ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809728
A. Mowshowitz
{"title":"Office automation: New arena for old struggle","authors":"A. Mowshowitz","doi":"10.1145/800173.809728","DOIUrl":"https://doi.org/10.1145/800173.809728","url":null,"abstract":"Office work accounts for one-half of the total employment in the United States. In 1978 there were 15.6 million professional and technical workers, 8.8 million managers and administrators, 6.4 million salesworkers, and 17.8 million clerical workers, for a grand total of 48.6 million white-collar employees constituting 49.8 percent of all workers. 1 The Bureau of Labor Statistics projects an increase in this category of at least 24.9 percent, compared with 18.6 percent for blue-collar workers, 31.4 percent for service workers, and a decline of about 21 percent for farm workers. Although service occupations are expected to be the fastest growing occupational group during 1978-1990, the largest number of new jobs will occur in the white- and blue-collar categories. The former is expected to increase by 12.1 to 16.1 million jobs; the latter by 5.9 to 8.9 million.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809696
Terry A. Cureton
{"title":"Computer security in a non-traditional architecture","authors":"Terry A. Cureton","doi":"10.1145/800173.809696","DOIUrl":"https://doi.org/10.1145/800173.809696","url":null,"abstract":"Isolation and separation between independent processes is a fundamental requirement for computer security. Nowhere is this more important than in the separation between operating system and user processes.\u0000 The architecture of the computer for which an operating system is designed is the determining factor on which mechanisms are used to meet this requirement and how effectively it is met. The architecture can make this relatively easy, difficult, or even impossible.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124062666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809736
Stephen C. Johnson, L. Rosler
{"title":"The new developments in C","authors":"Stephen C. Johnson, L. Rosler","doi":"10.1145/800173.809736","DOIUrl":"https://doi.org/10.1145/800173.809736","url":null,"abstract":"The C language has developed considerably since the publication of the Kernighan and Ritchie book. The language development includes enumeration data types, a void type, long (more than 8 character) identifiers, and an expanded semantic structure. At the same time, the compiler technology that developed the Portable C Compiler (which was used to provide more than 30 production compilers on different machines) is evolving into PCC2, which offers improved maintenance and an easier porting process while handling a larger number of machine features.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809714
P. Abrahams
{"title":"Subset/G PL/I and the PL/I Standard","authors":"P. Abrahams","doi":"10.1145/800173.809714","DOIUrl":"https://doi.org/10.1145/800173.809714","url":null,"abstract":"Subset/G PL/I (G for General Purpose) is a subset of full Standard PL/I. Both Subset/G PL/I and Standard PL/I are defined by standards issued by the American National Standards Institute. Subset/G evolved in the late 1970's as a result of a growing realization that full PL/I was a remarkably effective (if much maligned) language but at the same time a difficult language to implement and to teach. Subset/G was designed so as to preserve the most useful properties of PL/I while deleting features that were either little used, uneconomic to implement, or inappropriate to what we now know about good programming practice.\u0000 Full Standard PL/I is a descendant of the F-level PL/I language originally developed by IBM in the early 1960's. One of the design objectives of the original language was that it should be applicable to scientific programming, commercial programming, and systems programming. Part of the original rationale for this objective was that PL/I was intended to replace Fortran, Cobol, and assembly language. But there was also another reason: the growing number of applications that spanned more than one category. Subset/G also has this design objective, although some other design objectives of early PL/I were dropped, notably the principle that any construct that could reasonably be given a meaning should be acceptable. That rationale remains a major reason why Subset/G is a significant and useful language despite the many other languages that have emerged since PL/I was first designed.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125338076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809701
J. Loase, Brian D. Monahan
{"title":"A study of the relationship between job requirements and academic requirements in computer science","authors":"J. Loase, Brian D. Monahan","doi":"10.1145/800173.809701","DOIUrl":"https://doi.org/10.1145/800173.809701","url":null,"abstract":"In scrutinizing the 1981 Occupational Outlook Handbook, one cannot fail to recognize a strong positive connection between mathematical requirements in educational pre-requisites for occupational entry and the concomitant demand and remuneration of such employment. Very little research has been completed characterized by an intensive analysis of the mathematical competencies requisite for effective job functioning in specific occupations.\u0000 Laws (1968) and Miller (1970) interviewed occupational representatives in technical areas and 44 occupational specializations in science. Both studies challenged the mathematical collegiate pre-requisites expected of the practitioner; Laws and Miller recommended a re-evaluation of pure mathematics requirements for employment. Saunders (1978) interviewed a single representative from each of 100 occupations and found that facility with whole numbers, decimals, use of calculators, and percentage as essential. Saunders' sample needs to be increased in order to obtain more reliable results.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"50 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122422282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809719
D. Spooner
{"title":"Specification of content-dependent security policies","authors":"D. Spooner","doi":"10.1145/800173.809719","DOIUrl":"https://doi.org/10.1145/800173.809719","url":null,"abstract":"The protection of information from unauthorized disclosure is an important consideration for the designers of any large multiuser computer system. A general purpose database management system often requires the enforcement of content-dependent security policies in which a decision to allow access must be based on the value of the data itself. Several authors ([Har76], [Sto76], [Gri76], [Sum77], [Min78], [Spo83], and others) have proposed mechanisms for implementing content-dependent security policies. Few authors, however, have investigated the properties of models for the specification of such policies.\u0000 This paper identifies several problems created by inadequate models for the specification of content-dependent security policies. If a specification model is too liberal in the types of policies it can express, it may provide an increased opportunity for compromise of data. If the specification model is too conservative, it cannot express many desirable policies. Thus a flexible model which will allow a compromise between these two extremes is needed for specifying content-dependent policies. Such a model is proposed here.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809699
P. Matthews
{"title":"New computer-assisted instruction system for UNIX systems","authors":"P. Matthews","doi":"10.1145/800173.809699","DOIUrl":"https://doi.org/10.1145/800173.809699","url":null,"abstract":"The UNIX Instructional Workbench (IWB) software system is a general purpose computer-assisted instruction facility implemented for the UNIX operating system. The facility is characterized by a small number of abstract structures that support a wide range of courseware designs, and flexibility in using available terminal equipment and software. The INB system provides interactive aids for developing courseware as well as the means to deliver courseware to students.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126992138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809722
B. Mittman
{"title":"Computer chess panel - 1983","authors":"B. Mittman","doi":"10.1145/800173.809722","DOIUrl":"https://doi.org/10.1145/800173.809722","url":null,"abstract":"This year's ACM Annual Conference will host a unique event in the United States, the Fourth World Computer Chess Championship. ACM began sponsoring computer chess tournaments in 1970. The first world championship was held in Stockholm in 1974. Subsequent world championships were held in Toronto in 1977 and in Linz, Austria in 1980. One popular activity at ACM tournaments has been a panel discussion among the computer chess authors. This year, since the ACM is hosting the World Championship, the panel will include participants from the U.S. and Europe. We hope to hear from the authors of the three former World championship chess programs, KAISSA from the Institute for Systems Science in Moscow (1974), CHESS 4.6 from Northwestern University (1977), and BELLE from Bell Labs (1980). In addition, this year's tournament and panel will feature authors of microcomputer chess programs as well.\u0000 Some of the questions to be discussed will be: Has the chess playing strength of the programs reached a plateau? Will research into “expert systems” migrate into the development of better chess programs? What is being done to use the 32-bit micros in chess programming? What about the “super” computers?\u0000 We urge the audience to come prepared with questions, since these panels have elicited lively discussions in the past. This year should be no exception.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"74 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131708443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809716
I. Flores
{"title":"Multiuser microcomputer systems","authors":"I. Flores","doi":"10.1145/800173.809716","DOIUrl":"https://doi.org/10.1145/800173.809716","url":null,"abstract":"Microcomputers are small, efficient, powerful and inexpensive. They have found many uses in commerce and industry as well as for education and enlightenment. They are so inexpensive that it is possible in some firms to put one on everybody's desk. The computers are truly personal.\u0000 Personal stand-alone computers are fine for doing independent individual work. When it comes to sharing the work of others, we need an integrated system. Information created by one person should be easily available to any other person. This is a common policy in education, commerce, industry and engineering where the medium of exchange is the mainframe. Terminals allow users access to large quantities of information, as long as they are privileged to do so.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133527062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '83Pub Date : 1900-01-01DOI: 10.1145/800173.809740
A. C. Steele, Barbara J. Nowell
{"title":"Conceptual prototyping","authors":"A. C. Steele, Barbara J. Nowell","doi":"10.1145/800173.809740","DOIUrl":"https://doi.org/10.1145/800173.809740","url":null,"abstract":"Requirements engineering involves three processes: (1) problem recognition; (2) problem understanding; (3) solution space specification. [5] This paper focuses on problem recognition and problem understanding—the needs determination component of requirements engineering. During needs determination effective communication between information system users and information system designers is critical—creative exploration of the problem environment is imperative.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115664323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}