Upload
phungcong
View
224
Download
0
Embed Size (px)
Citation preview
AFIPSPRESS" 210 SUMMIT AVENUE .
MONTVALE, NEW JERSEY ,07645
AFIPS CONFERENCE PROCEEDINGS
1979 NATIONAL COMPUTER
CONFERENCE
June 4-7, 1979
New York, New York
From the collection of the Computer History Museum (www.computerhistory.org)
The ideas and opinions expressed herein are solely those of the authors and are not necessarily representative of or endorsed by the 1979 National Computer Conference or the American Federation of Information Processing Societies, Inc.
Library of Congress Catalog Card Number 55-44701 AFIPS PRESS
210 Summit Avenue Montvale, New Jersey 07645
© 1979 by AFIPS Press. Copying is permitted without payment of royalty provided that (I) each reproduction is done without alteration and (2) reference to the AFIPS Proceedings and notice of copyright are included on the first page. The title and abstract may be used without further permission in computer-based and other information-service systems. Permission to republish other excerpts should be obtained from AFIPS Press.
Printed in the United States of America
ii
From the collection of the Computer History Museum (www.computerhistory.org)
Preface
MERLIN SMITH Conference Chairman
The Proceedings of the 1979 National Computer Conference represents the most comprehensive, in-depth treatment of computing developments available today. It stands as a lasting credit to Richard Merwin and his program committee, and to the many authors, session chairpersons, reviewers and other contributors recognized on these pages.
Data processing has rapidly become one of the more vital factors in the economic and personal well being of all. The NCC program was directed to these many new interests of participants. Such an objective required many panel and discussion sessions beyond the formal papers, and the limits of this Proceedings. We owe a special debt to these participants who helped make our conference a success. Their names are recorded herein.
We appreciate this opportunity to be a part of recorded computer history.
iii
From the collection of the Computer History Museum (www.computerhistory.org)
RICHARD E. MERWIN NCC '79 Program Chairman
The NCC '79 technical program was planned to be a learning experience for all attendees. A broad range of paper and panel sessions was selected to emphasize social implications of computers, management issues, technical developments and applications. Each of these areas is represented by both paper and panel sessions which are designed to bring the attendees of this "biggest of all" computer conference to the forefront of knowledge of each specialty.
A major attempt has been made to broaden the scope of the NCC '79 technical program by including three mini-conferences covering the application of computers to financial transactions, law and health services. Thirty-two sessions dealing with these topics will expand the coverage of NCC '79 to an audience of specialists in fields which are increasingly becoming allied with data processing techniques.
The urge to participate in the NCC '79 technical program was overwhelming. Because of a limitation on the size of this Proceedings, the number of papers that could be accepted for publication was curtailed. A large number of proposals were received for panel sessions and a selection of the best of these was made. This trend for more and more participation in both the technical program and the exhibition of the latest compllter products mirrors the tremendous grO\vth of the computer industry, especially in the areas of microprocessors.
iv
Introduction
In response to the wide interest in the use of computers by the non-professional, a special set of sessions and a separate publication devoted to personal computing has been organized to augment the technical program and regular exhibits. The interest in this aspect of the computer industry has increased rapidly and represents a major factor in this industry.
This Proceedings is organized by specialized areas including Applications, Social Implications, Architecture, Data Base Management, Computer Technology, Networking and Software Techniques, in that order. Unfortunately, we had to eliminate overview statements by topical area organizers along with descriptions of panel sessions to maximize the number of technical papers that could be published. I regret these omissions but feel that our policy of publishing only technical papers best serves the technical goals of the conference.
The planning and organization of the NCC '79 technical program involved a number of area coordinators, session organizers and leaders and the panelists and presenters of technical papers. I want to extend my sincere appreciation to all those who supported the organization of this outstanding technical program. Special thanks is due to the hundreds of referees who helped us select the best papers. Finally, I want to thank the program committee staff who tirelessly worked with all participants to make this conference a success.
From the collection of the Computer History Museum (www.computerhistory.org)
CONTENTS
Preface ........................................................................ , .......... , ........ . Merlin Smith
Introduction ........................................................................................ . Richard E. Merwin
APPLICATIONS
Computer technology in the movie industry Suzanne Landa
The system architecture evaluation facility-An emulation facility at Rome Air Development Center N. Bruce Clark and Michael A. Troutman
Teaching and research experiences with an emulation laboratory ......................................... . Steven F. Sutphen
Simulating the delay in logic networks for large, high-speed computers ................................... . E. A. Wilson
Languages for operating systems description, design and implementation ................................. . Philip H. Enslow, Jr.
The simulation language SIMLJI ...................................................................... . M. H. MacDougall
Mix-dependent job scheduling-An application of hybrid simulation ...................................... . Steve Tolopka and Herb Schwetman
Parametric instabilities in computer system performance prediction Lawrence W. Dowdy and Ashok K. Agrav,rala
Aids to the development of network simulators ........................................................ . Imrich Chlamtac and W. R. Franta
A stochastic state space model for prediction of product demand ........................................ . William C. Cave and Evelyn Rosenkranz
The Bus Link-A microprogrammed development tool for the CMOS/SOS processor system ............... . Avner Ben-Dor, Paul Baker and Jon Selden
A computer analysis tool for structural decomposition using entropy metrics .............................. . Aaron N. Silver
Interactive modeling systems for managers-Semantic models should underlie quantitative models .......... . Rand B. Krumland
Modeling regular, process-structured networks ......................................................... . Bruce W. Arden and Hikyu Lee
The City of New York's integrated financial management system-From mandate to working system in 18 months .................. " ............................ " ..... , " ...... " ........................ " .
Sally J. Rupert
Recurrent dilemmas of computer use in complex organizations Rob Kling and Walt Scacchi
Project management through the Accomplishment Value Procedure (A VP) ...... . Donald J. Aharonian
v
iii
iv
7
13
19
29
39
45
51
57
67
73
83
89
95
103
107
117
From the collection of the Computer History Museum (www.computerhistory.org)
Textfax-Principle for new tools in the office of the future. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Wolfgang Horak and Walter Woborschil
Microcomputer programming skills .................................................................... 135 C. Wrandle Barth
Program conversion-One successful paradigm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Charles Lynn, Jr., Jean Risley and Robert Wells
A generalized zooming technique for pictorial database systems .......................................... 147 S. K. Chang, B. S. Lin and R. Walser
An approach to real-time scan conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Franklin C. Crow
The evolution and architecture of a high-speed workstation for interactive graphics. . . . . . . . . . . . . . . . . . . . . . . . . 165 William L. Paisner
A mathematical model for distributed free space ........................................................ 175 Y. H. Chin and S. H. Yu
Forecasting computer resource utilization using key volume indicators David E. Y. Sarna
185
Workflow-A technique for analyzing JES systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 H. Pat Artis
MMPS--A reconfigurable multi-microprocessor simulator system.. . . . . .. . . .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . 199 Daniel Klein
A (31,15) Reed-Solomon code for large memory systems. . . .. . .. . . . . . . .. .. . . . . . .. . . . . . .. . . .. . . . . . . . . . . . . . 205 Raymond S. Lim
English dictionary searching with little extra space ............... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Douglas Comer
New indices for bibliographic data and their applications ..... , . . .. .. .. .. .. .. .. . . .. . . . . . . . . .. . . . . . . . . .. . . . 217 Yahiko Kambayashi, Shuzo Yajima, Osamu Konishi and Takaki Hayashi
Visual inspection of metal surfaces .................................................................... 227 J. L. Mundy
Monitoring the earth's resources from space-Can you really identify crops by satellite? 233 David Landgrebe
Digital image shape detection ......................................................................... 243 R. Michael Hord
PM"-A reconfigurable multiprocessor system for pattern recognition and image processing Faye A. Briggs, King-Sun Fu, Kai Hwang and Janak H. Patel
255
Transportable image-processing software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 R. G. Hamlet and A. Rosenfeld
A data-handling mechanics of on-line text editing system with efficient secondary storage access. . . . . . . . . . . . . 273 Sakti Pramanik and Edgar T. Irons
SOCIAL IMPLICATIONS
How do we best control the flow of electronic information across sovereign borders? .. . . . . . . . . . . . . . . . . . . . . . 279 Peter Safirstein
Privacy and security in transnational data processing systems ............................................ 283 Rein Turn
A modular approach to computer security risk management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Robert P. Campbell and Gerald A. Sands
The design and operation of puhlic-key cryptosystems .... , ... , ..... , .. , . , , , , . , , . , , ... , . , , , ............. . 305 Eric H. Michelman
vi
From the collection of the Computer History Museum (www.computerhistory.org)
Safeguarding cryptographic keys ...................................................................... 313 G. R. Blakley
Applications for multilevel secure operating sytems ..................................................... 319 John P. L. Woodward
The foundations of a provably secure operating system (PSOS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Richard J. Feiertag and Peter G. Neumann
A security retrofit of VMJ370 ......................................................................... 335 B. D. Gold, R. R. Linde, R. J. Peeler, M. Schaefer, J. F. Scheid and P. D. Ward
KSOS-The design of a secure operating system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 E. J. McCauley and P. J. brongowski
UCLA Secure UNIX ................................................................................ 355 Gerald J. Popek, Mark Kampe, Charles S. Kline, Allen Stoughton, Michael Urban and Evelyn J. Walton
KSOS-Development methodology for a secure operating system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 T. A. Berson and G. L. Barksdale, Jr.
KSOS---Computer network applications ......................................................... , . . . . . . 373 M. A. Padlipsky, K. J. Biba and R. B. Neely
Considerations in the employment of blind computer professionals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 James A. Kutsch, Jr., and Kimberly B. Kutsch
Hiring a deaf computer professional ................................................................... 385 Karen K. Anderson and Philip W. Bravin
MIS effects on managers' task scope and satisfaction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 Daniel Robey
Some neglected outcomes of organizational use of computing technology-And their implications for systems 397 designers .......................................................................................... .
M. Lynne Markus
An academic meets industry-Rethinking computer-based education and personalized systems of instruction .. 403 Kenneth L. Modesitt
Recent developments in computers and society research and education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 Richard H. Austing and Gerald L. Engel
Interactive monitoring of computer-based group communication Kathleen Spangler, Hubert Lipinski and Robert Plummer
411
The status of women in health science computing ..... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 Lynn L. Peterson
Women and minorities in the computer professions.. .. . . .. .. .. .. .. . . . . . . . . . . . . .. . . .. .. . . . . . . . . .. . . .. .. . . 419 Helen M. Wood
Computers in judicial administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 Charles L. Aird and Barbara H. Todd
Police and computer technology-The expectations and the results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443 Kent W. Colton
ARCHITECTURE
Distributed algorithms for global structuring ........ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455 Raphael A. Finkel, Marvin Solomon and Michael L. Horowitz
The tree-structured distributed network front-end processor architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 Robert M. Monroe, Ronald J. Srodawa and Franklin H. Westervelt
Analysis of real-time control systems by the model of packet nets Mohamed Gawdat Gouda
vii
469
From the collection of the Computer History Museum (www.computerhistory.org)
Performance and economy of a fault-tolerant mUltiprocessor ............................................ . Jaynarayan H. Lala and Charles J. Smith
Serviceability features of the HP 300 small business computer ........................................... . Curtis R. Gowan
Automatic tuning of computer architectures ........................................................... . Ken Sakamura, Tatsushi Morokuma, Hideo Aiso and Hajime lizuka
The BTl 8000-Homogeneous, general-purpose multiprocessing ......................................... . George R. Lewis, J. Shirley Henry and Brian P. McCune
A survey of interconnection methods for reconfigurable parallel processing systems Howard Jay Siegel, Robert J. McMillen and Philip T. Mueller, Jr.
Adaptation properties for dynamic architectures ....................................................... . Steven I. Kartashev, Svetlana P. Kartashev and C. V. Ramamoorthy
Architectural considerations of the NEC mass data file subsystem ....................................... . Akira Sekino and Takuo Kitamura
Error-oriented architecture testing .................................................................... . Larry Kwok-Woon Lai
A survey of methods for intermittent fault analysis ..................................................... . Yashwant K. Malaiya and Stephen Y. H. Su
Architectural and design perspectives in a modular multi-microprocessor, toe DPS-I ....................... . Kells A. Elmquist
Work flow view of a distributed application J. R. Hamstra
The use of self-inverse program primitives in system evaluation John E. MacDonald, Jr.
A loosely-coupled applicative multi-processing system .................................................. . Robert M. Keller, Gary Lindstrom and Suhas Patil
A prototype dataflow computer with token l~belling Ian Watson and John Gurd
A view of dataflow ................................................................................. . Kim P. Gostelow and Robert E. Thomas
A hardware-independent virtual architecture for PASCAL Viswanathan Santhanam
Design of a high-level language machine ............................................................... . G. J. Battarel and R. J. Chevance
A programming language for high-level architecture Yaohan Chu and Edward ~~_~_~BnoI!_
DATA BASE MANAGEMENT
Data management in distributed data bases ., .......................................................... . c. V. Ramamoorthy and Benjamin W. Wah
A unified architecture for data and message management ............................................... . Georges Gardarin
Design of a prototype ANSI/SPARC three-schema data base system ..................................... . Eric K. Clemons
On the implementation of a conceptual schema model within a three-level DBMS architecture Shamkant B. Navathe and Johann Lemke
viii
481
493
499
513
529
543
557
565
577
587
595
605
613
623
629
637
649
657
667
681
689
697
From the collection of the Computer History Museum (www.computerhistory.org)
The practice of data base administration .............................................................. . Jay-Louise Weldon
An approach to automatic maintenance of semantic integrity in large design data bases ..................... . Gilles M. E. Lafue
On query-answering in relational data bases E. L. Lozinskii
ASTROL-An associative structure-oriented language .................................................. . James F. Wirth
An associative search language for data management Amar Mukhopadhyay and Alireza Hurson
Updating defined relations ........................................................................... . I. M. Osman
Performance enhancement for relational systems through query compilation Rand y H. Katz
COMPUTER TECHNOLOGY
System considerations for predicting mass storage subsystem behavior ................................... . E. J. McBride, A. B. Tonik and G. R. Finnin
A software reliability study using a complexity measure Thomas J. Walsh
A Markovian model for reliability and other performance measures of software systems .................... . Amrit L. Goel and Kazu Okumoto
Partial match retrieval for non-uniform query distributions V. S. Alagar and C. Soochan
NETWORKING
Comparing interactive computer services-Theoretical, technical and economic feasibility .................. . S. A. Mamrak and P. D. Amer
Characterizing a workload for the comparison of interactive services ..................................... . Domenico Ferrari
Control of computing funds and resources in a networking environment .................................. . Beverly O'Neal and Ronald Segal
The economic impact of network affiliation upon institutions of higher learning ............................ . Norman R. Nielsen
Approaches to concurrency control in distributed data base systems ..................................... . Philip A. Bernstein and Nathan Goodman
Access control mechanisms for a network operating system ............................................. . Helen M. Wood and Stephen R. Kimbleton
Public key vs. conventional key encryption ............................................................ . Charles S. Kline and Gerald J. Popek
SIGMA-An interactive message service for the Military Message Experiment ............................ . Robert Stotz, Ronald Tugender, David Wilczynski and Donald Oestreicher
The SIGMA experience-A study in the evolutionary design of a large software system .................... . David Wilczynski, Ronald Tugender and Donald Oestreicher
The terminal for the Military Message Experiment ..................................................... . Robert Stotz, Paul Raveling and Jeff Rothenberg
ix
709
713
717
721
727
733
741
749
761
769
775
""/01 /01
789
797
805
813
821
831
839
847
855
From the collection of the Computer History Museum (www.computerhistory.org)
On-line tutorials and documentation for the SIGMA message service ..................................... . Jeff Rothenberg
Maintaining order and consistency in multi-access data Ronald Tugender
Exact solution for the initialization time of packet radio networks with two station buffers .................. . Daniel Minoli
Fixing timeout intervals for lost packet detection in computer communication networks .................... . Robert J. T. Morris
Comparison of some end-to-end flow control policies in a packet-switchipg network G. Pujolle
Alternatives for providing highly reliable access to X.25 networks Richard J. Chung and A. M. Rybczynski
A fail-safe distributed local network for data communication Jane W. S. Liu, Izumi Suwa, Robert Stepp, Sergio M. Hinojosa and Tsutoma Utsuqi
An analysis of a distributed switching network with integrated voice and data in support of command and control Daniel Schutzer
The exploratory system control model multi-loop network Daniel J. Paulish
SOFTWARE TECHNIQUES
Software reliability measures applied to systems engineering John D. Musa
Verification procedures supporting software systems development Gruia-Catalin Roman
A language for distributed processing ................................................................. . Ronald J. Price
Automatic program transformations for virtual memory computers ....................................... . W. Abu-Sufah, D. Kuck and D. Lawrie
Analysis of data flow models using the SARA graph model of behavior ................................... . W. Ruggiero, G. Estrin, R. Fenchel, R. Razouk, D. Schwabe and M. Vernon
Software metrics for aiding program development and debugging ........................................ . N. F. Schneidewind
A measure of software complexity .................................................................... . Ned Chapin
Relating computer program maintainability to software measures A. R. Feuer and E. B. Fowlkes
863
869
875
887
893
905
917
927
935
941
947
957
969
975
989
995
1003
Program forms and program form analysers for high-level structured design. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1013 Jayashree Ramanathan and Meera Blattner
First-year results from a research program on human factors in software engineering. . . . . . . . . . . . . . . . . . . . . . . . 1021 Sylvia B. Sheppard, Bill Curtis, Phil Milliman, M. A. Borst and Tom Love
The use and abuse of a software engineering system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029 D. J. Pearson
The integrated controVdistributed power software development shop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1037 Jean-Paul Renault
On the fate of software enhancements Norman K. Sondheimer
1043
x
From the collection of the Computer History Museum (www.computerhistory.org)
Experiences in building and using compiler validation systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1051 Paul Oliver
Automatic program synthesis via synthesis of loop-free segments Joe W. Duran
Semantic similarity analysis-A computer-based study of meaning in noun phrases Lynn L. Peterson
1059
1063
Heuristic control of design-directed program transformations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1071 Christina L. Jette
A data flow evaluation system- based on the concept of recursive locality ........................ . . . . . . . . . . 1079 A. L. Davis
Data flow languages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1087 William B. Ackerman
xi
From the collection of the Computer History Museum (www.computerhistory.org)
From the collection of the Computer History Museum (www.computerhistory.org)