首页 > 最新文献

AFIPS '69 (Fall)最新文献

英文 中文
Management of confidential information 保密信息的管理
Pub Date : 1899-12-30 DOI: 10.1145/1478559.1478575
Edward V. Comber
For many years, informed persons have expended considerable time and energy attempting to evolve an acceptable philosophic assessment of the concept of "privacy." Studies made in the fields of anthropology, phychology, and sociology are in general agreement that both the mental and physical well-being of an individual requires freedom to experience some degree of personal anonymity within the environment. While the significance of "privacy" has been recognized, it has eluded the constraint of an acceptable definition. The search for a workable definition continues as man seeks a means for establishing practical bounds for inter-personal relations.
多年来,知情人士花费了相当多的时间和精力,试图对“隐私”概念形成一种可接受的哲学评估。人类学、心理学和社会学领域的研究普遍认为,一个人的身心健康都需要在环境中自由地体验某种程度的个人匿名。虽然“隐私”的重要性已得到承认,但它却没有一个可接受的定义。当人类寻求为人际关系建立实际界限的方法时,对可行定义的探索仍在继续。
{"title":"Management of confidential information","authors":"Edward V. Comber","doi":"10.1145/1478559.1478575","DOIUrl":"https://doi.org/10.1145/1478559.1478575","url":null,"abstract":"For many years, informed persons have expended considerable time and energy attempting to evolve an acceptable philosophic assessment of the concept of \"privacy.\" Studies made in the fields of anthropology, phychology, and sociology are in general agreement that both the mental and physical well-being of an individual requires freedom to experience some degree of personal anonymity within the environment. While the significance of \"privacy\" has been recognized, it has eluded the constraint of an acceptable definition. The search for a workable definition continues as man seeks a means for establishing practical bounds for inter-personal relations.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122642905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Dynamic protection structures 动力防护结构
Pub Date : 1899-12-30 DOI: 10.1145/1478559.1478563
B. Lampson
A very general problem which pervades the entire field of operating system design is the construction of protection mechanisms. These come in many different forms, ranging from hardware which prevents the execution of input/output instructions by user programs, to password schemes for identifying customers when they log onto a time-sharing system. This paper deals with one aspect of the subject, which might be called the meta-theory of protection systems: how can the information which specifies protection and authorizes access, itself be protected and manipulated. Thus, for example, a memory protection system decides whether a program P is allowed to store into location T. We are concerned with how P obtains this permission and how he passes it on to other programs.
一个遍及整个操作系统设计领域的非常普遍的问题是保护机制的构建。它们有许多不同的形式,从防止用户程序执行输入/输出指令的硬件,到在用户登录分时系统时识别用户的密码方案。本文探讨了保护系统元理论的一个方面,即指定保护和授权访问的信息本身如何受到保护和操纵。因此,例如,内存保护系统决定是否允许程序P存储到位置t中。我们关心的是P如何获得该权限以及他如何将该权限传递给其他程序。
{"title":"Dynamic protection structures","authors":"B. Lampson","doi":"10.1145/1478559.1478563","DOIUrl":"https://doi.org/10.1145/1478559.1478563","url":null,"abstract":"A very general problem which pervades the entire field of operating system design is the construction of protection mechanisms. These come in many different forms, ranging from hardware which prevents the execution of input/output instructions by user programs, to password schemes for identifying customers when they log onto a time-sharing system. This paper deals with one aspect of the subject, which might be called the meta-theory of protection systems: how can the information which specifies protection and authorizes access, itself be protected and manipulated. Thus, for example, a memory protection system decides whether a program P is allowed to store into location T. We are concerned with how P obtains this permission and how he passes it on to other programs.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131652559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 191
Establishment and maintenance of a storage hierarchy for an on-line data base under TSS/360 在TSS/360下建立和维护在线数据库的存储层次结构
Pub Date : 1899-12-30 DOI: 10.1145/1478559.1478610
J. Considine, Allan H. Weis
As on-line interactive systems increase in popularity, several problem areas become more and more apparent. One of these is the management of the on-line accessible data base. It has been the experience of installations throughout the country that such a data base tends, if ungoverned, to increase in size as the system continues in operation, bounded only by the size of the storage available to contain it. It is, therefore, essential for the continuance of a viable system that this data base be examined and methods devised to control its growth.
随着在线交互系统的日益普及,一些问题变得越来越明显。其中之一是联机可访问数据库的管理。根据全国各地安装的经验,这种数据库如果不加管理,随着系统继续运行,其规模往往会增加,仅受可容纳它的存储空间大小的限制。因此,为了维持一个可行的系统,必须审查这个数据库并设计控制其增长的方法。
{"title":"Establishment and maintenance of a storage hierarchy for an on-line data base under TSS/360","authors":"J. Considine, Allan H. Weis","doi":"10.1145/1478559.1478610","DOIUrl":"https://doi.org/10.1145/1478559.1478610","url":null,"abstract":"As on-line interactive systems increase in popularity, several problem areas become more and more apparent. One of these is the management of the on-line accessible data base. It has been the experience of installations throughout the country that such a data base tends, if ungoverned, to increase in size as the system continues in operation, bounded only by the size of the storage available to contain it. It is, therefore, essential for the continuance of a viable system that this data base be examined and methods devised to control its growth.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130704458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Self-contained exponentiation 独立的求幂
Pub Date : 1899-12-30 DOI: 10.1145/1478559.1478644
N. W. Clark, W. Cody
The traditional implementation for floating-point exponentiation, x raised to the y power, is to compute exp (y ln(x)) using standard subroutines for the logarithm and the exponential function. While it is possible to provide extremely accurate subroutines for these latter functions, we shall shortly see that this is seldom done. Even in those rare cases where excellent subroutines are available, the exponentiation routine, for sound theoretical reasons, is poor. In this paper, we present brief statistics indicative of the quality of these three subroutines in the basic Fortran libraries provided by various manufacturers, a detailed error analysis for exponentiation, and a method for exponentiation via self-contained subroutines.
浮点求幂的传统实现,即x的y次方,是使用对数和指数函数的标准子程序来计算exp (y ln(x))。虽然有可能为后面这些函数提供非常精确的子程序,但我们很快就会看到很少这样做。即使在有优秀子例程的极少数情况下,由于合理的理论原因,求幂例程也很差。在本文中,我们简要地统计了不同厂商提供的基本Fortran库中这三个子程序的质量,详细地分析了求幂的误差,以及一种通过自包含子程序求幂的方法。
{"title":"Self-contained exponentiation","authors":"N. W. Clark, W. Cody","doi":"10.1145/1478559.1478644","DOIUrl":"https://doi.org/10.1145/1478559.1478644","url":null,"abstract":"The traditional implementation for floating-point exponentiation, x raised to the y power, is to compute exp (y ln(x)) using standard subroutines for the logarithm and the exponential function. While it is possible to provide extremely accurate subroutines for these latter functions, we shall shortly see that this is seldom done. Even in those rare cases where excellent subroutines are available, the exponentiation routine, for sound theoretical reasons, is poor. In this paper, we present brief statistics indicative of the quality of these three subroutines in the basic Fortran libraries provided by various manufacturers, a detailed error analysis for exponentiation, and a method for exponentiation via self-contained subroutines.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130883431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Effects and detection of intermittent failures in digital systems 数字系统中间歇性故障的影响与检测
Pub Date : 1899-12-30 DOI: 10.1145/1478559.1478597
M. Ball, F. Hardie
A great deal has been written during the past few years on the subject of diagnostic test procedures for digital systems. Almost without exception, however, the investigators have limited their interest to the detection and location of solid faults, and their test procedures are usually based on the assumption that either the fault exists for the running time of the test procedure or the time interval between the fault occurrence is less than the required time to run the test.
在过去的几年中,关于数字系统的诊断测试程序的主题已经写了很多。然而,几乎无一例外,研究人员将他们的兴趣局限于检测和定位固体故障,他们的测试程序通常基于这样的假设,即故障在测试程序的运行时间内存在,或者故障发生之间的时间间隔小于运行测试所需的时间。
{"title":"Effects and detection of intermittent failures in digital systems","authors":"M. Ball, F. Hardie","doi":"10.1145/1478559.1478597","DOIUrl":"https://doi.org/10.1145/1478559.1478597","url":null,"abstract":"A great deal has been written during the past few years on the subject of diagnostic test procedures for digital systems. Almost without exception, however, the investigators have limited their interest to the detection and location of solid faults, and their test procedures are usually based on the assumption that either the fault exists for the running time of the test procedure or the time interval between the fault occurrence is less than the required time to run the test.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128644384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
Character generation from resistive storage of time derivatives 时间导数电阻存储的特征生成
Pub Date : 1899-12-30 DOI: 10.1145/1478559.1478627
M. Dertouzos
Recent advances in man-machine communication have stimulated increased interest in techniques and special circuits that generate characters, for graphical and alphanumeric Cathode-Ray-Tube (CRT) display terminals, at the display site. The primary advantage in employing such local character generation is compression of the data that is required to store and communicate a character from the computer to the display---a single binary word of length n is all that is required to instruct the character generator to display one of 2n possible characters. The primary disadvantage of local character generation is display cost, for it is generally considerably less expensive to generate characters from a longer sequence of more elementary commands---for example commands that cause the CRT beam to move right, left, up or down by a minimum resolvable increment. Besides these conflicting costs of data storage and transmission versus local-display generation, several other less tangible criteria such as character stability and fidelity (aesthetics), are instrumental in the design and evaluation of a local character-generation approach.
最近在人机通讯方面的进展刺激了人们对在显示现场为图形和字母数字阴极射线管显示终端产生字符的技术和特殊电路的兴趣。使用这种本地字符生成的主要优点是压缩了存储和将字符从计算机传输到显示器所需的数据——指示字符生成器显示2n个可能字符中的一个所需要的长度为n的单个二进制单词。本地字符生成的主要缺点是显示成本,因为从较长的更基本的命令序列生成字符通常要便宜得多——例如,导致CRT光束以最小的可解析增量向右、左、上或下移动的命令。除了这些与本地显示生成相冲突的数据存储和传输成本之外,其他一些不太明显的标准,如字符稳定性和保真度(美学),也有助于设计和评估本地字符生成方法。
{"title":"Character generation from resistive storage of time derivatives","authors":"M. Dertouzos","doi":"10.1145/1478559.1478627","DOIUrl":"https://doi.org/10.1145/1478559.1478627","url":null,"abstract":"Recent advances in man-machine communication have stimulated increased interest in techniques and special circuits that generate characters, for graphical and alphanumeric Cathode-Ray-Tube (CRT) display terminals, at the display site. The primary advantage in employing such local character generation is compression of the data that is required to store and communicate a character from the computer to the display---a single binary word of length n is all that is required to instruct the character generator to display one of 2n possible characters. The primary disadvantage of local character generation is display cost, for it is generally considerably less expensive to generate characters from a longer sequence of more elementary commands---for example commands that cause the CRT beam to move right, left, up or down by a minimum resolvable increment. Besides these conflicting costs of data storage and transmission versus local-display generation, several other less tangible criteria such as character stability and fidelity (aesthetics), are instrumental in the design and evaluation of a local character-generation approach.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130786008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
AFIPS '69 (Fall)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1