AFIPS_Bibliography_Vol48_1979

Preface
III
Merlin Smith
Introduction
IV
Richard E. Merwin
Computer technology in the movie industry
1
Suzanne Landa
The system architecture evaluation facility - An emulation facility at Rome Air Development Center
7
N. Bruce Clark, Michael A. Troutman
Teaching and research experiences with an emulation laboratory
13
Steven F. Sutphen
Simulating the delay in logic networks for large, high-speed computers
19
E. A. Wilson
Languages for operating systems description, design and implementation
29
Philip H. Enslow, Jr.
The simulation language SIML/I
39
M. H. MacDougall
Mix-dependent job scheduling - An application of hybrid simulation
45
Steve Tolopka, Herb Schwetman
Parametric instabilities in computer system performance prediction
51
Lawrence W. Dowdy, Ashok K. Agrawala
Aids to the development of network simulators
57
Imrich Chlamtac, W. R. Franta
A stochastic state space model for prediction of product demand
67
William C. Cave, Evelyn Rosenkranz
The Bus Link - A microprogrammed development tool for the CMOS/SOS processor system
73
Avner Ben-Dor , Paul Baker, Jon Selden
A computer analysis tool for structural decomposition using entropy metrics
83
Aaron N. Silver
Interactive modeling systems for managers - Semantic models should underlie quantitative models
89
Rand B. Krumland
Modeling regular, process-structured networks
95
Bruce W. Arden, Hikyu Lee
The City of New York's integrated financial management system - From mandate to working system in 18 months
103
Sally J. Rupert
Recurrent dilemmas of computer use in complex organizations
107
Rob Kling, Walt Scacchi
Project management through the Accomplishment Value Procedure (AVP)
117
Donald J. Aharonian
Textfax - Principle for new tools in the office of the future
125
Wolfgang Horak, Walter Woborschil
Microcomputer programming skills
135
C. Wrandle Barth
Program conversion - One successful paradigm
139
Charles Lynn, Jr. , Jean Risley, Robert Wells
A generalized zooming technique for pictorial database systems
147
S. K. Chang, B. S. Lin, R. Walser
An approach to real-time scan conversion
157
Franklin C. Crow
The evolution and architecture of a high-speed workstation for interactive graphics
165
William L. Paisner
A mathematical model for distributed freespace
175
Y. H. Chin, S. H. Yu
Forecasting computer resource utilization using key volume indicators
185
David E. Y. Sarna
Workflow - A technique for analyzing JES systems
193
H. Pat Artis
MMPS - A reconfigurable multi-microprocessor simulator system
199
Daniel Klein
A(31,15) Reed-Solomon code for large memory systems
205
Raymond S. Lim
English dictionary searching with little extra space
209
Douglas Comer
New indices for bibliographic data and their applications
217
Yahiko Kambayashi, Shuzo Yajima, Osamu Konishi, Takaki Hayashi
Visual inspection of metal surfaces
227
J. L. Mundy
Monitoring the earth's resources from space - Can you really identify crops by satellite?
233
David Landgrebe
Digital image shape detection
243
R. Michael Hord
PM4 - A reconfigurable multiprocessor system for pattern recognition and image processing
255
Faye A. Briggs, King-Sun Fu, Kai Hwang, Janak H. Patel
Transportable image-processing software
267
R. G. Hamlet and A. Rosenfeld
A data-handling mechanics of on-line text editing system with efficient secondary storage access
273
Sakti Pramanik and Edgar T. Irons
How do we best control the flow of electronic information across sovereign borders?
279
Peter Safirstein
Privacy and security in transnational data processing systems
283
Rein Turn
A modular approach to computer security risk management
293
Robert P. Campbell and Gerald A. Sands
The design and operation of public-key cryptosystems
305
Eric H. Michelman
Safeguarding cryptographic keys
313
G. R. Blakley
Applications for multi level secure operating sytems
319
John P. L. Woodward
The foundations of a provably secure operating system (PSOS)
329
Richard J. Feiertag and Peter G. Neumann
A security retrofit of VM/370
335
B. D. Gold, R. R. Linde, R. J. Peeler, M. Schaefer, J. F. Scheid, P. D. Ward
KSOS - The design of a secure operating system
345
E. J. McCauley, P. J. Brongowski
UCLA Secure UNIX
355
Gerald J. Popek, Mark Kampe, Charles S. Kline, Allen Stoughton, Michael Urban, Evelyn J. Walton
KSOS - Development methodology for a secure operating system
365
T. A. Berson, G. L. Barksdale, Jr.
KSOS-Computer network applications
373
M. A. Padlipsky, K. J. Biba, R. B. Neely
Considerations in the employment of blind computer professionals
383
James A. Kutsch, Jr., Kimberly B. Kutsch
Hiring a deaf computer professional
385
Karen K. Anderson, Philip W. Bravin
MIS effects on managers' task scope and satisfaction
391
Daniel Robey
Some neglected outcomes of organizational use of computing technology - And their implications for systems designers
397
M. Lynne Markus
An academic meets industry - Rethinking computer-based education and personalized systems of instruction
403
Kenneth L. Modesitt
Recent developments in computers and society research and education
407
Richard H. Austing, Gerald L. Engel
Interactive monitoring of computer-based group communication
411
Kathleen Spangler, Hubert Lipinski, Robert Plummer
The status of women in health science computing
415
Lynn L. Peterson
Women and minorities in the computer professions
419
Helen M. Wood
Computers in judicial administration
425
Charles L. Aird and Barbara H. Todd
Police and computer technology- The expectations and the results
443
Kent W. Colton
Distributed algorithms for global structuring
455
Raphael A. Finkel, Marvin Solomon, Michael L. Horowitz
The tree-structured distributed network front-end processor architecture
461
Robert M. Monroe, Ronald J. Srodawa, Franklin H. Westervelt
Analysis of real-time control systems by the model of packet nets
469
Mohamed Gawdat Gouda
Performance and economy of a fault-tolerant multiprocessor
481
Jaynarayan H. Lala, Charles J. Smith
Serviceability features of the HP 300 small business computer
493
Curtis R. Gowan
Automatic tuning of computer architectures
499
Ken Sakamura, Tatsushi Morokuma, Hideo Aiso, Hajime lizuka
The BTI 8000 - Homogeneous, general-purpose multiprocessing
513
George R. Lewis, J. Shirley Henry, Brian P. McCune
A survey of interconnection methods for reconfigurable parallel processing systems
529
Howard Jay Siegel, Robert J. McMillen, Philip T. Mueller, Jr.
Adaptation properties for dynamic architectures
543
Steven I. Kartashev, Svetlana P. Kartashev, C. V. Ramamoorthy
Architectural considerations of the NEC mass data file subsystem
557
Akira Sekino, Takuo Kitamura
Error-oriented architecture testing
565
Larry Kwok-Woon Lai
A survey of methods for intermittent fault analysis
577
Yashwant K. Malaiya, Stephen Y. H. Su
Architectural and design perspectives in a modular multi-microprocessor, tne DPS-1
587
Kells A. Elmquist
Work flow view of a distributed application
595
J. R. Hamstra
The use of self-inverse program primitives in system evaluation
605
John E. MacDonald, Jr.
A loosely-coupled applicative multi-processing system
613
Robert M. Keller, Gary Lindstrom, Suhas Patil
A prototype data flow computer with token labelling
623
Ian Watson, John Gurd
A view of dataflow
629
Kim P. Gostelow, Robert E. Thomas
A hardware-independent virtual architecture for PASCAL
637
Viswanathan Santhanam
Design of a high-Ievel language machine
649
G. J. Battarel and R. J. Chevance
A programming language for high-level architecture
657
Yaohan Chu and Edward RayCannon
Data management in distributed databases
667
C. V. Ramamoorthy and Benjamin W. Wah
A unified architecture for data and message management
681
Georges Gardarin
Design of a prototype ANSI/SPARC three-schema data base system
689
Eric K. Clemons
On the implementation of a conceptual schema model within a three-level DBMS architecture
697
Shamkant B. Navathe and Johann Lemke
The practice of data base administration
709
Jay-Louise Weldon
An approach to automatic maintenance of semantic integrity in large design data bases
713
Gilles M. E. Lafue
On query-answering in relational databases
717
E. L. Lozinskii
ASTROL - An associative structure-oriented language
721
James F. Wirth
An associative search language for data management
727
Amar Mukhopadhyay, Alireza Hurson
Updating defined relations
733
I. M. Osman
Performance enhancement for relational systems through query compilation
741
Randy H. Katz
System considerations for predicting mass storage subsystem behavior
749
E. J. McBride, A. B. Tonik, G. R. Finnin
A software reliability study using a complexity measure
761
Thomas J. Walsh
A Markovian model for reliability and other performance measures of software systems
769
Amrit L. Goel, Kazu Okumoto
Partial match retrieval for non-uniform query distributions
775
V. S. Alagar, C. Soochan
Comparing interactive computer services- Theoretical, technical and economic feasibility
781
S. A. Mamrak, P. D. Amer
Characterizing a workload for the comparison of interactive services
789
Domenico Ferrari
Control of computing funds and resources in a networking environment
797
Beverly O'Neal, Ronald Segal
The economic impact of network affiliation upon institutions of higher learning
805
Norman R. Nielsen
Approaches to concurrency control in distributed data base systems
813
Philip A. Bernstein, Nathan Goodman
Access control mechanisms for a network operating system
821
Helen M. Wood, Stephen R. Kimbleton
Public key vs. conventional key encryption
831
Charles S. Kline, Gerald J. Popek
SIGMA - An interactive message service for the Military Message Experiment
839
Robert Stotz, Ronald Tugender, David Wilczynski, Donald Oestreicher
The SIGMA experience - A study in the evolutionary design of a large software system
847
David Wilczynski, Ronald Tugender, Donald Oestreicher
The terminal for the Military Message Experiment
855
Robert Stotz, Paul Raveling and Jeff Rothenberg
On-line tutorials and documentation for the SIGMA message service
863
Jeff Rothenberg
Maintaining order and consistency in multi-access data
869
Ronald Tugender
Exact solution for the initialization time of packet radio networks with two station buffers
875
Daniel Minoli
Fixing timeout intervals for lost packet detection in computer communication networks
887
Robert J. T. Morris
Comparison of some end-to-end flow control policies in a packet-switching network
893
G. Pujolle
Alternatives for providing highly reliable access to X.25 networks
905
Richard J. Chung, A. M. Rybczynski
A fail-safe distributed local network for data communication
917
Jane W. S. Liu, Izumi Suwa, Robert Stepp, Sergio M. Hinojosa, Tsutoma Utsuqi
An analysis of a distributed switching network with integrated voice and data in support of command and control
927
Daniel Schutzer
The exploratory system control model multi-loopnetwork
935
Daniel J. Paulish
Software reliability measures applied to systems engineering
941
John D. Musa
Verification procedures supporting software systems development
947
Gruia-Catalin Roman
A language for distributed processing
957
Ronald J. Price
Automatic program transformations for virtual memory computers
969
W. Abu-Sufah, D. Kuck, D. Lawrie
Analysis of data flow models using the SARA graph model of behavior
975
W. Ruggiero, G. Estrin, R. Fenchel, R. Razouk, D. Schwabe, M. Vernon
Software metrics for aiding program development and debugging
989
N. F. Schneidewind
A measure of software complexity
995
Ned Chapin
Relating computer program maintainability to software measures
1003
A. R. Feuer, E. B. Fowlkes
Program forms and program form analysers for high-Ievel structured design
1013
Jayashree Ramanathan, Meera Blattner
First-year results from a research program on human factors in software engineering
1021
Sylvia B. Sheppard, Bill Curtis, Phil Milliman, M. A. Borst, Tom Love
The use and abuse of a software engineering system
1029
D. J. Pearson
The integrated control/distributed power software development shop
1037
Jean-Paul Renault
On the fate of software enhancements
1043
Norman K. Sondheimer
Experiences in building and using compiler validation systems
1051
Paul Oliver
Automatic program synthesis via synthesis of loop-free segments
1059
Joe W. Duran
Semantic similarity analysis - A computer-based study of meaning in noun phrases
1063
Lynn L. Peterson
Heuristic control of design-directed program transformations
1071
Christina L. Jette
A data flow evaluation system based on the concept of recursive locality
1079
A. L. Davis
Data flow languages
1087
William B. Ackerman