Two digital cryptographic techniques are described which may have potential applications in Data Processing Systems. A method of digital substitution analogous to a Vernan double tape system is presented, using a controlled combination of data and the contents of two memories. The second method uses a digital route transposition matrix using a combination of row and column transposition under memory control. Possible ways of achieving key leverage in each ciphering process are described.
{"title":"A consideration of the application of cryptographic techniques to data processing","authors":"R. O. Skatrud","doi":"10.1145/1478559.1478573","DOIUrl":"https://doi.org/10.1145/1478559.1478573","url":null,"abstract":"Two digital cryptographic techniques are described which may have potential applications in Data Processing Systems. A method of digital substitution analogous to a Vernan double tape system is presented, using a controlled combination of data and the contents of two memories. The second method uses a digital route transposition matrix using a combination of row and column transposition under memory control. Possible ways of achieving key leverage in each ciphering process are described.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116554017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A fundamental problem in monitoring the performance of a system with a hardware device is too much data. Inside the System/360 Model 40, for example, seventeen address bits and sixteen data bits may be processed every 2.5 microseconds; this rate is equivalent in bulk to about three novels per second but not generally equivalent in interest or information. The design objective for any hardware monitor, therefore, is to reduce the data it sees as soon as possible.
用硬件设备监控系统性能的一个基本问题是数据太多。例如,在System/360 Model 40中,每2.5微秒可以处理17个地址位和16个数据位;这个速度相当于每秒三部小说,但在兴趣或信息方面通常不相等。因此,任何硬件监视器的设计目标都是尽可能减少它所看到的数据。
{"title":"The system logic and usage recorder","authors":"R. Murphy","doi":"10.1145/1478559.1478585","DOIUrl":"https://doi.org/10.1145/1478559.1478585","url":null,"abstract":"A fundamental problem in monitoring the performance of a system with a hardware device is too much data. Inside the System/360 Model 40, for example, seventeen address bits and sixteen data bits may be processed every 2.5 microseconds; this rate is equivalent in bulk to about three novels per second but not generally equivalent in interest or information. The design objective for any hardware monitor, therefore, is to reduce the data it sees as soon as possible.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130063209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to meet the information retrieval needs of various industries, inquiry-response systems are being implemented by storing large data bases in centralized computer files. In some systems, the files are accessed by personnel primarily as the result of telephone calls from customers. As an example, in the airlines industry, computer files are accessed by reservation clerks to determine the availability of reservations for a specific flight. In this example, and in similar applications involving queries or requests from customers, input messages requesting certain information are generated by a customer representative and then transmitted to a computer from an input-output terminal such as a visual display device. When the computer has obtained the requested information, a response message is transmitted back to the requesting terminal, and the representative continues her dialogue with the customer.
{"title":"Analysis of the communications aspects of an inquiry-response system","authors":"J. Sykes","doi":"10.1145/1478559.1478639","DOIUrl":"https://doi.org/10.1145/1478559.1478639","url":null,"abstract":"In order to meet the information retrieval needs of various industries, inquiry-response systems are being implemented by storing large data bases in centralized computer files. In some systems, the files are accessed by personnel primarily as the result of telephone calls from customers. As an example, in the airlines industry, computer files are accessed by reservation clerks to determine the availability of reservations for a specific flight. In this example, and in similar applications involving queries or requests from customers, input messages requesting certain information are generated by a customer representative and then transmitted to a computer from an input-output terminal such as a visual display device. When the computer has obtained the requested information, a response message is transmitted back to the requesting terminal, and the representative continues her dialogue with the customer.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"423 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132315808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The development of a concept for a Department of the Army Civilian Personnel Management and Manpower Data Reporting System and an Optimum Automatic Data Processing System was undertaken by Computer Command and Control Company in June, 1967.
{"title":"Design of distributed communications system: a case study","authors":"N. Nisenoff","doi":"10.1145/1478559.1478638","DOIUrl":"https://doi.org/10.1145/1478559.1478638","url":null,"abstract":"The development of a concept for a Department of the Army Civilian Personnel Management and Manpower Data Reporting System and an Optimum Automatic Data Processing System was undertaken by Computer Command and Control Company in June, 1967.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Our model of a programming-language translator system is represented schematically in the block diagram of Figure 1. This diagram divides the translator system into two components. The first component T is a translator program that reads in and translates the valid programs of some programming language L. The output of the translator is a subset T(L) of the intermediate language. The second component is a system M for executing the programs translated into the intermediate language. It will be seen that, in this intermediate language, the operators follow their operands in postfix (reverse polish) form, and they are relatively machine independent. In this paper, we will be mainly concerned with defining the operation of the translator component by specifying the input-output relationships of the translator for a particular programming language. These relationships will be described in a syntactic notation that is independent of the particular translation algorithm used for implementing the translator T.
{"title":"Some syntactic methods for specifying extendible programming languages","authors":"V. Schneider","doi":"10.1145/1478559.1478577","DOIUrl":"https://doi.org/10.1145/1478559.1478577","url":null,"abstract":"Our model of a programming-language translator system is represented schematically in the block diagram of Figure 1. This diagram divides the translator system into two components. The first component T is a translator program that reads in and translates the valid programs of some programming language L. The output of the translator is a subset T(L) of the intermediate language. The second component is a system M for executing the programs translated into the intermediate language. It will be seen that, in this intermediate language, the operators follow their operands in postfix (reverse polish) form, and they are relatively machine independent. In this paper, we will be mainly concerned with defining the operation of the translator component by specifying the input-output relationships of the translator for a particular programming language. These relationships will be described in a syntactic notation that is independent of the particular translation algorithm used for implementing the translator T.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117254569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There are many ways in which a pattern recognition system may be implemented. In the specific problem of speaker verification, a two-class recognition scheme is of interest. A speaker who desired verification of his identity based upon some previously stored characteristics of his speech represents one of the two classes (real), whereas the other class (impostor) encompasses all other speakers.
{"title":"Pattern recognition in speaker verification","authors":"S. Das, W. Mohn","doi":"10.1145/1478559.1478646","DOIUrl":"https://doi.org/10.1145/1478559.1478646","url":null,"abstract":"There are many ways in which a pattern recognition system may be implemented. In the specific problem of speaker verification, a two-class recognition scheme is of interest. A speaker who desired verification of his identity based upon some previously stored characteristics of his speech represents one of the two classes (real), whereas the other class (impostor) encompasses all other speakers.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132261775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to analyze and subsequently synthesize complex systems, engineers have increasingly turned to computer simulation techniques. Until recently, simulation techniques could generally be divided either on the basis of the type of computer to be used, or the type of system to be simulated.
{"title":"A hybird computer programming system","authors":"M. Franklin, J. Strauss","doi":"10.1145/1478559.1478590","DOIUrl":"https://doi.org/10.1145/1478559.1478590","url":null,"abstract":"In order to analyze and subsequently synthesize complex systems, engineers have increasingly turned to computer simulation techniques. Until recently, simulation techniques could generally be divided either on the basis of the type of computer to be used, or the type of system to be simulated.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124843271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since February, 1969, a computer based course in computer programming has been running at an "inner city" high school in San Francisco, California. Each day ninety high school juniors and seniors in classes of fifteen interact with a course designed to teach the fundamentals of computer programming for business applications. For fifty minutes a day each student is on-line with a computer located thirty miles away on the Stanford University campus. The purpose of this paper is to describe the rationale and the major components of the software system used to implement the project.
{"title":"Computer based instruction in computer programming: a symbol manipulation-list processing approach","authors":"P. Lorton, J. Slimick","doi":"10.1145/1478559.1478623","DOIUrl":"https://doi.org/10.1145/1478559.1478623","url":null,"abstract":"Since February, 1969, a computer based course in computer programming has been running at an \"inner city\" high school in San Francisco, California. Each day ninety high school juniors and seniors in classes of fifteen interact with a course designed to teach the fundamentals of computer programming for business applications. For fifty minutes a day each student is on-line with a computer located thirty miles away on the Stanford University campus. The purpose of this paper is to describe the rationale and the major components of the software system used to implement the project.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127982363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Large aircraft, such as the Lockheed C-5A, can be forced to resonate on the ground in a large number of closely coupled vibration modes which involve the combined motion of lifting and control surfaces, fuselage and engines. During flight, atmospheric disturbances can also excite these vibrational resonances, though, under normal conditions, they are damped to a safe level because the airstream is able to extract energy from the vibrating structure. However, there exists the aeroelastic phenomenon called flutter---under certain conditions the structure is able to extract energy from the airstream and the amplitude of a resonance can very rapidly increase to a destructive level. Clearly, the damping of all resonances must remain positive throughout a wide range of flight conditions. This is verified by flight flutter test programs during which aircraft are proven safe at an airspeed and altitude before proceeding to a higher airspeed. In one method of flutter testing of large aircraft, the resonant modes are excited during flight by oscillatory forces from aerodynamic vanes. A frequency sweep technique is used; the frequency of the oscillatory forces is varied continuously from about 1 to 30 Hz. Accelerometers or other transducers indicate the response at various locations on the aircraft. After an excitation sweep, the frequencies and measures of damping of the resonances are determined, and a decision is made about the safety of a higher airspeed.
{"title":"A hybrid frequency response technique and its application to aircraft flight flutter testing","authors":"J. Simmons, J. Benson, J. Fiedler","doi":"10.1145/1478559.1478655","DOIUrl":"https://doi.org/10.1145/1478559.1478655","url":null,"abstract":"Large aircraft, such as the Lockheed C-5A, can be forced to resonate on the ground in a large number of closely coupled vibration modes which involve the combined motion of lifting and control surfaces, fuselage and engines. During flight, atmospheric disturbances can also excite these vibrational resonances, though, under normal conditions, they are damped to a safe level because the airstream is able to extract energy from the vibrating structure. However, there exists the aeroelastic phenomenon called flutter---under certain conditions the structure is able to extract energy from the airstream and the amplitude of a resonance can very rapidly increase to a destructive level. Clearly, the damping of all resonances must remain positive throughout a wide range of flight conditions. This is verified by flight flutter test programs during which aircraft are proven safe at an airspeed and altitude before proceeding to a higher airspeed. In one method of flutter testing of large aircraft, the resonant modes are excited during flight by oscillatory forces from aerodynamic vanes. A frequency sweep technique is used; the frequency of the oscillatory forces is varied continuously from about 1 to 30 Hz. Accelerometers or other transducers indicate the response at various locations on the aircraft. After an excitation sweep, the frequencies and measures of damping of the resonances are determined, and a decision is made about the safety of a higher airspeed.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116687280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The real-time digital process control system, of which the Partition Share Supervisor is an operational feature, was designed and implemented to assist in the functions of monitoring, evaluating and controlling an interconnected system of electrical power utility companies. The main processing unit is located at the central control office with teleprocessing communications to remote lower level control centers.
{"title":"An operational memory share supervisor providing multi-task processing within a single partition","authors":"J. Braun, A. Gartenhaus","doi":"10.1145/1478559.1478565","DOIUrl":"https://doi.org/10.1145/1478559.1478565","url":null,"abstract":"The real-time digital process control system, of which the Partition Share Supervisor is an operational feature, was designed and implemented to assist in the functions of monitoring, evaluating and controlling an interconnected system of electrical power utility companies. The main processing unit is located at the central control office with teleprocessing communications to remote lower level control centers.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1969-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125972410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}