scispace - formally typeset
Search or ask a question

Showing papers on "Domain (software engineering) published in 1975"


Journal ArticleDOI
01 Dec 1975
TL;DR: An excellant technical survey of the mechanics of protecting computer-stored information from unauthorised use or modifications, with a focus on the conceptual framework necessary to enforce data security.
Abstract: The topics of protection of information, data security, and privacy In the domain of Computer systems are of particular significance in our society, which is increasingly keeping its records in computer based systems. This paper is an excellant technical survey of the mechanics of protecting computer-stored information from unauthorised use or modifications, with a focus on tire conceptual framework necessary tu enforce data security.

156 citations



Book ChapterDOI
01 Jan 1975
TL;DR: In this paper, a general two-dimensional theory was developed in the same lines as the three-dimensional one considered before, where the two dimensional domain was denoted by S and its boundary by Γ.
Abstract: A general two-dimensional theory will be developed in the same lines as the three-dimensional one considered before. The two-dimensional domain will be denoted by S and its boundary by Γ

75 citations



Journal ArticleDOI
TL;DR: Several tree search methods that have been implemented in the chess playing program (KAISSA) are described and some perspectives on this domain are described.

56 citations


Book
01 Jun 1975

51 citations


Proceedings Article
Richard Fikes1
03 Sep 1975
TL;DR: The use of a 3 valued logic, generator functions to deduce answers to model queries, the saving and maintaining of derived results, and new facilities for modeling changes produced by the occurrence of events are discussed.
Abstract: This paper presents some programming facilities for modeling the semantics of a task domain and for describing the situations that occur in that domain as a task is being carried out Each such description models a "state" of the task environment, and any given state can be transformed into a new state by the occurrence of an event that aIters the environment Such modeling systems are vital in many Al systems, particularly those that do question answering and those that do automatic generation and execution monitoring of plans The modeling mechanisms described are basically extensions and modifications of facilities typically found in Al programming languages such as PLANNER, CONN1VER, and QA4 In particular, we discuss our use of a 3 valued logic, generator functions to deduce answers to model queries, the saving and maintaining of derived results, and new facilities for modeling stntc changes produced by the occurrence of events

29 citations


Journal ArticleDOI
TL;DR: In this article, a number of questions are raised about the theoretical nature of aggregative models of situational approaches to organization and management, and they include questions regarding the domain of contingencies, and whether contingencies can be considered as a kind of resources.
Abstract: A number of questions are raised about the theoretical nature of aggregative models of situational approaches to organization and management. These include questions regarding the domain of conting...

25 citations


Journal ArticleDOI
TL;DR: In this article, a formal theory for the measurement of non-canonical variables such as velocity, kinetic energy, and the electric field in the quantum domain is presented, and applied to measurements of velocity and kinetic energy.

24 citations


Proceedings ArticleDOI
19 May 1975
TL;DR: Several of the key design choices that must be made in specifying a packetswitching network are identified and some insight is provided in each area.
Abstract: The goals of this paper are to identify several of the key design choices that must be made in specifying a packetswitching network and to provide some insight in each area. Through our involvement in the design, evolution, and operation of the ARPA Network over the last five years (and our consulting in the design of several other networks), we have learned to appreciate both the opportunities and the hazards of this new technical domain.

24 citations





Journal ArticleDOI
TL;DR: The application of filter theory to the evaluation of a machine contour package and its performance permits description in the more convenient language and terminology of the wavenumber domain, rather than that of the space domain.
Abstract: With few exceptions, traditional approaches to contouring have been too subjective. Contouring and contour maps are too often discussed in terms more appropriate to art than to science. With hand contouring there is some justification for this attitude; with machine (i.e. programmed) contouring there is none. Hand contouring is highly susceptible to interpretive judgement and the interpreter is not bound by rigid mathematical constraints. Hence, in allowing for the interpreter's “freedom of expression” it may be difficult to evaluate hand contouring in a totally analytical and objective manner. Machine contouring, however, is based upon mathematical formulation. It is therefore a consistent and objective procedure, ideally suited to objective definition and analysis. It can be demonstrated that the combined process of sampling plus contouring constitutes a two-dimensional filter. The contouring component is that part which introduces “distortion” or wavenumber discrimination. An ideal contour package is one that acts as an all-pass filter where the distortion is zero. The application of filter theory to the evaluation of a machine contour package and its performance permits description in the more convenient language and terminology of the wavenumber domain, rather than that of the space domain. A more important advantage is that the contour package can be subjected to the various standards of filter evaluation such as amplitude and phase response. The practical application, as well as the benefit, of this approach is revealed through the comparison, in both the space and wavenumber domains, of contour maps generated from various machine contour packages.

Patent
31 Jul 1975
TL;DR: In this paper, a stopper domain protrudes into shift registor to obtain a potential wafer effective for charge transfer with the advantage of the potential of the above domain, which is used in charge transfer.
Abstract: PURPOSE: By forming a stopper domain which protrudes into shift registor, potential wafer effective for charge transfer is obtained with the advantage of the potential of the above domain. COPYRIGHT: (C)1977,JPO&Japio

Journal ArticleDOI
J.C. Simon1
TL;DR: Propositions are made for a formal P.R. language, similar to the language of logic, which could be used to describe precisely the P. R. techniques and programs, and properties of the experimental domain should guide the P-R.


Journal ArticleDOI
TL;DR: A program for the generation of random-dot stereogratings is described, with discussion of the advantages and disadvantages of the program.
Abstract: Stereogratings are an extension of periodic stimulation to the Cyclopean domain. A program for the generation of random-dot stereogratings is described, with discussion of the advantages and disadvantages of the program.


Patent
Kryder Mark Howard1
31 Dec 1975
TL;DR: In this paper, an improved thick film sensor for detection of magnetic bubble domains which can be configured to provide soft error detection and full data rate sensing is presented. The sensor can be fabricated using single level masking techniques and is typically a magnetoresistive sensor comprised of NiFe.
Abstract: An improved thick film sensor for detection of magnetic bubble domains which can be configured to provide soft error detection and full data rate sensing. The sensor can be fabricated using single level masking techniques and is typically a magnetoresistive sensor comprised of NiFe. In its basic configuration, the sensor is comprised of two sets of magnetoresistive elements, each set including a sensor element and a dummy element, where both the sensor element and the dummy element provide a signal due to the bubble domain to be sensed. The magnetoresistive elements are arranged in a bridge circuit to give full data rate sensing and soft error detection. In a preferred embodiment, chevron expander-detectors are used, although the geometry of the sensor and dummy elements is not limited to chevron-type geometries.


01 May 1975
TL;DR: The domain of the work is chess tactics, and the emphasis is on recognizing situations and dealing with them explicitly and ways that results of dynamic analysis (tree search) can be made available throughout a search tree for various purposes.
Abstract: : This paper is a condensation of a recent PhD dissertation. It describes a program, CAPS-2, and presents both its form and some of the results obtained in testing it. The domain of the work is chess tactics, and the emphasis is on recognizing situations and dealing with them explicitly. Discussed are (1) Recognition predicates, (2) Methods of stating specific problems so that their solution is easier than the general problems that include them, and (3) Ways that results of dynamic analysis (tree search) can be made available throughout a search tree for various purposes.

Patent
30 Jun 1975
TL;DR: In this article, a method of both testing all loops of a long serial magnetic bubble domain chip, and repairing the chip for automatic bypass of defective loops is presented, where each repair station associated with each loop is sequentially loaded with a bubble domain.
Abstract: A method of both testing all loops of a long serial magnetic bubble domain chip, and repairing the chip for automatic bypass of defective loops. Each repair station associated with each loop is sequentially loaded with a bubble domain. Then new domains are sequentially generated and positioned adjacent each loop. The domains initially loaded into the repair stations are shifted out in parallel for propagation along the loops. The new domains are then loaded in parallel into the repair stations. The domains propagated along the loops are read to determine defective loops, and form a basis for generating a repair pattern. The repair pattern is then loaded in parallel into the repair stations for sealing off defective loops.


Patent
17 Jan 1975
TL;DR: The dual access memory as discussed by the authors provides domain bit synchronization which means that after any domain bit makes one full circulation around the major loop, the bit may be transferred into the same location in the minor loop which the bit originally occupied.
Abstract: A magnetic domain memory system includes a domain propagation track, having a plurality of minor loops of equal domain capacity, first and second major loops of equal domain capacity and first and second groups of transfer switches which couple each minor loop to the first and second major loops, respectively, and a control system, responding to asynchronous commands, to access any selected record in the minor loop through the first group of unused switches which the circulating record encounters. The accessed records are updated in the major loops, each of which includes a domain detector, generator and annihilator, and the updated records are transferred back into the locations in the minor loops which the original records occupied. The design of the dual access memory provides domain bit synchronization which means that after any domain bit makes one full circulation around the major loop, the bit may be transferred into the same location in the minor loop which the bit originally occupied.

Patent
12 Mar 1975
TL;DR: In this paper, a domain detector system includes a passive domain splitter in a domain propagation track, a first detector in the propagation track for detecting one of the domains from the splitter, and a second detector in an auxiliary propagation track which extends from the spitter, the outputs being combined to enhance the total output signal.
Abstract: In a magnetic domain memory, a domain detector system includes a passive domain splitter in a domain propagation track, a first detector in the propagation track for detecting one of the domains from the splitter, and a second detector in an auxiliary propagation track which extends from the splitter, the detector outputs being combined to enhance the total output signal. The relative angular orientation of the detectors may be varied to provide any desired signal shaping. The passive splitter has features which ensure reliable domain splitting characteristics.

Proceedings ArticleDOI
01 Sep 1975
TL;DR: In this article, the determination of microwave transistor s-parameter over a frequency band up to lOGHz by means of Time Domain Techniques, involving Fourier analysis and deconvolution of transient response data, is described and compared with network analyzer techniques.
Abstract: The determination of microwave transistor s-parameter over a frequency band up to ? lOGHz by means of Time Domain Techniques, involving Fourier analysis and deconvolution of transient response data, is described and compared with network analyzer techniques. A method for the extraction of active device parameters from measurements on packaged devices is presented.