No abstract available.
Frontiers in computer science research
Old frontiers in Computer Science continue to expand. New frontiers emerge as better theoretical understanding, dramatically improved hardware characteristics, and improved techniques for software open new vistas. Much of the excitment and drive towards ...
Perspective on local area networks
This note summarizes current status of local area network offerings, local area network standardization activities, and growth projections for the LAN market during 1982-90.
The Brown University network
Brown University recently completed the installation of a $1.3 million, broadband communications network which ties together 130 buildings. The network backbone consists of two 300 MHz mid-split CATV systems and is run completely underground. More than ...
Local network selection criteria
With over 200 manufacturers of local networks or local network products currently identified, a potential local network purchaser certainly has a wide selection of vendors from which to choose. Various topologies, control structures, media, access ...
Natural language systems: How are they meeting human needs?
One goal of natural language research is to make systems more accessible to their users by allowing them to interact with machines in a language as close as possible to the language people use among themselves. Developing systems that answer natural ...
Why Ada is not just another programming language
Since there have been hundreds of high level languages developed over the past twenty years, many people are asking why there is so much fuss about Ada. The question is frequently asked—why isn't Ada just another programming language.
Although Ada was ...
Session M4: Women in the workplace
This session, organized by the Association for Women in Computing, seeks to provide a forum for discussion of the ever-changing environment facing today s woman in the computer industry. Each panelist, an experienced computer professional, will discuss ...
Secure use of personal workstations and local area networks
This panel is charged with presenting solutions to problems associated with securing the personal workstation and local area networks. My function is to set the stage for the presentations which will follow by defining technology changes that are ...
Database for office automation
With a fast growth in the quantity and quality of software applications for office systems and advanced workstations, it is becoming clear that the trend is towards a more integrated software architecture for workstation or office systems. A critical ...
Considerations in the design of office DBMS's
“Office Automation” has become a hot topic in recent years. There is considerable interest in developing database management systems (DBMS's) specifically for office applications. Before rushing into the bandwagon of developing office DBMS's the ...
Computer Aided Programming: Techniques for software manufacturing
A software manufacturing paradigm is described which deals effectively with many issues long associated with software development and maintenance. In essence, Computer Aided Programming (CAP) is to software manufacturing what CAD/CAM is to conventional ...
Scribe: How to use it for document production
Scribe is a document production system that makes it easier to produce and maintain large complex technical documentation. Although its primary purpose is high-quality text formatting, Scribe also performs cross-reference tabulations, indexing, ...
On-line international cash management
This paper describes a state-of-the-art cash management system recently installed for the Treasury Section of the United Nations Development Programme (UNDP). This system was a multi-year development effort of the UNDP supported by Chemical Bank's Cash ...
Solving large vehicle routing and scheduling problems in small core
In this paper, an efficient implementation of the Clarke and Wright algorithm for solving the single depot vehicle routing and scheduling problem is presented. With this implementation, a 900 customer problem can be solved approximately in less than 9 ...
Computer budgeting of mineral holdings for a small scale mining operation
This paper describes how a computer program handles the problems encountered in developing a mining budget from a large number of individual and widely scattered ore deposits. Among the difficulties overcome by the use of the program are constantly ...
Directions in computer security
One of the primary thrusts in operating system security has come from the Department of Defense (DoD), which early recognized the need for security controls in open use, multi-user, resource-shared computer systems.1 Two features in particular, ...
Computer security in a non-traditional architecture
Isolation and separation between independent processes is a fundamental requirement for computer security. Nowhere is this more important than in the separation between operating system and user processes.
The architecture of the computer for which an ...
DELTA: An expert system to troubleshoot diesel electric locomotives
In the last few years, expert systems have become the most visible and fastest growing branch of Artificial Intelligence. Their objective is to capture the knowledge of an expert in a particular problem domain, represent it in a modular, expandable ...
Tutorial on Ada
Ada is a general purpose language that was developed to meet the needs ofsoftware development within the U.S. Department of Defense. By the end of the 1980's, it is expected that the majority of software developed for mission-critical systems will be ...
New computer-assisted instruction system for UNIX systems
The UNIX Instructional Workbench (IWB) software system is a general purpose computer-assisted instruction facility implemented for the UNIX operating system. The facility is characterized by a small number of abstract structures that support a wide ...
From mainframe to micro: Moving a freshman computer course
In 1980, the US Military Academy decided to move its 1300 freshmen computer course from a mainframe to micro computers. This paper describes the transfer exercise and the lessons learned in the process of making such a transfer.
A study of the relationship between job requirements and academic requirements in computer science
In scrutinizing the 1981 Occupational Outlook Handbook, one cannot fail to recognize a strong positive connection between mathematical requirements in educational pre-requisites for occupational entry and the concomitant demand and remuneration of such ...
Using ADA as a design language - classroom experience
ADA was used as a design language in a software engineering course. Students were able to become familiar with the features of ADA as a programming language and to improve their software development skills. ADA proved to be a powerful and flexible ...
The future of commercial computing
United States' business computing power is dedicated to the transaction-based activities of companies, not to the needs of senior executives responsible for critical corporate decisions. Software supporting current business systems is absolete and ...
Human factors training and awareness
Transferring human factors technology to designers involves complex issues: training, human factors data, interdisciplinary communications, designers' preferences, and organizational trends. Training is a structured, formalized method for improving ...
Optical storage of page images and pictorial data - opportunities and needed advances in information retrieval
We describe two current development projects at the Library of Congress using high-density optical storage, both of which require more advanced and improved computer-based information retrieval methodologies than existing bibliographic retrieval ...
1983 Acm annual conference: “Health and safety aspects of office automation - the European scene”
“The number of people in the United Kingdom working with Visual Display Units (VDUs) as part of their job is increasing daily. A large proportion of them are prevented from getting the maximum use out of their VDU because they ere experiencing practical ...
Defining the ergonomic buzzwords
Current software and computer systems are being advertised and sold today as FRIENDLY systems that are EASY TO USE. Most also claim to be EASY TO LEARN as well. But what is it that makes a system FRIENDLY, EASY TO USE, or EASY TO LEARN? Is it sufficient ...
Personal computers in the corporate environment (Panel)
A microcomputer differs from a mainframe or a minicomputer in size, cost and power. Typically, micros are smaller, cost less and do not have the throughput of a mainframe. However, with today's technological improvements, microcomputers have surpassed ...
Microcomputer applications
Surveys of the use of micros that were made a few years ago suggested that use was concentrated in a few business functions. Calcs and financial reporting packages were expanding in use so rapidly that other types of applications seemed to be unnoticed. ...
Index Terms
- Proceedings of the 1983 annual conference on Computers : Extending the human resource