ACM '83最新文献

筛选
英文 中文
Office automation: New arena for old struggle 办公自动化:旧斗争的新舞台
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809728
A. Mowshowitz
{"title":"Office automation: New arena for old struggle","authors":"A. Mowshowitz","doi":"10.1145/800173.809728","DOIUrl":"https://doi.org/10.1145/800173.809728","url":null,"abstract":"Office work accounts for one-half of the total employment in the United States. In 1978 there were 15.6 million professional and technical workers, 8.8 million managers and administrators, 6.4 million salesworkers, and 17.8 million clerical workers, for a grand total of 48.6 million white-collar employees constituting 49.8 percent of all workers. 1 The Bureau of Labor Statistics projects an increase in this category of at least 24.9 percent, compared with 18.6 percent for blue-collar workers, 31.4 percent for service workers, and a decline of about 21 percent for farm workers. Although service occupations are expected to be the fastest growing occupational group during 1978-1990, the largest number of new jobs will occur in the white- and blue-collar categories. The former is expected to increase by 12.1 to 16.1 million jobs; the latter by 5.9 to 8.9 million.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer security in a non-traditional architecture 非传统体系结构中的计算机安全
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809696
Terry A. Cureton
{"title":"Computer security in a non-traditional architecture","authors":"Terry A. Cureton","doi":"10.1145/800173.809696","DOIUrl":"https://doi.org/10.1145/800173.809696","url":null,"abstract":"Isolation and separation between independent processes is a fundamental requirement for computer security. Nowhere is this more important than in the separation between operating system and user processes.\u0000 The architecture of the computer for which an operating system is designed is the determining factor on which mechanisms are used to meet this requirement and how effectively it is met. The architecture can make this relatively easy, difficult, or even impossible.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124062666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The new developments in C 解析:选C
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809736
Stephen C. Johnson, L. Rosler
{"title":"The new developments in C","authors":"Stephen C. Johnson, L. Rosler","doi":"10.1145/800173.809736","DOIUrl":"https://doi.org/10.1145/800173.809736","url":null,"abstract":"The C language has developed considerably since the publication of the Kernighan and Ritchie book. The language development includes enumeration data types, a void type, long (more than 8 character) identifiers, and an expanded semantic structure. At the same time, the compiler technology that developed the Portable C Compiler (which was used to provide more than 30 production compilers on different machines) is evolving into PCC2, which offers improved maintenance and an easier porting process while handling a larger number of machine features.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Subset/G PL/I and the PL/I Standard 子集/G PL/I和PL/I标准
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809714
P. Abrahams
{"title":"Subset/G PL/I and the PL/I Standard","authors":"P. Abrahams","doi":"10.1145/800173.809714","DOIUrl":"https://doi.org/10.1145/800173.809714","url":null,"abstract":"Subset/G PL/I (G for General Purpose) is a subset of full Standard PL/I. Both Subset/G PL/I and Standard PL/I are defined by standards issued by the American National Standards Institute. Subset/G evolved in the late 1970's as a result of a growing realization that full PL/I was a remarkably effective (if much maligned) language but at the same time a difficult language to implement and to teach. Subset/G was designed so as to preserve the most useful properties of PL/I while deleting features that were either little used, uneconomic to implement, or inappropriate to what we now know about good programming practice.\u0000 Full Standard PL/I is a descendant of the F-level PL/I language originally developed by IBM in the early 1960's. One of the design objectives of the original language was that it should be applicable to scientific programming, commercial programming, and systems programming. Part of the original rationale for this objective was that PL/I was intended to replace Fortran, Cobol, and assembly language. But there was also another reason: the growing number of applications that spanned more than one category. Subset/G also has this design objective, although some other design objectives of early PL/I were dropped, notably the principle that any construct that could reasonably be given a meaning should be acceptable. That rationale remains a major reason why Subset/G is a significant and useful language despite the many other languages that have emerged since PL/I was first designed.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125338076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of the relationship between job requirements and academic requirements in computer science 计算机科学中工作要求与学术要求之间关系的研究
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809701
J. Loase, Brian D. Monahan
{"title":"A study of the relationship between job requirements and academic requirements in computer science","authors":"J. Loase, Brian D. Monahan","doi":"10.1145/800173.809701","DOIUrl":"https://doi.org/10.1145/800173.809701","url":null,"abstract":"In scrutinizing the 1981 Occupational Outlook Handbook, one cannot fail to recognize a strong positive connection between mathematical requirements in educational pre-requisites for occupational entry and the concomitant demand and remuneration of such employment. Very little research has been completed characterized by an intensive analysis of the mathematical competencies requisite for effective job functioning in specific occupations.\u0000 Laws (1968) and Miller (1970) interviewed occupational representatives in technical areas and 44 occupational specializations in science. Both studies challenged the mathematical collegiate pre-requisites expected of the practitioner; Laws and Miller recommended a re-evaluation of pure mathematics requirements for employment. Saunders (1978) interviewed a single representative from each of 100 occupations and found that facility with whole numbers, decimals, use of calculators, and percentage as essential. Saunders' sample needs to be increased in order to obtain more reliable results.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"50 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122422282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Specification of content-dependent security policies 与内容相关的安全策略的规范
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809719
D. Spooner
{"title":"Specification of content-dependent security policies","authors":"D. Spooner","doi":"10.1145/800173.809719","DOIUrl":"https://doi.org/10.1145/800173.809719","url":null,"abstract":"The protection of information from unauthorized disclosure is an important consideration for the designers of any large multiuser computer system. A general purpose database management system often requires the enforcement of content-dependent security policies in which a decision to allow access must be based on the value of the data itself. Several authors ([Har76], [Sto76], [Gri76], [Sum77], [Min78], [Spo83], and others) have proposed mechanisms for implementing content-dependent security policies. Few authors, however, have investigated the properties of models for the specification of such policies.\u0000 This paper identifies several problems created by inadequate models for the specification of content-dependent security policies. If a specification model is too liberal in the types of policies it can express, it may provide an increased opportunity for compromise of data. If the specification model is too conservative, it cannot express many desirable policies. Thus a flexible model which will allow a compromise between these two extremes is needed for specifying content-dependent policies. Such a model is proposed here.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New computer-assisted instruction system for UNIX systems UNIX系统的新型计算机辅助教学系统
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809699
P. Matthews
{"title":"New computer-assisted instruction system for UNIX systems","authors":"P. Matthews","doi":"10.1145/800173.809699","DOIUrl":"https://doi.org/10.1145/800173.809699","url":null,"abstract":"The UNIX Instructional Workbench (IWB) software system is a general purpose computer-assisted instruction facility implemented for the UNIX operating system. The facility is characterized by a small number of abstract structures that support a wide range of courseware designs, and flexibility in using available terminal equipment and software. The INB system provides interactive aids for developing courseware as well as the means to deliver courseware to students.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126992138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer chess panel - 1983 电脑棋局- 1983年
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809722
B. Mittman
{"title":"Computer chess panel - 1983","authors":"B. Mittman","doi":"10.1145/800173.809722","DOIUrl":"https://doi.org/10.1145/800173.809722","url":null,"abstract":"This year's ACM Annual Conference will host a unique event in the United States, the Fourth World Computer Chess Championship. ACM began sponsoring computer chess tournaments in 1970. The first world championship was held in Stockholm in 1974. Subsequent world championships were held in Toronto in 1977 and in Linz, Austria in 1980. One popular activity at ACM tournaments has been a panel discussion among the computer chess authors. This year, since the ACM is hosting the World Championship, the panel will include participants from the U.S. and Europe. We hope to hear from the authors of the three former World championship chess programs, KAISSA from the Institute for Systems Science in Moscow (1974), CHESS 4.6 from Northwestern University (1977), and BELLE from Bell Labs (1980). In addition, this year's tournament and panel will feature authors of microcomputer chess programs as well.\u0000 Some of the questions to be discussed will be: Has the chess playing strength of the programs reached a plateau? Will research into “expert systems” migrate into the development of better chess programs? What is being done to use the 32-bit micros in chess programming? What about the “super” computers?\u0000 We urge the audience to come prepared with questions, since these panels have elicited lively discussions in the past. This year should be no exception.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"74 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131708443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiuser microcomputer systems 多用户微机系统
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809716
I. Flores
{"title":"Multiuser microcomputer systems","authors":"I. Flores","doi":"10.1145/800173.809716","DOIUrl":"https://doi.org/10.1145/800173.809716","url":null,"abstract":"Microcomputers are small, efficient, powerful and inexpensive. They have found many uses in commerce and industry as well as for education and enlightenment. They are so inexpensive that it is possible in some firms to put one on everybody's desk. The computers are truly personal.\u0000 Personal stand-alone computers are fine for doing independent individual work. When it comes to sharing the work of others, we need an integrated system. Information created by one person should be easily available to any other person. This is a common policy in education, commerce, industry and engineering where the medium of exchange is the mainframe. Terminals allow users access to large quantities of information, as long as they are privileged to do so.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133527062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptual prototyping 概念原型设计
ACM '83 Pub Date : 1900-01-01 DOI: 10.1145/800173.809740
A. C. Steele, Barbara J. Nowell
{"title":"Conceptual prototyping","authors":"A. C. Steele, Barbara J. Nowell","doi":"10.1145/800173.809740","DOIUrl":"https://doi.org/10.1145/800173.809740","url":null,"abstract":"Requirements engineering involves three processes: (1) problem recognition; (2) problem understanding; (3) solution space specification. [5] This paper focuses on problem recognition and problem understanding—the needs determination component of requirements engineering. During needs determination effective communication between information system users and information system designers is critical—creative exploration of the problem environment is imperative.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115664323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信