ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809721
Tat Y. Choi, Raymond E. Miller
{"title":"Network protocol: A structured approach","authors":"Tat Y. Choi, Raymond E. Miller","doi":"10.1145/800173.809721","DOIUrl":"https://doi.org/10.1145/800173.809721","url":null,"abstract":"Network protocols are modeled by processes exchanging messages through communication channels. For finite state protocols, each process participating in the protocol can be represented by a finite state graph. In this paper, we introduce a structuring principle for finite state protocols in the form of subgraphs. By structured protocols, we mean the following. The protocol graph can be partitioned into or be constructed from subgraphs each having a unique entry node and zero or more exit nodes. The exit nodes of one subgraph can be connected only to the entry nodes of other subgraphs. Moreover, a process in one subgraph can exchange events with another process in its corresponding subgraph only, i.e. there are no 'cross interaction' between subgraphs. Finally, from the standpoint of protocol design or synthesis, we require that when one process makes a transition into another subgraph, the other process will follow suit. Protocols that satisfy the above properties are structured in the sense that their logical correctness can be inferred from the logical correctness of individual protocol subgraphs.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114967788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809738
I. Jarett
{"title":"Office of the future: Using the structure of the human communication system to build the office of the future (I)","authors":"I. Jarett","doi":"10.1145/800173.809738","DOIUrl":"https://doi.org/10.1145/800173.809738","url":null,"abstract":"The basic concept of the Office of the Future is a natural outgrowth of the expansion of computers helping people in business do what they could not, or would not, do. The presentation will be confined to describing how computers will be used to provide a technological linkage between the three parts of the human communication process and to clearly communicate complex financial information to all levels of management.\u0000 Communication, or lack thereof, is one of the most serious problems constraining efficient business operations. The human communication system uses three basic input and output channels to pass information. These three channels—voice, the written word, and symbols—provide a complete, sensitive and effective process that permits humans to communicate one with another. The system consists of a sender sending a message over one or more of the channels at a time, and the receiver receiving the message through one or more of the channels. The channels can and most often do have “static” in them caused by either the sender, the receiver or the channel. The static is more prevalent in business because different professional cultures have different vocabularies and customs. The result of the static is three levels of communication problems in business organizations:","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809698
G. Poonen
{"title":"Tutorial on Ada","authors":"G. Poonen","doi":"10.1145/800173.809698","DOIUrl":"https://doi.org/10.1145/800173.809698","url":null,"abstract":"Ada is a general purpose language that was developed to meet the needs ofsoftware development within the U.S. Department of Defense. By the end of the 1980's, it is expected that the majority of software developed for mission-critical systems will be written in Ada. With the recent standardization of Ada by ANSI, there has been a considerable interest in the language both in the United States and abroad.\u0000 Ada is an extremely well-designed language and incorporates many important ideas in software methodology. These include:\u0000 •abstract data types\u0000 •information hiding\u0000 •concurrent processing\u0000 •re-usable software components\u0000 This tutorial is designed to introduce the main features of Ada. Using a simple problem as a background case study, the tutorial will cover:\u0000 •Ada types\u0000 •classical programming constructs\u0000 •packages, exceptions and generics\u0000 •tasks","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133017566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809694
D. McCulley
{"title":"Computer budgeting of mineral holdings for a small scale mining operation","authors":"D. McCulley","doi":"10.1145/800173.809694","DOIUrl":"https://doi.org/10.1145/800173.809694","url":null,"abstract":"This paper describes how a computer program handles the problems encountered in developing a mining budget from a large number of individual and widely scattered ore deposits. Among the difficulties overcome by the use of the program are constantly changing production forecasts requiring reworking of the budget, scheduling of the capacities of the offsite loading facilities, production rates requiring the mining of several properties concurrently while still maintaining quality control, and pressing time limits on several leases.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133308346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809710
Thomas O'Flaherty
{"title":"Personal computer software support","authors":"Thomas O'Flaherty","doi":"10.1145/800173.809710","DOIUrl":"https://doi.org/10.1145/800173.809710","url":null,"abstract":"The issues and information presented here will be useful to all current and potential users of personal computers (PC's). Much of the presentation is focussed on the proper role of the MIS department. Data is based on a study of how a cross-section of medium and large organizations are dealing with PC software support issues. The best observed practices are described as well as recommendations for further improvements.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132347453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809713
M. Smid
{"title":"Public cryptography outlook","authors":"M. Smid","doi":"10.1145/800173.809713","DOIUrl":"https://doi.org/10.1145/800173.809713","url":null,"abstract":"Ten years ago last March, the National Bureau of Standards issued its first solicitation for an algorithm to be used in public cryptography. While significant progress has been made in the development of the technology in this field, the public's use of cryptography has proceeded more slowly than some had originally expected. Yet, looking back, it seems surprising that anyone would have thought that public cryptography could have developed any faster than it has.\u0000 When the DES was published as a standard in January, 1977, the private and non-classified government communities knew little about cryptography and its capabilities. Open publications were primarily academic papers, and consequently the public had a poor understanding of what problems cryptography could solve and what problems were beyond its scope.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115567279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809686
V. Walker, Mary Charles Blakebrough, C. Eastman
{"title":"Session M4: Women in the workplace","authors":"V. Walker, Mary Charles Blakebrough, C. Eastman","doi":"10.1145/800173.809686","DOIUrl":"https://doi.org/10.1145/800173.809686","url":null,"abstract":"This session, organized by the Association for Women in Computing, seeks to provide a forum for discussion of the ever-changing environment facing today s woman in the computer industry. Each panelist, an experienced computer professional, will discuss private industry, academia, or government, in terms of the decision points in her own career. She will discuss topics such as initial educational requirements, work experience, career development activities, other issues relating to advancement, and the more general demands of the workplace as they have changed since she entered the workforce. She will then relate these factors to the entry-level computer professional, noting where shifts in emphasis have occurred. After the presentations, the panelists will discuss the similarities and differences in their various spheres.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809692
John F. Wilson
{"title":"On-line international cash management","authors":"John F. Wilson","doi":"10.1145/800173.809692","DOIUrl":"https://doi.org/10.1145/800173.809692","url":null,"abstract":"This paper describes a state-of-the-art cash management system recently installed for the Treasury Section of the United Nations Development Programme (UNDP). This system was a multi-year development effort of the UNDP supported by Chemical Bank's Cash Management Consulting Services (CMCS). It is resident on an IBM 4331 running under CICS with a DOS/VSE operating system. The data base management system is DL/I and it utilizes IBM 3270 terminals locally.\u0000 After a brief explanation on the basic functions of cash management, the general objectives of treasury systems are given to provide a background for the description of the system. The nature and scope of the operations of the Treasury Section are stated. In summary, the UNDP manages a cash flow of approximately $1 billion in over 150 currencies. Daily payments are made through 35 agencies with offices in 115 countries. Receivables (contributions) are denominated in 150 currencies. Cash in over 400 bank accounts is monitored daily and a $500,000,000 short-term portfolio, denominated in almost every major currency is maintained.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127360647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809683
K. Thurber, H. Freeman, Noel E. Schmidt
{"title":"Local network selection criteria","authors":"K. Thurber, H. Freeman, Noel E. Schmidt","doi":"10.1145/800173.809683","DOIUrl":"https://doi.org/10.1145/800173.809683","url":null,"abstract":"With over 200 manufacturers of local networks or local network products currently identified, a potential local network purchaser certainly has a wide selection of vendors from which to choose. Various topologies, control structures, media, access control techniques, and other local network items may be appropriate for the environment in which one's local network will be installed. Many local networks allow equipment of differing design or manufacturer to communicate; support the phased introduction of other system elements; allow for ease of reconfiguration; reduce duplication of resources; provide for smoother growth; and offer a more accurate alignment of the individual elements' usage patterns.\u0000 To correctly choose the local network or networks that will most completely offer these types of benefits, careful evaluation of the various offerings must be made. This article identifies the most important factors to consider when selecting a local network The selection criteria are listed in alphabetical order, because their individual ranking or importance is a function of the particular application requirements of the purchasing organization. The first steps in the selection process are to identify current and future applications that will use the network; correlate the applications, organized by rank or weighting factor, against the selection criteria; and then develop a set of appropriately weighted selection criteria to use In the evaluation of candidate local networks.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124855691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809680
W. Miller
{"title":"Frontiers in computer science research","authors":"W. Miller","doi":"10.1145/800173.809680","DOIUrl":"https://doi.org/10.1145/800173.809680","url":null,"abstract":"Old frontiers in Computer Science continue to expand. New frontiers emerge as better theoretical understanding, dramatically improved hardware characteristics, and improved techniques for software open new vistas. Much of the excitment and drive towards new frontiers still stems from new hardware characteristics which make it possible to attack a host of new problems. Conversely, the drive to improve hardware characteristics and to utilize computer systems more effectively has presented many challenging problems for computer science and engineering.\u0000 An additional force that is creating a demand pull for advanced research in computer science is the drive in all industrial and government sectors toward greater efficiency and productivity in order to make our economy and industries more competitive internationally. Without doubt, the international challenge to our computer industry has stimulated both the private sector and the public sector toward new areas of computer science research.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122109571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}