Preface III Merlin Smith Introduction IV Richard E. Merwin Computer technology in the movie industry 1 Suzanne Landa The system architecture evaluation facility - An emulation facility at Rome Air Development Center 7 N. Bruce Clark, Michael A. Troutman Teaching and research experiences with an emulation laboratory 13 Steven F. Sutphen Simulating the delay in logic networks for large, high-speed computers 19 E. A. Wilson Languages for operating systems description, design and implementation 29 Philip H. Enslow, Jr. The simulation language SIML/I 39 M. H. MacDougall Mix-dependent job scheduling - An application of hybrid simulation 45 Steve Tolopka, Herb Schwetman Parametric instabilities in computer system performance prediction 51 Lawrence W. Dowdy, Ashok K. Agrawala Aids to the development of network simulators 57 Imrich Chlamtac, W. R. Franta A stochastic state space model for prediction of product demand 67 William C. Cave, Evelyn Rosenkranz The Bus Link - A microprogrammed development tool for the CMOS/SOS processor system 73 Avner Ben-Dor , Paul Baker, Jon Selden A computer analysis tool for structural decomposition using entropy metrics 83 Aaron N. Silver Interactive modeling systems for managers - Semantic models should underlie quantitative models 89 Rand B. Krumland Modeling regular, process-structured networks 95 Bruce W. Arden, Hikyu Lee The City of New York's integrated financial management system - From mandate to working system in 18 months 103 Sally J. Rupert Recurrent dilemmas of computer use in complex organizations 107 Rob Kling, Walt Scacchi Project management through the Accomplishment Value Procedure (AVP) 117 Donald J. Aharonian Textfax - Principle for new tools in the office of the future 125 Wolfgang Horak, Walter Woborschil Microcomputer programming skills 135 C. Wrandle Barth Program conversion - One successful paradigm 139 Charles Lynn, Jr. , Jean Risley, Robert Wells A generalized zooming technique for pictorial database systems 147 S. K. Chang, B. S. Lin, R. Walser An approach to real-time scan conversion 157 Franklin C. Crow The evolution and architecture of a high-speed workstation for interactive graphics 165 William L. Paisner A mathematical model for distributed freespace 175 Y. H. Chin, S. H. Yu Forecasting computer resource utilization using key volume indicators 185 David E. Y. Sarna Workflow - A technique for analyzing JES systems 193 H. Pat Artis MMPS - A reconfigurable multi-microprocessor simulator system 199 Daniel Klein A(31,15) Reed-Solomon code for large memory systems 205 Raymond S. Lim English dictionary searching with little extra space 209 Douglas Comer New indices for bibliographic data and their applications 217 Yahiko Kambayashi, Shuzo Yajima, Osamu Konishi, Takaki Hayashi Visual inspection of metal surfaces 227 J. L. Mundy Monitoring the earth's resources from space - Can you really identify crops by satellite? 233 David Landgrebe Digital image shape detection 243 R. Michael Hord PM4 - A reconfigurable multiprocessor system for pattern recognition and image processing 255 Faye A. Briggs, King-Sun Fu, Kai Hwang, Janak H. Patel Transportable image-processing software 267 R. G. Hamlet and A. Rosenfeld A data-handling mechanics of on-line text editing system with efficient secondary storage access 273 Sakti Pramanik and Edgar T. Irons How do we best control the flow of electronic information across sovereign borders? 279 Peter Safirstein Privacy and security in transnational data processing systems 283 Rein Turn A modular approach to computer security risk management 293 Robert P. Campbell and Gerald A. Sands The design and operation of public-key cryptosystems 305 Eric H. Michelman Safeguarding cryptographic keys 313 G. R. Blakley Applications for multi level secure operating sytems 319 John P. L. Woodward The foundations of a provably secure operating system (PSOS) 329 Richard J. Feiertag and Peter G. Neumann A security retrofit of VM/370 335 B. D. Gold, R. R. Linde, R. J. Peeler, M. Schaefer, J. F. Scheid, P. D. Ward KSOS - The design of a secure operating system 345 E. J. McCauley, P. J. Brongowski UCLA Secure UNIX 355 Gerald J. Popek, Mark Kampe, Charles S. Kline, Allen Stoughton, Michael Urban, Evelyn J. Walton KSOS - Development methodology for a secure operating system 365 T. A. Berson, G. L. Barksdale, Jr. KSOS-Computer network applications 373 M. A. Padlipsky, K. J. Biba, R. B. Neely Considerations in the employment of blind computer professionals 383 James A. Kutsch, Jr., Kimberly B. Kutsch Hiring a deaf computer professional 385 Karen K. Anderson, Philip W. Bravin MIS effects on managers' task scope and satisfaction 391 Daniel Robey Some neglected outcomes of organizational use of computing technology - And their implications for systems designers 397 M. Lynne Markus An academic meets industry - Rethinking computer-based education and personalized systems of instruction 403 Kenneth L. Modesitt Recent developments in computers and society research and education 407 Richard H. Austing, Gerald L. Engel Interactive monitoring of computer-based group communication 411 Kathleen Spangler, Hubert Lipinski, Robert Plummer The status of women in health science computing 415 Lynn L. Peterson Women and minorities in the computer professions 419 Helen M. Wood Computers in judicial administration 425 Charles L. Aird and Barbara H. Todd Police and computer technology- The expectations and the results 443 Kent W. Colton Distributed algorithms for global structuring 455 Raphael A. Finkel, Marvin Solomon, Michael L. Horowitz The tree-structured distributed network front-end processor architecture 461 Robert M. Monroe, Ronald J. Srodawa, Franklin H. Westervelt Analysis of real-time control systems by the model of packet nets 469 Mohamed Gawdat Gouda Performance and economy of a fault-tolerant multiprocessor 481 Jaynarayan H. Lala, Charles J. Smith Serviceability features of the HP 300 small business computer 493 Curtis R. Gowan Automatic tuning of computer architectures 499 Ken Sakamura, Tatsushi Morokuma, Hideo Aiso, Hajime lizuka The BTI 8000 - Homogeneous, general-purpose multiprocessing 513 George R. Lewis, J. Shirley Henry, Brian P. McCune A survey of interconnection methods for reconfigurable parallel processing systems 529 Howard Jay Siegel, Robert J. McMillen, Philip T. Mueller, Jr. Adaptation properties for dynamic architectures 543 Steven I. Kartashev, Svetlana P. Kartashev, C. V. Ramamoorthy Architectural considerations of the NEC mass data file subsystem 557 Akira Sekino, Takuo Kitamura Error-oriented architecture testing 565 Larry Kwok-Woon Lai A survey of methods for intermittent fault analysis 577 Yashwant K. Malaiya, Stephen Y. H. Su Architectural and design perspectives in a modular multi-microprocessor, tne DPS-1 587 Kells A. Elmquist Work flow view of a distributed application 595 J. R. Hamstra The use of self-inverse program primitives in system evaluation 605 John E. MacDonald, Jr. A loosely-coupled applicative multi-processing system 613 Robert M. Keller, Gary Lindstrom, Suhas Patil A prototype data flow computer with token labelling 623 Ian Watson, John Gurd A view of dataflow 629 Kim P. Gostelow, Robert E. Thomas A hardware-independent virtual architecture for PASCAL 637 Viswanathan Santhanam Design of a high-Ievel language machine 649 G. J. Battarel and R. J. Chevance A programming language for high-level architecture 657 Yaohan Chu and Edward RayCannon Data management in distributed databases 667 C. V. Ramamoorthy and Benjamin W. Wah A unified architecture for data and message management 681 Georges Gardarin Design of a prototype ANSI/SPARC three-schema data base system 689 Eric K. Clemons On the implementation of a conceptual schema model within a three-level DBMS architecture 697 Shamkant B. Navathe and Johann Lemke The practice of data base administration 709 Jay-Louise Weldon An approach to automatic maintenance of semantic integrity in large design data bases 713 Gilles M. E. Lafue On query-answering in relational databases 717 E. L. Lozinskii ASTROL - An associative structure-oriented language 721 James F. Wirth An associative search language for data management 727 Amar Mukhopadhyay, Alireza Hurson Updating defined relations 733 I. M. Osman Performance enhancement for relational systems through query compilation 741 Randy H. Katz System considerations for predicting mass storage subsystem behavior 749 E. J. McBride, A. B. Tonik, G. R. Finnin A software reliability study using a complexity measure 761 Thomas J. Walsh A Markovian model for reliability and other performance measures of software systems 769 Amrit L. Goel, Kazu Okumoto Partial match retrieval for non-uniform query distributions 775 V. S. Alagar, C. Soochan Comparing interactive computer services- Theoretical, technical and economic feasibility 781 S. A. Mamrak, P. D. Amer Characterizing a workload for the comparison of interactive services 789 Domenico Ferrari Control of computing funds and resources in a networking environment 797 Beverly O'Neal, Ronald Segal The economic impact of network affiliation upon institutions of higher learning 805 Norman R. Nielsen Approaches to concurrency control in distributed data base systems 813 Philip A. Bernstein, Nathan Goodman Access control mechanisms for a network operating system 821 Helen M. Wood, Stephen R. Kimbleton Public key vs. conventional key encryption 831 Charles S. Kline, Gerald J. Popek SIGMA - An interactive message service for the Military Message Experiment 839 Robert Stotz, Ronald Tugender, David Wilczynski, Donald Oestreicher The SIGMA experience - A study in the evolutionary design of a large software system 847 David Wilczynski, Ronald Tugender, Donald Oestreicher The terminal for the Military Message Experiment 855 Robert Stotz, Paul Raveling and Jeff Rothenberg On-line tutorials and documentation for the SIGMA message service 863 Jeff Rothenberg Maintaining order and consistency in multi-access data 869 Ronald Tugender Exact solution for the initialization time of packet radio networks with two station buffers 875 Daniel Minoli Fixing timeout intervals for lost packet detection in computer communication networks 887 Robert J. T. Morris Comparison of some end-to-end flow control policies in a packet-switching network 893 G. Pujolle Alternatives for providing highly reliable access to X.25 networks 905 Richard J. Chung, A. M. Rybczynski A fail-safe distributed local network for data communication 917 Jane W. S. Liu, Izumi Suwa, Robert Stepp, Sergio M. Hinojosa, Tsutoma Utsuqi An analysis of a distributed switching network with integrated voice and data in support of command and control 927 Daniel Schutzer The exploratory system control model multi-loopnetwork 935 Daniel J. Paulish Software reliability measures applied to systems engineering 941 John D. Musa Verification procedures supporting software systems development 947 Gruia-Catalin Roman A language for distributed processing 957 Ronald J. Price Automatic program transformations for virtual memory computers 969 W. Abu-Sufah, D. Kuck, D. Lawrie Analysis of data flow models using the SARA graph model of behavior 975 W. Ruggiero, G. Estrin, R. Fenchel, R. Razouk, D. Schwabe, M. Vernon Software metrics for aiding program development and debugging 989 N. F. Schneidewind A measure of software complexity 995 Ned Chapin Relating computer program maintainability to software measures 1003 A. R. Feuer, E. B. Fowlkes Program forms and program form analysers for high-Ievel structured design 1013 Jayashree Ramanathan, Meera Blattner First-year results from a research program on human factors in software engineering 1021 Sylvia B. Sheppard, Bill Curtis, Phil Milliman, M. A. Borst, Tom Love The use and abuse of a software engineering system 1029 D. J. Pearson The integrated control/distributed power software development shop 1037 Jean-Paul Renault On the fate of software enhancements 1043 Norman K. Sondheimer Experiences in building and using compiler validation systems 1051 Paul Oliver Automatic program synthesis via synthesis of loop-free segments 1059 Joe W. Duran Semantic similarity analysis - A computer-based study of meaning in noun phrases 1063 Lynn L. Peterson Heuristic control of design-directed program transformations 1071 Christina L. Jette A data flow evaluation system based on the concept of recursive locality 1079 A. L. Davis Data flow languages 1087 William B. Ackerman