ACM '83最新文献

筛选
英文 中文
Network protocol: A structured approach 网络协议:一种结构化方法
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809721
Tat Y. Choi, Raymond E. Miller
{"title":"Network protocol: A structured approach","authors":"Tat Y. Choi, Raymond E. Miller","doi":"10.1145/800173.809721","DOIUrl":"https://doi.org/10.1145/800173.809721","url":null,"abstract":"Network protocols are modeled by processes exchanging messages through communication channels. For finite state protocols, each process participating in the protocol can be represented by a finite state graph. In this paper, we introduce a structuring principle for finite state protocols in the form of subgraphs. By structured protocols, we mean the following. The protocol graph can be partitioned into or be constructed from subgraphs each having a unique entry node and zero or more exit nodes. The exit nodes of one subgraph can be connected only to the entry nodes of other subgraphs. Moreover, a process in one subgraph can exchange events with another process in its corresponding subgraph only, i.e. there are no 'cross interaction' between subgraphs. Finally, from the standpoint of protocol design or synthesis, we require that when one process makes a transition into another subgraph, the other process will follow suit. Protocols that satisfy the above properties are structured in the sense that their logical correctness can be inferred from the logical correctness of individual protocol subgraphs.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114967788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Office of the future: Using the structure of the human communication system to build the office of the future (I) 未来的办公室:利用人际沟通系统的结构构建未来的办公室(一)
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809738
I. Jarett
{"title":"Office of the future: Using the structure of the human communication system to build the office of the future (I)","authors":"I. Jarett","doi":"10.1145/800173.809738","DOIUrl":"https://doi.org/10.1145/800173.809738","url":null,"abstract":"The basic concept of the Office of the Future is a natural outgrowth of the expansion of computers helping people in business do what they could not, or would not, do. The presentation will be confined to describing how computers will be used to provide a technological linkage between the three parts of the human communication process and to clearly communicate complex financial information to all levels of management.\u0000 Communication, or lack thereof, is one of the most serious problems constraining efficient business operations. The human communication system uses three basic input and output channels to pass information. These three channels—voice, the written word, and symbols—provide a complete, sensitive and effective process that permits humans to communicate one with another. The system consists of a sender sending a message over one or more of the channels at a time, and the receiver receiving the message through one or more of the channels. The channels can and most often do have “static” in them caused by either the sender, the receiver or the channel. The static is more prevalent in business because different professional cultures have different vocabularies and customs. The result of the static is three levels of communication problems in business organizations:","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tutorial on Ada Ada教程
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809698
G. Poonen
{"title":"Tutorial on Ada","authors":"G. Poonen","doi":"10.1145/800173.809698","DOIUrl":"https://doi.org/10.1145/800173.809698","url":null,"abstract":"Ada is a general purpose language that was developed to meet the needs ofsoftware development within the U.S. Department of Defense. By the end of the 1980's, it is expected that the majority of software developed for mission-critical systems will be written in Ada. With the recent standardization of Ada by ANSI, there has been a considerable interest in the language both in the United States and abroad.\u0000 Ada is an extremely well-designed language and incorporates many important ideas in software methodology. These include:\u0000 •abstract data types\u0000 •information hiding\u0000 •concurrent processing\u0000 •re-usable software components\u0000 This tutorial is designed to introduce the main features of Ada. Using a simple problem as a background case study, the tutorial will cover:\u0000 •Ada types\u0000 •classical programming constructs\u0000 •packages, exceptions and generics\u0000 •tasks","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133017566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer budgeting of mineral holdings for a small scale mining operation 为小型采矿作业编制矿物储备的计算机预算
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809694
D. McCulley
{"title":"Computer budgeting of mineral holdings for a small scale mining operation","authors":"D. McCulley","doi":"10.1145/800173.809694","DOIUrl":"https://doi.org/10.1145/800173.809694","url":null,"abstract":"This paper describes how a computer program handles the problems encountered in developing a mining budget from a large number of individual and widely scattered ore deposits. Among the difficulties overcome by the use of the program are constantly changing production forecasts requiring reworking of the budget, scheduling of the capacities of the offsite loading facilities, production rates requiring the mining of several properties concurrently while still maintaining quality control, and pressing time limits on several leases.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133308346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personal computer software support 个人电脑软件支持
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809710
Thomas O'Flaherty
{"title":"Personal computer software support","authors":"Thomas O'Flaherty","doi":"10.1145/800173.809710","DOIUrl":"https://doi.org/10.1145/800173.809710","url":null,"abstract":"The issues and information presented here will be useful to all current and potential users of personal computers (PC's). Much of the presentation is focussed on the proper role of the MIS department. Data is based on a study of how a cross-section of medium and large organizations are dealing with PC software support issues. The best observed practices are described as well as recommendations for further improvements.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132347453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public cryptography outlook 公共密码学展望
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809713
M. Smid
{"title":"Public cryptography outlook","authors":"M. Smid","doi":"10.1145/800173.809713","DOIUrl":"https://doi.org/10.1145/800173.809713","url":null,"abstract":"Ten years ago last March, the National Bureau of Standards issued its first solicitation for an algorithm to be used in public cryptography. While significant progress has been made in the development of the technology in this field, the public's use of cryptography has proceeded more slowly than some had originally expected. Yet, looking back, it seems surprising that anyone would have thought that public cryptography could have developed any faster than it has.\u0000 When the DES was published as a standard in January, 1977, the private and non-classified government communities knew little about cryptography and its capabilities. Open publications were primarily academic papers, and consequently the public had a poor understanding of what problems cryptography could solve and what problems were beyond its scope.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115567279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session M4: Women in the workplace 会议M4:工作场所的妇女
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809686
V. Walker, Mary Charles Blakebrough, C. Eastman
{"title":"Session M4: Women in the workplace","authors":"V. Walker, Mary Charles Blakebrough, C. Eastman","doi":"10.1145/800173.809686","DOIUrl":"https://doi.org/10.1145/800173.809686","url":null,"abstract":"This session, organized by the Association for Women in Computing, seeks to provide a forum for discussion of the ever-changing environment facing today s woman in the computer industry. Each panelist, an experienced computer professional, will discuss private industry, academia, or government, in terms of the decision points in her own career. She will discuss topics such as initial educational requirements, work experience, career development activities, other issues relating to advancement, and the more general demands of the workplace as they have changed since she entered the workforce. She will then relate these factors to the entry-level computer professional, noting where shifts in emphasis have occurred. After the presentations, the panelists will discuss the similarities and differences in their various spheres.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On-line international cash management 网上国际现金管理
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809692
John F. Wilson
{"title":"On-line international cash management","authors":"John F. Wilson","doi":"10.1145/800173.809692","DOIUrl":"https://doi.org/10.1145/800173.809692","url":null,"abstract":"This paper describes a state-of-the-art cash management system recently installed for the Treasury Section of the United Nations Development Programme (UNDP). This system was a multi-year development effort of the UNDP supported by Chemical Bank's Cash Management Consulting Services (CMCS). It is resident on an IBM 4331 running under CICS with a DOS/VSE operating system. The data base management system is DL/I and it utilizes IBM 3270 terminals locally.\u0000 After a brief explanation on the basic functions of cash management, the general objectives of treasury systems are given to provide a background for the description of the system. The nature and scope of the operations of the Treasury Section are stated. In summary, the UNDP manages a cash flow of approximately $1 billion in over 150 currencies. Daily payments are made through 35 agencies with offices in 115 countries. Receivables (contributions) are denominated in 150 currencies. Cash in over 400 bank accounts is monitored daily and a $500,000,000 short-term portfolio, denominated in almost every major currency is maintained.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127360647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local network selection criteria 本地网络选择标准
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809683
K. Thurber, H. Freeman, Noel E. Schmidt
{"title":"Local network selection criteria","authors":"K. Thurber, H. Freeman, Noel E. Schmidt","doi":"10.1145/800173.809683","DOIUrl":"https://doi.org/10.1145/800173.809683","url":null,"abstract":"With over 200 manufacturers of local networks or local network products currently identified, a potential local network purchaser certainly has a wide selection of vendors from which to choose. Various topologies, control structures, media, access control techniques, and other local network items may be appropriate for the environment in which one's local network will be installed. Many local networks allow equipment of differing design or manufacturer to communicate; support the phased introduction of other system elements; allow for ease of reconfiguration; reduce duplication of resources; provide for smoother growth; and offer a more accurate alignment of the individual elements' usage patterns.\u0000 To correctly choose the local network or networks that will most completely offer these types of benefits, careful evaluation of the various offerings must be made. This article identifies the most important factors to consider when selecting a local network The selection criteria are listed in alphabetical order, because their individual ranking or importance is a function of the particular application requirements of the purchasing organization. The first steps in the selection process are to identify current and future applications that will use the network; correlate the applications, organized by rank or weighting factor, against the selection criteria; and then develop a set of appropriately weighted selection criteria to use In the evaluation of candidate local networks.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"458 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124855691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frontiers in computer science research 计算机科学研究的前沿
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809680
W. Miller
{"title":"Frontiers in computer science research","authors":"W. Miller","doi":"10.1145/800173.809680","DOIUrl":"https://doi.org/10.1145/800173.809680","url":null,"abstract":"Old frontiers in Computer Science continue to expand. New frontiers emerge as better theoretical understanding, dramatically improved hardware characteristics, and improved techniques for software open new vistas. Much of the excitment and drive towards new frontiers still stems from new hardware characteristics which make it possible to attack a host of new problems. Conversely, the drive to improve hardware characteristics and to utilize computer systems more effectively has presented many challenging problems for computer science and engineering.\u0000 An additional force that is creating a demand pull for advanced research in computer science is the drive in all industrial and government sectors toward greater efficiency and productivity in order to make our economy and industries more competitive internationally. Without doubt, the international challenge to our computer industry has stimulated both the private sector and the public sector toward new areas of computer science research.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122109571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信