{"title":"An approach to automatic maintenance of semantic integrity in large design data bases","authors":"G. Lafue","doi":"10.1109/MARK.1979.8817295","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817295","url":null,"abstract":"One way a data base can cease retaining a meaningful relationship with the \"real world\" situation that it models is through violations of its semantic integrity , i.e., transgressions of the defining constraints of its data. These constraints state the legality of the data values and are defined by the creators of the data, e.g., a checking account cannot be negative, or the salary of an assistant professor cannot be greater than that of a full professor.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128104788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The exploratory system control model multi-loop network","authors":"D. Paulish","doi":"10.1109/MARK.1979.8817288","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817288","url":null,"abstract":"The Exploratory Systems Control Model (ESM) Multiloop Network consists of the original three-loop ESM network delivered in 1977 and the fourth Exploratory Systems Control Model Development (ESMD) loop delivered in 1978. The ESM also includes a fifth loop supplied under the Modular System Control Development Model (MSCDM) project. The ESM provides a flexible tool for simulating and comparing a wide range of system control architectures and their related procedures and protocols. The ESM has been designed to model the class of the system control architectures that have the characteristics of decentralized operation, modularity, easy modification and upgrade capability, high reliability, high survivability and fail-soft operation.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124264152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An analysis of a distributed switching network with integrated voice and data in support of command and control","authors":"D. Schutzer","doi":"10.1109/MARK.1979.8817291","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817291","url":null,"abstract":"The potential for increased transmission efficiency of military tactical command and control data links through voice/ data integration has increased in importance in recent years. With the introduction of even more sophisticated and automated weapons systems, the requirement for on-line exchange of data among tactically-embedded military computer systems has risen dramatically. Today we are faced with a proliferation of data link requirements for innumerable military systems that span all the services. An already densely populated electromagnetic environment is faced with still greater demands for its scarce bandwidth resources. Adding to this situation is the fact that these very resources that are in such heavy demand are quite fragile in the face of military electronic warfare measures. And, with few exceptions, the means for countering these electronic warfare measures place still greater demands on the already scarce bandwidth resources. All of the above provide the motivation for exploring new avenues and techniques that achieve greater efficiency of transmission resources. Economically, the revolution in digital componentry makes more viable the consideration of a greater degree of voice/ data integration over tactical data links than would have been possible just a few years ago. Namely, competing signal processing techniques—Digital LSI, CCDs and SAWs are pushing the boundaries of technologies and making economically attractive spread spectrum, time division multiple access data link systems and internal multiplexed data distribution techniques which would simplify the integration of voice and data. Finally, with the increased sophistication of military weapon systems, the interrelationships and employment of voice and data in the conduct of war becomes even more intertwined and requires in many cases careful reevaluation and re-enumeration.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122172355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of some end-to-end flow control policies in a packet-switching network","authors":"G. Pujolle","doi":"10.1109/MARK.1979.8817269","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817269","url":null,"abstract":"Various techniques may be considered when it comes to setting up a communications system between computers. The \"packet-switching\" technique described by Davies 1 seems to be one of the best of existing approaches. In the following we consider only such a technique—users of a computer network communicate with each other by the intermediate of a store-and-forward packet-switching network.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120937860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling regular, process—structured networks*","authors":"B. Arden, Hikyu Lee","doi":"10.1109/MARK.1979.8817242","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817242","url":null,"abstract":"An interesting strategy to exploit micro-technology is to interconnect microcomputers (i.e., microprocessor with local memory) in a regular dataflow network of low degree. The network is regular so that each computer is a similar \"building block\" with regard to the number of connecting data buses. The number of buses is small not only because microcomputers are inherently limited in their bus capacity but also because many incident buses lead to switching and \"memory port\" complexity, which is difficult to handle by micro-circuits. Such complexity is one of the reasons why shared memory \"mainframe\" computers are relatively expensive. In essence, the low-degree, regular network approach replaces the hard-wired switching with programmed message-passing. Since the processor node will not be fully utilized by productive computing, some of the capacity can profitably be used for such message-handling.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131000208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exact solution for the initialization time of packet radio networks with two station buffers","authors":"D. Minoli","doi":"10.1109/MARK.1979.8817232","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817232","url":null,"abstract":"The Packet Radio Network (PRNET), a store-and-forward packet-switching system sharing a single radio channel via multi-access techniques and spread spectrum, is an effective communication medium for data and voice transmission in situations requiring fast deployment, non-fixed hardware locations, encryption and anti-jamming in hostile military environments. 1 – 5 , 14 , 15","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ASTROL—An associative structure-oriented language","authors":"James F. Wirth","doi":"10.1109/MARK.1979.8817193","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817193","url":null,"abstract":"The language ASTROL resulted from the search for a \"small\" language somewhat like LISP 1.5 which could be easily implemented on a minicomputer with about 32K bytes of store. The LISP cell was considered to be an example of the record—an object whose structure is specified by a set of field descriptors. However, the set of descriptors is often allocated at compile time, whereas it would be useful to be able to add descriptors to a record dynamically.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133448297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recurrent dilemmas of computer use in complex organizations","authors":"R. Kling, W. Scacchi","doi":"10.1109/MARK.1979.8817143","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817143","url":null,"abstract":"Computer technology is usually spoken of as a problem solving tool, 33 , 36 a helpful device used to ease the burdens and expand the flexibility of information processing. In this narrow sense, computer technologies have in fact increased the capabilities of people and organizations to carry out complex calculations, manipulate large sets of data and access data from geographically remote locations.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132480148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architectural and design perspectives in a modular multi-microprocessor, the DPS-1","authors":"K. Elmquist","doi":"10.1109/MARK.1979.8817097","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817097","url":null,"abstract":"For the last decade, one of the most active and exciting areas in computer architecture is the interconnection of computers to form parallel or concurrent systems. These systems are generally called \"multiprocessors\" or \"distributed processors\" and may range in organization from processors sharing a common memory to geographically isolated computer installations connected as a network. The low cost and ease of implementation of LSI microprocessors make them extremely attractive design possibilities for the implementation of general-purpose multiprocessor systems. Furthermore, the MOS technology used to implement the majority of microprocessors limits the instruction execution rates such that many applications are compute bound rather than limited by other system bandwidths. This indicates that a number of microprocessors may be effectively interconnected to increase the general system performance.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116090559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visual inspection of metal surfaces","authors":"J. Mundy","doi":"10.1109/MARK.1979.8817307","DOIUrl":"https://doi.org/10.1109/MARK.1979.8817307","url":null,"abstract":"The majority of applications of automatic visual inspection have been the case in which a high contrast image can be obtained. This will result from object silhouettes 1 and high contrast reflectivity changes as in printed text. In these cases, the image can usually be successfully segmented by a threshold operation 2 , 3 leading to a two-level or binary image.","PeriodicalId":341008,"journal":{"name":"1979 International Workshop on Managing Requirements Knowledge (MARK)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126189592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}