首页 > 最新文献

ACM '83最新文献

英文 中文
Network protocol: A structured approach 网络协议:一种结构化方法
Pub Date : 1900-01-01 DOI: 10.1145/800173.809721
Tat Y. Choi, Raymond E. Miller
Network protocols are modeled by processes exchanging messages through communication channels. For finite state protocols, each process participating in the protocol can be represented by a finite state graph. In this paper, we introduce a structuring principle for finite state protocols in the form of subgraphs. By structured protocols, we mean the following. The protocol graph can be partitioned into or be constructed from subgraphs each having a unique entry node and zero or more exit nodes. The exit nodes of one subgraph can be connected only to the entry nodes of other subgraphs. Moreover, a process in one subgraph can exchange events with another process in its corresponding subgraph only, i.e. there are no 'cross interaction' between subgraphs. Finally, from the standpoint of protocol design or synthesis, we require that when one process makes a transition into another subgraph, the other process will follow suit. Protocols that satisfy the above properties are structured in the sense that their logical correctness can be inferred from the logical correctness of individual protocol subgraphs.
网络协议由通过通信通道交换消息的进程来建模。对于有限状态协议,参与协议的每个进程可以用有限状态图表示。在本文中,我们以子图的形式引入了有限状态协议的结构原则。通过结构化协议,我们指的是以下内容。协议图可以划分为子图或由子图构造,每个子图都有一个唯一的入口节点和零个或多个出口节点。一个子图的出口节点只能与其他子图的入口节点相连。此外,一个子图中的进程只能与对应子图中的另一个进程交换事件,即子图之间不存在“交叉交互”。最后,从协议设计或合成的角度来看,我们要求当一个进程过渡到另一个子图时,另一个进程将紧随其后。满足上述属性的协议是结构化的,因为它们的逻辑正确性可以从单个协议子图的逻辑正确性推断出来。
{"title":"Network protocol: A structured approach","authors":"Tat Y. Choi, Raymond E. Miller","doi":"10.1145/800173.809721","DOIUrl":"https://doi.org/10.1145/800173.809721","url":null,"abstract":"Network protocols are modeled by processes exchanging messages through communication channels. For finite state protocols, each process participating in the protocol can be represented by a finite state graph. In this paper, we introduce a structuring principle for finite state protocols in the form of subgraphs. By structured protocols, we mean the following. The protocol graph can be partitioned into or be constructed from subgraphs each having a unique entry node and zero or more exit nodes. The exit nodes of one subgraph can be connected only to the entry nodes of other subgraphs. Moreover, a process in one subgraph can exchange events with another process in its corresponding subgraph only, i.e. there are no 'cross interaction' between subgraphs. Finally, from the standpoint of protocol design or synthesis, we require that when one process makes a transition into another subgraph, the other process will follow suit. Protocols that satisfy the above properties are structured in the sense that their logical correctness can be inferred from the logical correctness of individual protocol subgraphs.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114967788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Office of the future: Using the structure of the human communication system to build the office of the future (I) 未来的办公室:利用人际沟通系统的结构构建未来的办公室(一)
Pub Date : 1900-01-01 DOI: 10.1145/800173.809738
I. Jarett
The basic concept of the Office of the Future is a natural outgrowth of the expansion of computers helping people in business do what they could not, or would not, do. The presentation will be confined to describing how computers will be used to provide a technological linkage between the three parts of the human communication process and to clearly communicate complex financial information to all levels of management. Communication, or lack thereof, is one of the most serious problems constraining efficient business operations. The human communication system uses three basic input and output channels to pass information. These three channels—voice, the written word, and symbols—provide a complete, sensitive and effective process that permits humans to communicate one with another. The system consists of a sender sending a message over one or more of the channels at a time, and the receiver receiving the message through one or more of the channels. The channels can and most often do have “static” in them caused by either the sender, the receiver or the channel. The static is more prevalent in business because different professional cultures have different vocabularies and customs. The result of the static is three levels of communication problems in business organizations:
未来办公室的基本概念是计算机发展的自然结果,它帮助商界人士做他们不能或不愿做的事情。该报告将仅限于描述如何使用计算机在人类沟通过程的三个部分之间提供技术联系,并清楚地将复杂的财务信息传达给各级管理人员。沟通或缺乏沟通是制约高效业务运作的最严重问题之一。人类通信系统使用三个基本的输入和输出通道来传递信息。这三种渠道——声音、文字和符号——提供了一个完整、敏感和有效的过程,使人类能够相互交流。该系统由发送方一次通过一个或多个通道发送消息,接收方通过一个或多个通道接收消息组成。通道可以并且大多数情况下确实具有由发送方、接收方或通道引起的“静态”。静态在商业中更为普遍,因为不同的职业文化有不同的词汇和习俗。静态的结果是商业组织中的三个层次的沟通问题:
{"title":"Office of the future: Using the structure of the human communication system to build the office of the future (I)","authors":"I. Jarett","doi":"10.1145/800173.809738","DOIUrl":"https://doi.org/10.1145/800173.809738","url":null,"abstract":"The basic concept of the Office of the Future is a natural outgrowth of the expansion of computers helping people in business do what they could not, or would not, do. The presentation will be confined to describing how computers will be used to provide a technological linkage between the three parts of the human communication process and to clearly communicate complex financial information to all levels of management.\u0000 Communication, or lack thereof, is one of the most serious problems constraining efficient business operations. The human communication system uses three basic input and output channels to pass information. These three channels—voice, the written word, and symbols—provide a complete, sensitive and effective process that permits humans to communicate one with another. The system consists of a sender sending a message over one or more of the channels at a time, and the receiver receiving the message through one or more of the channels. The channels can and most often do have “static” in them caused by either the sender, the receiver or the channel. The static is more prevalent in business because different professional cultures have different vocabularies and customs. The result of the static is three levels of communication problems in business organizations:","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tutorial on Ada Ada教程
Pub Date : 1900-01-01 DOI: 10.1145/800173.809698
G. Poonen
Ada is a general purpose language that was developed to meet the needs ofsoftware development within the U.S. Department of Defense. By the end of the 1980's, it is expected that the majority of software developed for mission-critical systems will be written in Ada. With the recent standardization of Ada by ANSI, there has been a considerable interest in the language both in the United States and abroad. Ada is an extremely well-designed language and incorporates many important ideas in software methodology. These include: •abstract data types •information hiding •concurrent processing •re-usable software components This tutorial is designed to introduce the main features of Ada. Using a simple problem as a background case study, the tutorial will cover: •Ada types •classical programming constructs •packages, exceptions and generics •tasks
Ada是一种通用语言,是为了满足美国国防部软件开发的需要而开发的。到20世纪80年代末,预计为关键任务系统开发的大多数软件将用Ada编写。随着ANSI最近对Ada的标准化,在美国和国外都对这门语言产生了相当大的兴趣。Ada是一门设计得非常好的语言,它融合了软件方法论中的许多重要思想。这些包括:•抽象数据类型•信息隐藏•并发处理•可重用的软件组件本教程旨在介绍Ada的主要特性。使用一个简单的问题作为背景案例研究,本教程将涵盖:•Ada类型•经典编程结构•包、异常和泛型•任务
{"title":"Tutorial on Ada","authors":"G. Poonen","doi":"10.1145/800173.809698","DOIUrl":"https://doi.org/10.1145/800173.809698","url":null,"abstract":"Ada is a general purpose language that was developed to meet the needs ofsoftware development within the U.S. Department of Defense. By the end of the 1980's, it is expected that the majority of software developed for mission-critical systems will be written in Ada. With the recent standardization of Ada by ANSI, there has been a considerable interest in the language both in the United States and abroad.\u0000 Ada is an extremely well-designed language and incorporates many important ideas in software methodology. These include:\u0000 •abstract data types\u0000 •information hiding\u0000 •concurrent processing\u0000 •re-usable software components\u0000 This tutorial is designed to introduce the main features of Ada. Using a simple problem as a background case study, the tutorial will cover:\u0000 •Ada types\u0000 •classical programming constructs\u0000 •packages, exceptions and generics\u0000 •tasks","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133017566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer budgeting of mineral holdings for a small scale mining operation 为小型采矿作业编制矿物储备的计算机预算
Pub Date : 1900-01-01 DOI: 10.1145/800173.809694
D. McCulley
This paper describes how a computer program handles the problems encountered in developing a mining budget from a large number of individual and widely scattered ore deposits. Among the difficulties overcome by the use of the program are constantly changing production forecasts requiring reworking of the budget, scheduling of the capacities of the offsite loading facilities, production rates requiring the mining of several properties concurrently while still maintaining quality control, and pressing time limits on several leases.
本文描述了计算机程序如何处理从大量单个和广泛分散的矿床中制定采矿预算时遇到的问题。使用该程序所克服的困难包括不断变化的生产预测,需要重新编制预算,安排场外装载设施的能力,要求同时开采多个物业的生产率,同时保持质量控制,以及对几个租赁的紧迫时间限制。
{"title":"Computer budgeting of mineral holdings for a small scale mining operation","authors":"D. McCulley","doi":"10.1145/800173.809694","DOIUrl":"https://doi.org/10.1145/800173.809694","url":null,"abstract":"This paper describes how a computer program handles the problems encountered in developing a mining budget from a large number of individual and widely scattered ore deposits. Among the difficulties overcome by the use of the program are constantly changing production forecasts requiring reworking of the budget, scheduling of the capacities of the offsite loading facilities, production rates requiring the mining of several properties concurrently while still maintaining quality control, and pressing time limits on several leases.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133308346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personal computer software support 个人电脑软件支持
Pub Date : 1900-01-01 DOI: 10.1145/800173.809710
Thomas O'Flaherty
The issues and information presented here will be useful to all current and potential users of personal computers (PC's). Much of the presentation is focussed on the proper role of the MIS department. Data is based on a study of how a cross-section of medium and large organizations are dealing with PC software support issues. The best observed practices are described as well as recommendations for further improvements.
这里提出的问题和信息对所有当前和潜在的个人电脑用户都很有用。演讲的大部分内容都集中在信息管理系统部门的适当角色上。数据是基于一项关于大中型组织如何处理PC软件支持问题的研究。本文描述了观察到的最佳实践以及进一步改进的建议。
{"title":"Personal computer software support","authors":"Thomas O'Flaherty","doi":"10.1145/800173.809710","DOIUrl":"https://doi.org/10.1145/800173.809710","url":null,"abstract":"The issues and information presented here will be useful to all current and potential users of personal computers (PC's). Much of the presentation is focussed on the proper role of the MIS department. Data is based on a study of how a cross-section of medium and large organizations are dealing with PC software support issues. The best observed practices are described as well as recommendations for further improvements.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132347453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public cryptography outlook 公共密码学展望
Pub Date : 1900-01-01 DOI: 10.1145/800173.809713
M. Smid
Ten years ago last March, the National Bureau of Standards issued its first solicitation for an algorithm to be used in public cryptography. While significant progress has been made in the development of the technology in this field, the public's use of cryptography has proceeded more slowly than some had originally expected. Yet, looking back, it seems surprising that anyone would have thought that public cryptography could have developed any faster than it has. When the DES was published as a standard in January, 1977, the private and non-classified government communities knew little about cryptography and its capabilities. Open publications were primarily academic papers, and consequently the public had a poor understanding of what problems cryptography could solve and what problems were beyond its scope.
10年前的去年3月,国家标准局首次发布了用于公共密码学的算法征集。虽然这一领域的技术发展取得了重大进展,但公众使用密码学的速度比一些人最初预期的要慢。然而,回顾过去,似乎令人惊讶的是,有人会认为公共密码学可以比它发展得更快。当DES于1977年1月作为标准发布时,私人和非机密政府社区对密码学及其功能知之甚少。公开出版物主要是学术论文,因此公众对密码学可以解决哪些问题以及哪些问题超出了它的范围知之甚少。
{"title":"Public cryptography outlook","authors":"M. Smid","doi":"10.1145/800173.809713","DOIUrl":"https://doi.org/10.1145/800173.809713","url":null,"abstract":"Ten years ago last March, the National Bureau of Standards issued its first solicitation for an algorithm to be used in public cryptography. While significant progress has been made in the development of the technology in this field, the public's use of cryptography has proceeded more slowly than some had originally expected. Yet, looking back, it seems surprising that anyone would have thought that public cryptography could have developed any faster than it has.\u0000 When the DES was published as a standard in January, 1977, the private and non-classified government communities knew little about cryptography and its capabilities. Open publications were primarily academic papers, and consequently the public had a poor understanding of what problems cryptography could solve and what problems were beyond its scope.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115567279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session M4: Women in the workplace 会议M4:工作场所的妇女
Pub Date : 1900-01-01 DOI: 10.1145/800173.809686
V. Walker, Mary Charles Blakebrough, C. Eastman
This session, organized by the Association for Women in Computing, seeks to provide a forum for discussion of the ever-changing environment facing today s woman in the computer industry. Each panelist, an experienced computer professional, will discuss private industry, academia, or government, in terms of the decision points in her own career. She will discuss topics such as initial educational requirements, work experience, career development activities, other issues relating to advancement, and the more general demands of the workplace as they have changed since she entered the workforce. She will then relate these factors to the entry-level computer professional, noting where shifts in emphasis have occurred. After the presentations, the panelists will discuss the similarities and differences in their various spheres.
本次会议由计算机女性协会组织,旨在提供一个论坛,讨论当今计算机行业女性所面临的不断变化的环境。每个小组成员都是经验丰富的计算机专业人士,将根据自己职业生涯中的决策点讨论私营企业、学术界或政府。她将讨论的话题包括最初的教育要求、工作经验、职业发展活动、与晋升有关的其他问题,以及自她进入职场以来,工作场所的更普遍需求发生了变化。然后,她将把这些因素与初级计算机专业人员联系起来,注意到重点发生了变化。演讲结束后,小组成员将讨论各自领域的异同。
{"title":"Session M4: Women in the workplace","authors":"V. Walker, Mary Charles Blakebrough, C. Eastman","doi":"10.1145/800173.809686","DOIUrl":"https://doi.org/10.1145/800173.809686","url":null,"abstract":"This session, organized by the Association for Women in Computing, seeks to provide a forum for discussion of the ever-changing environment facing today s woman in the computer industry. Each panelist, an experienced computer professional, will discuss private industry, academia, or government, in terms of the decision points in her own career. She will discuss topics such as initial educational requirements, work experience, career development activities, other issues relating to advancement, and the more general demands of the workplace as they have changed since she entered the workforce. She will then relate these factors to the entry-level computer professional, noting where shifts in emphasis have occurred. After the presentations, the panelists will discuss the similarities and differences in their various spheres.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114882608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On-line international cash management 网上国际现金管理
Pub Date : 1900-01-01 DOI: 10.1145/800173.809692
John F. Wilson
This paper describes a state-of-the-art cash management system recently installed for the Treasury Section of the United Nations Development Programme (UNDP). This system was a multi-year development effort of the UNDP supported by Chemical Bank's Cash Management Consulting Services (CMCS). It is resident on an IBM 4331 running under CICS with a DOS/VSE operating system. The data base management system is DL/I and it utilizes IBM 3270 terminals locally. After a brief explanation on the basic functions of cash management, the general objectives of treasury systems are given to provide a background for the description of the system. The nature and scope of the operations of the Treasury Section are stated. In summary, the UNDP manages a cash flow of approximately $1 billion in over 150 currencies. Daily payments are made through 35 agencies with offices in 115 countries. Receivables (contributions) are denominated in 150 currencies. Cash in over 400 bank accounts is monitored daily and a $500,000,000 short-term portfolio, denominated in almost every major currency is maintained.
本文介绍了最近为联合国开发计划署(开发计划署)财务科安装的最先进的现金管理系统。该系统是开发计划署在化学银行现金管理咨询服务(CMCS)的支持下开展的一项多年发展工作。它驻留在使用DOS/VSE操作系统在CICS下运行的IBM 4331上。数据库管理系统采用DL/I,本地采用IBM 3270终端。在简要说明了现金管理的基本功能之后,给出了财务系统的总体目标,为系统的描述提供了背景。说明了财务科业务的性质和范围。总之,开发计划署管理着以150多种货币计算的约10亿美元现金流。每天的付款都是通过在115个国家设有办事处的35个机构进行的。应收账款(摊款)以150种货币计价。每天监控400多个银行账户的现金,并维持5亿美元的短期投资组合,几乎以每种主要货币计价。
{"title":"On-line international cash management","authors":"John F. Wilson","doi":"10.1145/800173.809692","DOIUrl":"https://doi.org/10.1145/800173.809692","url":null,"abstract":"This paper describes a state-of-the-art cash management system recently installed for the Treasury Section of the United Nations Development Programme (UNDP). This system was a multi-year development effort of the UNDP supported by Chemical Bank's Cash Management Consulting Services (CMCS). It is resident on an IBM 4331 running under CICS with a DOS/VSE operating system. The data base management system is DL/I and it utilizes IBM 3270 terminals locally.\u0000 After a brief explanation on the basic functions of cash management, the general objectives of treasury systems are given to provide a background for the description of the system. The nature and scope of the operations of the Treasury Section are stated. In summary, the UNDP manages a cash flow of approximately $1 billion in over 150 currencies. Daily payments are made through 35 agencies with offices in 115 countries. Receivables (contributions) are denominated in 150 currencies. Cash in over 400 bank accounts is monitored daily and a $500,000,000 short-term portfolio, denominated in almost every major currency is maintained.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127360647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local network selection criteria 本地网络选择标准
Pub Date : 1900-01-01 DOI: 10.1145/800173.809683
K. Thurber, H. Freeman, Noel E. Schmidt
With over 200 manufacturers of local networks or local network products currently identified, a potential local network purchaser certainly has a wide selection of vendors from which to choose. Various topologies, control structures, media, access control techniques, and other local network items may be appropriate for the environment in which one's local network will be installed. Many local networks allow equipment of differing design or manufacturer to communicate; support the phased introduction of other system elements; allow for ease of reconfiguration; reduce duplication of resources; provide for smoother growth; and offer a more accurate alignment of the individual elements' usage patterns. To correctly choose the local network or networks that will most completely offer these types of benefits, careful evaluation of the various offerings must be made. This article identifies the most important factors to consider when selecting a local network The selection criteria are listed in alphabetical order, because their individual ranking or importance is a function of the particular application requirements of the purchasing organization. The first steps in the selection process are to identify current and future applications that will use the network; correlate the applications, organized by rank or weighting factor, against the selection criteria; and then develop a set of appropriately weighted selection criteria to use In the evaluation of candidate local networks.
目前已确定的本地网络或本地网络产品制造商超过200家,因此潜在的本地网络购买者当然有很多可供选择的供应商。各种拓扑结构、控制结构、介质、访问控制技术和其他本地网络项目可能适合于将要安装本地网络的环境。许多本地网络允许不同设计或制造商的设备进行通信;支持其他系统要素的阶段性引入;允许易于重新配置;减少资源重复;提供更平稳的生长;并提供对单个元素使用模式的更准确的对齐。要正确选择最能提供这些类型好处的本地网络或网络,必须仔细评估各种产品。本文确定了选择本地网络时要考虑的最重要因素。选择标准按字母顺序列出,因为它们的个别排名或重要性是采购组织特定应用需求的函数。选择过程的第一步是确定将使用该网络的当前和未来应用程序;将按等级或权重因素排列的申请与选择标准联系起来;然后制定一套适当的加权选择标准,用于评估候选局部网络。
{"title":"Local network selection criteria","authors":"K. Thurber, H. Freeman, Noel E. Schmidt","doi":"10.1145/800173.809683","DOIUrl":"https://doi.org/10.1145/800173.809683","url":null,"abstract":"With over 200 manufacturers of local networks or local network products currently identified, a potential local network purchaser certainly has a wide selection of vendors from which to choose. Various topologies, control structures, media, access control techniques, and other local network items may be appropriate for the environment in which one's local network will be installed. Many local networks allow equipment of differing design or manufacturer to communicate; support the phased introduction of other system elements; allow for ease of reconfiguration; reduce duplication of resources; provide for smoother growth; and offer a more accurate alignment of the individual elements' usage patterns.\u0000 To correctly choose the local network or networks that will most completely offer these types of benefits, careful evaluation of the various offerings must be made. This article identifies the most important factors to consider when selecting a local network The selection criteria are listed in alphabetical order, because their individual ranking or importance is a function of the particular application requirements of the purchasing organization. The first steps in the selection process are to identify current and future applications that will use the network; correlate the applications, organized by rank or weighting factor, against the selection criteria; and then develop a set of appropriately weighted selection criteria to use In the evaluation of candidate local networks.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124855691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frontiers in computer science research 计算机科学研究的前沿
Pub Date : 1900-01-01 DOI: 10.1145/800173.809680
W. Miller
Old frontiers in Computer Science continue to expand. New frontiers emerge as better theoretical understanding, dramatically improved hardware characteristics, and improved techniques for software open new vistas. Much of the excitment and drive towards new frontiers still stems from new hardware characteristics which make it possible to attack a host of new problems. Conversely, the drive to improve hardware characteristics and to utilize computer systems more effectively has presented many challenging problems for computer science and engineering. An additional force that is creating a demand pull for advanced research in computer science is the drive in all industrial and government sectors toward greater efficiency and productivity in order to make our economy and industries more competitive internationally. Without doubt, the international challenge to our computer industry has stimulated both the private sector and the public sector toward new areas of computer science research.
计算机科学的旧领域继续扩大。随着更好的理论理解、显著改进的硬件特性和改进的软件技术的出现,新的领域开辟了新的前景。许多令人兴奋的事情和对新领域的推动仍然源于新的硬件特性,这些特性使解决一系列新问题成为可能。相反,改进硬件特性和更有效地利用计算机系统的动力为计算机科学和工程提出了许多具有挑战性的问题。推动计算机科学高级研究的另一股力量是,所有工业和政府部门都在努力提高效率和生产力,以使我们的经济和工业在国际上更具竞争力。毫无疑问,计算机行业面临的国际挑战刺激了私营部门和公共部门向计算机科学研究的新领域发展。
{"title":"Frontiers in computer science research","authors":"W. Miller","doi":"10.1145/800173.809680","DOIUrl":"https://doi.org/10.1145/800173.809680","url":null,"abstract":"Old frontiers in Computer Science continue to expand. New frontiers emerge as better theoretical understanding, dramatically improved hardware characteristics, and improved techniques for software open new vistas. Much of the excitment and drive towards new frontiers still stems from new hardware characteristics which make it possible to attack a host of new problems. Conversely, the drive to improve hardware characteristics and to utilize computer systems more effectively has presented many challenging problems for computer science and engineering.\u0000 An additional force that is creating a demand pull for advanced research in computer science is the drive in all industrial and government sectors toward greater efficiency and productivity in order to make our economy and industries more competitive internationally. Without doubt, the international challenge to our computer industry has stimulated both the private sector and the public sector toward new areas of computer science research.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122109571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM '83
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1