{"title":"An application of cellular logic for high speed decoding of minimum-redundancy codes","authors":"K. Ohmori, S. Naito, T. Nanya, K. Nezu","doi":"10.1145/1479992.1480040","DOIUrl":"https://doi.org/10.1145/1479992.1480040","url":null,"abstract":"In the efforts to improve the total efficiency of computer systems and their applications, more importance is being placed on the qualitative improvement of processing information in these days. The use of \"Kanji (Chinese characters)\" in the system is becoming one of the topical themes of research and development in Japan. It is expected to considerably improve the communication from machine to man. In the case of Kanji, a character generator with a font capacity greater than 1000 is required. The same requirement might exist also in Western countries, if special fonts for Greek or Roman alphabets, italics, bold face, or special mathematical symbols are necessary. Another example is a computer generated high-speed phototypesetting system.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121079833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The protection of privacy and security in criminal offender record information systems","authors":"S. Rothman","doi":"10.1145/1479992.1480050","DOIUrl":"https://doi.org/10.1145/1479992.1480050","url":null,"abstract":"In this paper we will single out those aspects of the problem of protecting privacy and security in information systems that are special to law enforcement.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114270120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Control Data® STAR-100 file storage station","authors":"Gustav S. Christensen, P. D. Jones","doi":"10.1145/1479992.1480072","DOIUrl":"https://doi.org/10.1145/1479992.1480072","url":null,"abstract":"Successful experience with the Control Data® 6000 and 7000 computer series has led to implementing improved concepts of distributed computing in the STAR-100 computer system. In the STAR system different computing functions have been physically separated from one another. Each computing function is performed by an independent system unit which possesses its own processing logic and memory. Thus each is performed in its own right in an optimal manner.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115403469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of the Burroughs B1700","authors":"W. Wilner","doi":"10.1145/1479992.1480060","DOIUrl":"https://doi.org/10.1145/1479992.1480060","url":null,"abstract":"Procrustes was the ancient Attican malefactor who forced wayfarers to lie on an iron bed. He either stretched or cut short each person's legs to fit the bed's length. Finally, Procrustes was forced onto his own bed by Theseus.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132047231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TRIDENT: a new maintenance weapon","authors":"R. Fitzsimons","doi":"10.1145/1479992.1480026","DOIUrl":"https://doi.org/10.1145/1479992.1480026","url":null,"abstract":"Everyone is familiar with maintenance. It is a necessary requirement for almost everything we have, from spacecraft and automobiles, to the heels on your shoes. The maintenance that this paper is concerned with is that of business machines and their associated products. These devices are the means to the end required for your business and other endeavors.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133180073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Module connection analysis: a tool for scheduling software debugging activities","authors":"F. Haney","doi":"10.1145/1479992.1480016","DOIUrl":"https://doi.org/10.1145/1479992.1480016","url":null,"abstract":"The largest challenge facing software engineers today is to find ways to deliver large systems on schedule. Past experience obviously indicates that this is not a well-understood problem. The development costs and schedules for many large systems have exceeded the most conservative, contingency-laden estimates that anyone dared to make. Why has this happened? There must be a plethora of explanations and excuses, but I think H. R. J. Grosch identified the common denominator in his article, \"Why MAC, MIS and ABM will never fly.\" Grosch's observation is essentially that for some large systems the problem to be solved and the system designed to solve it are in such constant flux that stability is never achieved. Even for some systems that are flying today, it is obvious that they came precariously close to this unstable, \"critical mass\" state.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124897532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach to job pricing in a multi-programming environment","authors":"C. Kreitzberg, J. Webb","doi":"10.1145/1479992.1480007","DOIUrl":"https://doi.org/10.1145/1479992.1480007","url":null,"abstract":"Computers are amazingly fast, amazingly accurate, and amazingly expensive. This last attribute, expense, is one which must be considered by those who would utilize the speed and accuracy of computers. In order to equitably distribute the expense of computing among the various users, it is essential that the computer installation management be able to accurately assess the costs of processing a specific job. Knowing job costs is also important for efficiency studies, hardware planning, and workload evaluation as well as for billing purposes.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124020418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Burroughs B1700 memory utilization","authors":"W. Wilner","doi":"10.1145/1479992.1480074","DOIUrl":"https://doi.org/10.1145/1479992.1480074","url":null,"abstract":"Squeezing more information into memory is a familiar problem to everyone who has written a program which was too large to fit into memory. Program compaction is also important to those who work on machines with virtual memory (such as the B5500); despite the almost unlimited amount of storage, one wants to keep program working-sets (collections of segments needed in core at the same time) as small as possible to reduce both the number and duration of segment swaps. In general, one seeks to raise the information content (or reduce the redundancy) of the blocks of information which one is using. In this discussion, \"information content\" will suffice as an intuitive notion.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134510864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TASSY: one approach to individualized test construction","authors":"T. L. Blaskovics, James A. Kutsch","doi":"10.1145/1479992.1480080","DOIUrl":"https://doi.org/10.1145/1479992.1480080","url":null,"abstract":"During the past ten years universities and the computing industry have seen the development of a new mode of teaching called Computer Aided---or Assisted---Instruction (C.A.I.). This new field, emerged as an attempt to meet and deal with the growing criticism and frustration of students, employers, legislators, and faculties, which stemmed from our inability to prepare students adequately.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134280472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"System identification and simulation: a pattern recognition approach","authors":"W. Karplus","doi":"10.1145/1479992.1480045","DOIUrl":"https://doi.org/10.1145/1479992.1480045","url":null,"abstract":"Recent years have seen continuing and increasingly-intensive attempts to extend the art of simulation to areas which heretofore were considered too complex and too difficult to lend themselves to conventional modelling and simulation techniques. These include such environment-oriented fields as air-pollution, water conservation, thermal pollution, etc., as well as systems belonging to the biological, the medical, the economic, and sociological areas. For example, in 1970 the Office of Water Resources Research catalogued over 600 on-going research projects concerned with the modelling of water resource systems. The extension of simulation techniques developed in application areas such as control system design, electro-mechanical systems, etc., to these new areas has often been disappointing, if not completely unsuccessful. This is due to the difficulty in constructing a sufficiently-valid mathematical model---a model which can be used for prediction with a reasonable amount of confidence. It is well-known, of course, that even under the best conditions, inverse problems such as system identification problems, do not have unique solutions. That is, inevitably an infinite number of possible models will satisfy a specified set of excitation/response relationships. Where the identification process is further handicapped by uncertainties as to system structure and inadequate experimental data, the pertinent question is often not: \"How good is the model?\" but rather: \"Is there any point to modelling at all?\"","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}