1979 International Workshop on Managing Requirements Knowledge (MARK)最新文献

筛选
英文 中文
MMPS—A reconfigurable multi-microprocessor simulator system 一个可重构的多微处理器模拟器系统
1979 International Workshop on Managing Requirements Knowledge (MARK) Pub Date : 1899-12-30 DOI: 10.1109/MARK.1979.8817287
D. Klein
{"title":"MMPS—A reconfigurable multi-microprocessor simulator system","authors":"D. Klein","doi":"10.1109/MARK.1979.8817287","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817287","url":null,"abstract":"The computing industry is currently undergoing a quiet revolution. Along with the recent advances in LSI design and production, a new trend in computation is forming. Many corporations are realizing that an important part of the future of computers lies in distributed data processing. The emphasis here is not on distributed data, for this field has been extensively (though certainly not completely) researched by computer scientists, but on distributed processing.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133202978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An associative search language for data management 用于数据管理的关联搜索语言
1979 International Workshop on Managing Requirements Knowledge (MARK) Pub Date : 1899-12-30 DOI: 10.1109/MARK.1979.8817075
A. Mukhopadhyay, A. Hurson
{"title":"An associative search language for data management","authors":"A. Mukhopadhyay, A. Hurson","doi":"10.1109/MARK.1979.8817075","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817075","url":null,"abstract":"Recent years have witnessed a widespread and intensive effort to develop systems to store, maintain and access data bases of varied size. Such systems are referred to as DBMS— D ata B ase Management S ystems. In different areas, such as artificial intelligence, management information systems, military and corporate logistics and medical diagnosis, a wide variety of DBMS exist. All these systems have generally been implemented on conventional computers, which are based on the von Neumann design. In this design, operations will be performed on the information in the memory by means of their addresses. Because of the size of typical data bases and costs of memory, we cannot hold all information in the main memory and swapping converts the search problem to a transportation problem. Present-day systems have to transfer large sets of data from their mass storage to the CPU, where simple compare-functions are performed in order to separate relevant data from irrelevant data. The transfer channels with their limited capacity form the main bottleneck of this system and as a result, great efforts have been made to reduce the necessary data flow by means of sophisticated software systems and additional redundancy such as index tables and inverted files. By these techniques, address of information will be obtained from a directory. Although directory partially solved the bottleneck problem, it nevertheless created some problems. The directory should logically be kept in the main memory. If we are dealing with large data bases, naturally we are dealing also with large directories, and large directories occupy a large portion of the memory. Also, the use of directories will create some complexity in the search, update and delete algorithms. Conventional computers are all based on numerical operations. The necessity of designing new hardware based on non-numerical operations has been discussed in detail by one of the authors. 1 In contrast, use of associative or content addressable memories and hardware design based on non-numerical operations as well as numerical operations causes information stored at unknown locations to be processed efficiently on the basis of some knowledge of its content.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114689417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Women and minorities in the computer professions 计算机行业的女性和少数族裔
1979 International Workshop on Managing Requirements Knowledge (MARK) Pub Date : 1899-12-30 DOI: 10.1109/MARK.1979.8817124
H. Wood
{"title":"Women and minorities in the computer professions","authors":"H. Wood","doi":"10.1109/MARK.1979.8817124","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817124","url":null,"abstract":"Generally, while full equity may not have been achieved by women and minorities in computer occupations, the belief has been that their employment status was better and conditions were more favorable for full utilization of skills due to the relative youth of the computer field. The federal government, in particular, has been involved in computers since their beginnings, and in addition has taken a stance in support of both equal employment opportunity (EEO) and affirmative action. 19 This position has been backed by laws (e.g., Civil Rights Act of 1964) and Executive Orders (e.g., E.O. 10590 and E.O. 11375) prohibiting discrimination on the basis of race, color, religion, sex, national origin, or age in federal employment. Accordingly, it is reasonable to assume that women and minorities would have more opportunities within the federal government, especially within the federal computer-related professions.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127292836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maintaining order and consistency in multi-access data 维护多访问数据的顺序和一致性
1979 International Workshop on Managing Requirements Knowledge (MARK) Pub Date : 1899-12-30 DOI: 10.1109/MARK.1979.8817153
Ronald Tugender
{"title":"Maintaining order and consistency in multi-access data","authors":"Ronald Tugender","doi":"10.1109/MARK.1979.8817153","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817153","url":null,"abstract":"The problem of controlling simultaneous access to shared data runs throughout the history of computer science. In order to preserve the consistency and integrity of such data, computer scientists and programmers have developed locks, 6 semaphores, 3 the notion of critical sections, 4 , 3 monitors, 5 and innumerable other techniques, both concrete and abstract. The great interest in such mechanisms throughout the computer community, both in the literature and in practice, is indicative of the importance of the problem.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"12 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The use and abuse of a software engineering system 软件工程系统的使用和滥用
1979 International Workshop on Managing Requirements Knowledge (MARK) Pub Date : 1899-12-30 DOI: 10.1109/MARK.1979.8817194
D. J. Pearson
{"title":"The use and abuse of a software engineering system","authors":"D. J. Pearson","doi":"10.1109/MARK.1979.8817194","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817194","url":null,"abstract":"In 1969, International Computers Limited of England set about the design of its 2900 Series which was to unify the primary thrust of the company and was to provide a hardware and software architecture which was, at least, state-of-the-art. 1 The systems also had to sell. Therefore, they had to satisfy the then market requirement for rich facilities and generally neat features. If ICL was seriously to compete with IBM (in Europe at least) the operating system, subsequently called System VME/B, would have to be comparable with the IBM products. ICL could not afford the staggering investments made in the 360 software systems. On the other hand, its recent track record had been less than outstanding for such software development. Faced with this dilemma, a project was set up to develop a system capable of minimizing the problems of software development by harnessing many of the current software engineering philosophies in order to aid management, reduce error rate and increase productivity. This system was subsequently called CADES (Computer Aided Development and Evaluation Systems). This paper describes briefly the major facets of this system and then goes on to discuss six years of product development experience with a software engineering system which was, by the standards of the day, state-of-the-art.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126470511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A (31,15) Reed-Solomon code for large memory systems A(31,15)大存储系统的Reed-Solomon码
1979 International Workshop on Managing Requirements Knowledge (MARK) Pub Date : 1899-12-30 DOI: 10.1109/MARK.1979.8817069
R. S. Lim
{"title":"A (31,15) Reed-Solomon code for large memory systems","authors":"R. S. Lim","doi":"10.1109/MARK.1979.8817069","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817069","url":null,"abstract":"This paper describes the encoding and the decoding of a (31,15) Reed-Solomon Code for multiple-burst error correction for large memory systems. The decoding procedure consists of four steps—(1) syndrome calculation, (2) error-location polynomial calculation, (3) error-location numbers calculation and (4) error values calculation. The principal features of the design are the use of a hardware shift register for both high-speed encoding and syndrome calculation, and the use of a commercially available (31,15) decoder for de-coding Steps 2, 3 and 4.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127576338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New indices for bibliographic data and their applications 书目数据新索引及其应用
1979 International Workshop on Managing Requirements Knowledge (MARK) Pub Date : 1899-12-30 DOI: 10.1109/MARK.1979.8817217
Y. Kambayashi, S. Yajima, O. Konishi, Takaki Hayashi
{"title":"New indices for bibliographic data and their applications","authors":"Y. Kambayashi, S. Yajima, O. Konishi, Takaki Hayashi","doi":"10.1109/MARK.1979.8817217","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817217","url":null,"abstract":"The KWIC Index is a widely-used tool for finding desired paper titles since it is simple yet very powerful. So in a bibliography of some specific area, the KWIC Index of Titles, Author Index and Subject Index are normally used. These indices are, however, not always sufficient for finding mutually-related papers. In this paper new indices for bibliographic data will be presented together with their applications.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116666399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The evolution and architecture of a high-speed workstation for interactive graphics 交互式图形高速工作站的发展和体系结构
1979 International Workshop on Managing Requirements Knowledge (MARK) Pub Date : 1899-12-30 DOI: 10.1109/MARK.1979.8817253
William L. Paisner
{"title":"The evolution and architecture of a high-speed workstation for interactive graphics","authors":"William L. Paisner","doi":"10.1109/MARK.1979.8817253","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817253","url":null,"abstract":"In 1975, California Computer Products, Inc. (CalComp) embarked on the design of a multi-station Interactive Graphics System. As a major part of this design effort, a fresh look was taken at the requirements for the workstation, which, after all, is the operator's sole point of contact with the system. The needs of the operator were perceived as follows: • To examine the working drawing—any part at any magnification. • To interact with the drawing—pointing where useful, typing where useful. —To perform the above rapidly so that he functions in a result-oriented rather than mechanics-oriented environment. 1 , 3 , 4 • To receive prompting as necessary for complex operations.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131272546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heuristic control of design-directed program transformations 面向设计的程序转换的启发式控制
1979 International Workshop on Managing Requirements Knowledge (MARK) Pub Date : 1899-12-30 DOI: 10.1109/MARK.1979.8817261
C. Jette
{"title":"Heuristic control of design-directed program transformations","authors":"C. Jette","doi":"10.1109/MARK.1979.8817261","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817261","url":null,"abstract":"This paper describes a class of semantic source-to-source program transformations called design-directed program transformations (DDPT) for use in a transformational implementation (TI) approach to programming. A methodology is developed for applying such transformations based on symbolic evaluation and experimental computation of programs. A DDPT is a cognitive model of source-to-source transformations; it knows what it is trying to accomplish and contains a strategy of how to accomplish it. A DDPT is more than a syntactic pattern replacement rule; it is a semantic program transformation which is intuitively closer to one that a good programmer would invoke in transforming his program.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128422801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic program transformations for virtual memory computers * 虚拟内存计算机的自动程序转换*
1979 International Workshop on Managing Requirements Knowledge (MARK) Pub Date : 1899-12-30 DOI: 10.1109/MARK.1979.8817192
W. Abu-Sufah, D. Kuck, D. Lawrie
{"title":"Automatic program transformations for virtual memory computers *","authors":"W. Abu-Sufah, D. Kuck, D. Lawrie","doi":"10.1109/MARK.1979.8817192","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817192","url":null,"abstract":"Improving the behavior of virtual memory systems is a popular subject, as evidenced by the vast number of papers in the literature. Typically, attempts to improve behavior fall into two areas—those which accept existing locality properties of programs and attempt to modify system parameters (e.g., memory allocated, window size for the working set policy, etc.), and those which attempt to reorganize programs in some way. The first approach treats programs behavioristically, i.e., without any attempt to change the original behavior of the program. This type of research generally attempts to deal with space allocation policies and replacement algorithms in order to improve the performance of the system, given the original behavior of the programs. The work of Denning, 12 , 13 Belady, 8 Chu and Opderbeck, 9 Smith, 21 Trivedi 22 and many others has contributed greatly to the evolution of operating systems and hardware for virtual memory systems.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115474261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信