{"title":"The design and operation of public-key cryptosystems","authors":"Eric H. Michelman","doi":"10.1109/MARK.1979.8817308","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817308","url":null,"abstract":"Recently, there has been a major advance in the area of communications security—that of a practical way to implement public-key cryptosystems (PKCS).","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128102318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The terminal for the Military Message Experiment","authors":"R. Stotz, Paul Raveling, Jeff Rothenberg","doi":"10.1109/MARK.1979.8817110","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817110","url":null,"abstract":"One of the technical challenges faced in the Military Message Experiment (MME) is providing a system that is easy to learn and operate by the typical action officers who are the users of the message service. These people have no computer background and have neither the time nor the inclination to master a complex system in order to accomplish a simple task such as reading their message traffic, which they already do effectively. The system must offer some new capabilities to make it attractive, but above all it must be comfortable and natural to use. A most critical ingredient of the user’s interface to the system is the terminal.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131926844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The City of New York’s integrated financial management system—From mandate to working system in 18 months","authors":"Sally J. Rupert","doi":"10.1109/MARK.1979.8817129","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817129","url":null,"abstract":"The development and implementation of New York City’s Integrated Financial Management System (IFMS) is precedent-setting in both its scope and its purpose. It is an excellent example of the successful implementation of a largescale computer system, a 20-million-dollar investment using the combined efforts of five consulting firms, into a complex organization, a municipal bureaucracy with 250,000 employees in 109 agencies and with a constantly shifting executive management. This paper describes how it was accomplished in terms of the development philosophy, the building of the system and, finally, the post-implementation environment.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114201568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Serviceability features of the HP 300 small business computer","authors":"Curtis R. Gowan","doi":"10.1109/MARK.1979.8817268","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817268","url":null,"abstract":"As computing system prices go down due to technological advances in hardware, more emphasis is being placed on the overall cost of ownership. To meet this challenge, serviceability features are designed into the HP 300—intertwined throughout the system hardware and software.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124454781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring the earth's resources from space–Can you really identify crops by satellite?","authors":"D. Landgrebe","doi":"10.1109/MARK.1979.8817179","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817179","url":null,"abstract":"Of the most important questions facing society today, those near the top of the list include the status and future of the world's food supply, its environmental quality and its sources of energy. These questions have increasingly been before the general public in recent years and have for an even longer period of time, been of concern to the world's thinkers, planners and policy makers. It had long been recognized that after all, our earth and its resources are finite and that as society continues to grow we must find better ways to manage these finite resources.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122939014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public key vs. conventional key encryption*","authors":"C. Kline, G. Popek","doi":"10.1109/MARK.1979.8817073","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817073","url":null,"abstract":"As distributed computer systems grow and their convenience attracts uses for which maintenance of privacy and security is important, the means by which encryption is integrated into these systems also becomes important. Encryption is the only practical way by which secure, private communication can be conducted while employing untrusted media to carry the transmission. The interest has spurred developments in the use of conventional encryption algorithms and there is even a federal standard algorithm for commercial use. 4 In addition, an innovative approach to encryption, called public key algorithms, has recently been proposed as a way to address many of the key distribution and other problems which are present in conventional algorithm-based approaches.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115741165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic program synthesis via synthesis of loop-free segments*","authors":"J. Duran","doi":"10.1109/MARK.1979.8817062","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817062","url":null,"abstract":"Work on theorem-proving-based automatic program synthesis (see Lee, et al. , 7 for example) has been neglected lately. In their 1971 paper, Manna and Waldinger 8 covered one of the main reasons why—the difficulty of synthesizing program loops within the current state of the art of automatic theorem-proving. However, there is a great deal of continuing work in theorem-proving, and it is important that motivating work in related areas such as program synthesis not be neglected.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"193 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121865569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data flow languages","authors":"W. Ackerman","doi":"10.1109/MARK.1979.8817131","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817131","url":null,"abstract":"There are several computer system architectures which have the goal of exploiting parallelism—multiprocessors, vector machines and array processors. For each of these architectures there have been attempts to design compilers to optimize programs written in conventional languages (e.g. \"vectorizing\" compilers for the FORTRAN language). There have also been new language designs to facilitate using these systems, such as Concurrent PASCAL for multiprocessors,6 and languages that utilize the features of such systems directly, such as GLYPNIR for the Illiac IV array processor19 and various \"vectorizing\" dialects of FORTRAN. These languages almost always make the multiprocessor, vector, or array properties of the computer visible to the programmer—that is, they are actually vehicles whereby the programmer helps the compiler uncover parallelism. Many of these languages or dialects are \"unnatural\" in that they closely reflect the behavior of the system for which they were designed, rather than reflecting the way programmers think about problem solutions.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124205414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A data-handling mechanics of on-line text editing system with efficient secondary storage access","authors":"S. Pramanik, E. Irons","doi":"10.1109/MARK.1979.8817204","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817204","url":null,"abstract":"The data-handling algorithm in many current editors 2 uses a text which is a continuous string of characters. In this technique the characters are moved directly from their input source to the text string by expanding it in tue core buffer. The disadvantage of such existing systems is due to the core buffer constraint. The buffer can be extended to the auxiliary storage but will result in less efficient auxiliary storage accessing.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A programming language for high-level architecture","authors":"Y. Chu, Edward Cannon","doi":"10.1109/MARK.1979.8817091","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817091","url":null,"abstract":"The machine language of a computer is the programming language that the bare hardware can accept and interpret. In a von Neumann architecture, it is essentially a set of machine instructions and data formats. In a high-level computer architecture, 7 , 8 the machine language is a high-level programming language since the hardware high-level architecture accepts and interprets this high-level language. Therefore, the programming language for a high-level computer architecture is the high-level machine language. For this reason, the programming language to be presented in this paper is called the HLM language.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133945601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}