Upload
buique
View
216
Download
0
Embed Size (px)
Citation preview
1IEEE TRANSACTIONS ON COMPUTERS, NOVEMBER 1971
Abstracts of Current Computer Literature
CONTENTS
ABSTRACTS. ....................................................
Al0) GENERAL; STANDARDS; EDUCATION ..................
1) LOGIC AND SWITCHING THEORY; SEQUENTIAL MA-CHINES... ..............................................
2) DIGITAL COMPUTERS AND SYSTEMS.................3) LOGIC DEVICES AND CIRCUITS (HARDWARE).........4) DIGITAL STORAGE AND INPUT-OUTPUT EQUIPMENT..5) PROGRAMMING OF DIGITAL MACHINES.............6) LINGUISTICS, DOCUMENTATION, AND HUMANITIES...7) BEHAVIORAL SCIENCE, PATTERN RECOGNITION, AND
ARTIFICIAL INTELLIGENCE.............................8) MATHEMATICS.........................................9) PROBABILITY, MATHEMATICAL PROGRAMMING, DIG-
ITAL SIMULATION, INFORMATION THEORY, AND COM-MUNICATION SYSTEMS.....................
10) SCIENCE, ENGINEERING, AND MEDICINE..............11) ANALOG AND HYBRID COMPUTERS.................12) REAL-TIME SYSTEMS AND AUTOMATIC CONTROL;
INDUSTRIAL APPLICATIONS............................13) GOVERNMENT, MILITARY, AND TRANSPORTATION
APPLICATIONS .........................................
14) BUSINESS APPLICATIONS OF INFORMATION PRO-CESSING. ...............................................
DESCRIPTOR-IN-CONTEXT INDEX............................IDENTIFIER INDEX.............................................AUTHOR INDEX..............................................
Pages 1421-1429
bstract Numbers9052-9055
9056-90709071-9077
9078-90809081-91069107-9108
9109-91129113-9126
9127-91359136-9137
Pages 1429-1433Page 1434Page 1435
Notice: These abstracts were prepared on a commercial basis by Information Associates under thedirection of Dr. Geoffrey Knight, Jr. The complete material is unavailable from either the IEEE or Infor-mation Associates. If you require copies of any of the papers referred to, we suggest you contact the authorsdirectly. All government research reports (those identified by CFSTI) can be obtained from Clearinghouse,Springfield, Va. 22151.
l4w
ABSTRACTS OF CURRENT COMPUTER LITERATURE
0) GENERAL; STANDARDS;EDUCATION
90521970 Turing Lecture: Some Comments from aNumerical Analyst, J. HI. Wilkinson (Nat.Phys. Lab., Teddington, Middlesex, En-gland); J. Ass. Comput. Mach., vol. 18, pp.137-147, Apr. 1971.A description is given of life with A. M.
Turing at the National Physic4l Laboratoryin the early days of the development of elec-tronic computers (1946-1948). The prssentmood ofpessimism among numerical analystsresulting from difficult relationships withcomputer scientists and mathematicians isdiscussed. It is suggested that in light of pastand present performance this pessimism isunjustified and is the main enemy of progressin numerical mathematics. Some achieve-ments in the fields of matrix computationsand error analysis are discussed and likelychanges in the direction of research innumerical analysis are sketched.
9053Security Techniques for EDP of MultilevelClassffied Information, H. W. Bingham(Burroughs Corp., Paoli); RADC-TR-65-415, 4424-65-112, 194 pp., Dec. 1965; CFSTI,AD 476 557, $3.00.
The study objective was to develop hard-ware and software techniques for security(need-to-know) control of on-line users andprogrammers in multiprogramming multi-processing EDP systems of apparent futuredevelopment. Hardware techniques recom-mended include: 1) processors having twomodes of operation, interrupt entry intocontrol mode in which privileged instructionsare executable, flag bits for identification andcontrol of memory works, 4nd addresschecks against access-differentiated memorybounds; 2) parity checks on intermoduleinformation transfers; 3) input/output con-trol processors which establish and verifyperipheral unit connections, check memoryaddresses against bounds, and confirmsecurity content of record headers beingtransferred; and 4) bulk file control ofphysical record integrity, and lock controlover write permission and flag bit setting topermit supervisor establishment of controlprograms.
9054The Merit of Regional Conmputing Networks,N. R. Nielsen (Stanford U., Calif.); Commun.Ass. Comput. Mach., vol. 14, pp. 319-326,May 1971.
One of the suggested means for stimulat-ing the spread of computing capabilities ininstitutions of higher learning is through theconstruction of regional computing networks.One such network has be-en constructed inthe San Francisco Bay Area by StanfordUniversity. This paper reports upon thelessons learned from the operation of thatnetwork over the past two years. A majorimpact of the network was not so much thecomputer power delivered to the schools asthe awakening of computing awareness andthe fostering of capability development atthese schools. The expertise and assistancefrom the central facility as well as the sharingof ideas among the participants were otherimportant benefits. Both the quality and
variety of services provided by the centralfacility were found to play a key role in theeffectiveness of the network. A regional net-work brings many benefits and should not bejudged as a purveyor of raw computer poweralone.
9055A Mathematical Method for Analyzing theGrowth of a Scientific Discipline, W. Goffman(Case Western Reserve U., Cleveland); J.Ass. Comput. Mach., vol. 18, pp. 173-185,Apr. 1971.
The spread of ideas within a scientificcommunity and the spread of infectiousdisease are both special cases of a generalcommunication process. Thus a generaltheory of epidemics can explain the growthof symbolic logic from 1847 to 1962. Anepidemic model predicts the rise and fall ofparticular research areas within symboliclogic. A Markov chain model of individualmovement between research areas indicatesthat once an individual leaves an area he isnot expected to return.
1) LOGIC AND SWITCHING THEORY;SEQUENTIAL MACHINES
Relational Data File and the Decision Problemfor Classes of Proper Formulas-see 9107.
9056On Effective Procedures for Speeding UpAlgorithms, M. Blum (U. Calif., Berkeley);J. Ass. Comput. Mach., vol. 18, pp. 290-305,Apr. 1971.
This paper is concerned with the nature ofspeedups. Letf be any recursive function. Itis shown that there is no effective procedurefor going from an algorithm forf to anotheralgorithm for f that is significantly faster onall but a finite number of inputs. On theother hand, for a large class of functions f,one can go effectively from any algorithm forf to one that is faster on at least infinitelymany integers. Finally, if one has an algo-rithm for a given function f, and if there isan algorithm which is faster on all but afinite number of inputs, then even though onecannot get this faster algorithm effectively,one can still obtain a pseudo-speedup: Thisis a very fast algorithm which computes avariant of the function, one which differsfrorn the original function on a finite numberof inputs.
9057Another Recursion Induction Principle, J. H.Morris, Jr., (U. Calif., Berkeley); Commun.Ass. Comput. Mach., vol. 14, pp. 351-354,May 1971.
An inductive method for proving thingsabout recursively defined functions is de-scribed. It is shown to be useful for provingpartial functions equivalent and thus appli-cable in proofs about interpreters for pro-gramming languages.
9058Heuristic Minimization ofAND-EXCLUSIVEOR Realization of Switching Functions, V. V.Rao and A. W. Nordstrom (Iowa U., IowaCity); Rep. THEMIS-UI-TR-36, 15 pp.,Feb. 1971; CFSTI AD, 719 394, $3.00.
Based on certain heuristics, a computeralgorithm has been developed to minimize
the AND-EXCLUSIVE-OR realization of a givenswitching function using both complementedand uncomplemented literals. Though noproof could be arrived at about the optimalityor suboptimality of the procedure, com-puter results for the four variable case havebeen very encouraging, suggesting that similarprocedures might lead to an optimum solu-tion of this long standing problem.
9059Realization of Nonlinearly Separable Switch-ing Functions, M. Ali and R. Ahmed (Ali-garh Muslim U., Aligarh, India); IEEETrans. Comput, (Short Notes), vol. C-20,pp. 695-697, June 1971.
In this paper CEP functions are appliedto realize nonlinearly separable switchingfunctions. It is proved that the introductionof these functions may realize all the 22nswitching functions of n binary variables. Amodel of a nonlinear threshold componentis proposed to realize the switching functions.
9060PCN Equivalence Class Invariants and Infor-mation Quantities, W. S. Matheson (U.Essex, Colchester, Essex, England); IEEETrans. Comput. (Short Notes), vol. C-20, pp.691-694, June 1971.
The switching variables in a switchingcircuit are considered as binary randomvariables. The input signals are given jointprobabilities, from which the output signals'probabilities are known. The joint entropy,or average information content, of subsetsof variables is defined, and a proof is giventhat a set of these entropies are characteristicinvariants of the PCN equivalence classes.
9061Gate-Interconnection Minimization of Switch-ing Networks Using Negative Gates, T.Ibaraki (Kyoto U., Kyoto, Japan); IEEETrans. Comput. (Short Notes), vol. C-20,pp. 698-706, June 1971.
In this note an algorithm to design a two-level switching network composed of nega-tive gates with no fan-in restriction imposedon them is developed. The resulting networkis such that it minimizes the cost functionh(G, I), a monotone nondecreasing functionof G and I, where G is the total number ofgates and I is the total number of intercon-nections in the network. In other words, theearlier work is generalized so that the numberof interconnections may be included in itscost criterion. The algorithm is then extendedto the multiple output network design.
9062Chow Parameters in Threshold Logic, R. 0.Winder (RCA Labs., Princeton); J. Ass.Comput. Mach., vol. 18, pp. 265-289, Apr.1971.
This paper is a broad treatment of Chowparameters-a set of n+1 integers whichcan be abstracted from any given n-argumentswitching function. Basic properties andalternative definitions of these numbers areestablished and correlated with several earlierwork in the subject. The main results are asfollows: The class of "unique" functions-those with unique Chow parameter N-tuples-lies properly between the classes of thresh-old functions and the class of completelymonotonic functions. The class of "extremal"
1421
IEEE TRANSACTIONS ON COMPUTERS, NOVEMBER 1971
functions-with locally minimal or maximalsingle parameters-lies properly between theclass of unique functions and the class ofunate functions (and these inclusions cannotbe tightened in terms of other k-mono-tonicities). A closely related question recentlyraised is settled. Quadratic bounds and aninfinite family of linear bounds, all tight, areobtained. A smooth well-behaved surfaceexists which encloses only the Chow param-eters of nonthreshold functions and whosetangent hyperplanes define realizations of thefunction whose parameters lie outside thepoint of tangency.
9063Cascaded Multithreshold Networks, S. Ghosh(Jadavpur U., Calcutta, India) and A. K.Choudhury (U. Calcutta, India); IEEETrans. Comput., vol. C-20, pp. 655-662, June1971.
Any switching function can always berealized by a single multithreshold elementpossessing a suitable number of thresholds.However, the practical realization of suchelements often presents serious difficulties;as such it becomes more convenient to realizethe given function in the form of a network ofmultithreshold threshold elements, eachpossessing fewer thresholds. In this paper, athorough study of these networks with differ-ent modes of interconnection has been made.These discussions have been limited to con-stant weight (CW) networks only. Finally, atechnique for obtaining the three-thresholdnetwork configuration for an arbitrary k-threshold function has also been suggested.It has been assumed that feedback loops areabsent.
9064A Grammatical Characterization of One-WayNondeterministic Stack Languages, M. E.Harrison and M. Schkolnick (U. Calif.,Berkeley); J. Ass. Comput. Mach., vol. 18,pp. 148-172, Apr. 1971.
A new family of grammars is introduced.A grammatical characterization of the one-way nondeterministic stack languages is ob-tained. Characterizations of the languagesaccepted by nonerasing stack automata andby checking automata are also derived.
9065An N Log N Algorithm for Minimizing Statesin a Finite Automaton, J. Hopcroft (StanfordU., Calif.); Rep. STAN-CS-80-190, 15 pp.,Jan. 1971; CFSTI, AD 719 398, $3.00.
An algorithm is given for minimizing thenumber of states in a finite automaton or fordetermining if two automata are equivalent.The asymptotic running time of the algorithmis bounded by kn log n where k is some con-stant and n is the number of states. The con-stant k depends linearly on the size of theinput alphabet.
9066Information Processing and Transmission inCellular Automata, E. R. Banks (M.I.T.,Cambridge); Rep. MAC-TR-81, 102 pp.,Jan. 1971; CFSTI, AD 717 951, $3.00.A cellular automation is an iterative
array of very simple identical informationprocessing machines called cells. Each cellcan communicate with neighboring cells. Atdiscrete moments of time the cells can changefrom one state to another as a function of the
states of the cell and its neighbors. Thus on aglobal basis, the collection of cells is char-acterized by some type of behavior. The goalof this investigation was to determine justhow simple the individual cells could bewhile the global behavior achieved somespecified criterion of complexity, usually theability to perform a computation or to repro-duce some pattern. The chief result describedis that an array of identical square cells (intwo dimensions), each cell of which communi-cates directly with only its four nearest edgeneighbors and each of which can exist in onlytwo states, can perform any computation.This computation proceeds in a straightfor-ward way.
9067Deterministic Pushdown Store Machines andReal-Time Computation, S. N. Cole (IBM,Owego); J. Ass. Comput. Mach., vol. 18, pp.306-328, Apr. 1971.A comparison is made of the computing
capabilities of deterministic push-down storemachines and real-time iterative arrays offinite-state machines. The main result is thatevery deterministic push-down store com-putation can be performed by some (multi-dimensional) iterative array in real-time. Thelatter are strictly more powerful since they canrecognize the set of palindromes in real time,which deterministic push-down store ma-chines cannot do even if permitted unlimitedcomputing time. During the development ofthe main; result, variants of push-down storemachines, the tabulator machines, and the n-dimensional push-down store machines, areintroduced. By imposing a real-time con-straint and letting the number of tabs and thenumber of dimensions vary, an infinitehierarchy of push-down store (deterministiccontext-free) languages is obtained.
9068Feedback in Homomorphic Realizations, B. P.Zeigler (U. Michigan, Ann Arbor); IEEETrans. Comput. (Short Notes), vol. C-20, pp.685-688, June 1971.
It is known that for every integer d thereare transition functions not isomorphicallyrealizable by any net having feedback indegree(the largest number of wires that any delayreceives from other delays in its feedbackloop) less than d. It is shown that, in contrastto the isomorphic case, every transition func-tion can be homomorphically realized by netsof feedback indegree not exceeding 2. This is aleast upper bound, since simple nets (i.e.,those having feedback indegrees not exceeding1) are shown not to be universal in this sense.
9069Inessential Errors in Sequential Machines,C. Harlow (U. Missouri, Columbia) andC. L. Coates, Jr., (U. Texas, Austin); IEEETrans. Comput. (Short Notes), vol. C-20, pp.688-690, June 1971.
Hartmanis and Stearns defined the con-cept of an inessential error in their study oferrors in sequential machines and representedsuch errors by means of an error partition HE.Although they showed that IIE could not bedetermined using only the usual partitionpair algebras, they did not provide a meansby which it could be determined. The purposeof this note is to develop an algorithm for thedetermination of IIE for a given machine.
9070A State Assignment Procedure for Asyn-chronous Sequential Circuits, G. K. Maki(U. Idaho, Moscow) and J. H. Tracey (U.Missouri, Rolla); IEEE Trans. Comput.-(Short Notes), vol. C-20, pp. 666-668, June1971.
This paper presents a new procedure forconstructing nonuniversal shared-row internalstate assignments for asynchronous sequentialcircuits. The method consists basically ofestablishing an initial code with the minimumnumber of variables required to distinguishthe states. Then variables are systematicallyadded until a satisfactory assignment is ob-tained. State variables added in the expansionof an assignment are merely the EXCLUSIVE ORof state variables in the original assignment.This simple construction procedure termi-nates with a maximum of m+[m/2] statevariables for a 2m-row flow table.
Heuristic Algorithm for Testing AsynchronousSequential Logic Circuits-see 9075.
2) DIGITAL COMPUTERSAND SYSTEMS
9071Scaling Machine Arithmetic, M. L. Stein andW. D. Munro (U. Minnesota, Minneapolis);IEEE Trans. Comput. (Short Notes), vol. C-20, pp. 675-678, June 1971.A general approach to the problem of
scaling machine arithmetic is developed. Thisleads to the determination of inequalities thatcan serve as a basis for the derivation of sys-tematic scaling techniques. The inequalitiesand techniques are shown to apply to com-plement arithmetic with either integral orfractional machine operations and to absolutevalue and sign arithmetic for both types ofoperations. A detailed discussion is presentedfor the case of complement integer arithmetic.The connections with floating-point arith-metic are derived.
9072Serial Adders with Overflow Correction, R. 0.Berg (Honeywell, Minneapolis) and L. L.Kinney (U. Minnesota, Minneapolis); IEEETrans. Comput. (Short Notes), vol. C-20, pp.668-671, June 1971.
A method of implementing two single-bitadders is discussed. These adders can be usedindividually to realize the conventional func-tions of serial addition and serial multiplica-tion on a pair of operands, or they can becascaded to allow the serial addition of threeoperands for forming the product of complexnumbers. In either case, the circuits willdetect the occurrence of an overflow or thegeneration of the number minus 1, and theywill allow an addition to be rescaled by out-putting the correct bits during the additionalshifts, whether the addition overflowed or not.
9073A Binary Multiplication Scheme Based onSquaring, T. C. Chen (IBM, San Jose); IEEETrans. Comput. (Short Notes), vol. C-20, pp.678-680, June 1971.
Using the formula A *B = [(A +B)/2]2- [(A -B)/2]2, the binary multiplication prob-lem is reducible to that of decomposing thesquare of PO P1P2 ... pk into a sum of twoor three quantities. For the eight-bit case, astudy of the multiplication parallelogram
1422
ABSTRACTS OF CURRENT COMPPUTER LITERATURE
suggests p2=R+S+T, where pi and p8appear only in R, and p2, p, appear only in Rand S. Each bit in T involves the oRing of nomore than four terms, each involving no morethan four Boolean variables. For a two-inputadder, S and T are combined into a six-vari-able problem, where each bit may have up to14 terms. The six- and four-bit problems aredegenerate cases with R = 0 and R =S=0,respectively.
9074Fault Diagnosis of Digital Systems-A Re-view, R. G. Bennetts and D. W. Lewin (TheUniversity, Southampton, England); Comput.J., vol. 14, pp. 199-206, May 1971.
The increasing complexity of digital sys-tems over the past decade has been accom-panied by a growing awareness of the need forefficient fault diagnosis, as proved by the everincreasing literature published on the subject.This paper is based on 86 referenced sourcesand its main function is to review the pub-lished methods of deriving diagnostic testsequences, indicating the advantages and dis-advantages of each technique. In so doing, ittraces the interaction between the diagnostictechniques that have evolved and their in-fluence on the design philosophy of digitalsystems at all levels. It is apparent from thereview that there exists a requirement for aunified theory of diagnosis compatible with,and complementary to, current design tech-niques based on switching theory, and waysare suggested by which this might be achieved.
9075A Heuristic Algorithm for the Testing ofAsynchronous Circuits, G. R. Putzolu andJ. P. Roth (IBM, Yorktown Heights); IEEETrans. Comput., vol. C-20, pp. 639-647, June1971.
This paper describes an algorithm for thecomputation of tests to detect failures inasynchronous sequential logic circuits. It isbased upon an extension of the D-algorithm.Discussion of experience with a program ofthe procedure is given.
9076The Design of a Class of Fast Fourier Trans-form Computers, M. J. Corinthios (U.Toronto, Ont., Canada); IEEE Trans. Com-put., vol. C-20, pp. 617-623, June 1971.
The design of a class of special-purposecomputers for time-series analysis by Fouriertransformation is described. The computersare sequential machines which implementmachine-oriented fast Fourier transformalgorithms obtained by factoring the discreteFourier transform to an arbitrary radix. Achoice of the degree of parallelism in machinearchitecture is made possible by selecting aproper radix r for implementation. Through-out the iterations these algorithms call foraccessing or storing data which are alwaysNlr words apart, where N is the record size.Thus it is possible to partition the data into rqueues, to the tops of which the arithmeticunit is hard-wired. Moreover, two of the im-plemented algorithms yield properly orderedFourier coefficients without the need for pre-or post-ordering data. This is accomplishedby including a simple shuffle operation as aninherent part of the feedback ofeach iteration.The processing speed and maximum samplingfrequency for real-time operation are specified.It is shown that, with present day tech-
nology, a radix-4 machine would performreal-time spectrum analysis of 4096 pointrecords sampled continuously at a rate of onemillion samples per second.
9077Research in Store and Forward Computer Net-works, H. Frank (Network Analysis Corp.,Glen Cove); 95 pp., Jan. 1971; CFSTI, AD719 416, $3.00.
The report discusses the relationship be-tween traffic, routing, throughput and cost instore-and-forward computer networks. Apowerful set of computer programs tooptimize cost and performance is describedand the results of a study to derive estimatesof optimum performance for specified net-works are discussed. The tradeoffs betweencost and throughput as a function of thenumber of nodes in the network are dis-played, and the substantial cost advantages oflarge computer-communication networksdemonstrated.
3) LOGIC DEVICES ANDCIRCUITS (HARDWARE)
Gate-Interconnection Minimization of Switch-ing Networks Using Negative Gates-see 9061.
Design of an Associative Memory Using Push-Down Lists and LSI-see 9078.
4) DIGITAL STORAGE AND INPUT-OUTPUT EQUIPMENT
9078Design of an Associative Memory, W. K. King(U. Houston, Houston); IEEE Trans. Com-put. (Short Notes), vol. C-20, pp. 671-674,June 1971.
An associative memory system usingpush-down or first-in first-out (FIFO) lists asits basic building elements is described. Withthe development of large-scale integrationtechnology (LSI), it is expected that deviceswith regular repetitive structure and highgate/interconnection ratio can be manu-factured at extremely low cost. Push-downand FIFO evidently belong to that category.The logic design of a push-down and a FIFOlist memory are first described. Then, withsome additional control logic, it is shown thatthey can be converted to an associativememory.
9079Modeling the Video Graphics System: Pro-cedure and Model Description, T. E. Bell(Rand Corp., Santa Monica); Rep. R-519-PR, 93 pp., Dec. 1970; CFSTI, AD 718 088,$3.00.
The report presents both the process andresults of generating a computer systemdescription for simulation purposes whileboth hardware and software are under devel-opment. The interactive multiterminal VideoGraphics System achieves low cost by using asterminals modified television sets whose pic-tures are continuously refreshed from a videodisk by three scan converters driven by asingle digital-to-analog converter. An IBM1800 process controller receives graphicorders from user programs in the connectedservice machines (IBM 360's) and sends themto the converter; it also handles input fromterminals. The documentation history details
the activities and elapsed time of each phaseof the 57-week effort; it can serve as an aid inestimating the investment required for such anundertaking, and the conclusions can helpsimulators to document and model moreeffectively.
9080A System for Stereo Viewing, A. Ortony(Imperial College, London, England); Com-put. J., vol. 14, pp. 140-144, May 1971.
This paper describes a system for the view-ing of stereoscopic pairs produced on a CRT.The system is cheap and reliable and con-veniently allows several viewers to simul-taneously perceive 3D objects in depth. It hasproved to be very useful as an aid to under-standing unfamiliar structures generated onthe display and provides a powerful toolparticularly when coupled with hidden lineremoval.
5) PROGRAMMING OF DIGITALMACHINES
9081Research in Computer-Assisted Documentationof Computer Programs. Volume 2, E. C.Berkeley (Berkeley Enterprises Inc., New-tonville); Rep. 8-230/71, 113, pp., Dec. 1970;CFSTI, AD 719 451, $3.00.
The purpose of the research is to discoverand develop methods and principles by meansof which a computer program which has littleor no documentation can be easily docu-mented by a human programmer with theassistance of a computer. The report: dis-cusses the problem of documentation of com-puter programs; presents a further model of a"Simulator Analyzer" computer programwhich simulates a computer and analyzes anundocumented working binary program;presents a computer program which expressesthis simulator analyzer; demonstrates howthis works on some simple examples; dis-cusses comments and mnemonic symbols incomputer programs and principles for ab-breviating, and suggests some preferred ab-breviations; discusses relocation of a workingbinary program without knowing how itworks; and presents a successful relocation ofa working binary program for a dynamicdebugging program without knowing thesymbolic program from which it was as-sembled.
9082Information Distribution Aspects of DesignMethodology, D. L. Parnas (Carnegie-MellonU., Pittsburgh); AFOSR-TR-71-0547, 26 pp.,Feb. 1971; CFSTI, AD 719 863, $3.00.
The role of documentation in the designand implementation of complex systems isexplored, resulting in suggestions in sharpcontrast with current practice. The concept ofsystem structure is studied by examining themeaning of the phrase "connections betweenmodules." It is shown that several systemdesign goals (each suggesting a partial timeordering of the decisions) may be inconsistent.Some properties of programmers are dis-cussed. System documentation, which makesall information accessible to anyone workingon the project, is discussed. The thesis thatsuch information "broadcasting" is harmful,that it is helpful if most system information ishidden from most programmers, is supported
1423
IEEE TRANSACflONS ON COMPUTERS, NOVEMBER 1971
by use of the above mentioned considerationsas well as by examples. An information hidingtechnique of documentation is given in theappendix.
9083The BRLESC II hstruction Code, G. A. Beck(Aberdeen Res. and Develop. Cen., AberdeenProving Ground); Rep. ARDC-TR-8, 56 pp.,Feb. 1971; CFSTI, AD 719 694, $3.00.
BRLESC II is a large, high speed, elec-tronic computer that is now in operation atARDC. It was built to supplement theBRLESC I computer which has been operat-ing since 1960. The report is intended to aidprogrammers in writing assembly languageprograms for applications which cannot bedone using the Fortran language and, in somecases, to aid in determining the cause whenFortran programs fail to execute as expectedby the programmer. A description of each ofthe 115 executable instructions is given from aprogramming point of view. That is, a descrip-tion is given of what is done, not how it isdone.
9084How to Keep the Addresses Short, D. L.Richards (Leasco Systems Corp., Tustin);Commun. Ass. Comput. Mach., vol. 14, pp.346-348, May 1971.
An algorithm is presented for minimizingthe sum of the lengths of the blocks of codingproduced by an assembler or compiler when:1) the length of each computer instruction isassumed to be either "long" or "short"("long," if the memory location addressed ismore than a predetermined distance from thecurrent location; "short", otherwise); and 2)there are blocks of instructions whose begin-nings (origins) are separated by prespecifiedamounts. For example, some computerspermit either 8-bit addressing (interpretedrelative to the location counter) or full 16-bitaddressing of all of memory. When assemblingor compiling two or more blocks of instruc-tions which have many mutual references insuch a computer, there is no simple iterativeprocedure for keeping as many of the ad-dresses as short as possible. This paper dem-onstrates that a wide class of problems ofthis type can be formulated as covering prob-lems solvable by means of elementaryarithmetic operations on the column vectorsof a ternary matrix.
9085On Implementation of Label Variables, R. R.Fenichel (M.I.T., Cambridge); Commun.Ass. Comput. Mach., vol. 14, pp. 349-350,May 1971.
Variables of label mode are conventionallyimplemented with a technique which faiis totrap certain programming errors. Fine-grained calendar clocks have recently becomeavailable; these allow implementation oflabel variables via a new technique whichtraps all programming errors of this variety.
9086Slave Memories and Segmentation, M. V.Wilkes (U. Cambridge, Cambridge, England);IEEE Trans. Comput. (Short Notes), vol. C-20, pp. 674-675, June 1971.
It is pointed out that in a computer pro-vided with multiple base-limit registers a slaveor buffer memory may be used to reduce timespent in address validation and relocation, as
well as for its normal purpose of reducingmemory access time.
9087Probability Models for Buffer Storage Alloca-tion Problems, D. P. Gaver, Jr., (Carnegie-Mellon U., Pittsburgh) and P. A. W. Lewis(IBM, Yorktown Heights); J. Ass. Comput.Mach., vol. 18, pp. 186-198, Apr. 1971.
This paper considers some of the issuesthat arise when messages or jobs inbound to acomputer facility are buffered prior to beingprocessed. Models are developed that de-scribe: 1) the results of blocking a singlememory unit for the use of diverse messages;2) the occupancy behavior of a buffer that istied to a single message source; and 3) theoccupancy of a buffer dynamically sharedamong many independent sources.
9088An ALGOL Line-Syntax Checker, E. W.Hadden (U. East Anglia, Norwich) andL. G. Proll (U. Southampton, Southampton,England); Comput. J., vol. 14, pp. 128-132,May 1971.
This paper describes a facility for partiallychecking the syntax of a line of an Algolprogram as it is input to a computer from aremote input device.
9089SOAP-A Program Which Documents andEdits ALGOL 60 Programs, R. S. Scowen, D.Allin, A. L. Hillman, and M. Shimell (Nat.Phys. Lab., Teddington, Middlesex, England);Comput. J., vol. 14, pp. 133-135, May 1971.
This paper describes a program calledSOAP (simplify obscure Algol programs)which reads an Algol 60 program as data,cleans it up, and outputs it in a form whichclarifies its structure, thus making it easier tounderstand. The paper states some of theadvantages of using SOAP and specifies thelayout of an edited program. SOAP iS anAlgol 60 procedure.
9090Extensible Language Research, T. A. Standishand E. L. Wegbreit (Harvard U., Cambridge);ESD-TR-70-442, 20 pp., Nov. 1970; CFSTI,AD 719 762, $3.00.
The report summarizes work performedat Harvard on the design and implementationof programming languages and programminglanguage techniques for handling multipledata types. A prototype language called thepolymorphic programming language has beenimplemented at Harvard and features datadefinition facilities and operator extensions.The report summarizes the experience gained,using this language, particularly with regardto the verification of the usefulness of datadefinition techniques in programming. Thereport also discussed unsolved problems inlanguage design and points toward areas forfurther investigation.
9091Interpreter Techniques for the GE-600, P.Barbe (Probe Consultants Inc., Phoenix);Rep. PLR-004, 15 pp., Aug. 1970; CFSTI, AD719 390, $3.00.
The interpreter is the first phase of thePILER system of automatic translation ofcomputer programs from one machine lan-guage to another. This report describes theimplementation of an interpreter for the GE-
600 computer. Because the operating systemis an integral part of the hardware-operatingprogram interface in this computer, certaininformation regarding the functions of thesubject program can be extracted from theoperating system. Elementary analysis is per-formed by the interpreter to locate this in-formation. The interpreter decodes instruc-tions, identifies I/O parameter lists, I/Obuffers, subroutine parameters and callingsequences, and other data. All information isprepared in microform format for input to thePILER analyzer.
Proofs About Interpreters for ProgrammingLanguages-see 9057.
9092Intermediate Language in the PILER System,P. Barbe (Probe Consultants Inc., Phoenix);Rep. PLR-005, 18 pp., Feb. 1971; CFSTI, AD719 391, $3.00.
The PILER system is an automatic com-puter program translator which translates asource machine language program to aspecified language for the target computer.The three steps in the translation are inter-pretation of subject program commands,analysis of subject program for function andpurpose and data forms, and conversion ofthe subject program to the target language.The report describes the intermediate lan-guage which is the language used to transmitinformation from the analyzer to the con-verter. This is not a formal programminglanguage, but an internal communicationcode. The intermediate language consists ofthree elements: the logic framework whichdetails the program flow paths; the impera-tive statement list which describes proceduresto be performed; and the data description,which describes the format and usage of dataitems.
9093Compiler Design for the ILLIAC IV, R. E.Millstein (Mass. Computer Ass., Inc., Wake-field); 72 pp., Jan. 1971; CFSTI, AD 719 417,$3.00.
The Illiac Fortran compiler may becharacterized as a series of transformations onthe source input stream. Fortran code is trans-formed into a representation which exploitsIlliac parallelism. This transformation isaccomplished by detecting individual state-ments within DO loops which may be executedin parallel for values of the DO indices, anddetermining an ordering which preserves datadependencies. While the result of this effortaffords Illiac parallelism, it is insensitive totwo major characteristics of Illiac hardware;an enormous disk latency, and an ability tooverlap execution of sequential and parallelcomponents of the hardware. In order tofully exploit the capabilities of the Illiac, twomore transformations are effected. First, codeis restructured to minimize the effect of disklatency. Second, operations are allocated tomaximize CUPE overlap. At this stage it isappropriate to generate Illiac code.
Recursion Induction Principle for ProvingCompiler Correctness-see 9057.
9094Computer Operating Systems Capabilities: ASource Selection and Analysis Aid, W. C.Mittwede (Comtre Corp., Coral Gables);
1424
ABSTRACTS OF CURRENT COMPUTER LITERATURE
ESD-TR-71-74, 267 pp., Nov. 1970; CFSTI,AD 718 973, $3.00.
The report presents a method for translat-ing operational data processing requirementsinto specific criteria for use in selecting,validating, or evaluating computer operatingsystems. The criteria have been structured onthe basis of an integrated functional classi-fication structure applicable to the executive/control functions, system management func-tions, and data manipulation functions ofcurrently available operating systems. In con-cert with the methodology presented, a check-list form is included as an aid to developingselection criteria for particular applications. Adiagram of the functional classification struc-ture is also included.
9095Program Suitability for Parallel Processing,M. J. Gonzalez, Jr., and C. V. Ramamoorthy(U. Texas, Austin); IEEE Trans. Comput.,vol. C-20, pp. 647-654, June 1971.
This paper describes the Fortran paralleltask recognizer and the directed graph modelupon which it is based. The recognizer is itselfa Fortran program. As input the recognizeraccepts source programs written in Fortran;as output the recognizer generates a set oftables which communicate to the operatingsystem information regarding the parallelprocessability of source program tasks. Therecognizer has been used to analyze severalprograms in an attempt to determine whatcharacteristics render a program "suitable"for parallel processing. Timing studies haveshown that the detailed recognizer analysisconsumes a large amount of time in an at-tempt to answer the suitability question. For asuitable production-type program this analysistime can be distributed over the lifetime of theprogram. In those cases where the sourceprogram is not suitable for parallel process-ing, however, this analysis represents awasted investment of valuable system re-sources. To circumvent this, a heuristicprocedure has been developed which intro-duces little overhead and provides a pre-liminary answer to the suitability questionbased solely on the nature and number ofsource program statements. If the preliminaryanalysis suggests a favorable potential for thesource program, then the program is subjectedto the detailed analysis of the recognizer.
9096A Cyclic-Queue Model of System Overhead inMultiprogrammed Computer Systems, P. W. A.Lewis (IBM, Yorktown Heights) and G. S.Shedler (IBM, San Jose); J. Ass. Comput.Mach., vol. 18, pp. 199-220, Apr. 1971.A probabilistic model is presented of a
multiprogrammed computer system operatingunder demand paging. The model contains anexplicit representation of system overhead,the CPU requirements and paging charac-teristics of the program load being describedstatistically. Expressions for steady-state CPUproblem program time, CPU overhead time,and channel utilization are obtained. Somenumerical results are given which quantifythe gains in CPU utilization obtained frommultiprogramming. It is also pointed outheuristically and demonstrated numericallythat an actual decrease in CPU utilization re-sults if there is too much overhead associatedwith multiprogramming and if the averagetime between page exceptions decreases too
rapidly with an increasing number of multi-programmed jobs.
Security Techniques in MultiprogrammingMultiprocessing Systems-see 9053.
9097Busy Period Analysis of a Time-Sharing Sys-tem Modeled as a Semi-Markov Process,U. N. Bhat and R. E. Nance (Inst. Tech.,Southern Methodist U., Dallas); J. Ass.Comput. Mach., vol. 18, pp. 221-238, Apr.1971.
Several authors have analyzed computertime-sharing systems from the user's per-spective waiting time in the system and ex-pected number of tasks in queue. In contrast,the busy period analysis is oriented towardthe operator's perspective effective utilizationof the central processing unit. Working fromthe model of task completions as a semi-Markov process, the busy period distributionof the central processor is derived in terms ofits Laplace-Stieltjes transforms. Limiting be-havior of the process describing the number oftasks in queue is developed for arbitrary timepoints as well as task completion epochs.While the latter has been given in earlierpapers, the former represents a new result. Ofsignificance is the fact that the limiting be-havior for number of tasks in queue atarbitrary time points is not reflected in thelimiting behavior at task completion epochs.Calculation of the transform values is en-hanced by the development of an efficientcomputational structure. To illustrate thecomputational procedure, the limiting be-havior of the time-sharing system is investi-gated. Changes in system behavior are notedas the number of peripheral units is increasedand the quantum length is varied. The numberof peripheral units that can be added beforesaturating the central processing unit is animmediate result. For the specific test cases, aquantum length of approximately one-half themean processing time for each job producesacceptable values for the expected busy periodand the limiting behavior for the number oftasks in queue.
9098Multi-Access on the Chilton Atlas, J. C.Baldwin and R. E. Thomas (Atlas ComputerLab., Chilton, Didcot, Berkshire, England);Comput. J., vol. 14, pp. 119-122, May 1971.
Multiaccess facilities have been providedon the Chilton Atlas without degradation ofthroughput by use of a satellite computer. Thesatellite, an XDS Sigma 2, is attached to themain machine in two distinct ways: directly,by means of a peripheral link (i.e., appearingas a paper tape reader/punch), and in-directly, via a large disk file. A filing system(absent from the Atlas operating system) hasbeen implemented on the Sigma 2 and provi-sion is made for Atlas jobs to be initiatedusing these files. No real-time interaction ispossible with a job running on Atlas, but out-put from the completed job may be directedback into the filing system for inspection atthe user's terminal.
9099Approaches to Conversational FORTRAN,D. W. Barron (The University, Southampton,England); Comput. J., vol. 14, pp. 123-127,May 1971.
This paper defines the term "conversa-tional programming system" in a pragmatic
way by considering the facilities that the userexpects to see in such a system. The difficultiesof implementation are discussed, in the con-text of developing an outline design for a con-versational Fortran system that makes areasonable compromise between flexibilityand efficiency.
9100Blocking Sequentially Processed MagneticFiles, S. J. Waters (LSE, London, England);Comput. J., vol. 14, pp. 109-112, May 1971.
This paper develops a mathematicalalgorithm that enables block sizes to besystematically calculated for sequentiallyprocessed magnetic files. A computer systemsdesigner should find the algorithm simple toapply manually, once understood, and it isbeing programmed into experimental designsoftware, which, to a large extent, automat-ically designs and optimizes a computersystem for minimum cost.
9101FOCUS-A Remote Access File HandlingSystem On-Line to a CDC 6000 Series Com-puter, D. Ball, P. M. Blackall, V. Gerard,G. R. Macleod, P. J. Marcer, and E. M.Palandri (CERN, Geneva, Switzerland);Comput. J., vol. 14, pp. 113-118, May 1971.
The paper describes a system to providemultiaccess facilities for file creation, storage,and manipulation on a medium-sized com-puter, together with remote job submission toa large batch processing computer. Withinthis framework, the system also provides filefacilities for the accumulation of sample datafrom a number of remote process controlcomputers which acquire data in real time inphysics experiments and which are connectedto the file handling machine by very highspeed data links. The system has been entirelyimplemented at CERN on a CDC 3100 com-puter connected to a CDC 6600 computer anda CDC 6500 computer.
9102Some Properties of the Scatter Storage Tech-nique with Linear Probing, J. Kral (Inst.Comput. Tech. CVUT, Horska, Praha,Czechoslovakia); Comput. J., vol. 14, pp. 145-149, May 1971.
Let M(n, k) be (for a scatter storage tech-nique) the average number of probes neces-sary to find an item in a table T of length ncontaining k items. Some identities allowingone to compute M(n, k) for the scatter storagetechnique with linear probing for various nand k are given. From the behavior ofM(n, k), an asymptotical formula given inMorris follows. For n_.1024 and k/n_0.8the values of M(n, k) are practically equal tothe corresponding asymptotical values. Acomparison with some other scatter storagemethods is made. It is shown that in manycases the linear probing method is the bestone.
9103APL/1500 File Access Subroutine Package,T. D. McMurchie and D. B. Thomas (FloridaState U., Tallahassee); Rep. CAI-SystemsMemo-10, 32 pp., Feb. 1971; CFSTI, AD 717928, $3.00.
The APL/1500 file-access subroutinepackage is a self-contained collection ofrelated subroutines which provide users ofAPL/1500 Fortran and assembly language
1425
IEEE TRANSACTIONS ON COMPUTERS, NOVEMBER 1971
systems with the ability to manipulate thedata in APL/1500 disk files. The subroutinepermit off-line access to data generatedthrough instructional and research applica-tions of the system. A description of the use ofthe film-access subroutines, and a listing andexecution of a sample Fortran program whichaccesses existing APL/1500 files is included.
9104Introduction to "Feature Analysis of Gener-alized Data Base Management Systems,"Codasyl Syst. Committee; Commun. Ass.Comput. Mach., vol. 14, pp. 308-318, May1971.
This paper is a separately published intro-duction to a main report which analyzes thefeatures of generalized data base managementsystems. This introduction gives a review ofthe current state of the art in these systemsand discusses the differences and similaritiesbetween capabilities found in host languagesystems and those found in self-containedsystems. After some discussion of the prob-lems of data independence and binding, thefour user levels are identified and described.Technical problems facing future designersare described. The first of these is that ofhandling existing stored data and the next isthat of providing more complex data struc-tures than those already available in conven-tional programming languages. The problemof high level interrogation and update func-tions acting on network structures is men-tioned, followed by a discussion of the prob-lem of catering to a high volume of transac-tions initiated from terminals by parametricusers, the lowest level of user. The use ofCobol as a basis for further developmentwork is considered at some length with re-spect to data structures, host languagecapabilities, and self-contained capabilities.This section also assesses the effect of the DataBase Task Group proposals. The final sectionoutlines the ten major topics in the main bodyof the full report.
9105Continuous Shading of Curved Surfaces, H.Gouraud (U. Utah, Salt Lake City); IEEETrans. Comput., vol. C-20, pp. 623-629, June1971.A procedure for computing shaded pic-
tures of curved surfaces is presented. Thesurface is approximated by small polygons inorder to solve easily the hidden-parts prob-lem, but the shading of each polygon is com-puted so that discontinuities of shade areeliminated across the surface and a smoothappearance is obtained. In order to achievespeed efficiency, the technique developed byWatkins is used which makes possible a hard-ware implementation of this algorithm.
9106Generation of Halftones by Computer-Con-trolled Microfilm Recorder, L. Rossol (Gen-eral Motors Res. Labs., Warren); IEEETrans. Comput. (Short Notes), vol. C-20, pp.662-664, June 1971.
Computers, in conjunction with microfilmrecording equipment, are capable of generat-ing pictures with a reasonable number of graylevels and good resolution. A method isdescribed for producing pictures by means ofhalftone dot patterns using such equipment.The method is relatively insensitive to varia-tions in hardware performance and adjust-ments.
6) LINGUISTICS, DOCUMENTATION,AND HUMANITIES
9107The Relational Data File and the DecisionProblem for Classes of Proper Formulas,R. A. DiPaola (Rand Corp., Santa Monica);Rep. R-661-PR, 28 pp., Feb. 1971; CFSTI,AD 719 752, $3.00.
In connection with Rand's relational datafile, the class of proper formulas has beenproposed as comprising those formalizationsof questions to be processed by the RDF thatare especially suitable for machine processing.The subclasses of proper formulas depend onthe identity of the logical primitives employed.Different sets of primitives give rise to differ-ent classes of proper formulas. In this reportit is shown that the decision problem issolvable for: 1) the class of proper prenexformulas (on any set of primitives); 2) theclass of proper formulas on negation, disjunc-tion, and existential quantification; 3) theclass of proper formulas on negation, im-plication, and existential quantification; and4) the class of proper formulas on negation,disjunction, implication, and existential quali-fication. Thus, for each of these classes thereis a mechanical decision procedure that deter-mines if an arbitrary formula (on the relevantset of primitives) is a member of the class.
9108Toward Direct Access Intelligence Systems,H. V. Foerster (Illinois U., Urbana); AFOSR-70-2991TR, 27 pp., Dec. 1970; CFSTI, AD718 062, $3.00.
In contrast to conventional so called"information storage and retrieval systems,"which de facto store indexed documents (thedata base) that upon retrieval may or may notcontain the information needed by the querierwho is to address such systems through highlyrestricted and artificial indexing languages,this project aims at the development of a database which organizes the intelligence stored ina machine such that the desired knowledge isdirectly accessible to the user through a man-machine dialogue in the user's natural lan-guage. The feasibility of this approach todirect-access intelligence systems (DAIS) isstrongly indicated by recent results obtainedby various investigators in the development ofrelational data structures and interactingmachine programs which permit computing inthe semantic domain, and in logic, theory, andexperimental studies of cognitive processes inliving organisms. Consequently, it was pro-posed to continue and to complete the re-search and development of the conceptual,theoretical, and technological foundations forthe development of machine intelligence sys-tems with direct access to a user's desiredknowledge via a man-machine dialogue in theuser's natural language.
Security Techniques for EDP of MultilevelClassified Information-see 9053.
7) BEHAVIORAL SCIENCE, PATTERNRECOGNITION, AND ARTIFICIAL
INTELLIGENCE9109A Distance Criterion for Figural PatternRecognition, A. Vinea (Cen. Econ. Comput.Econ. Cybern., Bucharest, Romania) and V.Vinea (Inst. Electron. and Comput. Tech.,Bucharest, Romania); IEEE Trans. Comput.
(Short Notes), vol. C-20, pp. 680-685, June1971.
The set of transformations which preservethe equivalence classes of figural patterns isconsidered. The simple figure and its abstractdescription in a metric space are defined. Anappropriate distance is proposed to be appliedto pattern recognition. A trainable classifierusing the nearest-neighbor method is de-scribed. Some experiments with printed orhandwritten letters are presented. No statis-tical results are given, but the visual examina-tion of figures that were recognized revealsthat the method successfully imitates humanperformance.
9110Some Parallel Thinning Algorithms forDigital Pictures, R. Stefanelli (Politecnico diMilano, Milan, Italy) and A. Rosenfeld (U.Maryland, College Park); J. Ass. Comput.Mach., vol. 18, pp. 255-264, Apr. 1971.
If a picture contains elongated objects ofdifferent thicknesses, one can make measure-ments on it which are thickness invariant byfirst transforming it so that each object isthinned down to a "medial line" of constantthickness. Several algorithms are describedwhich perform such a thinning transforma-tion when applied to the picture in parallel.It is proved that these algorithms do notchange the connectivity properties of thepicture.
9111On the Optimal Detection of Curves in NoisyPictures, U. Montanari (Instituto di Elabo-razione della Informazione, Pisa, Italy);Commun. Ass. Comput. Mach., vol. 14, pp.335-346, May 1971.A technique for recognizing systems of
lines is presented. In this technique theheuristic of the problem is not embedded inthe recognition algorithm but is expressedin a figure of merit. A multistage decisionprocess is then able to recognize in the inputpicture the optimal system of lines accordingto the given figure of merit. Due to the globalapproach, greater flexibility and adequacyin the particular problem is achieved. The re-lation between the structure of the figure ofmerit and the complexity of the optimizationprocess is then discussed. The method de-scribed is suitable for parallel processing be-cause the operations relative to each state canbe computed in parallel, and the number ofstages is equal to the length N of the curves(or to log2 (N) if the approximate method isused).
9112Networks of Constraints: Fundamental Proper-ties and Applications to Picture Processing,U. Montanari (Carnegie-Mellon U., Pitts-burgh); AFOSR-TR-71-0322, 57 pp., Jan.1971; CFSTI, AD 718 994, $3.00.
The problem of representation andhandling of constraints is considered, mainlyfor picture processing purposes. A systematicspecification and utilization of the availableconstraints could significantly reduce theamount of search in picture recognition. Onthe other hand, formally stated constraintscan be embedded in the syntactic productionsof picture languages. Only binary constraintsare treated, but they are represented in fullgenerality as binary relations. Constraintsamong more than two variables are thenrepresented as networks of simultaneous
1426
ABSTRACIS OF CURRENT COMPUTER LITERATURE
binary relations. In general, more than oneequivalent (i.e., representing the same con-straint) network can be found; a minimalequivalent network is shown to exist, and itscomputation is shown to solve most practicalproblems about constraint handling. No exactsolution for this central problem was found.Anyway, constraints are treated algebraically,and the solution of a system of linear equa-tions in this algebra provides an approxima-tion of the minimal network. This solution isthen proved exact in special cases, e.g., fortree-like and series parallel networks and forclasses of relations for which a distributiveproperty holds. This latter condition is satis-fied in cases of practical interest.
8) MATHEMATICSNumerical Analysis and Computer Science inRetrospect-see 9052.
9113A System for the Manipulation of Mathemati-cal Expressions with Computers, E. Vogel;Computing, vol. 6, nos. 1/2, pp. 173-190,1970.
This paper describes a system for manipu-lation of mathematical expressions alongheuristic lines (e.g., for formal integration).The system uses stored formulas (to be chosenaccording to the purpose), which form aformula program, where special signs controlthe procedure, depending on the applicabilityof the formulas. A formula language isdefined which allows for automatic analogousextension of formulas, so that, for instance,the formal multiplication of any two (match-ing) matrices can be expressed by one singleformula. Transitions to subroutines forarithmetical operations, simple standard pro-cedures, and so on are easily accomplished bymeans of a special symbol.
9114A General Factorising Algorithm, G. G. Alway(Nat. Phys. Lab., Teddington, Middlesex,England); Comput. J., vol. 14, pp. 166-168,May 1971.A computer algorithm is given for es-
tablishing the primality of large numbers;this is faster than those previously describedand allows a complete check on all thearithmetical processes.
9115On a Class of Systems of Complex IntervalEquations Evaluable with Iteration Methods,0. Mayer; Computing, vol. 6, nos. 1/2, pp.104-106, 1970.
In two previous papers there were de-duced some statements for certain intervalequations over the real number field concern-ing the existence and uniqueness of the solu-tion and the convergence of iteration methodsfor the evaluation of the solution. This papershows how these statements and their proofscan be extended to analogous interval equa-tions over the complex number field.
9116On an Algorithm for Discrete Nonlinear L,Approximation, M. R. Osborne and G. A.Watson (Australian National U., Canberra,ACT); Comput. J., vol. 14, pp. 184-188,May 1970.
An algorithm for discrete nonlinear L,approximation is shown to converge underconditions often assumed in practice. The
application of the algorithm is illustrated bysome examples.
9117Parametric Curve Fitting, M. Grossman(Imperial College, London, England);Comput. J., vol. 14, pp. 169-172, May 1971.
An iterative method is described forleast-squares curve fitting, when both theabscissae and ordinates are subject to error.The ordinate and abscissa are fitted by para-metric functions, using a constructive non-linear optimization procedure. The order ofthe data points is maintained, and hencemultivalued data may be fitted.
9118The Computation of Bounds for the Minimumand Maximum of a Polynomial in an Interval,R. Dussel and B. Schmitt; Computing, vol. 6,nos. 1/2, pp. 35-60, 1970.
With the aid of an errorbound, arithmeticbounds are computed for the minimum andmaximum of a polynomial P(x) in an interval[a, b]. The coefficients of P(x) can be intervalnumbers. To do this the zeros of P'(x) areenclosed in intervals where P(x) is evaluatedin a suitable manner. One gets the zeros ofP'(x) by computing successively the zeros ofP(i-')(x) until P'(x) beginning with a deriva-tion P(i)(x) with P(i)(x)#0. Thereby one usesthe fact that between two zeros of P (i)(x)there is at most one zero of P (-')(x). Thezeros are enclosed in intervals by means of themethod of interval halving.
9119A Note on Iterative Methods Using MonotonicDecomposable Operators, G. Alefeld; Com-puting, vol. 6, nos. 1/2, pp. 161-172, 1970.
By means of monotonic decomposableoperators, Collatz, Albrecht, and Schroderhave considered a variety of iterative methods,by which they get inclusion sets for the solu-tion of systems of simultaneous linear ornonlinear equations, for example. It is shownthat these methods are special cases of basiciterative methods for equations with intervalcoefficients. In the concluding part of thispaper a general convergence theorem in aRieszian-space is given.
9120On the Automatic Numerical Evaluation ofDefinite Integrals, R. Cranley and T. N. L.Patterson (U. Texas, Dallas); Comput. J.,vol. 14, pp. 189-198, May 1971.A critical examination is made of adaptive
subdivision as a means of reliably and effi-ciently performing the automatic evaluationof definite integrals. A model is set up whichembodies the basic features of adaptiveschemes. Circumstances are discussed underwhich adaptive schemes may inspire falseconfidence in the result produced. The effi-ciency of the method is seriously impaired byany attempts to overcome this difficulty. Theconclusions have been illustrated by ap-propriate numerical examples.
9121The Numerical Solution of Implicit FirstOrder Ordinary Differential Equations withInitial Conditions, M. A. Wolfe (U. St.Andrews, England); Comput. J., vol. 14, pp.173-178, May 1971.
Predictor-corrector methods are used inconjunction with iteration to obtain numeri-cal solutions of a class of first-order ordinary
differential equations with an initial conditionin which the derivative cannot be expressedexplicitly as a function of the independentand dependent variables.
9122Optimum Extrapolated ADI Iterative Dif-ference Schemes for the Solution of Laplace'sEquation in Three Space Variables, A.Hadjidimos (The New University of Ulster,Northern Ireland); Comput. J., vol. 14, pp.179-183, May 1971.
This paper describes the application of theextrapolated ADI methods for the numericalsolution of Laplace's equation over the openunit cube under "model problem" boundaryconditions. Three different approximatingdifference formulas are considered and eachone of the resulting extrapolated ADIschemes is treated by using the set of Douglasparameters in two different ways. In additiona comparison of the two methods is made andoptimum extrapolated ADI schemes aregiven.
9123Classical Fourth- and Lower Order Runge-Kutta Formulas with Stepsize Control andtheir Application to Heat Transfer Problems,E. Fehlberg; Computing, vol. 6, nos. 1/2,pp. 61-71, 1970.
New explicit fourth- and lower orderRunge-Kutta formulas are presented. Theseformulas include a stepsize control procedurebased on a complete coverage of the leadingterm of the local truncation error. The formu-las have considerably smaller truncationerrors than corresponding formulas of otherauthors. These new formulas are suitable forthe numerical integration of heat transferproblems after discretization of these prob-lems in the space variables, since stabilityconsiderations, occurring in such problems,would eliminate the benefits, (large per-missible stepsize) of high-order Runge-Kuttaformulas. The formulas are applied to anexample for a heat transfer problem.
9124Elementary Determination of EigenvalueBounds and of Functions Bounding the Solu-tion of Inhomogeneous Ordinary and SingularIntegral Equations of the Second Kind withFixed Limits of Integration, D. Marsal;Computing, vol. 6, nos. 1/2, pp. 80-93, 1970.
The paper deals mainly with the deter-mination of two functions bounding the solu-tion of systems of integral equations with anynumber of free variables. It is assumed thateach kernel is split into a degenerate one anda remainder. If the remainders are notsufficiently small, the result may be improvedby simple iteration. From a numerical pointof view, the method is superior to well-knownmethods of functional analysis.
9125On the Topological Properties of QuantizedSpaces. I. The Notion of Dimension, J. P.Mylopoulos and T. Pavlidis (Princeton U.,Princeton); J. Ass. Comput. Mach., vol. 18,pp. 239-246, Apr. 1971.
An attempt is made to define meaningfulcounterparts of topological notions inquantized spaces. Finitely presented Abeliangroups are used as a model for such spaces.Then the notion of dimension is introducedthrough a recursive definition, and it isproven that for free Abelian groups it equalsthe number of generators.
1427
IEEE TRANSACIIONS ON COMPPUTERS, NOVEMBER 1971
O,> th lTopological Properties of QuantizedSpaes. II. Connectivity and Order of Con-netivty, J. P. Mylopoulos and T. Pavlidis(Prnceton U., Princeton); J. Ass. Comput..a:k, vol. 18, pp. 247-254, Apr. 1971.A :notion of equivalence (c-equivalence) is
defind as the counterpart of homeomorphismfor quantized spaces. It is shown that setswith the same number of components andholes are c-equivalent in two-dimensional0paces. Then it is shown that for each arbi-trary set there is a set c-equivalent to it withcertain "regular" features (rectangular perim-ter, holes with diameter one, etc.).
9) PROBABILITY, MATHEMATICALPROGRAMMING, DIGITAL SIMULA-TION, INFORMATION THEORY,
AND COMMUNICATIONSYSTEMS
9127'A Note on Fast Cyclic Convolution, Y.-Zalcstein (Carnegie-Mellon U., Pittsburgh);IEEE Trans. Comput., (Short Notes), vol.C-20, pp. 665-666, June 1971.
This note presents a new algorithm forcomputing the cyclic convolution of twovectors over a commutative ring. The algo-fithm requires n(nl+1) ... (nk +1)/2k multi-plications for the convolution of two n-vec-tors, where n1 = n ...**k is a factorization of-n into factors which are pairwise relatively,prime.
9128Genertion of Permutation Sequences: Part 2,R. J. Ord-Smith (U. Bradford, Yorkshire,;England); Comput. J., vol. 14, pp. 136-139,May 1971.
The main purpose of Part 2 is to presentexplicitly the six fastest general permutationalgorithms in an improved and standardizedform. A comparison shows the kind ofdifficulties which can arise in the implementa-tifn of a high-level language. An appendixcontains an extended bibliography. A briefacount ofcontinuing work is included.
9129Sstematic Generation of Ordered Sequencessing; Recurrence Relations, E. S. Page (U.
Newcastle upon Tyne, England); Comput. J.,VWl. 14, pp. 150-153, May 1971.
The calculation of the number of membersf certnin sets can be achieved by analyzing
recurrexce relations. In this note, attentionis dra to the use of such recurrence rela-mions for deriving ordering of the members of
the sets in a systematic way and for answer-gquestions about places in the orderings.
xmples for certain types of restrictedpermutations are given.
Time-Seris Analysis by Fourier Transforma-ne 9076.
.9130-
A Note on a New Divisive Classificatory Pro-gram for Mixed Data, G. N. Lance and W. T.Williams (CSIRO, Brisbane, Australia);Coput. J., vol. 14, pp. 154-155, May 1971.
Algorithms are provided which will definea divisive monothetic classificatory programapplicable to mixed data; this is based on aninformation-statistic model, and is an alter-native to an earlier program based on x2.
9131Some Observations on a Paper by Lance andWilliams, R. Sibson (King's College, Cam-bridge, England); Comput. J., vol. 14, pp.156-157, May 1971.
This paper presents criteria which areconsidered essential for any general clusteringalgorithm and shows that the algorithm ofLance and Williams fails to satisfy these.
9132Group-Size Dependence: A Rationale forChoice Between Numerical Classifications,W. T. Williams (CSIRO, Queensland, Aus-tralia), H. T. Clifford (U. Queensland, St.Lucia, Queensland, Australia), and G. N.Lance (CSIRO, Canberra City, Australia);Comput. J., vol. 14, pp. 157-162, May 1971.
The problem of erecting criteria for choicebetween numerical classifications is brieflysurveyed; it is concluded that the most diffi-cult case arises in the synoptic classificationof highly heterogeneous data, for which apowerful clustering system is essential, andfor which several alternative strategies are incommon use. In all such strategies an inter-group or individual-group measure is de-pendent on the size of the group, but thenature of this dependence has not previouslybeen investigated. It is here investigated forfour widely used strategies, and appropriateconclusions drawn as to their differing ap-plicability to particular types of problems.
9133Controversy Concerning the Criteria forTaxonometric Strategies, W. T. Williams(CSIRO, St. Lucia, Queensland, Australia),G. N. Lance and M. B. Dale (CSIRO, Can-berra City, Australia), and H. T. Clifford(U. Queensland, St. Lucia, Queensland,Australia); Comput. J., vol. 14, pp. 162-165,May 1971.
Recent growth of interest in numericalclassificatory strategies has led to the searchfor criteria which such strategies should ful-fil. Two largely incompatible schools ofthought have now arisen, one in Cambridge,the other in Australia. The article examinesthe differences in the basic premises of theseschools with particular reference to linguisticdifferences and the wider implications of thetwo sets of criteria.
9134Analytical and Interactive Techniques forMultivariate Data Compression and Classifica-tion, R. B. Roper (Systems Res. Labs., Inc.,Dayton); Rep. SRL-60606-F AFCRL-70-0540, 59 pp., Sept. 1970; CFSTI, AD 719 753,$3.00.
The report demonstrates the applicabilityof classical statistical techniques to problemsinvolving compression and classification ofmultivariate data. The theoretical foundationsof two such techniques, intrinsic analysis anddiscriminant analysis, are treated in detail.Efficient digital computer implementation isdiscussed, including the combined applica-
tion of intrinsic and discriminant analysisand a new algorithm for computing approxi-mate intrinsic bases for very large problems.Experimental results are presented on theapplication of these techniques as featureextractors in a signal classification problem.Also included is a description of the inter-active graphics-oriented system softwarewhich has been developed to facilitate theapplication of these techniques.
9135A Man-Machine Approach Toward Solvingthe Traveling Salesman Problem, P. Krolakand W. Felts (Vanderbit U., Nashville) andG. Marble (Washington U., St. Louis);Commun. Ass. Comput. Mach., vol. 14, pp.327-334, May 1971.
The traveling salesman problem belongsto an important class of scheduling and rout-ing problems. It is also a subproblem in solv-ing others, such as the warehouse distribu-tion problem. It has been attacked by manymathematical methods with but meagersuccess. Only for special forms of the problemor for problems with a moderate number ofpoints can it be solved exactly, even if verylarge amounts of computer time are used.Heuristic procedures have been proposed andtested with only slightly better results. Thispaper describes a computer aided heuristictechnique which uses only a modest amountof computer time in real time to solve large(100-200) point problems. This techniquetakes advantage of both the computer's andthe human's problem-solving abilities. Thecomputer is not asked to solve the problemin a brute-force way as in many of today'sheuristics, but it is asked to organize the datafor the human so that the human can solvethe problem easily. The technique used in thispaper seems to point to new directions in thefield of man-machine interaction and in thefield of artificial intelligence.
Mathematical Model for Analyzing theGrowth of Symbolic Logic-see 9055.
Model of the Interactive Multiterminal VideoGraphics Display System-see 9079.
Probability Models for Buffer Storage Alloca-tion Problems-see 9087.
Probabilistic Model of a MultiprogrammingSystem Under Demand Paging-see 9096.
Busy Period Analysis of a Time-Sharing Sys-tem Modeled as a Semi-Markov Process-see9097.
10) SCIENCE, ENGINEERING,AND MEDICINE
9136Feasibility of Minicomputer Implementationof a Time Division Multiplexer, M. Klein, A.Franco, and M. Epstein (Automated Infor-mation Systems, Inc., Edgewater); 99 pp.,Jan. 1971; CFSTI, AD 719 432, $3.00.
The study was undertaken to see if, in thelight of recent drastic price reductions andtechnology advancements, the use of a pro-
449k,
ABSTRACTS OF CURRENT COMPUTER LITERATURE
grammable general-purpose minicomputer asa versatile Time Division Multiplexer (TDM)now presents a more viable economic alterna-tive to the special purpose hardwired equip-ment commonly used for this purpose.Methods for software impelmentation of therequired TDM functions were explored, andpreliminary hardware and software conceptswere set forth. The study concluded that theconcept of implementing a minicomputerbased TDM using currently available ma-
chines is a feasible one. In addition, costadvantages aside, the flexibility inherent insuch an approach appears imminently de-sirable.
9137Animated Reconstruction of Telemetry (ART),R. G. DeBiase, B. E. Winn, M. J. Rade-macher, and R. P. Gross (Aerospace Corp.,El Segundo); Rep. TOR-0059(6452)-3, 40 pp.,Feb. 1971; CFSTI, AD 719 741, $3.00.
The techniques used in the animated re-construction of telemetry (ART) permit thenontechnical individual to evaluate the per-formance of complex technological processes.ART uses the modularized vehicle simulation(MVS) program to model the physical phe-nomena under study, thus ensuring con-formance to the laws of physics. Animatedsequences are then produced from thesemodels to visually portray the system inreference systems chosen by the user.
DESCRIPTOR-IN-CONTEXT INDEX
AAccess
Multiaccess Facilities Provided by a Satel-lite Computer 9098
Remote Multiaccess File Handling SystemOn-Line to CDC Computers 9101
Disk File Access Subroutine Package 9103Intelligence Systems with Direct Access to
the Data Base Through a Man-MachineDialogue 9108
Adaptive-see Patterns, Threshold, Training
Addition; Adders; AdditiveSerial Adders with Overflow Correction9072
Addresses; AddressingMinimizing the Sum of the Lengths ofAddress Codes Produced by Assemblersor Compilers 9084
Use of Buffer Memories to Reduce TimeSpent in Address Validation and Reloca-tion 9086
-see also Paging, StorageAlgebra; Algebraic-see Algebraic Equations, Automata,
Polynomials, Sequential MachinesAlgebraic Equations
Iterative Methods for Solving Systems ofAlgebraic Equations Using Decompos-able Operators 9119
Algorithms; AlgorithmicEffective Procedures for Speeding Up
Algorithms Using Recursion Theory 9056Parallel Thinning Algorithms for Digital
Pictures 9110Criteria for General Clustering Algorithms
9131Algorithms for:
Heuristic Minimization of AND-EXCLU-SIVE-OR Realization of Switching Func-tions 9058
Gate-Interconnection Minimization ofSwitching Networks Using NegativeGates 9061
State Minimization in Finite Automata9065
Inessential Errors in Sequential Machines9069
Review of Fault Diagnosis of Digital Sys-tems 9074
Heuristic Algorithm for Testing Asyn-chronous Sequential Logic Circuits 9075
Time-Series Analysis by Fourier Trans-formation 9076
Minimizing the Sum of the Lengths ofAddress Codes Produced by Assemblersor Compilers 9084
Calculation of Block Sizes for SequentiallyProcessed Magnetic Files 9100
Continuous Shading of Curved Surfaces9105
Optimal Detection of Curves in NoisyPictures Using a Multistage DecisionProcess 911 1
Establishing the Primality of Large Num-bers 9114
Discrete Nonlinear L1 Approximation 9116Fast Cyclic Convolution of Two VectorsOver a Commutative Ring 9127
Generation of Permutation Sequences 9128Multivariate Data Compression and Classi-
fication Using Interactive Techniques9134
AllocationProbability Models for Buffer Storage
Allocation Problems 9087-see also Paging
Analysis; AnalyticAnalysis of Store and Forward ComputerNetwork Performance and Costs 9077
-see also Mathematics, Numerical Analy-sis, Syntax
Approximation; Curve FittingDiscrete Nonlinear L1 Approximation 9116-see also Error, Extrapolation
ArithmeticScaling Machine Arithmetic and Inequali-
ties 9071-see also Addition, Division, Floating
Point, MultiplicationArraysComputing Capabilities of Real-Time Itera-
tive Arrays of Finite-State Machines 9067-see also Cells, Storage
Artificial Intelligence-see Heuristic, Inference, Patterns
Assemblers; AssemblyMinimizing the Sum of the Lengths ofAddress Codes Produced by Assemblersor Compilers 9084
Associative; Content-AddressedDesign of an Associative Memory UsingPush-Down Lists and LSI 9078
Automata; Turing MachinesState Minimization in Finite Automata
9065Information Processing and Transmission
in Cellular Automata 9066-see also Languages, Machines, Sequential
MachinesAutomated; Automatic; AutomationAutomatic Numerical Evaluation of Defi-
nite Integrals 9120-see also Machines, Programming
BBinary; Nonbinary
Binary Multiplication Scheme Based onSquaring 9073
-see also Addition, ArithmeticBoolean-see Sequential, Switching Functions
CCalculus-see Differential Equations
Cells; CellularInformation Processing and Transmission
in Cellular Automata 9066-see also Arrays, Associative
Circuits-see Gates, Integrated Circuits, Logic,
Networks, Sequential Machines, Switch-ing
ClassificationDefinition of a Divisive Monothetic Classi-
ficatory Program Applicable to MixedData 9130
Criteria for General Clustering Algorithms9131
Criteria for Choice Between NumericalClassifications 9132
Controversy Concerning the Criteria forClassification Strategies 9133
Multivariate Data Compression and Classi-fication Using Interactive Techniques9134
-see also Patterns
1429
IEEE TRANSACTIONS ON COMPUTERS, NOVEMBER 1971
Codes; Coding; Decoding; EncodingInstruction Code for the BRLESC II Com-
puter 9083Minimizing the Sum of the Lengths of
Address Codes Produced by Assemblersor Compilers 9084
Compilers; CompilingRecursion Induction Principle for Proving
Compiler Correctness 9057Minimizing the Sum of the Lengths ofAddress Codes Produced by Assemblersor Compilers 9084
Technique for Implementation of LabelVariables Which Traps ProgrammingErrors in Compilers 9085
Design of the Compiler for the Illiac IVComputer 9093
-see also Programming Languages, Trans-lation (Artificial Languages)
Computation; ComputingDeterministic Pushdown Store Machinesand Real-Time Computation 9067
Computing Capabilities ofReal-Time Itera-tive Arrays of Finite-State Machines 9067
Computation of Bounds for the Minimumand Maximum of a Polynomial in anInterval 9118
-see also RecursionComputer Applications
Computer-Assisted Documentation ofComputer Programs 9081
Generation of Halftones by Computer-Controlled Microfilm Recorder 9106
Feasibility of a Minicomputer Implementa-tion of a Time Division Multiplexer 9136
Animated Reconstruction of Telemetry9137
-see also Automata, Computer Systems,Computers, Documentation, Editing,Education, Mathematics, Patterns, Pro-grams for
Computer ScienceNumerical Analysis and Computer Science
in Retrospect 9052-see also Education
Computer SystemsCyclic-Queue Model of System Overhead inMultiprogrammed Computer Systems9096
-see also Computers, Digital Computers,On-Line, Operating Systems, Remote,Time-Sharing
Computer Utility; Computer NetworksMerit of Regional Computing Networks
for Educational Institutions 9054Analysis of Store and Forward ComputerNetwork Performance and Costs 9077
ComputersDesign of a Class of Fast Fourier Trans-form Computers 9076
Instruction Code for the BRLESC II Com-puter 9083
Interpreter Techniques for the GE-600Computer 9091
Design of the Compiler for the Iliac IVComputer 9093
Multiaccess Facilities Provided by aSatellite Computer 9098
Remote Multiaccess File Handling SystemOn-Line to CDC Computers 9101
-see also Automata, Computer Applica-tions, Computer Science, Computer Sys-tems, Graphics, Processes, SequentialMachines, Time-Sharing
ConversationalConversational Fortran Programming Sys-tem 9099
Intelligence Systems with Direct Access tothe Data Base Through a Man-MachineDialogue 9108
Correction; CorrectnessRecursion Induction Principle for Proving
Compiler Correctness 9057Serial Adders with Overflow Correction9072
-see also ErrorCorrelation
Time-Series Analysis by Fourier Trans-formation 9076
CostsAnalysis of Store and Forward CQmputerNetwork Performance and Costs 9077
D
DataDesign and Implementation of Program-ming Languages for Handling MultipleData Types 9090
Definition of a Divisive Monothetic Classi-ficatory Program Applicable to MixedData 9130
-see also Classification, Data Bases, DataManagement, Data Processing, Files,Information
Data BasesFeature Analysis of Generalized Data BaseManagement Systems 9104
Intelligence Systems with Direct Access tothe Data Base Through a Man-MachineDialogue 9108
Data ManagementFeature Analysis of Generalized Data BaseManagement Systems 9104
Data ProcessingSecurity Techniques for EDP of Multilevel
Classified Information 9053-see also Computer Systems, Digital Com-
puters, Education, ProcessingDecision Processes; Decidability
Relational Data File and the DecisionProblem for Classes of Proper Formulas9107
Optimal Detection of Curves in NoisyPictures Using a Multistage DecisionProcess 91 11
DecompositionIterative Methods for Solving Systems of
Algebraic Equations Using Decom-posable Operators 9119
DesignDesign of a Class of Fast Fourier Trans-form Computers 9076
Design of an Associative Memory UsingPush-Down Lists and LSI 9078
Role of Documentation in the Design andImplementation of Complex Program-ming Systems 9082
Design and Implementation of Program-ming Languages for Handling MultipleData Types 9090
Design of the Compiler for the Illiac IVComputer 9093
-see also RealizationDetection; Detectors
Optimal Detection of Curves in NoisyPictures Using a Multistage DecisionProcess 91 11
DiagnosisReview of Fault Diagnosis of Digital Sys-
tems 9074-see also Error, Tests
Differential Equations (Ordinary)Numerical Solution of Implicit First-OrderOrdinary Differential Equations withInitial Conditions 9121
Differential Equations (Partial)Optimum Extrapolated ADI Iterative
Difference Schemes for Solving Laplace'sEquation 9122
New Explicit Fourth- and Lower OrderRunge-Kutta Formulas with Applicationto Heat Transfer 9123
DigitalParallel Thinning Algorithms for Digital
Pictures 9110-see also Integrated Circuits, Switching
Digital Computers; Digital SystemsReview of Fault Diagnosis of Digital Sys-
tems 9074-see also Computer Systems, Computers,
ProcessingDisk Files; Disk StoresDisk File Access Subroutine Package 9103
DisplaysSystem for Viewing Stereoscopic Pairs on aCRT Display 9080
-see also Graphics, TerminalsDivision
Definition of a Divisive Monothetic Classi-ficatory Program Applicable to MixedData 9130
-see also MultiplicationDocumentation
Computer-Assisted Documentation ofComputer Programs 9081
Role of Documentation in the Design andImplementation of Complex Program-ming Systems 9082
Documentation and Editing of Algol 60Programs 9089
-see also Editing, Information
EEditing; EditorsDocumentation and Editing of Algol 60
Programs 9089Education
Merit of Regional Computing Networksfor Educational Institutions 9054
-see also Computer ScienceEquations
Class of Systems of Complex IntervalEquations Evaluable Iteratively 9115
-see also Algebraic Equations, IntegralEquations
EquivalencePCN Equivalence Class Invariants and
Information Quantities for SwitchingCircuits 9060
ErrorInessential Errors in Sequential Machines
9069Technique for Implementation of Label
Variables which Traps ProgrammingErrors in Compilers 9085
-see also Codes, CorrectionEvaluation
Criteria for Use in Selecting, Validating, orEvaluating Operating Systems 9094
Class of Systems of Complex IntervalEquations Evaluable Iteratively 9115
1430
ABSTRACTS OF CURRENT COMPUTER LITERATURE
Automatic Numerical Evaluation of Defi-nite Integrals 9120
-see also Computation, Performance,Tests
ExpressionsFormula Language for Heuristic Manipula-
tion of Mathematical Expressions 9113ExtrapolationOptimum Extrapolated ADI Iterative
Difference Schemes for Sovling Laplace'sEquation 9122
FFailures; Faults; Malfunctions-see Diagnosis
Files; FilingCalculation of Block Sizes for Sequentially
Processed Magnetic Files 9100Remote Multiaccess File Handling SystemOn-Line to CDC Computers 9101
Properties of the Scatter Storage Techniquewith Linear Probing 9102
Relational Data File and the DecisionProblem for Classes of Proper Formulas9107
-see also Data Bases, Disk FilesFloating Point
Connections Between Floating-Point andScaling Machine Arithmetic 9071
FourierDesign of a Class of Fast Fourier Trans-form Computers 9076
Functions-see Approximation, Recursion, Switching
Functions, Threshold
GGates
Gate-Interconnection Minimization ofSwitching Networks Using NegativeGates 9061
Generation; GeneratorsGeneration of Halftones by Computer-
Controlled Microfilm Recorder 9106Generation of Permutation Sequences 9128Systematic Generation of Ordered Se-
quences Using Recurrence Relations9129
-see also Displays, Noise, Numbers,Sequence
GeometryTopological Properties of Quantized Spaces
9125,9126Graphics; GraphicalModel of the Interactive MultiterminalVideo Graphics Display System 9079
Continuous Shading of Curved Surfaces9105
Generation of Halftones by Computer-Controlled Microfilm Recorder 9106
Parallel Thinning Algorithms for DigitalPictures 9110
Optimal Detection of Curves in NoisyPictures Using a Multistage DecisionProcess 9111
Networks of Constraints with Applicationto Picture Processing 9112
-see also Displays, Patterns
HHeuristic; Heuristics
Heuristic Minimization of AND-EXCLUSIVE-OR Realization of Switching Functions9058
Heuristic Algorithm for Testing Asyn-chronous Sequential Logic Circuits 9075
Formula Language for Heuristic Manip-ulation of Mathematical Expressions9113
Heuristic Man-Machine Approach toSolving the Traveling Salesman Problem9135
Images-see Graphics, Patterns
InequalitiesScaling Machine Arithmetic and Inequali-
ties 9071Inference; Induction
Inductive Method for Proofs About Re-cursively Defined Functions 9057
InformationSecurity Techniques for EDP of Multilevel
Classified Information 9053PCN Equivalence Class Invariants and
Information Quantities for SwitchingCircuits 9060
Information Processing and Transmissionin Cellular Automata 9066
-see also Codes, DataInput-Output
Generation of Halftones by Computer-Controlled Microfilm Recorder 9106
-see also Consoles, Disk Files, Displays,Man-Machine Communications, Ter-minals
InstructionsInstruction Code for the BRLESC II Com-
puter 9083Technique for Implementation of Label
Variables which Traps ProgrammingErrors in Compilers 9085
Integral EquationsEigenvalue Bounds for Integral Equations
9124IntegralsAutomatic Numerical Evaluation of Def-
inite Integrals 9120Integrated Circuits; Microelectronics
Design of an Associative Memory UsingPush-Down Lists and LSI 9078
-see also Arrays, CellsInteraction-see Graphics, Man-Machine Communi-
cationsInterconnections
Gate-Interconnection Minimization ofSwitching Networks Using NegativeGates 9061
-see also Integrated Circuits, NetworksInterpreters; Interpretive
Proofs About Interpreters for Program-ming Languages 9057
Interpreter Techniques for the GE-600Computer 9091
Iterative; IterationComputing Capabilities of Real-Time Itera-
tive Arrays of Finite-State Machines 9067Class of Systems of Complex Interval
Equations Evaluable Iteratively 9115Parametric Curve Fitting Using an IterativeMethod 9117
Iterative Methods for Solving Systems ofAlgebraic Equations Using Decompos-able Operators 9119
Optimum Extrapolated ADI Iterative
Difference Schemes for Solving Laplace'sEquation 9122
LLanguages; Linguistics; Grammars
Grammatical Characterization of One-WayNondeterministic Stack Languages 9064
-see also Programming Languages, SyntaxLogic; Logical
Mathematical Model for Analyzing theGrowth of Symbolic Logic 9055
-see also Arrays, Cells, Gates, Sequential,Switching Functions, Threshold
MMachines; Mechanization
Deterministic Push-Down Store Machinesand Real-Time Computation 9067
-see also Automata, Computers, Man-Machine Communications, SequentialMachines
Magnetic Disk-see Disk Files
Magnetic TapesCalculation of Block Sizes for Sequentially
Processed Magnetic Files 9100Man-Machine Communications (Interaction,
Systems)Multivariate Data Compression and Classi-
fication Using Interactive Techniques9134
Heuristic Man-Machine Approach toSolving the Traveling Salesman Problem9135
-see also Conversational, Displays,Graphics, Terminals
Mathematics; MathematicalFormula Language for Heuristic Manip-
ulation of Mathematical Expressions9113
Fast Cyclic Convolution of Two VectorsOver a Commutative Ring 9127
-see also Arithmetic, Differential Equa-tions, Fourier, Geometry, Logic, Models,Numerical Analysis, Optimization, Poly-nomials, Probability
Memory-see Storage
Minimal; Minimization; ExtremaHeuristic Minimization of AND-EXCLUSIVE-OR Realization of Switching Functions9058
Gate-Interconnection Minimization ofSwitching Networks Using NegativeGates 9061
State Minimization in Finite Automata9065
Minimizing the Sum of the Lengths ofAddress Codes Produced by Assemblersor Compilers 9084
Computation of Bounds for the Minimumand Maximum of, a Polynomial in anInterval 9118
-see also Optimal, Switching FunctionsModels; Modeling
Mathematical Model for Analyzing theGrowth of Symbolic Logic 9055
Model of the Interactive MultiterminalVideo Graphics Display System 9079
Probability Models for Buffer StorageAllocation Problems 9087
Cyclic-Queue Model of System Overihead inMultiprogrammed Computer Systems9096
1431
IEEE TRANSACTIONS ON COMPUTERS, NOVEMBER 1971
Busy Period Analysis of a Time-SharingSystem Modeled as a Semi-MarkovProcess 9097
Multiple-Access; MultiuserMultiaccess Facilities Provided by a
Satellite Computer 9098Remote Multiaccess File Handling System
On-Line to CDC Computers 9101-see also Multiprogramming, Time-
SharingMultiplexing
Feasibility of a Minicomputer Implementa-tion of a Time Division Multiplexer 9136
Multiplication; MultipliersBinary Multiplication Scheme Based on
Squaring 9073Multiprocessing-see Multiprogramming, Parallel, Time-
SharingMultiprogramming
Security Techniques in MultiprogrammingMultiprocessing Systems 9053
Cyclic-Queue Model of System Overhead inMultiprogrammed Computer Systems9096
-see also Time-Sharing
N
Networks; NetsMerit of Regional Computing Networks
for Educational Institutions 9054Realization of Switching Functions by
Cascaded Multithreshold Networks 9063Analysis of Store and Forward ComputerNetwork Performance and Costs 9077
Networks of Constraints with Applicationto Picture Processing 9112
-see also Arrays, Sequential Machines,Switching
NoiseOptimal Detection of Curves in Noisy
Pictures Using a Multistage DecisionProcess 9111
-see also StochasticNumbers; Numeric; Number Theory; Enumer-
ationEstablishing the Primality of Large Num-
bers 9114-see also Stochastic
Numerical AnalysisNumerical Analysis and Computer Science
in Retrospect 9052-see also Arithmetic, Differential Equa-
tions, Integral Equations
0
On-LineRemote Multiaccess File Handling System
On-Line to CDC Computers 9101-see also Real Time
Operating SystemsCriteria for Use in Selecting, Validating, or
Evaluating Operating Systems 9094Operations Research
Heuristic Man-Machine Approach toSolving the Traveling Salesman Problem9135
-see also QueuesOptimal; Optimization
Optimal Detection of Curves in NoisyPictures Using a Multistage DecisionProcess 9111
Optimum Extrapolated ADI IterativeDifference Schemes for Solving Laplace'sEquation 9122
-see also Minimal
pPages; Paging
Probabilistic Model of a Multiprogram-ming System Under Demand Paging 9096
Parallel; ParallelismDetermination of Program Suitability for
Parallel Processing 9095Parallel Thinning Algorithms for Digital
Pictures 9110Patterns
Trainable Classifier for Figural PatternRecognition 9109
PerformanceAnalysis of Store and Forward ComputerNetwork Performance and Costs 9077
-see also Computer Systems, CostsPolynomialsComputation of Bounds for the Minimumand Maximum of a Polynomial in anInterval 9118
Probability; ProbabiIisticProbability Models for Buffer Storage
Allocation Problems 9087Probabilistic Model of a Multiprogram-ming System Under Demand Paging 9096
Generation of Permutation Sequences 9128-see also Stochastic
Processes; Processing; ProcessorsCalculation of Block Sizes for Sequentially
Processed Magnetic Files 9100Parallel Thinning Algorithms for Digital
Pictures 9110Optimal Detection of Curves in Noisy
Pictures Using a Multistage DecisionProcess 9111
Networks of Constraints with Applicationto Picture Processing 9112
-see also Associative, Computers, DataProcessing, Information, Parallel
ProgrammingTechnique for Implementation of Label
Variables which Traps ProgrammingErrors in Compilers 9085
-see also Heuristic, MultiprogrammingProgramming Languages
Proofs About Interpreters for Program-ming Languages 9057
Facility for Partially Checking the Syntaxof a Line of an Algol Program 9088
Design and Implementation of Program-ming Languages for Handling MultipleData Types 9090
Intermediate Language for the PILERProgram Translation System 9092
Formula Language for Heuristic Manip-ulation of Mathematical Expressions9113
-see also Compilers, LanguagesProgramming SystemsRole of Documentation in the Design and
Implementation of Complex Program-ming Systems 9082
Conversational Fortran Programming Sys-tem 9099
Programs; RoutinesComputer-Assisted Documentation ofComputer Programs 9081
Facility for Partially Checking the Syntaxof a Line of an Algol Program 9088
Intermediate Language for the PILERProgram Translation System 9092
Determination of Program Suitability forParallel Processing 9095
Disk File Access Subroutine Package 9103-see also Paging
Programs for:Testing Asynchronous Sequential Circuits
9075Documentation and Editing of Algol 60Programs 9089
Determination of Program Suitability forParallel Processing 9095
Calculation of Block Sizes for SequentiallyProcessed Magnetic Files 9100
ProofInductive Method. for Proofs About Re-
cursively Defined Functions 9057
QQueues
Cyclic-Queue Model of System Overhead inMultiprogrammed Computer Systems9096
-see also Time-Sharing
RRandom-see Access, Noise, Numbers, Stochastic
Real TimeDeterministic Push-down Store Machinesand Real-Time Computation 9067
Computing Capabilities ofReal-Time Itera-tive Arrays of Fnite-State Machines 9067
-see also On-LineRealization; Implementation
Heuristic Minimization of AND-EXCLUSIVE-OR Realization of Switching Functions9058
Realization of Nonlinearly SeparableSwitching Functions 9059
Realization of Switching Functions byCascaded Multithreshold Networks 9063
Feedback in Homomorphic Realizations ofSequential Machines 9068
Technique for Implementation of LabelVariables which Traps ProgrammingErrors in Compilers 9085
Feasibility of a Minicomputer Implementa-tion of a Time Division Multiplexer 9136
-see also DesignRecognition-see Patterns
Recursion; Recursive; RecurrenceEffective Procedures for Speeding Up
Algorithms Using Recursion Theory9056
Inductive Method for Proofs About Re-cursively Defined Functions 9057
Systematic Generation of Ordered Se-quences Using Recurrence Relations9129
RemoteRemote Multiaccess File Handling System
On-Line to CDC Computers 9101-see also Terminals, Time-Sharing
SSecurity
Security Techniques for EDP of MultilevelClassified Information 9053
Sequences; SequencingGeneration of Permutation Sequences 9128Systematic Generation of Ordered Se-
1432
ABSTRACTS OF CURRENT COMPUTER LITERATURE
quences Using Recurrence Relations9129
-see also StochasticSequential
Calculation of Block Sizes for SequentiallyProcessed Magnetic Files 9100
-see also Sequential MachinesSequential Machines (Circuits, Logic, Net-
works)Feedback in Homomorphic Realizations of
Sequential Machines 9068Inessential Errors in Sequential Machines
9069State Assignment Procedure for Asyn-chronous Sequential Circuits 9070
Heuristic Algorithm for Testing Asyn-chronous Sequential Logic Circuits 9075
-see also Automata, MachinesSignals; Signaling
Design of a Class of Fast Fourier Trans-form Computers 9076
Simulation; Simulators-see Models
Software-see Operating Systems, Programming,Programming Systems, Programs
States-see Automata, Sequential Machines
Statistics; Statistical-see Correlation, Proabbility, Stochastic
StochasticMathematical Model for Analyzing theGrowth of Symbolic Logic 9055
Busy Period Analysis of a Time-SharingSystem Modeled as a Semi-MarkovProcess 9097
-see also Noise, ProbabilityStorage; Memory
Analysis of Store and Forward Computer
Network Performance and Costs 9077Use of Buffer Memories to Reduce Time
Spent in Address Validation and Reloca-tion 9086
Properties of the Scatter Storage Techniquewith Linear Probing 9102
-see also Allocation, Arrays, Associative,Disk Files, Files, Integrated Circuits,Magnetic Tapes, Paging
Switches; SwitchingPCN Equivalence Class Invariants and In-
formation Quantities for Switching Cir-cuits 9060
Gate-Interconnection Minimization ofSwitching Networks Using NegativeGates 9061
-see also Automata, Logic, Networks,Sequential, Switching Functions
Switching FunctionsHeuristic Minimization of AND-EXCLUSIVE-OR Realization of Switching Functions9058
Realization of Nonlinearly SeparableSwitching Functions 9059
Realization of Switching Functions byCascaded Multithreshold Networks 9063
-see also Automata, Logic, SequentialMachines, Threshold
Symbolic; SymbolsMathematical Model for Analyzing theGrowth of Symbolic Logic 9055
SyntaxFacility for Partially Checking the Syntax of
a Line of an Algol Program 9088-see also Languages
SystemsModel of the Interactive MultiterminalVideo Graphics Display System 9079
System for Viewing Stereoscopic Pairs on aCRT Display 9080
-see also Computer Systems, Displays,Information, Man-Machine Communi-cations, Multiprogramming, On-Line,Operating Systems, Programming Sys-tems, Time-Sharing
TTerminalsModel of the Interactive MultiterminalVideo Graphics Display System 9079
-see also Display, Input-Output, Man-Machine Communications
TestsHeuristic Algorithm for Testing Asyn-
chronous Sequential Logic Circuits 9075-see also Diagnosis, Evaluation
ThresholdRealization of Nonlinearly Separable
Switching Functions 9059Chow Parameters in Threshold Logic 9062Realization of Switching Functions by
Cascaded Multithreshold Networks 9063Time-SharingBusy Period Analysis of a Time-Sharing
System Modeled as a Semi-MarkovProcess 9097
-see also Multiple-Access, Multiprogram-ming, Remote
TrainingTrainable Classifier for Figural Pattern
Recognition 9109-see also Education
Translation; Translators (Artificial Languages)Intermediate Language for the PILERProgram Translation System 9092
-see also Compilers, Interpreters
1433
IEEE TRANSACnONS ON COMPUTERS, NOVEMBER 1971
IDENTIFIER INDEX
AAbelian Groups 9125,9126ACE Computer 9052ADI Method 9122Algol 60 Programs 9089Algol Syntax Checking 9088AND-EXCLUSIVE-oR Realization 9058Animation ofTelemetry 9137Asynchronous Sequential Circuits 9070, 9075Atlas Computer 9098
BBase-Limit Registers 9086Block Sizes 9100Blocking 9087Bounds 9118BRLESCII Instruction Code 9083Buffer Memories 9086, 9087Busy Period Analysis 9097
CCascaded Adders 9072Cascaded Multithreshold Networks 9063CDC 6000 Series Computers 9101Central Processor Utilization 9097CEP Functions 9059Channel Utilization 9096Checking Automata 9064Chow Parameters 9062Clustering Algorithms 9131Cobol Usage 9104COM 9106Commutative Rings 9127Compatible Sets 9061Complement Arithmetic 9071Complementary Even Parity Functions 9059Complemented Literals 9058Compression ofData 9134Connectivity 9126Contour Following 9109Convolution 9076Convolution of Vectors 9127Cooley-Tukey Algorithm 9076Coons Patches 9105Curve Detection 9111Curve Fitting 9117Curved Surface Shading 9105CW Networks 9063Cyclic Convolution 9127
DD-Algorithm 9075Definite Integrals 9120Demand Paging 9096Discriminant Analysis 9134Disk Latency 9093Distance Criterion 9109
EEigenvalue Bounds 9124Epidemic Model 9055Eucidean Transformations 9109
FFast Fourier Transform 9076Feature Analysis 9104Feedback Indegree 9068FIFO Lists 9078Figural Pattern Recognition 9109FOCUS System 9101Formula Languages 9113Fortran Compiler 9093Fortran (Conversational) 9099Fortran Parallel Path Recognizer 9095Fortran Subroutines 9103
GGE-600 Interpreter 9091
HHalftones 9105,9106Heat Transfer 9123Hidden Line Removal 9080,9105Homomorphic Realizations 9068
IIBM 1800 Application 9079Illiac IV Compiler 9093Implicit Differential Equations 9121Inessential Errors 9069Internal State Assignment 9070Interval Arithmetic 9118Interval Equations 9115Intrinsic Analysis 9134
LLL Approximation 9116Label Variables 9085Laplace-Stieltjes Transform 9097Laplace's Equation 9122Least-Squares Curve Fitting 9117Linear Probing 9102Linear Separability 9059LSI Memory 9078
MMarkov Chain Model 9055Microfilm Recording 9106MOS Integrated Circuits 9061Multiple Base-Limit Registers 9086Multiple Output Networks 9061Multithreshold Networks 9063
NNearest-Neighbor Recognition 9109Negative Gates 9061Nonerasing Stack Automata 9064Nonlinearly Separable Switching Functions
9059Nonuniversal Assignments 9070
0One-Way Stack Automata 9064Operators (Decomposable) 9119Order of Connectivity 9126Ordered Sequences 9129Overflow Correction 9072Overhead in Multiprogramming 9096
pParametric Curve Fitting 9117Partial Functions 9057Partition Pair Algebra 9069PCN Equivalence Classes 9060Permutations 9128,9129Picture Processing 9110, 9111, 9112PILER Translator 9091,9092Polymorphic Programming Language 9090Predictor-Corrector Methods 9121Proper Formulas 9107Push-Down Lists 9078
QQuantized Spaces 9125,9126Quarter-Square Multiplication 9073
RRelational Data File 9107Relocation 9086Runge-Kutta Formulas 9123
SSatellite Computers 9098Scaling Arithmetic 9071Scatter Storage 9102Semi-Markov Process 9097Serial Adders 9072Shading 9105Shared-Row Assignments 9070Skeletonization of Pictures 9110Slave Memories 9086SOAP Program 9089Special Purpose Computers 9076Spectrum Analysis 9076Speeding Up Algorithms 9056Squaring 9073Stack Automata 9064Stereo Viewing 9080Storage (Scatter) 9102Supercirculant Matrices 9127
TTaxonometric Strategies 9133Telemetry Animation 9137Thinning of Pictures 9110Three-Dimensional Viewing 9080Three-Threshold Function 9063Throughput 9077Time Division Multiplexer 9136Time-Series Analysis 9076Topology ofQuantized Spaces 9125,9126Trapping of Errors 9085Traveling Salesman Problem 9135Truncation Error 9123Turing Machines 9056
VValidation of Addresses 9086
xXerox Data Systems Sigma 2 9098
1434
ABSTRACrS OF CURRENT COMPUTER LITERATURE
AUTIHOR INDEX
AAhmed, R. 9059Alefeld, G. 9119Ali, M. 9059Allin, D. 9089Alway, G. G. 9114
BBaldwin, J. C. 9098Ball, D. 9101Banks, E. R. 9066Barbe, P.9091,9092Barron, D. W. 9099Beck, G. A. 9083Bell, T. E. 9079Bennetts, R. G. 9074Berg, R. 0. 9072Berkeley, E. C. 9081Bhat, U. N. 9097Bingham, H. W. 9053Blackall, P. M. 9101Blum, M. 9056
CChen, T. C. 9073Choudhury, A. K. 9063Clifford, H. T. 9132, 9133Coates, Jr., C. L. 9069Cole, S. N. 9067Corinthios, M. J. 9076
DDeBiase, R. G. 9137
DiPaola, R. A. 9107Dussel, R. 9118
EEpstein, M. 9136
FFehlberg, E. 9123Felts, W. 9135Fenichel, R. R. 9085Foerster, H. V. 9108Franco, A. 9136Frank, H. 9077
G
Gaver, Jr., D. P. 9087Gerard, V. 9101Ghosh, S. 9063Goffman, W. 9055Gonzalez, Jr., M. J. 9095Gouraud, H. 9105Gross, R. P. 9137Grossman, M. 9117
HHadden, E. W. 9088Hadjidimos, A. 9122Harlow, C. 9069Harrison, M. E. 9064Hillman, A. L. 9089Hopcroft, J. 9065
I
Ibaraki, T. 9061
KKing, W. K. 9078Kinney, L. L. 9072Klein, M. 9136Kral, J. 9102Krolak, P. 9135
LLance, G. N. 9130, 9132,
9133Lewin, D. W. 9074Lewis, P. A. W. 9087, 9096
MMacleod, G. R. 9101Maki, G. K. 9070Marble, G. 9135Marcer, P. J. 9101Marsal, D. 9124Matheson, W. S. 9060Mayer, 0. 9115McMurchie, T. D. 9103Millstein, R. E. 9093Mittwede, W. C. 9094Montanari, U. 9111, 9112Morris, Jr., J. H. 9057Munro, W. D. 9071Mylopoulos, J. P. 9125,9126
N
Nance, R. E. 9097Nielsen, N. R. 9054Nordstrom, A. W. 9058
0
Ord-Smith, R. J. 9128Ortony, A. 9080Osborne, M. R. 9116
p
Page, E. S. 9129Palandri, E. M. 9101Parnas, D. L. 9082Patterson, T. N. L. 9120Pavlidis, T. 9125, 9126Proll, L. G. 9088Putzolu, G. R. 9075
RRademacher, M. J. 9137Ramamoorthy, C. V. 9095Rao, V. V. 9058Richards, D. L. 9084Roper, R. B. 9134Rosenfeld, A. 9110Rossol, L. 9106Roth, J. P. 9075
SSchkolnick, M. 9064Schmitt, B. 9118
Scowen, R. S. 9089Shedler, G. S. 9096Shimell, M. 9089Sibson, R. 9131Standish, T. A. 9090Stefanelli, R. 9110Stein, M. L. 9071
T
Thomas, D. B. 9103Thomas, R. E. 9098Tracey, J. H. 9070
VVinea, A. 9109Vinea, V. 9109Vogel, E. 9113
wWaters, S. J. 9100Watson, G. A. 9116Wegbreit, E. L. 9090Wilkes, M. V. 9086Wilkinson, J. H. 9052Williams, W. T. 9130,9132,9133
Winder, R. 0. 9062Winn, B. E. 9137Wolfe, M. A. 9121
zZalcstein, Y. 9127Zeigler, B. P. 9068
1435