{"title":"Police and computer technology—The expectations and the results","authors":"K. W. Colton","doi":"10.1109/MARK.1979.8817156","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817156","url":null,"abstract":"In July, 1965, in the face of dramatic rises in reported crime and delinquency rates, the President’s Commission on Law Enforcement and the Administration of Justice (sometimes called the Crime Commission) was created. One area selected for special attention in the Commission’s final report was the potential contribution of science and technology in the generally labor-intensive field of law enforcement. Because criminal justice agencies must process enormous quantities of data, the use of computer technology—electronic computers and new techniques such as systems analysis, operations research and computer modeling—seemed particularly promising, and the use of computer technology by the police has expanded significantly since the mid-1960s.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132476291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A mathematical model for distributed free space","authors":"Y. Chin, YU S.H.","doi":"10.1109/MARK.1979.8817087","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817087","url":null,"abstract":"To have fast response time is often a requirement for a data base system especially in the on-line environment such as inventory control, stock quotation or hotel/airline reservation. This requirement for fast response time can be easily obtained by carefully organizing the file at loading time. Due to subsequent insertions, the file structure designed with fast response time would be damaged because insertions were stored in overflow area. As more insertions are added, the response time will be lengthened since accessing records in overflow area takes more time than in home area. When the response time exceeds the tolerance limit that a user can stand, a reorganization is required. In general, reorganization of a file is a costly and time-consuming job and should be avoided as much as possible. In order to maintain a fast response time and to avoid frequent reorganizations, a technique called \"distributed free space\" 10 within home area was introduced.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"591 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The BTI 8000-Homogeneous, general-purpose multiprocessing","authors":"G. Lewis, J. Henry, B. P. McCune","doi":"10.1109/MARK.1979.8817201","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817201","url":null,"abstract":"With the price of computer hardware decreasing steadily and the scope of data processing applications ever rising, the problem of upgrading a computer system is omnipresent. The myriad of potential pitfalls includes losing an investment in purchased hardware and software, reprogramming applications, reformatting data files, retraining personnel, operating two different systems in parallel during the conversion period and reoptimizing finely tuned applications.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115576772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fixing timeout intervals for lost packet detection in computer communication networks","authors":"R. Morris","doi":"10.1109/MARK.1979.8817276","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817276","url":null,"abstract":"In a packet-switched data communication network which provides internal packet accountability via an end-to-end positive acknowledgment protocol, it is necessary to include a mechanism for detection and retransmission of missing packets. In particular, a decision must be made as to how long a sending element should reasonably wait before declaring an unacknowledged packet lost and initiating a recovery action. This waiting time is one of a class of system parameters which have come to be known as timeout intervals. The choice of a timeout interval is a delicate problem. 1 , 2 If it is too short, network capacity is wasted by frequent unnecessary actions for packets which are not lost but merely delayed. If the timeout interval is too long, lost packets cause needlessly prolonged delays before recovery is initiated.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124864754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"KSOS—Computer network applications","authors":"M. Padlipsky, K. Biba, R. Neely","doi":"10.1109/MARK.1979.8817313","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817313","url":null,"abstract":"The need for multilevel security in computer systems has become well known. In the military, lacking such systems makes costs higher than they should be because of the need either to replicate facilities or perform \"color changes\" (shutting down and purging systems between uses at varying levels) in order to deny less-cleared users access to highly-classified information, and desirable functions which would require the controlled intermixing of data at different security levels are simply not yet done. The Government’s concern with such matters is amply reflected in Reference 9 . Outside the military, it is clear that most if not all funds transfer systems, for example, would benefit from the other side of the security coin—that is, although the major military threat is compromise of data, the major financial threat is alteration of data. In both broad areas, a free-standing multilevel secure operating system would be a distinct asset. The Kemelized Secure Operating System is meant to be just such a system, and in these terms alone is of considerable interest. This paper, though, will address potential applications of KSOS in areas other than as a free-standing system.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130532608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The practice of data base administration","authors":"J. Weldon","doi":"10.1109/MARK.1979.8817241","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817241","url":null,"abstract":"The position or role of data base administrator has been described and discussed since the earliest specifications for data base management systems. 1 , 2 , 4 Most of the literature on DBA is normative—describing in detail what the DBA function should include. Different authors have focused on the DBA’s role in introducing the data base concept to organizations, 8 the functions that the DBA should perform, 7 the specification of tools and DBMS features needed by DBAs, 3 and how to establish and perform the DBA’s responsibilities within an organization. 5 , 6 In practice, however, the organization and content of the DBA function may be quite different from the ideal. Other factors related to the DBA’s technical and organizational environment may influence the DBA’s role. This paper summarizes the results of an exploratory survey on data base administration 9 which was undertaken as a first step toward identifying and understanding these factors.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126728311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Textfax—Principle for new tools in the office of the future","authors":"W. Horak, W. Woborschil","doi":"10.1109/MARK.1979.8817196","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817196","url":null,"abstract":"By taking a closer look at today’s office, we observe the following trend: The conventional typewriter is gradually being replaced by word-processors. These may merely be electric typewriters with a storage added or they may take on the form of highly sophisticated CRT workstations featuring screens carrying an entire standard size page and exchangeable storage media. These systems, which originally had been intended for local word-processing, are now increasingly being supplemented by communication functions, permitting direct text communication from one’s own buffer to that of a business partner—i.e. to his electronic \"mailbox.\" Whenever desired, the recipient can then call up the text from the buffer for reading or, if necessary, for editing and subsequent filing or forwarding. These functions can be summed up under the catchword \"electronic mail.\"","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126750344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of interconnection methods for reconfigurable parallel processing systems*","authors":"H. Siegel, Robert J. McMillen, Philip T. Mueller","doi":"10.1109/MARK.1979.8817077","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817077","url":null,"abstract":"This is a survey of a variety of interconnection networks for reconfigurable parallel processing systems that have appeared in the literature. A system is reconfigurable if it may assume several architectural configurations, each of which is characterized by its own topology of activated interconnections between modules. 18 The systems whose networks will be examined include multiple-SIMD and MIMD systems, as well as both fixed and dynamic word size systems. This paper is restricted to networks for geographically-localized parallel processing systems using 12 or more processors in a reconfigurable manner. Related survey papers include References 1 , 3 , 10 , 19 , 20 , 45 - 47 .","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126054355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptation properties for dynamic architectures","authors":"S. I. Kartashev, S. P. Kartashev, C. Ramamoorthy","doi":"10.1109/MARK.1979.8817086","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817086","url":null,"abstract":"The main characteristic of most powerful parallel systems is that their architecture is oriented towards specific types of problems to be computed. Such an orientation limits the range of tasks that can be effectively solved. As a result, systems are produced in small quantities which must bear all the costs of software and hardware development, and which are, as a result, very expensive. This slows down the computerization of many other complex problems just because they require that new high cost parallel systems be manufactured for their computation.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125273119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic similarity analysis—A computer-based study of meaning in noun phrases","authors":"L. Peterson","doi":"10.1109/MARK.1979.8817095","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817095","url":null,"abstract":"The purpose of this paper is to present a method by which a computerized data base which contains phrases of natural language information can be created and interrogated in the semantic domain for multiple uses and users. The method takes into account both the individual user’s needs and concepts of similarity in meaning of textual material represented by the stored data. The method is applicable to arbitrary bodies of natural language text which occur in the syntactic format of the noun phrase. The method was developed and tested, however, using noun phrases of medical text since its capabilities are directly applicable to needs in that area.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132818043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}