12
AFIPSPRESS" 210 SUMMIT AVENUE . MONTVALE, NEW JERSEY ,07645 AFIPS CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York From the collection of the Computer History Museum (www.computerhistory.org)

CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

Embed Size (px)

Citation preview

Page 1: CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

AFIPSPRESS" 210 SUMMIT AVENUE .

MONTVALE, NEW JERSEY ,07645

AFIPS CONFERENCE PROCEEDINGS

1979 NATIONAL COMPUTER

CONFERENCE

June 4-7, 1979

New York, New York

From the collection of the Computer History Museum (www.computerhistory.org)

Page 2: CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

The ideas and opinions expressed herein are solely those of the authors and are not necessarily representative of or endorsed by the 1979 National Computer Conference or the American Federation of Information Processing Societies, Inc.

Library of Congress Catalog Card Number 55-44701 AFIPS PRESS

210 Summit Avenue Montvale, New Jersey 07645

© 1979 by AFIPS Press. Copying is permitted without payment of royalty provided that (I) each reproduction is done without alteration and (2) reference to the AFIPS Proceedings and notice of copyright are included on the first page. The title and abstract may be used without further permission in computer-based and other information-service systems. Permission to republish other excerpts should be obtained from AFIPS Press.

Printed in the United States of America

ii

From the collection of the Computer History Museum (www.computerhistory.org)

Page 3: CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

Preface

MERLIN SMITH Conference Chairman

The Proceedings of the 1979 National Computer Conference represents the most comprehensive, in-depth treatment of computing developments available today. It stands as a lasting credit to Richard Merwin and his program committee, and to the many authors, session chairpersons, re­viewers and other contributors recognized on these pages.

Data processing has rapidly become one of the more vital factors in the economic and personal well being of all. The NCC program was directed to these many new interests of participants. Such an objective required many panel and discussion sessions beyond the formal papers, and the limits of this Proceedings. We owe a special debt to these par­ticipants who helped make our conference a success. Their names are recorded herein.

We appreciate this opportunity to be a part of recorded computer history.

iii

From the collection of the Computer History Museum (www.computerhistory.org)

Page 4: CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

RICHARD E. MERWIN NCC '79 Program Chairman

The NCC '79 technical program was planned to be a learning experience for all attendees. A broad range of paper and panel sessions was selected to emphasize social implications of computers, management issues, technical developments and applications. Each of these areas is represented by both paper and panel sessions which are designed to bring the attendees of this "biggest of all" computer conference to the fore­front of knowledge of each specialty.

A major attempt has been made to broaden the scope of the NCC '79 technical program by including three mini-conferences covering the application of computers to financial transactions, law and health services. Thirty-two sessions dealing with these topics will expand the coverage of NCC '79 to an audience of specialists in fields which are increasingly becoming allied with data processing techniques.

The urge to participate in the NCC '79 technical program was overwhelming. Because of a limitation on the size of this Proceedings, the number of papers that could be accepted for publication was curtailed. A large number of proposals were received for panel sessions and a selection of the best of these was made. This trend for more and more participation in both the technical program and the exhibition of the latest com­pllter products mirrors the tremendous grO\vth of the computer industry, especially in the areas of micro­processors.

iv

Introduction

In response to the wide interest in the use of com­puters by the non-professional, a special set of ses­sions and a separate publication devoted to personal computing has been organized to augment the tech­nical program and regular exhibits. The interest in this aspect of the computer industry has increased rapidly and represents a major factor in this industry.

This Proceedings is organized by specialized areas including Applications, Social Implications, Architec­ture, Data Base Management, Computer Technology, Networking and Software Techniques, in that order. Unfortunately, we had to eliminate overview state­ments by topical area organizers along with descrip­tions of panel sessions to maximize the number of technical papers that could be published. I regret these omissions but feel that our policy of publishing only technical papers best serves the technical goals of the conference.

The planning and organization of the NCC '79 tech­nical program involved a number of area coordinators, session organizers and leaders and the panelists and presenters of technical papers. I want to extend my sincere appreciation to all those who supported the organization of this outstanding technical program. Special thanks is due to the hundreds of referees who helped us select the best papers. Finally, I want to thank the program committee staff who tirelessly worked with all participants to make this conference a success.

From the collection of the Computer History Museum (www.computerhistory.org)

Page 5: CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

CONTENTS

Preface ........................................................................ , .......... , ........ . Merlin Smith

Introduction ........................................................................................ . Richard E. Merwin

APPLICATIONS

Computer technology in the movie industry Suzanne Landa

The system architecture evaluation facility-An emulation facility at Rome Air Development Center N. Bruce Clark and Michael A. Troutman

Teaching and research experiences with an emulation laboratory ......................................... . Steven F. Sutphen

Simulating the delay in logic networks for large, high-speed computers ................................... . E. A. Wilson

Languages for operating systems description, design and implementation ................................. . Philip H. Enslow, Jr.

The simulation language SIMLJI ...................................................................... . M. H. MacDougall

Mix-dependent job scheduling-An application of hybrid simulation ...................................... . Steve Tolopka and Herb Schwetman

Parametric instabilities in computer system performance prediction Lawrence W. Dowdy and Ashok K. Agrav,rala

Aids to the development of network simulators ........................................................ . Imrich Chlamtac and W. R. Franta

A stochastic state space model for prediction of product demand ........................................ . William C. Cave and Evelyn Rosenkranz

The Bus Link-A microprogrammed development tool for the CMOS/SOS processor system ............... . Avner Ben-Dor, Paul Baker and Jon Selden

A computer analysis tool for structural decomposition using entropy metrics .............................. . Aaron N. Silver

Interactive modeling systems for managers-Semantic models should underlie quantitative models .......... . Rand B. Krumland

Modeling regular, process-structured networks ......................................................... . Bruce W. Arden and Hikyu Lee

The City of New York's integrated financial management system-From mandate to working system in 18 months .................. " ............................ " ..... , " ...... " ........................ " .

Sally J. Rupert

Recurrent dilemmas of computer use in complex organizations Rob Kling and Walt Scacchi

Project management through the Accomplishment Value Procedure (A VP) ...... . Donald J. Aharonian

v

iii

iv

7

13

19

29

39

45

51

57

67

73

83

89

95

103

107

117

From the collection of the Computer History Museum (www.computerhistory.org)

Page 6: CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

Textfax-Principle for new tools in the office of the future. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Wolfgang Horak and Walter Woborschil

Microcomputer programming skills .................................................................... 135 C. Wrandle Barth

Program conversion-One successful paradigm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Charles Lynn, Jr., Jean Risley and Robert Wells

A generalized zooming technique for pictorial database systems .......................................... 147 S. K. Chang, B. S. Lin and R. Walser

An approach to real-time scan conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 Franklin C. Crow

The evolution and architecture of a high-speed workstation for interactive graphics. . . . . . . . . . . . . . . . . . . . . . . . . 165 William L. Paisner

A mathematical model for distributed free space ........................................................ 175 Y. H. Chin and S. H. Yu

Forecasting computer resource utilization using key volume indicators David E. Y. Sarna

185

Workflow-A technique for analyzing JES systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 H. Pat Artis

MMPS--A reconfigurable multi-microprocessor simulator system.. . . . . .. . . .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . 199 Daniel Klein

A (31,15) Reed-Solomon code for large memory systems. . . .. . .. . . . . . . .. .. . . . . . .. . . . . . .. . . .. . . . . . . . . . . . . . 205 Raymond S. Lim

English dictionary searching with little extra space ............... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Douglas Comer

New indices for bibliographic data and their applications ..... , . . .. .. .. .. .. .. .. . . .. . . . . . . . . .. . . . . . . . . .. . . . 217 Yahiko Kambayashi, Shuzo Yajima, Osamu Konishi and Takaki Hayashi

Visual inspection of metal surfaces .................................................................... 227 J. L. Mundy

Monitoring the earth's resources from space-Can you really identify crops by satellite? 233 David Landgrebe

Digital image shape detection ......................................................................... 243 R. Michael Hord

PM"-A reconfigurable multiprocessor system for pattern recognition and image processing Faye A. Briggs, King-Sun Fu, Kai Hwang and Janak H. Patel

255

Transportable image-processing software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 R. G. Hamlet and A. Rosenfeld

A data-handling mechanics of on-line text editing system with efficient secondary storage access. . . . . . . . . . . . . 273 Sakti Pramanik and Edgar T. Irons

SOCIAL IMPLICATIONS

How do we best control the flow of electronic information across sovereign borders? .. . . . . . . . . . . . . . . . . . . . . . 279 Peter Safirstein

Privacy and security in transnational data processing systems ............................................ 283 Rein Turn

A modular approach to computer security risk management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Robert P. Campbell and Gerald A. Sands

The design and operation of puhlic-key cryptosystems .... , ... , ..... , .. , . , , , , . , , . , , ... , . , , , ............. . 305 Eric H. Michelman

vi

From the collection of the Computer History Museum (www.computerhistory.org)

Page 7: CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

Safeguarding cryptographic keys ...................................................................... 313 G. R. Blakley

Applications for multilevel secure operating sytems ..................................................... 319 John P. L. Woodward

The foundations of a provably secure operating system (PSOS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Richard J. Feiertag and Peter G. Neumann

A security retrofit of VMJ370 ......................................................................... 335 B. D. Gold, R. R. Linde, R. J. Peeler, M. Schaefer, J. F. Scheid and P. D. Ward

KSOS-The design of a secure operating system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345 E. J. McCauley and P. J. brongowski

UCLA Secure UNIX ................................................................................ 355 Gerald J. Popek, Mark Kampe, Charles S. Kline, Allen Stoughton, Michael Urban and Evelyn J. Walton

KSOS-Development methodology for a secure operating system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 T. A. Berson and G. L. Barksdale, Jr.

KSOS---Computer network applications ......................................................... , . . . . . . 373 M. A. Padlipsky, K. J. Biba and R. B. Neely

Considerations in the employment of blind computer professionals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 James A. Kutsch, Jr., and Kimberly B. Kutsch

Hiring a deaf computer professional ................................................................... 385 Karen K. Anderson and Philip W. Bravin

MIS effects on managers' task scope and satisfaction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 Daniel Robey

Some neglected outcomes of organizational use of computing technology-And their implications for systems 397 designers .......................................................................................... .

M. Lynne Markus

An academic meets industry-Rethinking computer-based education and personalized systems of instruction .. 403 Kenneth L. Modesitt

Recent developments in computers and society research and education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 Richard H. Austing and Gerald L. Engel

Interactive monitoring of computer-based group communication Kathleen Spangler, Hubert Lipinski and Robert Plummer

411

The status of women in health science computing ..... . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 Lynn L. Peterson

Women and minorities in the computer professions.. .. . . .. .. .. .. .. . . . . . . . . . . . . .. . . .. .. . . . . . . . . .. . . .. .. . . 419 Helen M. Wood

Computers in judicial administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 Charles L. Aird and Barbara H. Todd

Police and computer technology-The expectations and the results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 443 Kent W. Colton

ARCHITECTURE

Distributed algorithms for global structuring ........ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 455 Raphael A. Finkel, Marvin Solomon and Michael L. Horowitz

The tree-structured distributed network front-end processor architecture. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461 Robert M. Monroe, Ronald J. Srodawa and Franklin H. Westervelt

Analysis of real-time control systems by the model of packet nets Mohamed Gawdat Gouda

vii

469

From the collection of the Computer History Museum (www.computerhistory.org)

Page 8: CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

Performance and economy of a fault-tolerant mUltiprocessor ............................................ . Jaynarayan H. Lala and Charles J. Smith

Serviceability features of the HP 300 small business computer ........................................... . Curtis R. Gowan

Automatic tuning of computer architectures ........................................................... . Ken Sakamura, Tatsushi Morokuma, Hideo Aiso and Hajime lizuka

The BTl 8000-Homogeneous, general-purpose multiprocessing ......................................... . George R. Lewis, J. Shirley Henry and Brian P. McCune

A survey of interconnection methods for reconfigurable parallel processing systems Howard Jay Siegel, Robert J. McMillen and Philip T. Mueller, Jr.

Adaptation properties for dynamic architectures ....................................................... . Steven I. Kartashev, Svetlana P. Kartashev and C. V. Ramamoorthy

Architectural considerations of the NEC mass data file subsystem ....................................... . Akira Sekino and Takuo Kitamura

Error-oriented architecture testing .................................................................... . Larry Kwok-Woon Lai

A survey of methods for intermittent fault analysis ..................................................... . Yashwant K. Malaiya and Stephen Y. H. Su

Architectural and design perspectives in a modular multi-microprocessor, toe DPS-I ....................... . Kells A. Elmquist

Work flow view of a distributed application J. R. Hamstra

The use of self-inverse program primitives in system evaluation John E. MacDonald, Jr.

A loosely-coupled applicative multi-processing system .................................................. . Robert M. Keller, Gary Lindstrom and Suhas Patil

A prototype dataflow computer with token l~belling Ian Watson and John Gurd

A view of dataflow ................................................................................. . Kim P. Gostelow and Robert E. Thomas

A hardware-independent virtual architecture for PASCAL Viswanathan Santhanam

Design of a high-level language machine ............................................................... . G. J. Battarel and R. J. Chevance

A programming language for high-level architecture Yaohan Chu and Edward ~~_~_~BnoI!_

DATA BASE MANAGEMENT

Data management in distributed data bases ., .......................................................... . c. V. Ramamoorthy and Benjamin W. Wah

A unified architecture for data and message management ............................................... . Georges Gardarin

Design of a prototype ANSI/SPARC three-schema data base system ..................................... . Eric K. Clemons

On the implementation of a conceptual schema model within a three-level DBMS architecture Shamkant B. Navathe and Johann Lemke

viii

481

493

499

513

529

543

557

565

577

587

595

605

613

623

629

637

649

657

667

681

689

697

From the collection of the Computer History Museum (www.computerhistory.org)

Page 9: CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

The practice of data base administration .............................................................. . Jay-Louise Weldon

An approach to automatic maintenance of semantic integrity in large design data bases ..................... . Gilles M. E. Lafue

On query-answering in relational data bases E. L. Lozinskii

ASTROL-An associative structure-oriented language .................................................. . James F. Wirth

An associative search language for data management Amar Mukhopadhyay and Alireza Hurson

Updating defined relations ........................................................................... . I. M. Osman

Performance enhancement for relational systems through query compilation Rand y H. Katz

COMPUTER TECHNOLOGY

System considerations for predicting mass storage subsystem behavior ................................... . E. J. McBride, A. B. Tonik and G. R. Finnin

A software reliability study using a complexity measure Thomas J. Walsh

A Markovian model for reliability and other performance measures of software systems .................... . Amrit L. Goel and Kazu Okumoto

Partial match retrieval for non-uniform query distributions V. S. Alagar and C. Soochan

NETWORKING

Comparing interactive computer services-Theoretical, technical and economic feasibility .................. . S. A. Mamrak and P. D. Amer

Characterizing a workload for the comparison of interactive services ..................................... . Domenico Ferrari

Control of computing funds and resources in a networking environment .................................. . Beverly O'Neal and Ronald Segal

The economic impact of network affiliation upon institutions of higher learning ............................ . Norman R. Nielsen

Approaches to concurrency control in distributed data base systems ..................................... . Philip A. Bernstein and Nathan Goodman

Access control mechanisms for a network operating system ............................................. . Helen M. Wood and Stephen R. Kimbleton

Public key vs. conventional key encryption ............................................................ . Charles S. Kline and Gerald J. Popek

SIGMA-An interactive message service for the Military Message Experiment ............................ . Robert Stotz, Ronald Tugender, David Wilczynski and Donald Oestreicher

The SIGMA experience-A study in the evolutionary design of a large software system .................... . David Wilczynski, Ronald Tugender and Donald Oestreicher

The terminal for the Military Message Experiment ..................................................... . Robert Stotz, Paul Raveling and Jeff Rothenberg

ix

709

713

717

721

727

733

741

749

761

769

775

""/01 /01

789

797

805

813

821

831

839

847

855

From the collection of the Computer History Museum (www.computerhistory.org)

Page 10: CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

On-line tutorials and documentation for the SIGMA message service ..................................... . Jeff Rothenberg

Maintaining order and consistency in multi-access data Ronald Tugender

Exact solution for the initialization time of packet radio networks with two station buffers .................. . Daniel Minoli

Fixing timeout intervals for lost packet detection in computer communication networks .................... . Robert J. T. Morris

Comparison of some end-to-end flow control policies in a packet-switchipg network G. Pujolle

Alternatives for providing highly reliable access to X.25 networks Richard J. Chung and A. M. Rybczynski

A fail-safe distributed local network for data communication Jane W. S. Liu, Izumi Suwa, Robert Stepp, Sergio M. Hinojosa and Tsutoma Utsuqi

An analysis of a distributed switching network with integrated voice and data in support of command and control Daniel Schutzer

The exploratory system control model multi-loop network Daniel J. Paulish

SOFTWARE TECHNIQUES

Software reliability measures applied to systems engineering John D. Musa

Verification procedures supporting software systems development Gruia-Catalin Roman

A language for distributed processing ................................................................. . Ronald J. Price

Automatic program transformations for virtual memory computers ....................................... . W. Abu-Sufah, D. Kuck and D. Lawrie

Analysis of data flow models using the SARA graph model of behavior ................................... . W. Ruggiero, G. Estrin, R. Fenchel, R. Razouk, D. Schwabe and M. Vernon

Software metrics for aiding program development and debugging ........................................ . N. F. Schneidewind

A measure of software complexity .................................................................... . Ned Chapin

Relating computer program maintainability to software measures A. R. Feuer and E. B. Fowlkes

863

869

875

887

893

905

917

927

935

941

947

957

969

975

989

995

1003

Program forms and program form analysers for high-level structured design. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1013 Jayashree Ramanathan and Meera Blattner

First-year results from a research program on human factors in software engineering. . . . . . . . . . . . . . . . . . . . . . . . 1021 Sylvia B. Sheppard, Bill Curtis, Phil Milliman, M. A. Borst and Tom Love

The use and abuse of a software engineering system. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029 D. J. Pearson

The integrated controVdistributed power software development shop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1037 Jean-Paul Renault

On the fate of software enhancements Norman K. Sondheimer

1043

x

From the collection of the Computer History Museum (www.computerhistory.org)

Page 11: CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

Experiences in building and using compiler validation systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1051 Paul Oliver

Automatic program synthesis via synthesis of loop-free segments Joe W. Duran

Semantic similarity analysis-A computer-based study of meaning in noun phrases Lynn L. Peterson

1059

1063

Heuristic control of design-directed program transformations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1071 Christina L. Jette

A data flow evaluation system- based on the concept of recursive locality ........................ . . . . . . . . . . 1079 A. L. Davis

Data flow languages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1087 William B. Ackerman

xi

From the collection of the Computer History Museum (www.computerhistory.org)

Page 12: CONFERENCE PROCEEDINGS - IEEE Computer Society · CONFERENCE PROCEEDINGS 1979 NATIONAL COMPUTER CONFERENCE June 4-7, 1979 New York, New York ... I regret these omissions but feel

From the collection of the Computer History Museum (www.computerhistory.org)