{"title":"Program forms and program form analysers for high-level structured design","authors":"J. Ramanathan, M. Blattner","doi":"10.1109/MARK.1979.8817260","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817260","url":null,"abstract":"Structured programming is the single most important technique currently used in developing software which is both reliable and inexpensive. 11 , 27 It has been observed by various researchers that programmer productivity can be vastly improved if the development of software is split into two, equally important phases.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123761122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PM4—A reconfigurable multiprocessor system for pattern recognition and image processing","authors":"F. Briggs, K. Fu, K. Hwang, J. Patel","doi":"10.1109/MARK.1979.8817082","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817082","url":null,"abstract":"Pictorial information is often described by digitized arrays, syntactic (and semantic) strings and high-dimensional trees or graphs. The analysis and extraction of meaningful information for pictorial patterns by digital computers is called pictorial pattern analysis. Pattern analysis tasks require a wide variety of processing techniques and mathematical tools. In most machine intelligence systems, large computers are employed to process pictorial information. Because most image processing tasks require only repetitive Boolean operations or simple arithmetic operations defined over extremely large arrays of picture elements (pixels), 1 the use of large computers with rigidly structured sequential or parallel processors may result in intolerable waste of resources. 2 For example, the array-structured ILLIAC IV 3 and STARAN 4 are efficient for processing fixed-length vectors, but are very inefficient for mixed scalar and vector operations, due to the fact that multiple instruction streams do not exist simultaneously in these supercomputers.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122018707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A measure of software complexity","authors":"N. Chapin","doi":"10.1109/MARK.1979.8817207","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817207","url":null,"abstract":"In recounting-the copious reasons or excuses for our traditional problems in developing and maintaining computer software, many authorities have mentioned complexity (e.g., References 2, 8, 15). The complexity pointed to sometimes is the inherent complexity of the jobs the computer is to do; sometimes it is the complexity of the systems or programs that direct the computer to do the jobs.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131608224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A software reliability study using a complexity measure","authors":"Thomas J. Walsh","doi":"10.1109/MARK.1979.8817197","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817197","url":null,"abstract":"Software engineers face a real problem in guaranteeing that their computer programming systems under development will be able to function in a reliable manner and be easily understood, maintained and extended. A major impediment of this problem is coping with the inherent complexity of the software system in an effective way. The complexity of the computer system will defeat the designer’s efforts unless a relatively simple way is found to break the problem down in order that the resulting programs are testable and maintainable. Complex problems must be factored into smaller units to be treated by the human intelligence because man’s capacity for logically precise invention is limited. The consequence of ignoring these bounds to man’s cognitive and creative capacity was well stated by Harlan Mills of IBM: 1 We often ignore the complexity of a planned program or sub-program. But when the complexity exceeds certain unknown limits, frustration ensues. Computer programs capsize under their own logical weight, or become so crippled that maintenance is impossible.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115739335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The foundations of a provably secure operating system (PSOS)","authors":"R. Feiertag, P. Neumann","doi":"10.1109/MARK.1979.8817256","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817256","url":null,"abstract":"PSOS has been designed according to a set of formal techniques embodying the SRI Hierarchical Development Methodology (HDM). HDM has been described elsewhere, 1 – 3 and thus is only summarized here. The influence of HDM on the security of PSOS is also discussed elsewhere. 4 In addition, Linden 5 gives a general discussion of the impact of structured design techniques on the security of operating systems (including capability systems).","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124724342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aids to the development of network simulators","authors":"I. Chlamtac, W. Franta","doi":"10.1109/MARK.1979.8817312","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817312","url":null,"abstract":"In this paper we describe the features of a program designed to simulate computer networks. The networks are assumed to consist of hosts attached to one or more network nodes (communication units) which in turn communicate with one another via one or more communication channels. The program accounts for user-host, host-node, node-node, node-host, and host-user protocols, as well as network topology and hardware characteristics. As reported in a later section, the program has been primarily used to conduct simulations to ascertain the performance (in terms of message or packet throughput and delay) for a variety of node-node channel access protocols, for nodes connected to a single common communication medium (e.g. a multi-drop cable or radio channel). It is, however, possible to accommodate networks in which nodes may be connected to several separate communication channels. Further, it is possible to simulate the behavior of store-end-forward networks as they can be viewed as a network in which the nodes are connected to multiple communication links. For either class of network the program can be used to verify protocol correctness or to assess network performance.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129264169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MIS effects on managers’ task scope and satisfaction*","authors":"D. Robey","doi":"10.1109/MARK.1979.8817303","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817303","url":null,"abstract":"The impact of computers on organizations has long been a topic of special interest to management and organization theorists. Opinions vary widely on the nature and importance of information technology's influence on the structure and process of organizations. For every ounce of technical optimism created by computer scientists, a pound of social pessimism is generated by behavioral scientists suspicious of technological impacts. Over the past 20 years much dialogue has raged in emotional and speculative tones without substantial progress made in our understanding of the issue. The armchair theorists who project less human organizational life because of the computer have generally operated without the benefit of research findings. The purpose of this paper is to shed some empirical light on one hotly debated issue: the impact of management information systems on managers’ tasks and their evaluation of computer-induced changes in tasks.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115306097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applications for multilevel secure operating systems","authors":"J. P. Woodward","doi":"10.1109/MARK.1979.8817315","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817315","url":null,"abstract":"The need for secure computer systems has been identified in many areas of DoD operations, but in the past these systems have not been built in a secure manner because a secure operating system on which to run has not existed. Now that verifiably secure minicomputer operating systems are becoming a reality, applications for secure systems are becoming more clearly thought-out, designed and implemented. This paper surveys some proposed DoD and non-DoD secure computer applications.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123789169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Wilczynski, Ronald Tugender, Donald Obstreicher
{"title":"The SIGMA experience—A study in the evolutionary design of a large software system","authors":"D. Wilczynski, Ronald Tugender, Donald Obstreicher","doi":"10.1109/MARK.1979.8817183","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817183","url":null,"abstract":"Anyone who has been a part of a large software effort knows of its peculiar afflictions and special problems. The literature teems with guidelines, rules and conventions for designing and managing such systems; in fact, there are probably more books written about large systems than there are large systems. This paper will make no attempt to add to this literature; instead it will simply report our experience over the last five years in the design and implementation of sigma. 3 This introspective study is meant to be not a pedagogical paper but a reflective, often humbling, diary.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125661912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive modeling systems for managers—Semantic models should underlie quantitative models","authors":"R. B. Krumland","doi":"10.1109/MARK.1979.8817154","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817154","url":null,"abstract":"This paper is concerned with helping managers build and use quantitative models in problem-solving, especially models that are built and used on on-line, interactive computer systems. Quantitative models play a large part in many of the activities of managers of a wide variety of organizations. Indeed, several companies currently find it profitable to provide managers with the service of access to models and modeling systems which have increasing levels of sophistication. 2 , 8 However, such models are not used as widely as they could be. 6 Certain concepts are beginning to emerge which will hasten the development and deployment of more sophisticated interactive modeling systems which may improve this situation. Here we define one such concept—that of a semantic model —and discuss its place in an advanced interactive modeling system.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121072188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}