Since the advent of LSI technology, several schemes have evolved for the utilization of large arrays to their full potential. A common and straightforward approach involves the designer restricting himself to the equipment being designed at the moment. Faced with only a limited set of problems, it is not difficult to specify a small number of LSI array types which will efficiently complete the design. While the results are quite encouraging for specific cases, the drawbacks of any mass adoption of these techniques are obvious. This, the so-called "custom approach," would require the semiconductor manufacturer to be responsive to each customer with numerous low-output production runs of highly specialized devices. The per-unit cost to the user, for his own efforts as well as those of the manufacturer, would be quite high due to the inability to spread initial costs over many devices. In addition, the complexity of 100-gate-plus arrays is such that it is difficult to substitute one for another (with efficient results). This would severely limit the off-the-shelf capabilities of both user and manufacturer.
{"title":"Characters: universal architecture for LSI","authors":"F. D. Erwin, J. McKevitt","doi":"10.1145/1478559.1478568","DOIUrl":"https://doi.org/10.1145/1478559.1478568","url":null,"abstract":"Since the advent of LSI technology, several schemes have evolved for the utilization of large arrays to their full potential. A common and straightforward approach involves the designer restricting himself to the equipment being designed at the moment. Faced with only a limited set of problems, it is not difficult to specify a small number of LSI array types which will efficiently complete the design. While the results are quite encouraging for specific cases, the drawbacks of any mass adoption of these techniques are obvious. This, the so-called \"custom approach,\" would require the semiconductor manufacturer to be responsive to each customer with numerous low-output production runs of highly specialized devices. The per-unit cost to the user, for his own efforts as well as those of the manufacturer, would be quite high due to the inability to spread initial costs over many devices. In addition, the complexity of 100-gate-plus arrays is such that it is difficult to substitute one for another (with efficient results). This would severely limit the off-the-shelf capabilities of both user and manufacturer.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122596651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Motivated computer professionals all over the United States have undertaken a most special and extraordinary task: they are involving themselves in every way possible in the training of disadvantaged and educationally-deficited men and women from the so-called ghetto and poverty areas of the country. They are exhibiting a special and wonderful tension which impels them to appear at that interface between their own computing community and those underprivileged who wish to enter it.
{"title":"The involved generation: computing people and the disadvantaged","authors":"David B. Mayer","doi":"10.1145/1478559.1478642","DOIUrl":"https://doi.org/10.1145/1478559.1478642","url":null,"abstract":"Motivated computer professionals all over the United States have undertaken a most special and extraordinary task: they are involving themselves in every way possible in the training of disadvantaged and educationally-deficited men and women from the so-called ghetto and poverty areas of the country. They are exhibiting a special and wonderful tension which impels them to appear at that interface between their own computing community and those underprivileged who wish to enter it.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123178667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to meet the information retrieval needs of various industries, inquiry-response systems are being implemented by storing large data bases in centralized computer files. In some systems, the files are accessed by personnel primarily as the result of telephone calls from customers. As an example, in the airlines industry, computer files are accessed by reservation clerks to determine the availability of reservations for a specific flight. In this example, and in similar applications involving queries or requests from customers, input messages requesting certain information are generated by a customer representative and then transmitted to a computer from an input-output terminal such as a visual display device. When the computer has obtained the requested information, a response message is transmitted back to the requesting terminal, and the representative continues her dialogue with the customer.
{"title":"Analysis of the communications aspects of an inquiry-response system","authors":"J. Sykes","doi":"10.1145/1478559.1478639","DOIUrl":"https://doi.org/10.1145/1478559.1478639","url":null,"abstract":"In order to meet the information retrieval needs of various industries, inquiry-response systems are being implemented by storing large data bases in centralized computer files. In some systems, the files are accessed by personnel primarily as the result of telephone calls from customers. As an example, in the airlines industry, computer files are accessed by reservation clerks to determine the availability of reservations for a specific flight. In this example, and in similar applications involving queries or requests from customers, input messages requesting certain information are generated by a customer representative and then transmitted to a computer from an input-output terminal such as a visual display device. When the computer has obtained the requested information, a response message is transmitted back to the requesting terminal, and the representative continues her dialogue with the customer.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"423 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132315808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The development of a concept for a Department of the Army Civilian Personnel Management and Manpower Data Reporting System and an Optimum Automatic Data Processing System was undertaken by Computer Command and Control Company in June, 1967.
{"title":"Design of distributed communications system: a case study","authors":"N. Nisenoff","doi":"10.1145/1478559.1478638","DOIUrl":"https://doi.org/10.1145/1478559.1478638","url":null,"abstract":"The development of a concept for a Department of the Army Civilian Personnel Management and Manpower Data Reporting System and an Optimum Automatic Data Processing System was undertaken by Computer Command and Control Company in June, 1967.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Our model of a programming-language translator system is represented schematically in the block diagram of Figure 1. This diagram divides the translator system into two components. The first component T is a translator program that reads in and translates the valid programs of some programming language L. The output of the translator is a subset T(L) of the intermediate language. The second component is a system M for executing the programs translated into the intermediate language. It will be seen that, in this intermediate language, the operators follow their operands in postfix (reverse polish) form, and they are relatively machine independent. In this paper, we will be mainly concerned with defining the operation of the translator component by specifying the input-output relationships of the translator for a particular programming language. These relationships will be described in a syntactic notation that is independent of the particular translation algorithm used for implementing the translator T.
{"title":"Some syntactic methods for specifying extendible programming languages","authors":"V. Schneider","doi":"10.1145/1478559.1478577","DOIUrl":"https://doi.org/10.1145/1478559.1478577","url":null,"abstract":"Our model of a programming-language translator system is represented schematically in the block diagram of Figure 1. This diagram divides the translator system into two components. The first component T is a translator program that reads in and translates the valid programs of some programming language L. The output of the translator is a subset T(L) of the intermediate language. The second component is a system M for executing the programs translated into the intermediate language. It will be seen that, in this intermediate language, the operators follow their operands in postfix (reverse polish) form, and they are relatively machine independent. In this paper, we will be mainly concerned with defining the operation of the translator component by specifying the input-output relationships of the translator for a particular programming language. These relationships will be described in a syntactic notation that is independent of the particular translation algorithm used for implementing the translator T.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117254569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There are many ways in which a pattern recognition system may be implemented. In the specific problem of speaker verification, a two-class recognition scheme is of interest. A speaker who desired verification of his identity based upon some previously stored characteristics of his speech represents one of the two classes (real), whereas the other class (impostor) encompasses all other speakers.
{"title":"Pattern recognition in speaker verification","authors":"S. Das, W. Mohn","doi":"10.1145/1478559.1478646","DOIUrl":"https://doi.org/10.1145/1478559.1478646","url":null,"abstract":"There are many ways in which a pattern recognition system may be implemented. In the specific problem of speaker verification, a two-class recognition scheme is of interest. A speaker who desired verification of his identity based upon some previously stored characteristics of his speech represents one of the two classes (real), whereas the other class (impostor) encompasses all other speakers.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132261775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to analyze and subsequently synthesize complex systems, engineers have increasingly turned to computer simulation techniques. Until recently, simulation techniques could generally be divided either on the basis of the type of computer to be used, or the type of system to be simulated.
{"title":"A hybird computer programming system","authors":"M. Franklin, J. Strauss","doi":"10.1145/1478559.1478590","DOIUrl":"https://doi.org/10.1145/1478559.1478590","url":null,"abstract":"In order to analyze and subsequently synthesize complex systems, engineers have increasingly turned to computer simulation techniques. Until recently, simulation techniques could generally be divided either on the basis of the type of computer to be used, or the type of system to be simulated.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124843271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since February, 1969, a computer based course in computer programming has been running at an "inner city" high school in San Francisco, California. Each day ninety high school juniors and seniors in classes of fifteen interact with a course designed to teach the fundamentals of computer programming for business applications. For fifty minutes a day each student is on-line with a computer located thirty miles away on the Stanford University campus. The purpose of this paper is to describe the rationale and the major components of the software system used to implement the project.
{"title":"Computer based instruction in computer programming: a symbol manipulation-list processing approach","authors":"P. Lorton, J. Slimick","doi":"10.1145/1478559.1478623","DOIUrl":"https://doi.org/10.1145/1478559.1478623","url":null,"abstract":"Since February, 1969, a computer based course in computer programming has been running at an \"inner city\" high school in San Francisco, California. Each day ninety high school juniors and seniors in classes of fifteen interact with a course designed to teach the fundamentals of computer programming for business applications. For fifty minutes a day each student is on-line with a computer located thirty miles away on the Stanford University campus. The purpose of this paper is to describe the rationale and the major components of the software system used to implement the project.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Large aircraft, such as the Lockheed C-5A, can be forced to resonate on the ground in a large number of closely coupled vibration modes which involve the combined motion of lifting and control surfaces, fuselage and engines. During flight, atmospheric disturbances can also excite these vibrational resonances, though, under normal conditions, they are damped to a safe level because the airstream is able to extract energy from the vibrating structure. However, there exists the aeroelastic phenomenon called flutter---under certain conditions the structure is able to extract energy from the airstream and the amplitude of a resonance can very rapidly increase to a destructive level. Clearly, the damping of all resonances must remain positive throughout a wide range of flight conditions. This is verified by flight flutter test programs during which aircraft are proven safe at an airspeed and altitude before proceeding to a higher airspeed. In one method of flutter testing of large aircraft, the resonant modes are excited during flight by oscillatory forces from aerodynamic vanes. A frequency sweep technique is used; the frequency of the oscillatory forces is varied continuously from about 1 to 30 Hz. Accelerometers or other transducers indicate the response at various locations on the aircraft. After an excitation sweep, the frequencies and measures of damping of the resonances are determined, and a decision is made about the safety of a higher airspeed.
{"title":"A hybrid frequency response technique and its application to aircraft flight flutter testing","authors":"J. Simmons, J. Benson, J. Fiedler","doi":"10.1145/1478559.1478655","DOIUrl":"https://doi.org/10.1145/1478559.1478655","url":null,"abstract":"Large aircraft, such as the Lockheed C-5A, can be forced to resonate on the ground in a large number of closely coupled vibration modes which involve the combined motion of lifting and control surfaces, fuselage and engines. During flight, atmospheric disturbances can also excite these vibrational resonances, though, under normal conditions, they are damped to a safe level because the airstream is able to extract energy from the vibrating structure. However, there exists the aeroelastic phenomenon called flutter---under certain conditions the structure is able to extract energy from the airstream and the amplitude of a resonance can very rapidly increase to a destructive level. Clearly, the damping of all resonances must remain positive throughout a wide range of flight conditions. This is verified by flight flutter test programs during which aircraft are proven safe at an airspeed and altitude before proceeding to a higher airspeed. In one method of flutter testing of large aircraft, the resonant modes are excited during flight by oscillatory forces from aerodynamic vanes. A frequency sweep technique is used; the frequency of the oscillatory forces is varied continuously from about 1 to 30 Hz. Accelerometers or other transducers indicate the response at various locations on the aircraft. After an excitation sweep, the frequencies and measures of damping of the resonances are determined, and a decision is made about the safety of a higher airspeed.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116687280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The real-time digital process control system, of which the Partition Share Supervisor is an operational feature, was designed and implemented to assist in the functions of monitoring, evaluating and controlling an interconnected system of electrical power utility companies. The main processing unit is located at the central control office with teleprocessing communications to remote lower level control centers.
{"title":"An operational memory share supervisor providing multi-task processing within a single partition","authors":"J. Braun, A. Gartenhaus","doi":"10.1145/1478559.1478565","DOIUrl":"https://doi.org/10.1145/1478559.1478565","url":null,"abstract":"The real-time digital process control system, of which the Partition Share Supervisor is an operational feature, was designed and implemented to assist in the functions of monitoring, evaluating and controlling an interconnected system of electrical power utility companies. The main processing unit is located at the central control office with teleprocessing communications to remote lower level control centers.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125972410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}