The National Bureau of Economic Research provides a national network for interactive research in economics. Economic models may be described and studied using this network. A common model possible is the discrete linear regulator. This model is so common that software has been developed to facilitate its use. The software is in the form of macros written in a macro language provided by NBER. Several macros are discussed, and an example of their use is given.
美国国家经济研究局(National Bureau of Economic Research)为经济学领域的互动研究提供了一个全国性的网络。经济模型可以用这个网络来描述和研究。一个可能的通用模型是离散线性调节器。这个模型是如此普遍,以至于已经开发了一些软件来促进它的使用。该软件是用NBER提供的宏语言编写的宏的形式。讨论了几种宏,并给出了它们的使用示例。
{"title":"An interactive macro language application to a tracking problem and to a best ellipsoidal bounds problem","authors":"Joe Stiles","doi":"10.1145/800191.805667","DOIUrl":"https://doi.org/10.1145/800191.805667","url":null,"abstract":"The National Bureau of Economic Research provides a national network for interactive research in economics. Economic models may be described and studied using this network. A common model possible is the discrete linear regulator. This model is so common that software has been developed to facilitate its use. The software is in the form of macros written in a macro language provided by NBER. Several macros are discussed, and an example of their use is given.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126308748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael A. Harrison, Susan L. Graham, Kenneth Kennedy, Meera Blattner
This session surveys some advances in theoretical computer science and their impact on the design of programming language compilers. The emphasis is on three major areas: the analysis of program syntax, the detection of errors at compile time, and the optimization of compiled code. The tutorials presented here do not purport to summarize all the work that has been done, but they will capture its flavor and demonstrate its practical importance.
{"title":"SIGACT (Tutorial Session)","authors":"Michael A. Harrison, Susan L. Graham, Kenneth Kennedy, Meera Blattner","doi":"10.1145/800191.805517","DOIUrl":"https://doi.org/10.1145/800191.805517","url":null,"abstract":"This session surveys some advances in theoretical computer science and their impact on the design of programming language compilers. The emphasis is on three major areas: the analysis of program syntax, the detection of errors at compile time, and the optimization of compiled code. The tutorials presented here do not purport to summarize all the work that has been done, but they will capture its flavor and demonstrate its practical importance.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122792613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A program verification system has been developed consisting of three major components. The verification condition generator(which is patterned after the work of Igarashi, London, and Luckham [10]) is used to generate verification conditions from asserted PASCAL programs. The subgoal generator(which is similar to the program described in [2])processes the verification conditions to produce simpler subgoals, a significant number of which it proves using restricted techniques. The subgoal solveris a resolution theorem prover which was developed at NIH by L. Norton [13]. The more powerful techniques of the subgoal solver are used to prove subgoals which the subgoal generator was unable to prove. The verification system has been used to verify a number of programs. These include all but one of the examples from King [11], a Bubble Sort program, and Hoare's FIND program.
{"title":"A program verification system","authors":"R. Hookway, George W. Ernst","doi":"10.1145/800191.805651","DOIUrl":"https://doi.org/10.1145/800191.805651","url":null,"abstract":"A program verification system has been developed consisting of three major components. The verification condition generator(which is patterned after the work of Igarashi, London, and Luckham [10]) is used to generate verification conditions from asserted PASCAL programs. The subgoal generator(which is similar to the program described in [2])processes the verification conditions to produce simpler subgoals, a significant number of which it proves using restricted techniques. The subgoal solveris a resolution theorem prover which was developed at NIH by L. Norton [13]. The more powerful techniques of the subgoal solver are used to prove subgoals which the subgoal generator was unable to prove.\u0000 The verification system has been used to verify a number of programs. These include all but one of the examples from King [11], a Bubble Sort program, and Hoare's FIND program.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126022011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The basic model of semantics for protection languages is reviewed. Advanced protection features are introduced into the model and their impact on authorization and enforcement is discussed. History keeping allows access dependency upon the occurrence of previous data operations. Auxiliary program invocation provides for additional (procedural) protection measures. Extended authorization permits a user to utilize, via authorized procedures, data which are not directly accessible by him. Examples are used to explain each of these features. The enforcement process for full specifications is illustrated with an example.
{"title":"Full protection specifications in the semantic model for database protection languages","authors":"H. Hartson, D. K. Hsiao","doi":"10.1145/800191.805538","DOIUrl":"https://doi.org/10.1145/800191.805538","url":null,"abstract":"The basic model of semantics for protection languages is reviewed. Advanced protection features are introduced into the model and their impact on authorization and enforcement is discussed. History keeping allows access dependency upon the occurrence of previous data operations. Auxiliary program invocation provides for additional (procedural) protection measures. Extended authorization permits a user to utilize, via authorized procedures, data which are not directly accessible by him. Examples are used to explain each of these features. The enforcement process for full specifications is illustrated with an example.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126500806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Heavily used plotter- and computer-independent graphics facilities are supported for a large IBM batch and time-sharing installation. JCL-selectable plotter drivers present a common interface to the supported graphics packages. Their selection can be made at linkedit or at execution time. Driver output can go to line printers, pen plotters, electrostatic plotters, microfilm recorders, or terminals for plotting; or driver output can go to OS datasets for later post-processing. The drivers self-initiate, their output is self-identifying, they self-terminate at either normal or abnormal job end, and they provide for automatic accounting. Extensive documentation and user support is supplied.
{"title":"Computer graphics at a large IBM installation","authors":"R. Clark","doi":"10.1145/800191.805564","DOIUrl":"https://doi.org/10.1145/800191.805564","url":null,"abstract":"Heavily used plotter- and computer-independent graphics facilities are supported for a large IBM batch and time-sharing installation. JCL-selectable plotter drivers present a common interface to the supported graphics packages. Their selection can be made at linkedit or at execution time. Driver output can go to line printers, pen plotters, electrostatic plotters, microfilm recorders, or terminals for plotting; or driver output can go to OS datasets for later post-processing. The drivers self-initiate, their output is self-identifying, they self-terminate at either normal or abnormal job end, and they provide for automatic accounting. Extensive documentation and user support is supplied.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122973342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The measurement of computational work in computer systems traditionally relied heavily on indicators of hardware. Unfortunately, these indicators have a low correlation to the user's perception of useful work. This paper defines computations in terms of fundamental bit logical manipulations and shows the user's “useful computational work” can be quantized from a job specification in FORTRAN source statements. The method can be automated yielding a specific quantity of work for a given method FORTRAN program with specified data. The resulting measure of work can be used to obtain ranges of computational power for any system on which the benchmarks are executed.
{"title":"Measuring productive computational work","authors":"M. Talbott","doi":"10.1145/800191.805577","DOIUrl":"https://doi.org/10.1145/800191.805577","url":null,"abstract":"The measurement of computational work in computer systems traditionally relied heavily on indicators of hardware. Unfortunately, these indicators have a low correlation to the user's perception of useful work. This paper defines computations in terms of fundamental bit logical manipulations and shows the user's “useful computational work” can be quantized from a job specification in FORTRAN source statements. The method can be automated yielding a specific quantity of work for a given method FORTRAN program with specified data. The resulting measure of work can be used to obtain ranges of computational power for any system on which the benchmarks are executed.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127990871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. S. Herndon, James S. Cameron, M. Talbott, B. Lientz, M. Abrams
Selection and evaluation of computer systems and services is becoming increasingly sophisticated and complex. Algorithms for decision-making are being developed and refined. Hardware and software tools are being developed. Following brief presentations of the highlights of the papers, there will be a discussion of key questions including: “What's the difference between procuring systems and services?”, “How much advance work is required to get a pay-off?”,and “What tools are worth using?”
{"title":"SIGMETRICS (Panel Session)","authors":"E. S. Herndon, James S. Cameron, M. Talbott, B. Lientz, M. Abrams","doi":"10.1145/800191.805574","DOIUrl":"https://doi.org/10.1145/800191.805574","url":null,"abstract":"Selection and evaluation of computer systems and services is becoming increasingly sophisticated and complex. Algorithms for decision-making are being developed and refined. Hardware and software tools are being developed. Following brief presentations of the highlights of the papers, there will be a discussion of key questions including: “What's the difference between procuring systems and services?”, “How much advance work is required to get a pay-off?”,and “What tools are worth using?”","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128446882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Wilensky, R. F. Simmons, A. Levine, Mitchell P. Marcus, R. Schank
Natural language processing has had a spurt of interest in recent years, due in part to a new focus on the representation and structure of knowledge. The papers in this session cover all ends of natural language research, parsing, generating, and memory and inference. The advances to be reported on here indicate that the possibility of natural communication with machines may be closer than had been anticipated.
{"title":"SIGART (Paper Session)","authors":"R. Wilensky, R. F. Simmons, A. Levine, Mitchell P. Marcus, R. Schank","doi":"10.1145/800191.805523","DOIUrl":"https://doi.org/10.1145/800191.805523","url":null,"abstract":"Natural language processing has had a spurt of interest in recent years, due in part to a new focus on the representation and structure of knowledge. The papers in this session cover all ends of natural language research, parsing, generating, and memory and inference. The advances to be reported on here indicate that the possibility of natural communication with machines may be closer than had been anticipated.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128505479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a methodology for, and an evaluation of the feasibility of converting a typical data processing system to a data base management system. This methodology is applied to a particular system. The data base management system under evaluation uses a back-end mini-computer to perform the data management functions. The evaluation is made in terms of changes in system resources, program requirements, and human factors. The results of this study provide considerable insight into the problem of conversion to a data base management system, and suggest guidelines for the evaluation of any proposed data base conversions.
{"title":"Evaluation of conversion to a back-end data base management system","authors":"F. Maryanski, P. Fisher, V. Wallentine","doi":"10.1145/800191.805601","DOIUrl":"https://doi.org/10.1145/800191.805601","url":null,"abstract":"This paper presents a methodology for, and an evaluation of the feasibility of converting a typical data processing system to a data base management system. This methodology is applied to a particular system. The data base management system under evaluation uses a back-end mini-computer to perform the data management functions. The evaluation is made in terms of changes in system resources, program requirements, and human factors. The results of this study provide considerable insight into the problem of conversion to a data base management system, and suggest guidelines for the evaluation of any proposed data base conversions.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115561298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ronald W. Hagen, L. J. Thomas, Janet A. Thomas, B. F. Maskewitz, R. Henne, W. McClain, A. Safir, C. Kulikowski, W. Lively
Every year advances in computer systems and technology cause increased usage of the computer as a tool to further improve health care delivery. This session endeavors to present some of the more recent trends of computer applications in the field of medicine. Papers in this session will cover physiologic research systems, diagnostic system and medical computer program information centers.
{"title":"SIGBIO (Paper Session)","authors":"Ronald W. Hagen, L. J. Thomas, Janet A. Thomas, B. F. Maskewitz, R. Henne, W. McClain, A. Safir, C. Kulikowski, W. Lively","doi":"10.1145/800191.805541","DOIUrl":"https://doi.org/10.1145/800191.805541","url":null,"abstract":"Every year advances in computer systems and technology cause increased usage of the computer as a tool to further improve health care delivery. This session endeavors to present some of the more recent trends of computer applications in the field of medicine. Papers in this session will cover physiologic research systems, diagnostic system and medical computer program information centers.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114375004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}