<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>Project MAC</title>
<link>https://hdl.handle.net/1721.1/29813</link>
<description/>
<pubDate>Mon, 06 Apr 2026 12:20:23 GMT</pubDate>
<dc:date>2026-04-06T12:20:23Z</dc:date>
<item>
<title>Decidability Questions for Petri Nets</title>
<link>https://hdl.handle.net/1721.1/149455</link>
<description>Decidability Questions for Petri Nets
Hack, Michel Henri Théodore
An understanding of the mathematical properties of Petri Nets is essential when one wishes to use Petri Nets as an abstract model for concurrent systems.  The decidability of various problems which arise in this context is an important aspect of this question. The fact that these problems also arise in the context of other mathematical theories, such as commutative, closure under linear relations,  Matrix Context-Free grammars, or Weak Counter Automata, provides further motivation.
</description>
<pubDate>Tue, 01 Jun 1976 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149455</guid>
<dc:date>1976-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Petri Net Language</title>
<link>https://hdl.handle.net/1721.1/149453</link>
<description>Petri Net Language
Hack, Michel Henri Théodore
In a labeled Petri Net we assign symbols from an alphabet to some or all the transitions of a Petri Net.  To each firing sequence of such a Labeled Petri Net corresponds to a string over the alphabet.  We study the languages obtained in this way by all firing sequences of a Petri Net, or by all firing sequences which reach a given final marking.
</description>
<pubDate>Mon, 01 Mar 1976 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149453</guid>
<dc:date>1976-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Some Data Base Applications of Constraint Expressions</title>
<link>https://hdl.handle.net/1721.1/149452</link>
<description>Some Data Base Applications of Constraint Expressions
Grossman, Richard Weaver
This report presents a novel network-like representation for information, called "constraint expressions" (CE).  CE makes use of some of the knowledge-representation techniques developed by Artificial Intelligence research.
</description>
<pubDate>Sun, 01 Feb 1976 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149452</guid>
<dc:date>1976-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Preliminary Study in Computer-aided Legal Analysis</title>
<link>https://hdl.handle.net/1721.1/149451</link>
<description>A Preliminary Study in Computer-aided Legal Analysis
Meldman, Jeffrey A.
This paper describes the prototype for a computer system that can perform a simple kind of legal analysis.  The system user, who is presumed to be a lawyer, describes to the system a hypothetical set of facts.  The system determines the extent to which these facts fall within certain legal doctrines (by syllogism), or near to these doctrines  (by analogy).
</description>
<pubDate>Sat, 01 Nov 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149451</guid>
<dc:date>1975-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>Minimizing the Naming Facilities Requiring Protection in a Computing Utility</title>
<link>https://hdl.handle.net/1721.1/149450</link>
<description>Minimizing the Naming Facilities Requiring Protection in a Computing Utility
Bratt, Richard Glenn
This thesis examines the various mechanisms for naming the information objects stored in a general-purpose computing utility, and isolates a basic set of naming facilities that must be protected to assure complete control over user interaction and that allow desired interactions among users to occur in a natural way. Minimizing the protected naming facilities consistent with functional objective of controlled, but natural, user interaction contribute to defining a security kernel for a general-purpose computing utility.
</description>
<pubDate>Mon, 01 Sep 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149450</guid>
<dc:date>1975-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Mechanization of Temporal Knowledge</title>
<link>https://hdl.handle.net/1721.1/149449</link>
<description>Mechanization of Temporal Knowledge
Kahn, Kenneth M.
The design and implementation of a collection of computer programs knowledgeable about time "in general," called the time specialist, is described.  The thesis that this time specialist can be placed in the service of larger more general problem solvers is demonstrated for two examples, medical diagnosis and the understanding of a time-travel story.
</description>
<pubDate>Mon, 01 Sep 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149449</guid>
<dc:date>1975-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Strategy Selection in Medical Diagnosis</title>
<link>https://hdl.handle.net/1721.1/149447</link>
<description>Strategy Selection in Medical Diagnosis
Miller, Peter B.
The recorded, verbal problem-solving behavior of doctors performing the diagnostic task of taking a present illness was analyzed in this research.  The goal of the analysis was to discover that data-acquisition strategies were used by the doctors to accomplish the task. A model called the strategy frame model was created to describe the strategies that were found and to provide a mechanism for the selection of a strategy.
</description>
<pubDate>Mon, 01 Sep 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149447</guid>
<dc:date>1975-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Equivalence Problems for Monadic Schemas</title>
<link>https://hdl.handle.net/1721.1/149446</link>
<description>Equivalence Problems for Monadic Schemas
Qualitz, Joseph E.
A class of monadic program schemas is defined.  This class, called iteration schemas, consists of schemas whose programs comprise assignment statements, conditional statements, and iteration statements.  These schemas are shown to correspond to program schemas which are structured, and are shown to be strictly less "powerful" than monadic program schemas.
</description>
<pubDate>Sun, 01 Jun 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149446</guid>
<dc:date>1975-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Automatic Test, Configuration and Repair of Cellular Arrays</title>
<link>https://hdl.handle.net/1721.1/149445</link>
<description>Automatic Test, Configuration and Repair of Cellular Arrays
Manning, Frank B.
A cellular array is an iterative array of identical information processing machines, cells.  The arrays discussed are rectangular arrays of programmable logic, in which information stored in a working cell tells the cell how to behave.  No signal line connects more than a few cells. A loading mechanism in each cell allows a computer directly connected to one cell to load any good cell that is not walled off by flawed cells.
</description>
<pubDate>Sun, 01 Jun 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149445</guid>
<dc:date>1975-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Portable Compiler for the Language C</title>
<link>https://hdl.handle.net/1721.1/149444</link>
<description>A Portable Compiler for the Language C
Snyder, Alan
This paper describes the implementation of a compiler for the language C.  The compiler has been designed to be able to be capable of producing assembly-language code for most register-oriented machines with only minor recoding.
</description>
<pubDate>Thu, 01 May 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149444</guid>
<dc:date>1975-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Program Restructuring for Virtual Memory Systems</title>
<link>https://hdl.handle.net/1721.1/149443</link>
<description>Program Restructuring for Virtual Memory Systems
Johnson, Jerry William
The problem area addressed in this report is program restructuring, a method of reordering the relocatable sectors of a program in its address space to increase the locality of the programs reference behavior, thereby reducing the number of page fetches require for execution in a virtual memory system.
</description>
<pubDate>Sat, 01 Mar 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149443</guid>
<dc:date>1975-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Formalization and Correctness Proof of the CGOL Language System</title>
<link>https://hdl.handle.net/1721.1/149442</link>
<description>A Formalization and Correctness Proof of the CGOL Language System
VanDeVanter, Michael Lee
In many important ways the design and implementation of programming languages are hindered rather than helped by BNF.  We present an alternative meta-language based on the work of Pratt which retains much of the effective power of BNF but is more convenient for designer, implementer, and user alike. Its amenability to formal treatment is demonstrated by a rigorous correctness proof of a simple implementation.
</description>
<pubDate>Sat, 01 Mar 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149442</guid>
<dc:date>1975-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Computational Complexity of Some Logical Theories</title>
<link>https://hdl.handle.net/1721.1/149441</link>
<description>The Computational Complexity of Some Logical Theories
Rackoff, Charles Weill
Upper and lower bounds on the inherent computational complexity of the decision problem for a number of logical theories are established.  A general form of Ehrenfeucht game technique for deciding theories is developed which involves analyzing the expressive power of formulas with given quantifier depth. The method allows one to decide the truth of sentences by limiting quantifiers to range over finite sets.
</description>
<pubDate>Sat, 01 Feb 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149441</guid>
<dc:date>1975-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Digitalis Therapy Advisory</title>
<link>https://hdl.handle.net/1721.1/149440</link>
<description>A Digitalis Therapy Advisory
Silverman, Howard
The physician administering digitalis makes use of the full richness of the clinical setting to form his/her impressions and decide on a therapeutic program.  The weakness of existing programs which formulate digitalis dosage regimens lies in their inability to use all of the clinical data available-both quantitative. and qualitative. This report describes the construction of a computer system which formulates digitalis dosage regimens and which adjusts this regimen by interpreting the patient's response to the original dosage regimen.
</description>
<pubDate>Wed, 01 Jan 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149440</guid>
<dc:date>1975-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Some Problems in German in English Machine Translation</title>
<link>https://hdl.handle.net/1721.1/149439</link>
<description>Some Problems in German in English Machine Translation
Brown, Gretchen P.
This paper discusses some problems in the machine translation of natural language, in particular, for translation from German into English.  An implementation of some parts of the translating process has been built.  The system consists of a German interpretive grammar, to take in German text and output a set of semantic representation, and a generator, to produce English sentences from single semantic representations.
</description>
<pubDate>Sun, 01 Dec 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149439</guid>
<dc:date>1974-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>Naming and Protection in Extendable Operating Systems</title>
<link>https://hdl.handle.net/1721.1/149438</link>
<description>Naming and Protection in Extendable Operating Systems
Redell, David D.
The properties of capability-based extendible operating systems are described, and various aspects of such systems are discussed, with emphasis on the conflict between free distribution of access privileges and later revocation of those privileges.
</description>
<pubDate>Fri, 01 Nov 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149438</guid>
<dc:date>1974-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>Nondeterministic Time and Space Complexity Classes</title>
<link>https://hdl.handle.net/1721.1/149437</link>
<description>Nondeterministic Time and Space Complexity Classes
Seiferas, Joel Irvin
The marginal utility of the Turing machine computational resources running time and storage space are studied.  A technique is developed which, unlike diagonalization, applies equally well to nondeterministic and deterministic automata.  For f, g time or space bounding functions with f (n+1) small compared to g(n), it is shown that, in terms of word length n, there are languages which are accepted by Turing machines operating within time or space g(n) but which are accepted by no Turing machine operating within time or space f(n). The proof involves use of the recursion theorem together with "padding" or "translational" techniques of formal language theory.
</description>
<pubDate>Sun, 01 Sep 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149437</guid>
<dc:date>1974-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Functional Domains of Applicative Languages</title>
<link>https://hdl.handle.net/1721.1/149436</link>
<description>Functional Domains of Applicative Languages
Ward, Stephen A.
The expressive power of a particular applicative language may be characterized by the set of abstract functions directly representable in that language. The common FUNARG and applicative order problems are scrutinized in this way, and the effects of these weaknesses are related to the inexpressibility of classes of functions.
</description>
<pubDate>Sun, 01 Sep 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149436</guid>
<dc:date>1974-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Semantics of Data Structures and References</title>
<link>https://hdl.handle.net/1721.1/149435</link>
<description>Semantics of Data Structures and References
Ellis, David J.
Each programming language that handles data structures has its own set of rules for working with them.  Notions such as assignment and construction of structures values appear in a huge number of different and complicated versions.  This thesis presents a methodology which provides a common basis for describing ways in which programming languages deal with  data structures and reference to them.
</description>
<pubDate>Thu, 01 Aug 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149435</guid>
<dc:date>1974-08-01T00:00:00Z</dc:date>
</item>
<item>
<title>Removing the Dynamic Linker from the Security Kernel of a Computing Utility</title>
<link>https://hdl.handle.net/1721.1/149434</link>
<description>Removing the Dynamic Linker from the Security Kernel of a Computing Utility
Jason, Philippe Arnaud
In order to enforce the security of the information stored in a computing utility, it is necessary to certify that the protection mechanism is correctly implemented so that there exist no uncontrolled access path to the stored information.
</description>
<pubDate>Sat, 01 Jun 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149434</guid>
<dc:date>1974-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Mathematical Logic for Computer Scientists</title>
<link>https://hdl.handle.net/1721.1/149433</link>
<description>Mathematical Logic for Computer Scientists
Levin, Michael
This book is an introductory course in mathematical logic covering basic topics in quantification theory and recursive function theory, and is intended for the reader who is interested in artificial intelligence, computer linguistics, and other related areas. The text is theoretical, but organized with implementation in mind.
</description>
<pubDate>Sat, 01 Jun 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149433</guid>
<dc:date>1974-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Using Interactive Graphics in Simulating the Hospital Emergency Room</title>
<link>https://hdl.handle.net/1721.1/149432</link>
<description>Using Interactive Graphics in Simulating the Hospital Emergency Room
Weissberg, Richard W.
The hospital emergency room is a complex system having many interrelated factors contributing to its operation.  The emergency room administrator has limited control over certain of these factors: numbers of beds, nurses, doctors, x-ray units; for example. Other factors such as patient arrival rates and demands made upon available resources are largely uncontrollable.
</description>
<pubDate>Wed, 01 May 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149432</guid>
<dc:date>1974-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Computer Utility as a Marketplace for Computer Service</title>
<link>https://hdl.handle.net/1721.1/149431</link>
<description>The Computer Utility as a Marketplace for Computer Service
Frankston, Robert Mm.
Computers are unique in their ability to be programmed for a wide variety of applications.  This is in contrast with hardware dedicated to specific tasks such as the telephone system.  Because of its flexibility, a computer system can support, concurrently, many diverse services that do not require dedicated hardware.
</description>
<pubDate>Wed, 01 May 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149431</guid>
<dc:date>1974-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Experimental Analysis of Program Reference Patterns in the Multics Virtual Memory</title>
<link>https://hdl.handle.net/1721.1/149430</link>
<description>An Experimental Analysis of Program Reference Patterns in the Multics Virtual Memory
Greenberg, Bernard Stewart
This thesis reports the design, conducting, and results of an experiment intended to measure the paging rate of a virtual memory computer system as a function of paging memory size.  This experiment, conducted on the Multics computer system at MIT, a large interactive computer utility serving an academic community, sought to predict paging rates for paging memory sizes larger than existing memory at the time.
</description>
<pubDate>Wed, 01 May 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149430</guid>
<dc:date>1974-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Model-debugging System</title>
<link>https://hdl.handle.net/1721.1/149429</link>
<description>A Model-debugging System
Mark, William S.
</description>
<pubDate>Tue, 01 Jan 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149429</guid>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Verification of Programs Operating on Structured Data</title>
<link>https://hdl.handle.net/1721.1/149428</link>
<description>Verification of Programs Operating on Structured Data
Laventhal, Mark Steven
The major method for verifying the correctness of computer program is the inductive assertion approach.  This approach has been limited in the past by the lack of techniques for handling data structures.  In particular, there has been a need for concepts with which to describe structured data during intermediate and final stages of a computation.
</description>
<pubDate>Fri, 01 Mar 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149428</guid>
<dc:date>1974-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Introduction to Multics</title>
<link>https://hdl.handle.net/1721.1/149427</link>
<description>Introduction to Multics
Saltzer, Jerome H.
The Multics project was begun in 1964 by the Computer Systems Research group of M.I.T. Project MAC.  The goal was to create a prototype of a computer utility.  In 1965, the project became a cooperative venture of M.I.T. Project MAC, the General Electric Company Computer Department (now Honeywell Information Systems Inc. ) and Bell Telephone  Laboratories. In 1969, at the end of the research phase of the project, Bell Telephone Laboratories ended its active involvement.
</description>
<pubDate>Fri, 01 Feb 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149427</guid>
<dc:date>1974-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>On Lower Bounds for Selection Problems</title>
<link>https://hdl.handle.net/1721.1/149426</link>
<description>On Lower Bounds for Selection Problems
Yao, Foong Frances
Let V i (n) be the minimum number of binary comparisons that are required to determine the i-th largest of n elements drawn from a totally ordered set.  In this thesis we use adversary strategies to prove lower bounds on V i (n).  For i = 3, our lower bounds determine V 3(n) precisely for infinitely many values of n,and determine V 3(n) to within 2 for all n.
</description>
<pubDate>Fri, 01 Mar 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149426</guid>
<dc:date>1974-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Analysis of Asynchronous Concurrent Systems by Timed Petri Nets</title>
<link>https://hdl.handle.net/1721.1/149425</link>
<description>Analysis of Asynchronous Concurrent Systems by Timed Petri Nets
Ramchandani, Chander
This thesis is concerned with the modeling and performance analysis of systems which consist of concurrently acting components, an example of which is an asynchronous pipelined processor.  The work is divided into two parts.  In the first part, a suitable model is developed for describing the structure of asynchronous concurrent systems. In conventional automata theory, the finite-state machine model is used to describe the behavior of systems; the problem with this is that a large number of states results when practical systems are modelled.
</description>
<pubDate>Fri, 01 Feb 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149425</guid>
<dc:date>1974-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Abstract Model of a Research Institute: Simple Automatic Programming Approach</title>
<link>https://hdl.handle.net/1721.1/149424</link>
<description>An Abstract Model of a Research Institute: Simple Automatic Programming Approach
Briabrin, Victor
A problem of knowledge representation is considered in terms of designing a model for a simple sociological structure.  A version of the access language is proposed which is based on three kind of expressions accepted by the system - constructors, specificators and requests. In addition, some topics concerned with model implementation and extension are discussed.
</description>
<pubDate>Fri, 01 Mar 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149424</guid>
<dc:date>1974-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Input/Output Architecture for Virtual Memory Computer Systems</title>
<link>https://hdl.handle.net/1721.1/149423</link>
<description>An Input/Output Architecture for Virtual Memory Computer Systems
Clark, David D
In many large systems today, input/output is not performed directly by the user, but is done interpretively by the system for him, which causes additional overhead and also restricts the user to whatever algorithms the system has implemented.  Many causes contribute to this involvement of the system in user input/output, including the need to enforce protection requirements, the inability to provide adequate response to control signals from devices, and the difficulty of running devices in a virtual environment, especially a virtual memory.
</description>
<pubDate>Tue, 01 Jan 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149423</guid>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Backup and Recovery of On-line Information in a Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149422</link>
<description>Backup and Recovery of On-line Information in a Computer Utility
Stern, Jerry A.
This thesis describes a design for an automatic backup mechanism to be incorporated in a computer utility for the protection of on-line information against accidental or malicious destruction.  This protection is achieved by preserving on magnetic tape recent copies of all items of information known to the online system. In the event of a system failure, file system damage is automatically assessed and missing information is recovered from backup storage.
</description>
<pubDate>Tue, 01 Jan 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149422</guid>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>On Reducibility Among Combinatorial Problems</title>
<link>https://hdl.handle.net/1721.1/149420</link>
<description>On Reducibility Among Combinatorial Problems
Herrmann, Paul Peter
A large class of combinatorial problems have been shown by Cook and Karp to be computationally equivalent to within a polynomial.  We exhibit some new problems in this class, and provide simpler proofs for some of the known reductions.
</description>
<pubDate>Sat, 01 Dec 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149420</guid>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>Productivity in Parallel Computational Schemata</title>
<link>https://hdl.handle.net/1721.1/149419</link>
<description>Productivity in Parallel Computational Schemata
Linderman, John P.
A general model for parallel computation is developed in three parts.  One part, the data flow graph, describes how actors which transform and test values are connected to the locations in a finite memory.  Another part, an interpretation, supplies information about the contents of memory and the detailed nature of the transformations and tests.
</description>
<pubDate>Sat, 01 Dec 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149419</guid>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>Complexity Classes of Recursive Functions</title>
<link>https://hdl.handle.net/1721.1/149418</link>
<description>Complexity Classes of Recursive Functions
Moll, Robert
An honest function is one whose size honestly reflects its computation time.  In 1969 Meyer and McCreight proved the "honesty theorem," which says that for every t, the t-computable functions are the same as the t'computable functions for some honest honest t'.
</description>
<pubDate>Fri, 01 Jun 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149418</guid>
<dc:date>1973-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Emptiness and Complementation Problems for Automata on Infinite Trees</title>
<link>https://hdl.handle.net/1721.1/149416</link>
<description>The Emptiness and Complementation Problems for Automata on Infinite Trees
Rackoff, Charles Weill
In [6] Rabin defines Automata on Infinite Trees, and the body of that paper is concerned with proving two theorems about these automata.  The result we consider in the first chapter says that there exists an effective procedure to determine, given an automaton on infinite trees, whether or not it accepts anything at all. We present a new decision procedure which is much simpler than Rabin's since we do not use an induction argument as he does.
</description>
<pubDate>Mon, 01 Jan 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149416</guid>
<dc:date>1973-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Analysis of Sorting Networks</title>
<link>https://hdl.handle.net/1721.1/149415</link>
<description>An Analysis of Sorting Networks
Smith, Burton J.
Comparators which sort two numbers can be interconnected to form networks which sort n numbers for any n.  The input and output characteristics of comparator networks are analyzed from several different points of view.
</description>
<pubDate>Sun, 01 Oct 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149415</guid>
<dc:date>1972-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Cooperation of Mutually Suspicious Subsystems in a Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149414</link>
<description>Cooperation of Mutually Suspicious Subsystems in a Computer Utility
Schroeder, Michael D.
This thesis describes practical protection mechanisms that allow mutually suspicious subsystems to cooperate in a single computation and still be protected from one another.  The mechanisms are based on the division of a computation into independent domains of access privilege, each of which may encapsulate a protected subsystem. The central component of the mechanisms is a hardware processor that automatically enforces the access constraints associated with a multidomain computation implemented as a single execution point in a segmented virtual memory.
</description>
<pubDate>Fri, 01 Sep 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149414</guid>
<dc:date>1972-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Finite Tree Automata and W-Automata</title>
<link>https://hdl.handle.net/1721.1/149413</link>
<description>Finite Tree Automata and W-Automata
Hossley, Robert
Chapter I is a survey of finite automata as acceptors of finite labeled trees.  Chapter II is a survey of finite automata as acceptors of infinite strings on a finite alphabet.  Among the automata models considered in Chapter II are those used by McNaughton, Buchi, and Landweber. In Chapter II we also consider several new automata models based on a notion of a run of a finite automataton on  an infinite string suggested by Professor A.R. Meyer in private communication. We show that these new models are all equivalent to various previously formulated models.
</description>
<pubDate>Fri, 01 Sep 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149413</guid>
<dc:date>1972-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Relativization of the Theory of Computational Complexity</title>
<link>https://hdl.handle.net/1721.1/149410</link>
<description>Relativization of the Theory of Computational Complexity
Lynch, Nancy A.
Blum's machine-independent treatment of the complexity of partial recursive functions is extended to relative algorithms (as represented by Turing machines with oracles).  We prove relativizations of several results of Blum complexity theory, such as the compression theorem. A recursive relatedness theorem is proved, showing that any two relative complexity measures are related by fixed recursive function. This theorem allows us to obtain proofs of results  for all measures from proofs for a particular measure.
</description>
<pubDate>Thu, 01 Jun 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149410</guid>
<dc:date>1972-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Complexity of Finite Functions</title>
<link>https://hdl.handle.net/1721.1/149409</link>
<description>The Complexity of Finite Functions
Vilfan, Bostjan
Lower bounds on the length of formulas for finite functions are obtained from a generalization of a theorem  of Specker.  Let f: (0,1,...,d-1)    [0,1,...,d-1] be a function which can be represented by a formula of length  &lt; c.n. For any m, if n is sufficiently large, there is a restriction f': {0,1,...,d-1}m  &gt; {0,...,d-1} of f which, is representable by special class of formulas called homogeneous e-complexes.
</description>
<pubDate>Wed, 01 Mar 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149409</guid>
<dc:date>1972-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Autonomous, Synchronous Counters Constructed Only of J-K Flip-flops</title>
<link>https://hdl.handle.net/1721.1/149408</link>
<description>Autonomous, Synchronous Counters Constructed Only of J-K Flip-flops
Manning, Frank
This report describes research into some properties of autonomous, synchronous counters constructed with only the simplest form of J-K Flip-Flop.  The research revolved around a system with a special-purpose digital machine and a general-purpose computer. The special-purpose searched through all the possible counters constructed of five or fewer J-K Flip-Flops for all counters with a period equal to that specified by th input to the system.
</description>
<pubDate>Mon, 01 May 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149408</guid>
<dc:date>1972-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Essays in Algebraic Simplification</title>
<link>https://hdl.handle.net/1721.1/149407</link>
<description>Essays in Algebraic Simplification
Fateman, Richard J.
This thesis consists of essays on several aspects of the problem of algebraic simplification by computer.  Since simplification is at the core of most algebraic manipulations, efficient and effective simplification procedures are essential to building useful computer systems for non-numerical mathematics. Efficiency is attained through carefully designed and engineered algorithms, heuristics,and data types, while effectiveness is assured through theoretical considerations.
</description>
<pubDate>Sat, 01 Apr 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149407</guid>
<dc:date>1972-04-01T00:00:00Z</dc:date>
</item>
<item>
<title>Analysis of Production Schemata by Petri Nets</title>
<link>https://hdl.handle.net/1721.1/149406</link>
<description>Analysis of Production Schemata by Petri Nets
Hack, Michel Henri Théodore
Petri nets provide a powerful graphical tool for representing and analyzing complex concurrent systems.  Properties such as hang-up freeness, determinacy, conflict, concurrency and dependency, can be represented and studied.  The precise relationship between structural and behavioral properties, and between local and global properties is not well-understood for the most general class of Petri Nets.
</description>
<pubDate>Tue, 01 Feb 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149406</guid>
<dc:date>1972-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>Induction in Proofs about Programs</title>
<link>https://hdl.handle.net/1721.1/149405</link>
<description>Induction in Proofs about Programs
Greif, Irene Gloria
Four methods for proving equivalence of programs by induction are described and compared.  They are recursion induction, structural induction, mu-rule induction, and truncation induction.  McCarthy's formalism for conditional expressions as function definitions is used and reinterpreted in view of Park's work on results on results in lattice theory as related to proofs about programs. The possible application of this work to automatic program verification is commented upon.
</description>
<pubDate>Tue, 01 Feb 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149405</guid>
<dc:date>1972-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>Evaluation of Definite Integrals by Symbolic Manipulation</title>
<link>https://hdl.handle.net/1721.1/149404</link>
<description>Evaluation of Definite Integrals by Symbolic Manipulation
Wang, Paul S.
A heuristic computer program for the evaluation of real definite integrals of elementary functions is described.  This program, called WANDERER (WANg's DEfinite integRal EvaluatoR), evaluates many proper and improper integrals.  The improper integrals may have a finite or infinite range of integration. Evaluation by contour integration and residue theory is among the methods used. A program called DELIMITER (DEfinitive LIMITEvaluatoR) is used for the limit computations needed in evaluating some definite integrals.
</description>
<pubDate>Wed, 01 Sep 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149404</guid>
<dc:date>1971-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Cost Analysis of Debugging Systems</title>
<link>https://hdl.handle.net/1721.1/149403</link>
<description>Cost Analysis of Debugging Systems
Lester, Bruce P.
A general method is presented for performing cost analysis of interactive debugging systems.  The method is based on an abstract model of program execution.  This model is derived from the interpreter used in the Vienna method of semantic definition of PL/I. A brief discussion of the overall operation and significance of Vienna interpreter is included.
</description>
<pubDate>Wed, 01 Sep 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149403</guid>
<dc:date>1971-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Primary Access Control in Large-scale Time-shared Decision Systems</title>
<link>https://hdl.handle.net/1721.1/149402</link>
<description>Primary Access Control in Large-scale Time-shared Decision Systems
Owens, Richard C., Jr.
The computer differs from other tools in that it presently does not provide its users with a working environment transparent to their desires; in particular, current computer systems do not support adequate mechanisms for controlled sharing of sensitive information. Four primary dimensions of the access control problem are identified.  They are: 1) the physical level at which to apply control; 2) the fineness of distinction applied to the term ""access"" 3) the meaning of the term "user identification",and 4) the degree of sophistication employed in automatically assigned restrictions to new data files.
</description>
<pubDate>Thu, 01 Jul 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149402</guid>
<dc:date>1971-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>Bounds on Information Retrieval Efficiency in Static File Structures</title>
<link>https://hdl.handle.net/1721.1/149401</link>
<description>Bounds on Information Retrieval Efficiency in Static File Structures
Welch, Terry A.
This research addresses the problem of file organization for efficient information retrieval when each file item may be accessed through any one of a large number of identification keys.  The emphasis is on library problems, namely large, low-update, directory-oriented files, but other types of files are discussed.
</description>
<pubDate>Tue, 01 Jun 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149401</guid>
<dc:date>1971-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Dynamic Reconfiguration in a Modular Computer System</title>
<link>https://hdl.handle.net/1721.1/149400</link>
<description>Dynamic Reconfiguration in a Modular Computer System
Schell, Roger R.
This thesis presents an orderly design approach for dynamically changing the configuration of constituent physical units in a modular computer system.  Dynamic reconfiguration contributes to high system availability by allowing preventative maintenance, development of new operating systems, and changes in system capacity on a non-interference basis.
</description>
<pubDate>Tue, 01 Jun 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149400</guid>
<dc:date>1971-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Automatic Creation of a Code Generator from a Machine Description</title>
<link>https://hdl.handle.net/1721.1/149399</link>
<description>Automatic Creation of a Code Generator from a Machine Description
Miller, Perry L.
This paper studies some of the problems involved in attaining machine independence for a code generator, similar to the language independence and the token independence attained by automatic parsing and automatic lexical systems.  In particular, the paper examines the logic involved in two areas of code generation: computation and data reference.
</description>
<pubDate>Sat, 01 May 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149399</guid>
<dc:date>1971-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Computer Analysis of Visual Properties of Curved Objects</title>
<link>https://hdl.handle.net/1721.1/149398</link>
<description>Computer Analysis of Visual Properties of Curved Objects
Krakauer, Lawrence J.
A  method is presented for the visual analysis of objects by computer.  It is particularly well suited for opaque objects with smoothly curved surfaces.  The method extracts information about the object's surface properties, including measures of its specularity, texture, and regularity. It also aids in determining the object's shape.
</description>
<pubDate>Sat, 01 May 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149398</guid>
<dc:date>1971-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Design Strategies for File Systems</title>
<link>https://hdl.handle.net/1721.1/149395</link>
<description>Design Strategies for File Systems
Madnick, S.E.
This thesis describes a methodology for the analysis and synthesis of modern general purpose file systems.  The two basic concepts developed are (1) establishment of a uniform representation of a file's structure in the form of virtual memory or segmentation and (2) determination of a hierarchy of logical transformations within a file system.
</description>
<pubDate>Thu, 01 Oct 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149395</guid>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Complexity Measures for Language Recognition by Canonic Systems</title>
<link>https://hdl.handle.net/1721.1/149394</link>
<description>Complexity Measures for Language Recognition by Canonic Systems
Haggerty, Joseph P.
A canonic system C is a specification of a recursively enumerable set, such as a set of strings over a finite alphabet.  From this description C, it is possible to generate a system C , called a proof measure function, which is an indication of the complexity of the language defined. For certain simple but important classes of canonic system, algebraic bounds on these functions can be derived from the structure of the system.
</description>
<pubDate>Thu, 01 Oct 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149394</guid>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Deadlock-free Sharing of Resources in Asynchornous Systems</title>
<link>https://hdl.handle.net/1721.1/149393</link>
<description>Deadlock-free Sharing of Resources in Asynchornous Systems
Hebalkar, Prakash G.
Whenever resources are shared among several activities that hoard resources, the activities can attain a state of deadlock in which, for lack of resources, none of the activities can proceed.  Deadlocks can be prevented by coordination of the sharing. efficient running of the activities under such coordination requires knowledge of the patterns of use of resources by the activities.
</description>
<pubDate>Tue, 01 Sep 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149393</guid>
<dc:date>1970-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Integral Convex Polyhedra and an Approach to Integralization</title>
<link>https://hdl.handle.net/1721.1/149392</link>
<description>Integral Convex Polyhedra and an Approach to Integralization
Edelberg, Murray
Many combinatorial optimization problems may be formulated as integer linear programming problems - that is, problems of the form: given a convex polyhedron P contained in the non-negative orthant of n-dimensional space, find a integer point in P which maximizes (or minimizes) a given linear objective function. Well known linear programming methods would suffice to solve such a problem if:  (i) P is an integral convex polyhedron, or  (ii) P is transformed into the integral convex polyhedron that is the convex hull of the set of integer points in P, a process which is called integralization.
</description>
<pubDate>Sat, 01 Aug 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149392</guid>
<dc:date>1970-08-01T00:00:00Z</dc:date>
</item>
<item>
<title>Computer Recognition of Prismatic Solids</title>
<link>https://hdl.handle.net/1721.1/149391</link>
<description>Computer Recognition of Prismatic Solids
Griffith, Arnold Koons
An investigation is made into the problem of constructing a model of the appearance to an optical input device of scenes consisting of plane-faced geometric solids.  The goal is to study algorithms which find the real straight edges in the scenes, taking into account smooth variations in intensity over faces of the solids, blurring of edges and noise.
</description>
<pubDate>Sat, 01 Aug 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149391</guid>
<dc:date>1970-08-01T00:00:00Z</dc:date>
</item>
<item>
<title>Coordination of Asynchronous Event</title>
<link>https://hdl.handle.net/1721.1/149390</link>
<description>Coordination of Asynchronous Event
Patil, Suhas Shrikrishna
The way activity in a system proceeds is that events occur as a result of some conditions and lead to some new conditions which make other events possible.  Often it is necessary to coordinate such events to ensure proper behavior. Coordination nets for representing such coordinations and physically realizable structures for enforcing such coordinations are presented. These structures are modular and can be mechanically derived from the coordination nets. Coordination involved in concurrent management of resources are also discussed.
</description>
<pubDate>Mon, 01 Jun 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149390</guid>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Computer-controlled Graphical Display Processor</title>
<link>https://hdl.handle.net/1721.1/149389</link>
<description>A Computer-controlled Graphical Display Processor
Fiasconaro, James Gerard
A cathode-ray tube, (CRT), is frequently employed to display text and drawings generated by a digital computer.  Unfortunately, all of the commercially available CRT display systems are either very expensive or have limited dynamic capability resulting from the use of some form of storage-type CRT. A need exists to develop a low-cost, relatively sophisticated display compute-generated pictures.
</description>
<pubDate>Mon, 01 Jun 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149389</guid>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Generalized Organization of Large Data Bases: A Set-theoretic Approach to Relations</title>
<link>https://hdl.handle.net/1721.1/149388</link>
<description>Generalized Organization of Large Data Bases: A Set-theoretic Approach to Relations
Fillat, Andrew Irwin; Kraning, Leslie Alan
Problems inherent in representation and manipulation of large data bases are discussed.  Data management is considered as the manipulation of relationships among elements of a data base.  A detailed analogy introduces concepts embodied in a data management system. Set theory is used to describe a model for data-bases, and operations suitable for manipulation of relations are defined.
</description>
<pubDate>Mon, 01 Jun 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149388</guid>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Economies of Scale in Computer Use: Initial Test and Implication A for the Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149387</link>
<description>Economies of Scale in Computer Use: Initial Test and Implication A for the Computer Utility
Selwyn, Lee L.
This study is concerned with the existence of economies of scale in the production of data processing and other computing services, and the possible regulatory and public policy implications of such economies.  The rapid development of the technology of computation since the Second World War has raised many questions as to the supervision by public authorities of the use and progress of this technology.
</description>
<pubDate>Mon, 01 Jun 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149387</guid>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Controlled Information Sharing in a Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149386</link>
<description>Controlled Information Sharing in a Computer Utility
Vanderbilt, Dean H.
A computer utility is envisioned as a large, multi-access computer system providing its users with the ability to store information and share its use with other system users.  This thesis considers the nature of information sharing and how a computer utility can provide facilities allowing such sharing to take place in a controlled manner.
</description>
<pubDate>Wed, 01 Oct 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149386</guid>
<dc:date>1969-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Recognition of Translators Invariants* By Iterative Arrays</title>
<link>https://hdl.handle.net/1721.1/149385</link>
<description>Recognition of Translators Invariants* By Iterative Arrays
Beyer, Wendel Terry
A study is made of the recognition and transformation of figures by iterative arrays of finite state automata. A figure is a finite rectangular two-dimensional array of symbols. The iterative arrays considered are also finite, rectangular and two-dimensional.
</description>
<pubDate>Wed, 01 Oct 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149385</guid>
<dc:date>1969-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Practical Translators for LR(k) Languages</title>
<link>https://hdl.handle.net/1721.1/149384</link>
<description>Practical Translators for LR(k) Languages
Deremer, Franklin Lewis
A context-free syntactical translator (CFST) is a machine which defines a translation from one context-free language to another.  A transduction grammar is a formal system based on a context-free grammar and it specifies a context-free syntactical translation. A simple suffix transduction grammar based on a context-free grammar which is LR(k) specifies a translation which can be defined by a deterministic push-down automation (DPDA).
</description>
<pubDate>Wed, 01 Oct 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149384</guid>
<dc:date>1969-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Graph Model for Parallel Computations</title>
<link>https://hdl.handle.net/1721.1/149383</link>
<description>A Graph Model for Parallel Computations
Rodrigues, Jorge E.
This report presents a computational model called program  graphs  which makes possible a precise description of parallel computations of arbitrary complexity on non-structured data.  In the model, the computation steps are represented by the nodes of a directed graph whose links represent elements of storage and transmission of data and /or control information.
</description>
<pubDate>Mon, 01 Sep 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149383</guid>
<dc:date>1969-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Case Study in Interactive Graphics Programming: A Circuit Drawing and Editing Program for Use with A Storage-tube Display Terminal</title>
<link>https://hdl.handle.net/1721.1/149382</link>
<description>Case Study in Interactive Graphics Programming: A Circuit Drawing and Editing Program for Use with A Storage-tube Display Terminal
Brackett, J.; Hammer, M.M.; Thornhill, D.
The concepts involved in building and manipulating a data structure through graphical interaction are presented, using the drawing and editing of electrical circuits as a vehicle. The circuit drawings program was designed to operate on an ARDS storage-tube display terminal attached to the M.I.T. Project MAC IBM 7094 Compatible Time-Sharing System.
</description>
<pubDate>Wed, 01 Oct 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149382</guid>
<dc:date>1969-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>EPS: An Interactive System for Solving Elliptic Boundary-Value Problems with Facilities for Data Manipulation</title>
<link>https://hdl.handle.net/1721.1/149381</link>
<description>EPS: An Interactive System for Solving Elliptic Boundary-Value Problems with Facilities for Data Manipulation
Tillman, Coyt C., Jr.
This appendix for the author's forthcoming thesis, "On-Line Solution of Elliptic Boundary-Value Problems," is a user's guide for EPS. EPS solves two-dimensional boundary-value problems for elliptic systems of second-order partial differential equations. It also has general-purpose capabilities which permit the on-line definition and execution  of arbitrary numerical procedures.
</description>
<pubDate>Sun, 01 Jun 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149381</guid>
<dc:date>1969-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Interactive Computer-mediated Animation</title>
<link>https://hdl.handle.net/1721.1/149380</link>
<description>Interactive Computer-mediated Animation
Baeker, Ronald M.
The use of interactive computer graphics in the construction of animated visual displays is investigated. The dissertation presents a process called interactive computer-mediated animation, in which dynamic displays are constructed by utilizing direct console commands, algorithms, free-hand sketches, and real-time actions. The resulting "movie" can then be immediately viewed and altered.
</description>
<pubDate>Sun, 01 Jun 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149380</guid>
<dc:date>1969-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Formal System for Defining the Syntax and Semantics of Computer Languages</title>
<link>https://hdl.handle.net/1721.1/149379</link>
<description>A Formal System for Defining the Syntax and Semantics of Computer Languages
Ledgard, Henry Francis
The thesis of this dissertation is that formal definitions of the syntax and semantics of computer languages are needed.  This dissertation investigates two candidates for formally defining computer languages: (1) the formalism of canonical systems for defining the syntax of a computer language and its translation into a target language for defining the semantics of a computer language.
</description>
<pubDate>Tue, 01 Apr 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149379</guid>
<dc:date>1969-04-01T00:00:00Z</dc:date>
</item>
<item>
<title>Computer Recognition of Three-Dimensional Objects in a Visual Scene</title>
<link>https://hdl.handle.net/1721.1/149378</link>
<description>Computer Recognition of Three-Dimensional Objects in a Visual Scene
Guzman-Arenas, Aldolfo
Methods are presented 1) to partition or decompose a visual scene into the bodies forming it; (2) to position these bodies in three-dimensional space, by combining two scenes that make a stereoscopic pair; 3) to find the regions or zones of a visual scene that belong to its background, (4) to carry out the isolation of objects in (1) when the input has inaccuracies.
</description>
<pubDate>Sun, 01 Dec 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149378</guid>
<dc:date>1968-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Simulator of Multiple Interactive Users to Drive a Time-shared Computer System</title>
<link>https://hdl.handle.net/1721.1/149377</link>
<description>A Simulator of Multiple Interactive Users to Drive a Time-shared Computer System
Greenbaum, Howard Jacques
In the construction and maintenance of a time-shared computer system the need arises for a tool which can provide a controlled, repeatable environment for the purpose of making performance measurements.  This thesis describes the use of a small second computer to simulate the actions of multiple interactive users over individual communication lines. Each simulated user exhibits responses similar to those of a "normal" interactive user.
</description>
<pubDate>Wed, 01 Jan 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149377</guid>
<dc:date>1969-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Lambda Calculus Models of Programming Languages</title>
<link>https://hdl.handle.net/1721.1/149376</link>
<description>Lambda Calculus Models of Programming Languages
Morris, James H.
Two aspects of programming languages, recursive definitions and type declarations are analyzed in detail.  Church's -calculus is used as a model of a programming language for purposes of the analysis.  The main result on recursion is an analogue to Kleene's first recursion theorem: If A= FA for any A-expressions A and F, then A is an extension of YF in the sense that if E[YE], any expressions containing YF, has a normal form then E[F] =E {A]. Y is Curry's paradoxical combinator. The result is shown to be invariant for many different versions of Y.
</description>
<pubDate>Sun, 01 Dec 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149376</guid>
<dc:date>1968-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Integrated Hardware-software Systems for Computer Graphics in Time-sharing</title>
<link>https://hdl.handle.net/1721.1/149375</link>
<description>An Integrated Hardware-software Systems for Computer Graphics in Time-sharing
Thornhill, D.E.; Stotz, R.H.; Ross, D.T.; Ward, J.E.
This report describes the ESL Display Console and its associated user-oriented software systems developed by the M.I.T. Computer-Aided Design Project with Project MAC.  Console facilities include hardware projection of three-dimensional line drawings, automatic light pen tracking, and a flexible set of knob, switch, and push-button inputs. The console is attached to the Project MAC IBM 7094 Compatible Time-Sharing System either directly or through a PDP-7 Computer.
</description>
<pubDate>Sun, 01 Dec 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149375</guid>
<dc:date>1968-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>Implementing Multi-process Primitives in a Multiplexed Computer System</title>
<link>https://hdl.handle.net/1721.1/149374</link>
<description>Implementing Multi-process Primitives in a Multiplexed Computer System
Rappaport, Robert Lee
In any computer system primitive functions are needed to control the actions of processes in the system.  This thesis discusses a set of six such process control primitives which are sufficient to solve many of the problems involved in parallel processing as well as in the efficient multiplexing of  system resources among the many processes in a system.
</description>
<pubDate>Fri, 01 Nov 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149374</guid>
<dc:date>1968-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>Resource Allocation in Multiprocess Computer Systems</title>
<link>https://hdl.handle.net/1721.1/149370</link>
<description>Resource Allocation in Multiprocess Computer Systems
Denning, Peter James
The dynamic allocation for limited processor and main memory resources among members of a user community is investigated as a supply-and-demand problem.  The work is divided into four phases.  First phase is the construction of the working set model for program behavior. This model is based on locality, the concept that, during any interval of execution, a program favors a subset of its information; a computation's working set is a dynamic measure of this set of favored information. A working set storage management policy is one that allocates processors to a computation if and only if there is enough uncommitted  space in main memory to contain its working set.
</description>
<pubDate>Wed, 01 May 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149370</guid>
<dc:date>1968-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Incremental Simulation on a Time-shared Computer</title>
<link>https://hdl.handle.net/1721.1/149369</link>
<description>Incremental Simulation on a Time-shared Computer
Jones, Malcolm Murray
This thesis describes a system which allows simulation models to be built and tested incrementally.  It is called OPS-4 and is specifically designed to operate in the environment of the Multics system.  It represents a major expansion and improvement of the OPS-3 system implemented in CTSS and also includes many features adapted from other current simulation systems.
</description>
<pubDate>Mon, 01 Jan 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149369</guid>
<dc:date>1968-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Symbolic Integration</title>
<link>https://hdl.handle.net/1721.1/149368</link>
<description>Symbolic Integration
Moses, Joel
SIN and SOLDIER are heuristic programs written in LISP which solve symbolic integration problems.  SIN (Symbolic INtegrator) solves indefinite integration problems at the difficulty approaching those in the larger integral tables.  SIN contains several more methods than are used in the previous symbolic integration program SAINT, and solves most of the problems attempted by SAINT in less than one second. SOLDIER (SOLution of Ordinary Differential Equations Routine) solves first order, first degree ordinary differential equations at the level of a good college sophomore and at an average of about five seconds per problem attempted.
</description>
<pubDate>Fri, 01 Dec 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149368</guid>
<dc:date>1967-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Canonic Translator</title>
<link>https://hdl.handle.net/1721.1/149367</link>
<description>A Canonic Translator
Alsop, Joseph Wright
An algorithm to recognize and translate sets of character strings specified by canonic system is presented.  The ability of canonic systems to define the context sensitive features of strings and to specify their translation allows the algorithm to recognize and translate real computer languages. It is also applicable in other languages systems.
</description>
<pubDate>Wed, 01 Nov 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149367</guid>
<dc:date>1967-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>A System for Computer-aided Diagnosis</title>
<link>https://hdl.handle.net/1721.1/149365</link>
<description>A System for Computer-aided Diagnosis
Gorry, Gregory Anthony
This thesis describes a model diagnostic problem and a computer program designed to deal with this problem.  The model diagnostic problem is an abstract problem.  A major contention of this thesis, however, is that this problem subsumes the principal feature of a number of ostensibly different real diagnostic problems including certain problems of medical diagnosis and the diagnosis of machine failures. A second major contention of this thesis is that strategies for the solution of the model diagnostic problem can be formulated in terms sufficiently explicit to permit their incorporation in a computer program.
</description>
<pubDate>Fri, 01 Sep 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149365</guid>
<dc:date>1967-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Program Analysis by Digital Computer</title>
<link>https://hdl.handle.net/1721.1/149364</link>
<description>Program Analysis by Digital Computer
Wilde, Daniel Underwood
A comparison of the properties of non-modifying and self-modifying programs leads to the definition of independent and dependent instructions.  Because non-modifying programs contain only independent instructions, such programs can be analyzed by a straight forward, two -step analysis procedure. First, the program control flow is detected; second, that control flow is used to determine the program data flow or data processing. However, self-modifying programs can also contain dependent instructions, and the program control flows and data flows exhibit cyclic interaction.
</description>
<pubDate>Tue, 01 Aug 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149364</guid>
<dc:date>1967-08-01T00:00:00Z</dc:date>
</item>
<item>
<title>Design and Implementation of a Table-Driven Compiler System</title>
<link>https://hdl.handle.net/1721.1/149363</link>
<description>Design and Implementation of a Table-Driven Compiler System
Liu, Chung L.; Change, Gabriel D.; Marks, Richard E.
Our goal is to provide users of the table-driven compiler system with an environment within which they can freely design and produce their compilers.  The primary design criterion is generality so that the users can define a large class of input languages oriented toward any kind of problem-solving purposes, and can also define a large class of object programs to be executed on different computer systems. Therefore, in our system we do not limit the users to specific ways of doing syntactic analysis, or doing storage allocation, or producing binary programs of a specific format for a particular computer system. What we provide are mechanisms that are general enough for whichever way a user desires to build his compiler.
</description>
<pubDate>Sat, 01 Jul 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149363</guid>
<dc:date>1967-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>Surfaces for Computer-aided Design of Space Forms</title>
<link>https://hdl.handle.net/1721.1/149362</link>
<description>Surfaces for Computer-aided Design of Space Forms
Coons, Steven A.
The design of airplanes, ships, automobiles, and so-called ""sculptured parts"" involves the design, delineation, and mathematical description of bounding surfaces.  A method is described which makes possible the description of free-form doubly curved surfaces of a very general kind. An extension of these ideas to hyper-surfaces in higher dimensional spaces is also indicated.
</description>
<pubDate>Thu, 01 Jun 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149362</guid>
<dc:date>1967-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>On-line Analysis for Social Scientists</title>
<link>https://hdl.handle.net/1721.1/149361</link>
<description>On-line Analysis for Social Scientists
Miller, James R.
A library of computer routines has been compiled to facilitate the analysis of social science research data.  Many of these routines are designed to test statistical hypotheses.  All routines are operated on-line and permit conversational interaction between the user and a time-shared computer. Input data are typed directly into the computer through a teletype console. Explicit typing directions and error diagnostics, where appropriate, are printed out by each routine to guide the input process. Analyses are executed immediately, and computed results are printed out in typical publication language.
</description>
<pubDate>Mon, 01 May 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149361</guid>
<dc:date>1967-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Syntax-based Analytic Reading of Musical Scores</title>
<link>https://hdl.handle.net/1721.1/149360</link>
<description>Syntax-based Analytic Reading of Musical Scores
Forte, Allen
As part of a larger research project in musical structure, a program has been written which ""reads"" scores encoded in an input language isomorphic to music notation.  The program is believed to be the first of its kind.  From a small number of parsing rules the program derives complex configurations, each of which is associated  with a set of reference points in a numerical representation of a time-comtinuum.  The logical structure of the program is such that all and only the defined classes of events are represented in the output.
</description>
<pubDate>Sat, 01 Apr 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149360</guid>
<dc:date>1967-04-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Low-cost Output Terminal for Time-shared Computers</title>
<link>https://hdl.handle.net/1721.1/149359</link>
<description>A Low-cost Output Terminal for Time-shared Computers
Rosenburg, Ronald C.; Kennedy, Daniel W.; Humphrey, Roger A.
This report describes a low-cost remote terminal to provide switch-form output from a time-shared digital computer.  The terminal consists of a modified model 35 KSR teletype and a local memory unit.  The unit is independent of any particular computer, and is easy to test and maintain. The states of the memory control and memory words are observable directly by indicator lights.
</description>
<pubDate>Wed, 01 Mar 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149359</guid>
<dc:date>1967-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Some Aspects of Pattrn Recognition by Computer</title>
<link>https://hdl.handle.net/1721.1/149358</link>
<description>Some Aspects of Pattrn Recognition by Computer
Guzman-Arenas, Adolfo
A computer may gather a lot of information from its environment in an optical or graphical manner.  A scene, as seen for instance from a TV camera or a picture, can be transformed into a symbolic description of points and lines or surfaces.  This thesis describes several programs, written in the language CONVERT, for the analysis of such descriptions in order to recognize, differentiate and identify desired objects or classes of objects in the scene. Examples are given in each case.
</description>
<pubDate>Wed, 01 Feb 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149358</guid>
<dc:date>1967-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>An On-line System for Algebraic Manipulation</title>
<link>https://hdl.handle.net/1721.1/149357</link>
<description>An On-line System for Algebraic Manipulation
Fenichel, Robert R.
This thesis describes an approach to the problem of programming a computer for algebraic manipulation.  The motivating threads of the work are first picked up in Chapter I.  To test the descriptive intuitions urged normatively in Chapter I, an experimental system was actually implemented. This system is described in Chapter II and in the Appendices.
</description>
<pubDate>Thu, 01 Dec 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149357</guid>
<dc:date>1966-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>Computer Design for Asynchronously Reproducible Multiprocessing</title>
<link>https://hdl.handle.net/1721.1/149356</link>
<description>Computer Design for Asynchronously Reproducible Multiprocessing
Van Horn, Earl C.
A concept is presented for designing either a computing system, or a programming language system, so that the following problem is avoided: during a multiprocess computation in which several processes communicate, and in which the relative timing of the processes is arbitrary, the output produced by the computation might not be a function of only the initial computation state, i.e., of only the inputs and initial program of the computation.
</description>
<pubDate>Tue, 01 Nov 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149356</guid>
<dc:date>1966-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>ADEPT: A Heuristic Program for Proving Theorems of Group Theory</title>
<link>https://hdl.handle.net/1721.1/149355</link>
<description>ADEPT: A Heuristic Program for Proving Theorems of Group Theory
Norton, Lewis Mark
A computer program, named ADEPT (A Distinctly  Empirical Prover of Theorems), has been written which proves theorems taken from the abstract theory of groups.  Its organization is basically heuristic, incorporating many of the techniques of the human mathematician in a "natural" way. This program has proved almost 100 theorems, as well as serving as a vehicle for testing and evaluating special-purpose heuristics.
</description>
<pubDate>Sat, 01 Oct 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149355</guid>
<dc:date>1966-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Pilot: A Step Towards Man-Computer Symbiosis</title>
<link>https://hdl.handle.net/1721.1/149354</link>
<description>Pilot: A Step Towards Man-Computer Symbiosis
Teitelman, Warren
PILOT  is a programming system constructed in LISP.  It is designed to facilitate the development of programs by easing the familiar sequence: write some code, run the program, make some changes, write some more code, run the program again, etc. As a program becomes more complex, making theses changes becomes harder and harder because the implications of changes are harder to anticipate.
</description>
<pubDate>Thu, 01 Sep 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149354</guid>
<dc:date>1966-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Models and Data Structures for Digital Logic Simulation</title>
<link>https://hdl.handle.net/1721.1/149353</link>
<description>Models and Data Structures for Digital Logic Simulation
Smith, Donald Leigh
A digital  logic simulation system is proposed for design verification.  Logic to be simulated is specified with a high level register transfer design language, and the simulation system operates on-line on a large time-shared computer.  The problem of selecting adequate circuit and signal models for this purpose is considered. models are proposed with sufficient timing detail to allow the simulation system to detect timing errors which currently are found by manual checking or prototype.
</description>
<pubDate>Mon, 01 Aug 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149353</guid>
<dc:date>1966-08-01T00:00:00Z</dc:date>
</item>
<item>
<title>Traffic Control in a Multiplexed Computer System</title>
<link>https://hdl.handle.net/1721.1/149352</link>
<description>Traffic Control in a Multiplexed Computer System
Saltzer, Jerome H.
This thesis describes a scheme for processor multiplexing in a multiple user, multiple processor computer system.  The scheme is based upon a distributed supervisor which may be different for different users.  The processor multiplexing method provides smooth inter-process communication, treatment of input/output  control as a special case of inter-process communication, and provision for a user to specify parallel processing or simultaneous input/output without interrupt logic.
</description>
<pubDate>Fri, 01 Jul 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149352</guid>
<dc:date>1966-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>Search Procedures Based on Measures of Relatedness Between Documents</title>
<link>https://hdl.handle.net/1721.1/149351</link>
<description>Search Procedures Based on Measures of Relatedness Between Documents
Ivie, Evan Leon
In this thesis a new type of information retrieval system is suggested which utilizes data of the type generated by the users of the system instead of data generated by indexers.  The theoretical model on which the system is based consists of three basic elements. The first element is measure of the relatedness between document-pairs. It is derived from information theory.
</description>
<pubDate>Wed, 01 Jun 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149351</guid>
<dc:date>1966-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Input/Output in Time-shared, Segmented, Multiprocessor Systems</title>
<link>https://hdl.handle.net/1721.1/149350</link>
<description>Input/Output in Time-shared, Segmented, Multiprocessor Systems
Smith, Arthur Anshel
After introducing and defining the concepts of time-sharing, segmentation, and multiprocessing, two classes of systems incorporating these are introduced.  Both classes use associative memories, as 'look behind' devices to speed the operation of addressing the segment memory, with the distinction between classes being the location of the associative memory.
</description>
<pubDate>Wed, 01 Jun 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149350</guid>
<dc:date>1966-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Design of a Low-cost Character Generator for Remote Computer Displays</title>
<link>https://hdl.handle.net/1721.1/149348</link>
<description>Design of a Low-cost Character Generator for Remote Computer Displays
Cheek, Thomas Burrell
A requirement exists for a low-cost remote display terminal with alphanumeric and line-drawing capabilities for use with time-shared computer systems.  This thesis, conducted as part of the overall remote display design project, was undertaken to investigate novel approaches to character generation, with the goal of drastically reducing present-day costs for such devices.      A survey of existing devices and character generation techniques was carried out, and a design approach was chosen which takes advantage of mass-fabrication techniques.  This includes using a five-by-seven dot matrix raster and a resistor array "read-only" character memory for the 96 printable symbols of the Revised Proposed ASCII Code.  Circuits designed, included a dot matrix generator and a register array memory with selection logic sense amplifiers, and a shift register output buffer.  An experimental character generator with an eight-word memory was built, largely using integrated circuits and was found to work as desired.  It is concluded that the design approach will yield a character generator that is of low enough cost to find wide use in remote computer terminals.
</description>
<pubDate>Tue, 01 Mar 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149348</guid>
<dc:date>1966-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Investigation of an Analog Technique to Decrease Pentracking Time in Computer Display</title>
<link>https://hdl.handle.net/1721.1/149347</link>
<description>Investigation of an Analog Technique to Decrease Pentracking Time in Computer Display
Stratton, William David
Many modern digital computer systems contain cathode-ray tube display equipment to facilitate man-machine communications.  Through the use of a display and a light-sensitive pen, graphical material can be directly inserted into the computer by using the pen to control the position of the electron beam at the face of the CRT-a process called pen tracking.  Beam position is continually sampled by the computer, permitting continuous display of the material being sketched.  In present digital pen-tracking techniques, a tracking pattern (usually a cross) with a substantial number of points is generated on the face of the CRT and the binary response of the pen to the individual points of the pattern is employed to calculate pen position.  The large number of pattern points, and the phosphor decay time associated with each, yield a typical tracking cycle of 500 to 1000 microseconds.  Since the cycle must be repeated about 100 times per second, 5 to 10 percent of display time is consumed.      To reduce the time required by the tracking operation, an analog technique employing a four-point tracking pattern is proposed in this study, in which the amplitude response of the pen to corresponding pairs of points is used to determine the position of the pen relative to the center of the pattern.  To study the method, one channel of the proposed two-channel analog tracking system was designed, constructed, and coupled to the horizontal channel of a high-speed computer display console.  To avoid the phosphor-decay limitation, an experimental "Beam" pen capable of detecting the electron beam rather than the phosphor luminescence is employed.  The system included a pattern generator, sample-and-hold gates, difference amplifier, envelope detector and noise filter, and a threshold-logic analog-to-digital converter.  The time required to generate the tracking pattern and develop the binary equivalent of the horizontal distance separating pen and pattern center is only 25 microseconds.  Tracking is generally satisfactory, but some anomalies were noted, apparently due to the characteristics of the experimental pen being used.      It is concluded that the analog technique is feasible for improving the speed of pen tracking, but recommended that further studies be made of the limitations inherent in the method.
</description>
<pubDate>Tue, 01 Mar 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149347</guid>
<dc:date>1966-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>MAP: A System for On-line Mathematical Analysis</title>
<link>https://hdl.handle.net/1721.1/149346</link>
<description>MAP: A System for On-line Mathematical Analysis
Kaplow, Roy; Strong, Stephen; Brackett, John
This manual describes a computer suitable for use on the time-sharing facility at the M.I.T. Computation Center or at Project MAC.  Designated for direct computer access through a remote console, the system replaces the normal procedures of programming with a question and answer interchange between the user (hereinafter called U) and the computer (hereinafter called C).  The system is intended for the solution of mathematical problems.  It should be usable by a person with no knowledge of computers or programming and little knowledge of numerical analysis.  Within its range of capabilities, it should be as efficient as are the normal means of computer access for the more sophisticated user.      The system establishes a "conversation" between U and C with an electric typewriter as the means of communication.  U can give information to C and can ask it certain questions.  C can answer those questions if it is given enough information.  C can also ask questions and can therefore request any missing information.  In addition, C can explain procedures to U in order to help the latter transmit the required information in a proper form.  U, therefore, only needs to know a few basic rules, such as how to phrase his questions and how to name and tabulate his data.
</description>
<pubDate>Sat, 01 Jan 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149346</guid>
<dc:date>1966-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Programming Semantics for Multiprogrammed Computations</title>
<link>https://hdl.handle.net/1721.1/149345</link>
<description>Programming Semantics for Multiprogrammed Computations
Dennis, Jack B.; Van Jhorn, Earl C.
The semantics are defined for a number of meta-instructions which perform operations essential to the writing of programs in multiprogrammed computer systems.  These meta-instructions relate to parallel procession, protection of separate computations, program debugging, and the sharing among users of memory segments and other computing objects, the names of which are hierarchically structured.  The language sophistication contemplated is midway between an assembly language and an advanced algebraic language.
</description>
<pubDate>Wed, 01 Dec 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149345</guid>
<dc:date>1965-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Priority Problem</title>
<link>https://hdl.handle.net/1721.1/149344</link>
<description>The Priority Problem
Greenberger, Martin
Priority decisions arise whenever limited facilities must be apportioned among competitive demands for service.  Broadly viewed, even the familiar first-come-first served discipline is a priority rule.  It favors the longest-waiting user, and guards against excessive delays.  Other priority rules, such as shortest-job-next, are keyed instead to considerations of operating efficiency.  Urgency of request is still another common consideration.  Since these considerations often conflict, the priority rule serves as mediator.  Use of a common cost measure can help effect this mediation, as results from recent job-shop simulations illustrate.      A priority operation of contemporary interest is scheduling a time-shared computer among its concurrent users.  Service requirements are not known in advance of execution.  To keep response times short for small requests, service intervals are partitioned and segments are served separately in round-robin fashion.  A mathematical analysis pinpoints the tradeoff between overhead and discrimination implicit in this procedure, and allows alternate strategies to be costed.  Extensions of the simple round-robin procedure are suggested, the objectives of time-sharing are reviewed, and implications are drawn for the design of future priority and pricing systems.
</description>
<pubDate>Mon, 01 Nov 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149344</guid>
<dc:date>1965-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>Queueing Models for File Memory Operation</title>
<link>https://hdl.handle.net/1721.1/149343</link>
<description>Queueing Models for File Memory Operation
Denning, Peter James
A model for the auxiliary memory function of a segmented, multiprocessor, time-shared computer system is set up.  A drum system in particular is discussed, although no loss of generality is implied by limiting the discussion to drums.  Particular attention is given to the queue of requests waiting for drum use.  It is shown that a shortest access time first queue discipline is the most efficient, with the access time being defined as the time required for the drum to be positioned, and is measured from the finish of service of the last request to the beginning of the data transfer for the present request.  A detailed study of the shortest access time queue is made, giving the minimum access time probability distribution, equations for the number in the queue, and equations for the wait in the queue.  Simulations were used to verify these equations; the results are discussed.  Finally, a general Markov Model for Queues is discussed in an Appendix.
</description>
<pubDate>Fri, 01 Oct 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149343</guid>
<dc:date>1965-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Calculaid: An On-line System for Algebraic Computation and Analysis</title>
<link>https://hdl.handle.net/1721.1/149342</link>
<description>Calculaid: An On-line System for Algebraic Computation and Analysis
Wantman, Mayer Elihu
OPS is an on-line system developed by M. Greenberger et al. at Project MAC.  The present work provides a powerful and simple way to perform numerical manipulations and calculations within OPS.  The program package is called CALCULAID.      A method of executing algebraic assignment statements, of which MAD and FORTRAN assignments are a subset, is provided.  When this assignment-statement ability is coupled with other features of the OPS system, such as unconditional transfers, general conditionals, and array and function declarations, most of the ability of a compiler language is provided.  Because the programs written in OPS are executed interpretively, OPS-3 programs can be changed and re-run immediately, without being compiled.      The other elements of CALCULAID are a program for creating multiple linear regression models, rank-ordering and counting data, and finding roots to polynomial equations in one unknown.      The applications of CALCULAID to the analysis of a round-robin scheduling model and to a process-control problem are discussed, and conclusions regarding the suitability of running computational programs in an interpretive mode are drawn.
</description>
<pubDate>Wed, 01 Sep 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149342</guid>
<dc:date>1965-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Heuristic Approach to Alternate Routing in a Job Shop</title>
<link>https://hdl.handle.net/1721.1/149341</link>
<description>A Heuristic Approach to Alternate Routing in a Job Shop
Russo, F.J.
The research reported here investigates the use of heuristics for selecting from several alternate routes resulting from partially ordered tasks in a job shop order file.  The experimental vehicle employed was digital simulation.      The concept of the "Alternate string" has been developed to generalize the existence of partially ordered operations.  That term is defined as a concatenation of operations that can be performed in any order, with the additional specification that all within the string can be attempted.  The presence of alternate strings with two or more member gives rise to the alternate routing problem, whose solution is approached by heuristic methods.      Choosing from among several alternate routes constitutes a three level decision problem.  At the lowest level, routes can be chosen when the order enters the shop.  This is equivalent to fixed routing.  At a higher level,  alternates can be selected at the time of transition from one work station to another.  The third decision level occurs at operation time, when one of the alternate operations is placed on a machine.  Heuristics were tested at the latter two levels.      There were two prior assertions that this thesis set out to prove.  The first was that alternate routing at the highest decision level would produce significant reductions in the mean tardiness of orders completed past their designated due dates, the improvement being both relative to fixed routing and to alternate routing heuristics implemented at lower decision levels.  Secondly, the contention was made that the improvement would be as such a magnitude that on-line, real-time systems become economically justifiable as a means of mitigating the attendant control problems caused by non-deterministic paths through the queuing network.      The methodology employed here was to conduct two passes of simulated shop runs.  The first, with two artificially high levels of alternate incidence, tested the efficiency of five different alternate routing heuristics in reducing mean tardiness.  The second pass consisted of runs with the best heuristic developed during the first experimental phase applied to a realistic length and frequency of alternate strings.      The results of the experiments strongly support the assertions made at the outset of the thesis.  The performance characteristics of the different heuristics are discussed at length.  In addition, some implications are drawn of the computational nature of alternate routing and the difficulties encountered in implementing alternate routing heuristics at operation time.
</description>
<pubDate>Tue, 01 Jun 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149341</guid>
<dc:date>1965-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Analysis of Time-Shared Computer Systems</title>
<link>https://hdl.handle.net/1721.1/149340</link>
<description>An Analysis of Time-Shared Computer Systems
Scherr, Allan Lee
Some of the aspects of the operation of time-shared, interactive computer systems are analyzed.  The emphasis is on the reaction of hardware systems to the demands that its users make upon it.  Simply shared systems and their users in order to be able to predict the performance of the two operating together.  Portions of this problem include the specification and measurement of user characteristics, the development and verification of both simulation and mathematical models for time-shared systems, and the specification and measurement of performance metrics for such systems.  The user and some of the performance measurements were made on Project MAC's "Compatible Time-Sharing System" (CTSS).      First, simulation models are used to study the effects of changing small details in the operation of CTS-like systems.  Then, a continuous-time Markov process model is derived to predict the performance of a broad class of systems.  Throughout, the CTSS data are used as a basis for comparison with model predictions.  In order to be able to take measurements and to build models, many definitions of commonly used time-shared system terminology are made precise.
</description>
<pubDate>Tue, 01 Jun 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149340</guid>
<dc:date>1965-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Time Sharing on a Multiconsole Computer</title>
<link>https://hdl.handle.net/1721.1/149339</link>
<description>Time Sharing on a Multiconsole Computer
Samuel, Arthur L.
After a brief historical review and a description of the three basic types for time-sharing systems, the general purpose time-sharing system as exemplified by the M.I.T. CTSS system is described in general terms, with particular attention to the way the system looks to the user.
</description>
<pubDate>Mon, 01 Mar 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149339</guid>
<dc:date>1965-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>CTSS Technical Notes</title>
<link>https://hdl.handle.net/1721.1/149338</link>
<description>CTSS Technical Notes
Saltzer, Jerome H.
This report is a technical description of the 7094 Compatible Time-Sharing System in use at Project MAC and the M.I.T. Computation Center.  It is designed to acquaint a system programmer with the techniques of construction which were used in this particular time-sharing system.  Separate chapters discuss the overall supervisor program flow: console message input and output: the scheduling and storage algorithms: and a thumbnail sketch is given of each of the subroutines which make up the supervisor program.      This report was prepared with the aid of the compatible time-sharing system and the TYPSET and RUNOFF  commands.
</description>
<pubDate>Mon, 01 Mar 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149338</guid>
<dc:date>1965-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Use of CTSS in a Teaching Environment</title>
<link>https://hdl.handle.net/1721.1/149337</link>
<description>Use of CTSS in a Teaching Environment
Roos, Daniel
Computer time-sharing offers many interesting possibilities for use in teaching computer technology.  It might be expected that with proper hardware and software, students using time-sharing as a teaching machine could acquire proficiency in the fundamentals of programming more easily than using batch-processing.  To test this hypothesis, the M.I.T. Department of Civil Engineering divided a freshman programming class so that half the students used batch-processing methods, and half used the Project MAC time-sharing system to do the same work.  This paper describes the experiment and its tentative results.
</description>
<pubDate>Sun, 01 Nov 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149337</guid>
<dc:date>1964-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>A New Methodology for Computer Simulation</title>
<link>https://hdl.handle.net/1721.1/149336</link>
<description>A New Methodology for Computer Simulation
Greenberger, Martin
Computer simulation is a cooperative venture between researcher and information processor, but the processor's role customarily begins too late.  The researcher can benefit substantially by bringing  the computer up into the earlier, creative phases of the simulation process.  An on-line computer system that makes this possible is described.
</description>
<pubDate>Thu, 01 Oct 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149336</guid>
<dc:date>1964-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>The MAC System: A Progress Report</title>
<link>https://hdl.handle.net/1721.1/149335</link>
<description>The MAC System: A Progress Report
Fano, Robert M.
The notion of machine-aided cognition implies an intimate collaboration between a human user and a computer in a real-time dialogue on the solution of a problem, in which the two parties contribute their best capabilities.  In order for this intimate collaboration to be possible, a computer system is needed that can serve simultaneously a large number of people, and that is easily accessible to them, both physically and intellectually.  The present MAC System is a first step toward this goal.  The purpose of this paper is to present a brief description of the current system, to report on the experience gained from its operation, and to indicate directions along which future developments are like to proceed.
</description>
<pubDate>Thu, 01 Oct 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149335</guid>
<dc:date>1964-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Program Structure in a Multi-access Computer</title>
<link>https://hdl.handle.net/1721.1/149334</link>
<description>Program Structure in a Multi-access Computer
Dennis, Jack B.
A multi-access computer (MAC) system consists of processing  units  and directly addressable main  memory  in which procedure information is interpreted as sequences of operations on data, a system of terminal  devices  through which users may communicate with procedures operating for them, and mass memory where procedures and data may be held when not required for immediate reference.  One fundamental attraction of the MAC concept is the increased productivity of "computer catalyzed research" that results from close man-machine interaction.  Another attraction is wealth of data and procedures that are accessible to a large user community through the file memory of a MAC system.  In this report thoughts are developed which form an adequate model of program structure.  These concepts have grown out of many discussions with colleges in Project MAC, and our experience to date in the design and operation of multi-access computer systems.
</description>
<pubDate>Fri, 01 May 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149334</guid>
<dc:date>1964-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>The OPS-1 Manual</title>
<link>https://hdl.handle.net/1721.1/149333</link>
<description>The OPS-1 Manual
Greenberger, Martin
The recent attainment and continuing development of personally accessible computer facilities have opened another chapter in the use of machines by man.  A number of current research efforts, including Project MAC at M.I.T., are designing new conceptual systems to adapt the emerging technology to a wide range of human activity.  Activities relating to management are the concern of a trial system at Project MAC called OPS-1.  The OPS-1 system and the experiment that launched it are described in this manual. {AD 604-681}
</description>
<pubDate>Fri, 01 May 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149333</guid>
<dc:date>1964-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>OPL-I An Open Ended Programming System Within CTSS</title>
<link>https://hdl.handle.net/1721.1/149332</link>
<description>OPL-I An Open Ended Programming System Within CTSS
Weizenbaum, Joseph
OPL-1, an incremental programming system presently operating with CTSS, permits the user to augment both his program and his data base during widely separated successive sessions at his terminal.  Facilities are provided which make it possible for the user to operate on his already established data base both by means of built-in operators and in terms of operators (functions) which the user has previously defined in the language of the system.  Underlying the system is a powerful list processing scheme embedded in FORTRAN (SLIP).  The machinery of this fundamental language drives the system and is also largely available to the user.  The data base generated by the user is therefore a set of list structures (trees), and most of the operators available to him are list processing  operators.  Data structures with considerably complex inter-relational properties may therefore be treated quite directly.
</description>
<pubDate>Wed, 01 Jan 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149332</guid>
<dc:date>1964-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Stress: A Problem-oriented Language for Structural Engineering</title>
<link>https://hdl.handle.net/1721.1/149331</link>
<description>Stress: A Problem-oriented Language for Structural Engineering
Biggs, John M.; Logcher, Robert D.
STRESS  is a general purpose programming system for the analysis of structures.  Compared to most other structural programs it has three distinguishing characteristics: (1)  The input language is that of the structural engineer which makes possible direct communication between the engineer and the machine; (2)  The system is capable of analyzing a wide variety of structural types and loading conditions thus permitting industrial use on a routine basis; and (3)  The design process is expedited by the fact that modifications of the original structure for alternate designs can be easily executed.  This last capability is most effective when STRESS  is used in the time-sharing mode.  These features combine to provide a system which not only reduces the effort required for structural analysis but, more significantly, enhances the designer's ability to evolve an efficient structure.
</description>
<pubDate>Fri, 01 Jul 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149331</guid>
<dc:date>1966-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>CARPS, A Program Which Solves Calculus Word Problems</title>
<link>https://hdl.handle.net/1721.1/149330</link>
<description>CARPS, A Program Which Solves Calculus Word Problems
Charniak, Eugene
</description>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149330</guid>
</item>
<item>
<title>Verbal and Graphical Language for the AED System: A Progress Report</title>
<link>https://hdl.handle.net/1721.1/149329</link>
<description>Verbal and Graphical Language for the AED System: A Progress Report
Ross, Douglas T.; Feldman, Clarence G.
For Computer-Aided Design, use of time-sharing a single language which can take either verbal or graphical form is required.  This paper describes how a single language processing technique, which is in turn a special application of more general concepts concerning the step-by-step growth and processing of large structures of interrelated elements, can efficiently process both language forms in the same manner.  Illustrations of the concepts involved are also drawn from the methods used in the AED-O Compiler, an efficient ALGOL-60-based compiler used in Computer-Aided Design work, which is available as a public command in the Project MAC CTSS.
</description>
<pubDate>Fri, 01 May 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149329</guid>
<dc:date>1964-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>System Requirements for Multiple  -Access, Time-shared Computers</title>
<link>https://hdl.handle.net/1721.1/149328</link>
<description>System Requirements for Multiple  -Access, Time-shared Computers
Corbató, Fernando J.
It is now clear that it is possible to create a general-purpose time-shared multiple access system on most contemporary computers.  However, it is equally clear that none of the existent computers are well designed for multiple access systems.  At present, good service to a few dozen simultaneous users is considered state-of-the-art.      Discussions include: clocks, memory protection and supervisor mode, program relocation and common subroutines which expose the reader to the difficulties encountered with contemporary machines when multiple user multiple-processor systems are considered.
</description>
<pubDate>Fri, 01 May 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149328</guid>
<dc:date>1964-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>SIR: A Computer Program for Semantic Information Retrieval</title>
<link>https://hdl.handle.net/1721.1/149327</link>
<description>SIR: A Computer Program for Semantic Information Retrieval
Raphael, Bertram
SIR  is a computer system, programmed in the LISP language, which accepts information and answers questions expressed in a restricted form of English.  This system demonstrates what can reasonably be called an ability to "understand" semantic information.  SIR's  semantic and deductive ability is based on the construction of an internal model, which uses word associations and property lists, for the relational information normally conveyed in conversational statements.      A format-matching procedure extracts semantic content from English sentences.  If an input sentence is declarative, the system adds appropriate information to the model.  If an input sentence is a question, the system searches the model until it either finds the answer or determines why it cannot find the answer.  In all cases SIR  reports its conclusions.  The system has some capacity to recognize exceptions to general rules, resolve certain semantic ambiguities, and modify its model structure in order to save computer memory space.      Judging from its conversational ability, SIR  is more "intelligent" than any existing question-answering system.  The author describes how this ability was developed and how the basic features of SIR  compare with those of other systems.       The working system, SIR , is a first step toward intelligent machine communication.  The author proposes a next step by describing how to construct a more general system which is less complex and yet more powerful than SIR .  This proposed system contains a generalized version of the SIR  model, a formal logical system called SIR1 , and a computer program for testing the truth of SIR1  statements with respect to the generalized model by using partial proof procedures in the predicate calculus.  The thesis also describes the formal properties of SIR1  and how they relate to the logical structure of SIR .
</description>
<pubDate>Mon, 01 Jun 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149327</guid>
<dc:date>1964-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Natural Language Input for a Computer Problem Solving System</title>
<link>https://hdl.handle.net/1721.1/149326</link>
<description>Natural Language Input for a Computer Problem Solving System
Bobrow, Daniel .G
The STUDENT  problem solving system, programmed in LISP, accepts as input a comfortable but restricted subset of English which can express a wide variety of algebra story problems.  STUDENT  finds the solution to a large class of these problems.  STUDENT  can utilize a store of global information not specific to any one problem, and may make assumptions about the interpretation of ambiguities in the wording of the problem being solved.  If it uses such information, or makes any assumptions, STUDENT communicates this fact to the user.       The thesis includes a summary of other English language question-answering systems.  All these systems, and STUDENT are evaluated according to four standard criteria.      The linguistic analysis in STUDENT  is a first approximation to the analytic portion of a semantic theory of discourse outlined in the thesis.  STUDENT  finds the set of kernel sentences which are the base of the input discourse, and transforms this sequence of kernel sentences into a set of simultaneous equations which form the semantic base of the Student  system.  STUDENT  then tries to solve this set of equations for the values of requested unknowns.  If it is successful it gives the answers in English.  If not, STUDENT  asks the user for more information, and indicates the nature of the desired information.  The STUDENT  system is a first step toward natural language communication with computers.  Further work on the semantic theory proposed should result in much more sophisticated systems.
</description>
<pubDate>Tue, 01 Sep 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149326</guid>
<dc:date>1964-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Improved Bounds on the Costs of Optimal and Balanced Binary Search Trees</title>
<link>https://hdl.handle.net/1721.1/148897</link>
<description>Improved Bounds on the Costs of Optimal and Balanced Binary Search Trees
Bayer, Paul J.
A binary search tree can be used to store data in a computer system for retrieval by name. Different elements in the tree may be referenced with different probabilities. If we define the cost of the tree as the average number of elements which must be examined in searching for an element, then different trees have different costs. We show that two particular types of trees, weight balanced trees and min-max trees, which are easily constructed from the probability distribution on the elements, are close to optimal. Specifically, we show that for any probability distribution with entropy H, H-log2H-(log2e-1)&lt;=Copt&lt;= Cwb ,+ H+2/Cmm,+H+2 where Copt, Cwb, and Cmm are the optimal, weigh balances, and min-max costs. We gain some added insight by deriving an expression for the expected value of the entropy of a random probability distribution.
</description>
<pubDate>Sat, 01 Nov 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148897</guid>
<dc:date>1975-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>Steam-oriented Computation in Recursive Data Flow Schemas</title>
<link>https://hdl.handle.net/1721.1/148896</link>
<description>Steam-oriented Computation in Recursive Data Flow Schemas
Weng, Kung-Song
In this thesis we present a parallel programming language based on a parallel computation model known as data flow schemas. Syntactically, the language resembles programming languages such as Algol 60, but does not have GOTO's, WHILE-loops, and non-local variables. The attractiveness of this approach lies in the inherently determinate nature of data flow schemas and the possiblity of formalizing the semantics of the language within the formalism suggested by Scott and Strachey. The language provides programming features for stream-oriented computation and intercommunicating systems. We introduce the notions of proper initialization and termination of such systems. A subclass of determinate systems in which these properties can be easily checked is defined and a translation into recursive data flow schemas is given.
</description>
<pubDate>Wed, 01 Oct 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148896</guid>
<dc:date>1975-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Computational Complexity of the Word Problem for Commutative Semigroups</title>
<link>https://hdl.handle.net/1721.1/148895</link>
<description>Computational Complexity of the Word Problem for Commutative Semigroups
Cardoza, Edward W.
We analyze the computational complexity of some decision problems for commutative semigroups in terms of time and space on a Turing machine. The main result we present is that any decision procedure for the word problemm for commutative semigroups requires storage space at least proportional to n/logn on a multitape Turing machine. This implies that the word problem is polynomia space hard (and in particular that it is at least NP-hard). We comment on the close relation of commutative semigroups to vector addition systems and Petri nets. We also show that the lower bound of space n/logn can be extended to certain other natural algorithmic problems for commutative semigroups. Finally we show that for several other algorithmic problems for commutative semigroups there exist polynomial time algorithms.
</description>
<pubDate>Wed, 01 Oct 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148895</guid>
<dc:date>1975-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Formal Properties of Well-formed Data Flow Schemas</title>
<link>https://hdl.handle.net/1721.1/148894</link>
<description>Formal Properties of Well-formed Data Flow Schemas
Leung, Clement Kin Cho
This thesis presents some results in comparative schematology and some undecidability results for two models of computer programs: the class of flowchart schemas and the class of well-formed data flow schemas (wfdfs's). Algorithms are given for translating a schema in each class into an equivalent schema in the other class. The propertiees of freedom, _-freedom, openness, and completeness are defined and studied. For every path P in a free flowchart schema S, there exists an interpretation under which the flow of controls through S is along P. _-freedom is a generalization of freedom and captures the notion of freedom for wfdfs's. An open schema is one in which no basic component is redundant and a complete schema contains no subschema which, whenever enabled, does not terminate. A comparison of the expressive power of subclasses of flowchart schemas and wfdfs's possessing various combinations of these properties is made. It is shown that the class of free flowchart schemas properly contains the classes of free and _-free wfdfs's , and that the class of open and complete flowchart schemas is equivalent in expressive power to the class of open and complete wfdfs's. Three undecidabilty results for open and complete program schemas are established: openness is undecidable for complete program schemas, completeness is undecidable for open program schemas, and equivalence is undecidable for open and complete program schemas.
</description>
<pubDate>Sun, 01 Jun 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148894</guid>
<dc:date>1975-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Complexity of Negotion-limited Networks: A Brief Survery</title>
<link>https://hdl.handle.net/1721.1/148893</link>
<description>The Complexity of Negotion-limited Networks: A Brief Survery
Fischer, Michael J.
</description>
<pubDate>Sun, 01 Jun 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148893</guid>
<dc:date>1975-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Finding Isomorph Classes for Combinatorial Structures</title>
<link>https://hdl.handle.net/1721.1/148892</link>
<description>Finding Isomorph Classes for Combinatorial Structures
Weiss, Randell B.
A common problem in combinatorial analysis is finding isomorph classes of combinatorial objects. This process is sometimes known as isomorph rejection. In graph theory, it is used to count labelled and unlabelled graphs with certain properties. In chemistry, it is used to count the number of structures with the same chemical formula. In computer science it is used in counting arguments in proofs in complexity theory. In coding theory, it is used to partition sets of vectors into easy to handle sets. This thesis presents three different algorithms for solving this type of problem and compares their timing and memory use. Some examples are given of how to apply the algorithms to graph theory and coding theory.
</description>
<pubDate>Sun, 01 Jun 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148892</guid>
<dc:date>1975-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Asynchronous Logic Array</title>
<link>https://hdl.handle.net/1721.1/148890</link>
<description>An Asynchronous Logic Array
Patil, Suhas S.
A new asynchronous logic array for the general synthesis of asynchronous digital circuits is presented. The parallel and asynchronous nature of the array gives the realized systems the speed and characteristics of hardwired circuits even though they are implemented in a uniform diode array with appropriate terminating circuits. The logic array is particularly suited for implementing control structures and should help extend the field of micro-control to asynchronous and parallel computers.
</description>
<pubDate>Thu, 01 May 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148890</guid>
<dc:date>1975-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>First Version of a Data Flow Procedure Language</title>
<link>https://hdl.handle.net/1721.1/148889</link>
<description>First Version of a Data Flow Procedure Language
Dennis, Jack B.
A language for representing computational procedures based on the concept of data flow is presented in terms of a semantic model that permits concurrent execution of noninterfering program parts. Procedures in the language operate on elementary and structured values, and always define functional transformations of values. The language is equivalent in expressive power to a block structured language with internal procedure variables and is a generalization of pure Lisp. The language is being used as a model for study of fundamental semantic constructs for programming, as a target language for evaluating translatability of programs expressed as the user-language level, and as a guide for research in advanced computer architecture.
</description>
<pubDate>Thu, 01 May 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148889</guid>
<dc:date>1975-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>CAMAC: Group Manipulation System</title>
<link>https://hdl.handle.net/1721.1/148888</link>
<description>CAMAC: Group Manipulation System
Weiss, Randell B.
CAMAC is a collection of group manipulation progams with an easy to use interface. With groups defined by either generating permutations or generators and relations the system can find coset tables, normalizers, centralizers, stabilizers, orbits, conjugacy classes, and isomorph classes of combinatorial objects, etc.
</description>
<pubDate>Sat, 01 Mar 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148888</guid>
<dc:date>1975-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Decision Problems for Petri Nets and Vector Addition Systems</title>
<link>https://hdl.handle.net/1721.1/148887</link>
<description>Decision Problems for Petri Nets and Vector Addition Systems
Hack, Michael
Petri Nets, Generalized Petri Nets, and Vector Addition Systems can represent each other and thus have common decideability problems. The graphical appeal of Petri Nets is used in a new presentation of the classical problems of boundedness (decidable) and inclusion (undecidable). Various forms of the Reachability Problem are shown to be recursively equivalent to the Liveness Problem for Petri Nets. The decideability of these questions is still open, and some arguments both for and against the decidability of Liveness are presented.
</description>
<pubDate>Sat, 01 Mar 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148887</guid>
<dc:date>1975-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Decidability of Equivalence for a Class of Data Flow Schemas</title>
<link>https://hdl.handle.net/1721.1/148886</link>
<description>Decidability of Equivalence for a Class of Data Flow Schemas
Qualitz, Joseph E.
In this paper we examine a class of computation schemas and consider the problem of deciding when pairs of elements in this class represent equivalent programs. We are able to show that equivalence is decidable for a non-trivial class of unary operator data flow schemas, and consider the applicability of this result to the problem of deciding equivalence in related models of computation. The model described below is a restricted version of the data flow schema described by Dennie and Fosseen in [1]. The reader is referred to that source for a more complete discussion of the properties of data flow schemas.
</description>
<pubDate>Sat, 01 Mar 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148886</guid>
<dc:date>1975-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>On Bateson's Logical Levels of Learning Theory</title>
<link>https://hdl.handle.net/1721.1/148885</link>
<description>On Bateson's Logical Levels of Learning Theory
Levin, Michael
</description>
<pubDate>Sat, 01 Feb 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148885</guid>
<dc:date>1975-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>Research on Experts Systems</title>
<link>https://hdl.handle.net/1721.1/148884</link>
<description>Research on Experts Systems
Gorry, G. Anthony
</description>
<pubDate>Sun, 01 Dec 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148884</guid>
<dc:date>1974-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Class of Boolean Functions with Linear Combinatorial Complexity</title>
<link>https://hdl.handle.net/1721.1/148883</link>
<description>A Class of Boolean Functions with Linear Combinatorial Complexity
Hsieh, W. N.; Harper, L.H.; Savage, J.E.
In this paper we investigate the combinatorial complexity of Boolean functions satisfying a certain property, P^nk,m. A function of n variable has the P^nk,m property if there are at least m functions obtainable from each way of restricting it to a subset of n-l variables. We show that the complexity of P^n3,5 function is no less than 7n-4/6, and this bound cannot be much improved. Further, we find that for each k, there are p^k,2^k functions with complexity linear in n.
</description>
<pubDate>Tue, 01 Oct 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148883</guid>
<dc:date>1974-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Inherent Computational Complexity of Theories of Ordered Sets: A Brief Survery</title>
<link>https://hdl.handle.net/1721.1/148882</link>
<description>The Inherent Computational Complexity of Theories of Ordered Sets: A Brief Survery
Meyer, Albert R.
</description>
<pubDate>Tue, 01 Oct 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148882</guid>
<dc:date>1974-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>MDC-Programmer: A Muddle-to-datalanguage Translator for Information Retrieval</title>
<link>https://hdl.handle.net/1721.1/148881</link>
<description>MDC-Programmer: A Muddle-to-datalanguage Translator for Information Retrieval
Bengelloun, Safwan A.
This memo describes a practical application within the framework of the ARPA computer network of the philosophy that a fully developed computer network should appear as a virtual extensino of the user's own software environment. The application involves the design and implementation of a software facility that will permit users at MIT's Dynamic Modeling System to consider the retrieval component of the Datacomputer (developed and run by the Computer Corporation of America) as an extension of the Muddle environment. This facility generates efficient Datalanguage retrieval code, handles inter-process control of the Datacomputer, and manages all the necessary network connections.
</description>
<pubDate>Tue, 01 Oct 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148881</guid>
<dc:date>1974-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Computing in Logarithmic Space</title>
<link>https://hdl.handle.net/1721.1/148880</link>
<description>Computing in Logarithmic Space
Lind, John C.
The set logspace, of logarithmic space computable string functions is defined. It is easily seen that logspace ≤ polytime, the set of polynomial time computable functions. ogspace is shown to equal L, the smallest class of recursive string functions containing concatenation and the equality function, and closed under explicit transformation, substitution of a function for a variable and two restricted types of recursion on notation. The first is called recursion of concatenation and only allows top level concetenation of the value of the recursive call. The second, called log bounded recursion on notation, will only define string functions whose length is bounded by 0(log n) on arguments of length n. Some additional closure properties of logspace are also described.
</description>
<pubDate>Sun, 01 Sep 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148880</guid>
<dc:date>1974-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Investigation of Current Language Support for the Data Requirements of Structured Programming</title>
<link>https://hdl.handle.net/1721.1/148879</link>
<description>An Investigation of Current Language Support for the Data Requirements of Structured Programming
Aiello, Jack M.
Structured programming is a new method for constructing reliable programs. Structured programming relies upon a systematic technique of top-down development which involves the refinement of both control structures and data structures. With possibly some limitations and extensions, existing languages can support control structure refinement. On the other hand, it is the belief of many that the representation of data structure refinement cannot be satified by present-day languages. Before accepting this view, it is wise to explore its validity. Therefore this thesis will investigate whether existing languages with possibly slight modifications are adequate for supporting the data requirements of structured programming.
</description>
<pubDate>Sun, 01 Sep 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148879</guid>
<dc:date>1974-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Enciphering Module for Multics</title>
<link>https://hdl.handle.net/1721.1/148878</link>
<description>An Enciphering Module for Multics
Benedict, G. Gordon
Recently IBM Corporation has declassified an algorithm for encryption usable for computer-to-computer or computer-to-terminal communications. Their algorithm was implemented in a hardware device called Lucifer. A software implementation of Lucifer for Multics is described. A proof of the algorithm's reversibility for deciphering is provided. A special hand-coded (assembly language) version of Lucifer is described whose goal is to attain performance as close as possible to that of the hardward device. Performance measurements of this program are given. Questions addressed are: How complex is it to implement an algorithm in software designed primarily for digital hardware? Can such a program perform well enough for use in the I/O system of a large time-sharing system?
</description>
<pubDate>Mon, 01 Jul 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148878</guid>
<dc:date>1974-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>Complete Classification of (24,12) and (22,11) Self-dual Codes</title>
<link>https://hdl.handle.net/1721.1/148877</link>
<description>Complete Classification of (24,12) and (22,11) Self-dual Codes
Pless, Vera; Sloane, N.J.A.
A complete classification is given of all [22, 11] and [24, 12] self-dual codes. For each code we give the order of its group, the number of codes equivalent to it, and its weight distribution. There is a unique [24, 12, 6] self-dual code. Several theorems on the enumeration of self-orthogonal codes are used, including forumlas for the number of such codes with minimum distance ≥ 4, and for the sum of the weight enumerators of all self-dual codes.
</description>
<pubDate>Sat, 01 Jun 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148877</guid>
<dc:date>1974-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Reduction Method for Establishing Lower Bounds on the Number of Additions</title>
<link>https://hdl.handle.net/1721.1/148876</link>
<description>The Reduction Method for Establishing Lower Bounds on the Number of Additions
Kedem, Zvi M.
A method for establishing lower bounds on the number of multiplications and divisions has been developed by Pan, Winograd and Strassen. A similar method is developed for establishing lower bounds on the number of additions and subtractions. The results obtained partially overlap those of Belaga, Winograd and Kirkpatrick.
</description>
<pubDate>Sat, 01 Jun 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148876</guid>
<dc:date>1974-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Combining Dimensionality and Rate of Growth Arguments for Establishing Lower Bounds on Number of Multiplications</title>
<link>https://hdl.handle.net/1721.1/148875</link>
<description>Combining Dimensionality and Rate of Growth Arguments for Establishing Lower Bounds on Number of Multiplications
Kedem, Zvi M.
In this paper we describe a new method for establishing lower bounds for the number of multiplications and divisions required to compute rational functions. We shall start by reminding the reader of some standard notations.
</description>
<pubDate>Sat, 01 Jun 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148875</guid>
<dc:date>1974-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Fast On-line Integer Multiplication</title>
<link>https://hdl.handle.net/1721.1/148874</link>
<description>Fast On-line Integer Multiplication
Fischer, Michael J.; Stockmeyer, Larry J.
A Turing machine multiplies binary integers on-line if it receives its inputs low-order digits first and produces the jth digit of the product before reading in the (j+l)st digits of the two inputs. We present a general method for converting any off-line multiplication algorithm which forms the product of two n-digit binary numbers in time F(n) into an on-line method which uses time only O(F(n) log n ), assuming that F is monotone and satisfies n F(n) F(2n)/2 ! kF(n) for some constant k.
</description>
<pubDate>Wed, 01 May 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148874</guid>
<dc:date>1974-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Symmetry Codes and Their Invariant Subcodes</title>
<link>https://hdl.handle.net/1721.1/148873</link>
<description>Symmetry Codes and Their Invariant Subcodes
Pless, Vera
We define and study the invariant subcodes of the symmetry codes in order to be able to determine the algebraic properties of these codes. An infinite family of self-orthogonal rate 1/2 codes over GF (3), called symmetry codes, were constructed in [3].
</description>
<pubDate>Fri, 01 Feb 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148873</guid>
<dc:date>1974-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>Super-exponential Complexity of Presburger Arithmetic</title>
<link>https://hdl.handle.net/1721.1/148872</link>
<description>Super-exponential Complexity of Presburger Arithmetic
Fischer, Michael J.; Rabin, Michael O.
Lower bounds are established on the computational complexity of the decision problem and on the inherent lengths of proofs for two classical decidable theories of logic: the first order theory of the real numbers under addition, and Presburger arithmetic -- the first order theory of addition on the natural numbers. There is a fixed constant c &gt; 0 such that for every (non-deterministic) decision procedure for determining the truth of sentences of real addition and for all sufficiently large n, there is a sentence  of length n for which the decision procedure runs for more than 2 cn steps.
</description>
<pubDate>Fri, 01 Feb 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148872</guid>
<dc:date>1974-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>On the Complexity of the Theories of Weak Direct Products</title>
<link>https://hdl.handle.net/1721.1/148871</link>
<description>On the Complexity of the Theories of Weak Direct Products
Rackoff, Charles
Let N be the set of nonnegative integers and let &lt; N ,+&gt; be the weak direct product of &lt; N,+&gt; with itself. Mostowski[ 9 ] shows that the theory of &lt; N ,*&gt; is decidable, but his decision procedure isn't elementary recursive. We present here a more efficient procedure which operates   within space 2 2 . As corollaries we obtain the same upper bound for the theory of finite abelian groups, the theory of finitely generated abelian groups, and the theory of the structure &lt; N ,' &gt; of positive ...
</description>
<pubDate>Tue, 01 Jan 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148871</guid>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>String-matching and Other Products</title>
<link>https://hdl.handle.net/1721.1/148870</link>
<description>String-matching and Other Products
Fischer, Michael J.; Paterson, Michael S.
The string-matching problem considered here is to find all occurrences of a given pattern as a substring of another longer string. When the pattern is simply a given string of symbols, there is an algorithm due to Morris, Knuth and Pratt which has a  running time proportional to the total  length of the pattern and long string together. This time may be achieved even on a Turing machine. The more difficult  case where either string may have "don't care" symbols which are deemed to match with all symbols is also considered. By exploiting the formal similarity of string-matching with integer multiplication, a new algorithm has been obtained with a running time which is only slightly worse than linear.
</description>
<pubDate>Tue, 01 Jan 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148870</guid>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Improved Overlap Argument for On-line Multiplication</title>
<link>https://hdl.handle.net/1721.1/148869</link>
<description>An Improved Overlap Argument for On-line Multiplication
Paterson, Michael S.; Fischer, Michael J.; Meyer, Albert R.
A lower bound of cN1ogN is proved for the mean time complexity of an on-line multitape Turing machine performing the multiplication of N-digit binary integers. For a more general class of machines the corresponding bound is  cN1ogN. These bounds compare favorably with know upper bounds of the form cN(1ogN) k, and for some classes the upper and lower bounds coincide. The proofs are based on the "overlap" argument due to Cook and Aanderaa.
</description>
<pubDate>Tue, 01 Jan 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148869</guid>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Discrete Computation: Theory and Open Problems</title>
<link>https://hdl.handle.net/1721.1/148868</link>
<description>Discrete Computation: Theory and Open Problems
Meyer, Albert R.
Complexity  1. Borodin, A. Computational Complexity: Theory and Practice, in Currents in the Theory of Computing, A. Aho, ed., Prentice-Hall, Englewood Cliff, N.J., 1973,pp.32-89.
</description>
<pubDate>Tue, 01 Jan 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148868</guid>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Weak Monadic Second Order Theory of Successor is not Element-recurive</title>
<link>https://hdl.handle.net/1721.1/148867</link>
<description>Weak Monadic Second Order Theory of Successor is not Element-recurive
Meyer, Albert R.
Let L SIS be the set of formulas expressible in a week monadic second order logic using only the predicates [x =y+1] and [x E z]. Bucci and Elgot [3,4] have shown that the truth of sentences in L SIS (under the standard interpretation &lt; N, successor &gt; with second order variables interpreted as ranging over finite sets) is decidable. We refer to the true sentences in L SIS as WSIS. We shall prove that WSIS is not elementary-recursive in the sense of Kalmar. In fact, we claim a stronger result:
</description>
<pubDate>Sat, 01 Dec 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148867</guid>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>Real-time Simulation of Multidimensional Turing Machines by Storage Modification Machines</title>
<link>https://hdl.handle.net/1721.1/148866</link>
<description>Real-time Simulation of Multidimensional Turing Machines by Storage Modification Machines
Schönage, A.
In [1] the author introduced a new machine model, now called the Storage Modification Machine (SMM). It was claimed, but not proved, that SMM's can simulate all sorts of Turing machines-- those with multidimensional worktapes in particular -- in real time.
</description>
<pubDate>Sat, 01 Dec 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148866</guid>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>A User's Guide to the Macro Control Language</title>
<link>https://hdl.handle.net/1721.1/148865</link>
<description>A User's Guide to the Macro Control Language
Geiger, Steven P.
</description>
<pubDate>Sat, 01 Dec 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148865</guid>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Interactive Implementation of the ToddCoxeter Algorithm</title>
<link>https://hdl.handle.net/1721.1/148864</link>
<description>An Interactive Implementation of the ToddCoxeter Algorithm
Bonneau, Richard  J.
The Todd-Coxeter algorithm provides a systematic approach to the enumeration of cosets of a finitely presented group.  This memo describes an interactive implementation  of algorithm, including a manual on its use, examples, and methods of accessing the program. Applications of this algorithm are also discussed.
</description>
<pubDate>Sat, 01 Dec 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148864</guid>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>Polynomial Exponentiation: The Fast Fourier Transform Revisited</title>
<link>https://hdl.handle.net/1721.1/148863</link>
<description>Polynomial Exponentiation: The Fast Fourier Transform Revisited
Bonneau, Richard J.
</description>
<pubDate>Fri, 01 Jun 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148863</guid>
<dc:date>1973-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Decision Procedure for the First Order Theory of Real Addition with Order</title>
<link>https://hdl.handle.net/1721.1/148862</link>
<description>A Decision Procedure for the First Order Theory of Real Addition with Order
Ferrante, Jeanne; Rackoff, Charles
Consider the first order theory of the real numbers with the predicates + (plus) and &lt; (less than). Let S be the set of true sentences. We first present an elimination of quantifiers decision procedure for S, and then analyse it to show that it takes at most time 2^2^cn, c a constant, to decide sentences of length n. Looking more closely at this procedure, we arrive at a second procedure by showing that a given sentence doesn't change in truth value when each of the quantifiers is limited to range over an appropriately chosen finite set of rationals. This fact leads to a decision procedure for S which takes space2^cn. We also remark that our methods lead to a decision procedure for Presburger arithmetic which operates in space 2^2^cn. These upper bounds should be compared with the results of Fischer and Rabin (Proceedings of AMS Symp. on Complexity of Real Computation Processes, to appear) that for some constant c, tim 2^cn for real addition, and time 2^2^cn for Presburger arithmetic, is required to decide some sentences of length n for infitely many n.
</description>
<pubDate>Tue, 01 May 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148862</guid>
<dc:date>1973-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Operator Embedding Theorem for Complexity Classes of Recursive Functions</title>
<link>https://hdl.handle.net/1721.1/148861</link>
<description>An Operator Embedding Theorem for Complexity Classes of Recursive Functions
Moll, Robert
Let F (t) be the set of functions computable by some machine using no more than t(x) machine steps on all but finitely many arguments x. If we order the - classes under set inclusion as t varies over the recursive functions, then it is natural to ask how rich a structure is obtained. We show that this structure is very rich indeed. If R is any countable partial order and F is any total effective operator, then we show that there is a recursively enumerable sequence of...
</description>
<pubDate>Tue, 01 May 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148861</guid>
<dc:date>1973-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Class of Finite Computations Structures Supporting the Fast Fourier Transform</title>
<link>https://hdl.handle.net/1721.1/148860</link>
<description>A Class of Finite Computations Structures Supporting the Fast Fourier Transform
Bonneau, Richard J.
The Fast Fourier Transform (FFT) and modular arithmetic are two distinct techniques which recently have been employed to increase the efficiency of numerous algorithms in the area of symbolic and algebraic manipulation.
</description>
<pubDate>Thu, 01 Mar 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148860</guid>
<dc:date>1973-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>SIM360: A S/360 Simulator</title>
<link>https://hdl.handle.net/1721.1/148859</link>
<description>SIM360: A S/360 Simulator
McCray, Wm. Arthur
Modern, large-scale computer systems typically operate under the control of an operating system or executive program, and reserve for the exclusive use of the operating system a set of privileged instructions, which the normal users may not issue. This very necessary arrangement produces a problem of equipment availability for those who wish to develop or investigate operating systems programs, because such programs cannot be run as normal user jobs under an executive program. This thesis describes SIM360, a detailed simulator of the representative IBM S/360 computer, which was written to run student programs, programs assigned as machine problems for a course in operating systems. The simulator allows programs to issue all of the priveleged instructions of the S/360, and thus provides a readily available tool for the study of operating systems programs.
</description>
<pubDate>Mon, 01 May 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148859</guid>
<dc:date>1972-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Emptiness Problem for Automata on Infinite Trees</title>
<link>https://hdl.handle.net/1721.1/148858</link>
<description>The Emptiness Problem for Automata on Infinite Trees
Hossley, Robert; Rackoff, Charles
The purpose of this paper is to give an alternative proof to the decidability of the emptiness problem for tree automata, as shown in Rabin [4]. The proof reduces the emptiness problem for automata on infinite trees to that for automata on finite trees, by showing that any automata definable set of infinite trees must contain a finitely-genarable trees.
</description>
<pubDate>Thu, 01 Jun 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148858</guid>
<dc:date>1972-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Construction Heuristics for Geometry and a Vector Algebra Representation of Geometry</title>
<link>https://hdl.handle.net/1721.1/148857</link>
<description>Construction Heuristics for Geometry and a Vector Algebra Representation of Geometry
Wong, Richard
Heuristics for generating constructions to help solve high school geometry problems are given. Many examples of the use of these heuristics are given. A method of translating geometry problems into vector algebra problems is discussed. The solution of these vector algebra geometry problems is analyzed. The use of algebraic constructions to help solve these vector problems is also discussed.
</description>
<pubDate>Thu, 01 Jun 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148857</guid>
<dc:date>1972-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Economy of Descriptions and Minimal Indices</title>
<link>https://hdl.handle.net/1721.1/148856</link>
<description>Economy of Descriptions and Minimal Indices
Bagchi, Amitava
</description>
<pubDate>Sat, 01 Jan 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148856</guid>
<dc:date>1972-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Helping People Think</title>
<link>https://hdl.handle.net/1721.1/148855</link>
<description>Helping People Think
Goldstein, Robert C.
Everyone, today, is familiar with the use of machines to ease physical burdens. Since the dawn of civilization, man's progress in gaining control over his environment has been largely determined by the power and sophistication of the machines that he has been able to command. Furthermore, since simple machines can be used to construct more complicated ones, this process, once begun, tends to advance at an accelerating rate.
</description>
<pubDate>Thu, 01 Apr 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148855</guid>
<dc:date>1971-04-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Macaims Data Management System</title>
<link>https://hdl.handle.net/1721.1/148854</link>
<description>The Macaims Data Management System
Goldstein, Robert C.; Strnad, Alois J.
MacAIMS (MAC Advanced Interactive Management System) is a relatively small research project that was initiated in the summer of 1968 to investigate the feasibility of using some of the then existing computer facilities at M.I.T. to aid in the management of Project MAC. Several interesting and useful interactive programs were developed and are currently in use.
</description>
<pubDate>Thu, 01 Apr 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148854</guid>
<dc:date>1971-04-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Relational Approach to the Management of Data Bases</title>
<link>https://hdl.handle.net/1721.1/148853</link>
<description>The Relational Approach to the Management of Data Bases
Strnad, Alois J.
The ultimate goal of Project MacAIMS (MAC Advanced Interactive Management System) is to build a computer facility which will be able to support non-trivial decision making processes. (See reference 4). In the early stages of our experiments we discovered that traditional approaches to the management of data bases do not satisfy our needs. We have determined the following requirements for the management of Large Data Bases (LDB) in a dynamically varying  environment such as an interactive Management  Information System.
</description>
<pubDate>Thu, 01 Apr 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148853</guid>
<dc:date>1971-04-01T00:00:00Z</dc:date>
</item>
<item>
<title>Transmission of Information Between a Man-machine Decision System and its Environment</title>
<link>https://hdl.handle.net/1721.1/148852</link>
<description>Transmission of Information Between a Man-machine Decision System and its Environment
Wells, Douglas M.
</description>
<pubDate>Thu, 01 Apr 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148852</guid>
<dc:date>1971-04-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Substantive Use of Computers for Intellectual Activities</title>
<link>https://hdl.handle.net/1721.1/148851</link>
<description>The Substantive Use of Computers for Intellectual Activities
Goldstein, Robert C.
</description>
<pubDate>Thu, 01 Apr 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148851</guid>
<dc:date>1971-04-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Computer Model of Simple Forms of Learning</title>
<link>https://hdl.handle.net/1721.1/148850</link>
<description>A Computer Model of Simple Forms of Learning
Jones, Thomas L.
</description>
<pubDate>Fri, 01 Jan 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148850</guid>
<dc:date>1971-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>A New List-tracing Algorithm</title>
<link>https://hdl.handle.net/1721.1/148849</link>
<description>A New List-tracing Algorithm
Fenichel, Robert R.
List-processing systems have each allowed use of only a  single size and configuration of list cell. This paper describes a system which allows use of arbitrarily many different sizes and configurations of list cell, possibly not specified until run time.
</description>
<pubDate>Thu, 01 Oct 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148849</guid>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Automatic Code-generation from an Object-machine Description</title>
<link>https://hdl.handle.net/1721.1/148848</link>
<description>Automatic Code-generation from an Object-machine Description
Miller, Perry L.
This memo outlines the basic elements of a macro code-generating system, and develops an informal machine-independent model of a code generator. Then the memo discusses how an implementation of this model could be set up to generate code for a particular machine from machine-dependent information given in descriptive form.
</description>
<pubDate>Thu, 01 Oct 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148848</guid>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Complexity Measures for Programming Languages</title>
<link>https://hdl.handle.net/1721.1/148847</link>
<description>Complexity Measures for Programming Languages
Goodman, Leonard I.
A theory of complexity is developed for algorithms implemented in typical programming languages. The complexity of a measuring a specific type of complexity is a complexity measure -- some function of the amount of a particular resource used by a program in processing an input. Typical resources would be execution time, core, I/O devices, and channels
</description>
<pubDate>Wed, 01 Sep 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148847</guid>
<dc:date>1971-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Pseudo-random Sequences</title>
<link>https://hdl.handle.net/1721.1/148846</link>
<description>Pseudo-random Sequences
Bruere-Dawson, Gerard
The purpose of this paper is to study some notions of randomnes for infinite sequences of 0's and 1's.
</description>
<pubDate>Thu, 01 Oct 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148846</guid>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Expansion of the Data Structuring Capabilities of PAL</title>
<link>https://hdl.handle.net/1721.1/148845</link>
<description>An Expansion of the Data Structuring Capabilities of PAL
Zilles, Stephen N.
</description>
<pubDate>Thu, 01 Oct 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148845</guid>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Suspension of Processes in a Multiprocessing Computer System</title>
<link>https://hdl.handle.net/1721.1/148844</link>
<description>Suspension of Processes in a Multiprocessing Computer System
Vogt, Carla M.
</description>
<pubDate>Tue, 01 Sep 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148844</guid>
<dc:date>1970-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Use of High Level Languages for Sytems Programming</title>
<link>https://hdl.handle.net/1721.1/148843</link>
<description>Use of High Level Languages for Sytems Programming
Graham, Robert M.
(This paper is a slightly edited version of a transcript so that it still contains the colloquial flavor of the oral presentation.)  I'm going to talk about languages for systems programming what they can do for us, and what we might expect from them in the future. These comments are largely based on my experience with the Multics System and I'll quote a few figures from Multics as we go along. I'm concerned particularly with large complex system.
</description>
<pubDate>Tue, 01 Sep 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148843</guid>
<dc:date>1970-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>File Management and Related Topics, June 12, 1970</title>
<link>https://hdl.handle.net/1721.1/148842</link>
<description>File Management and Related Topics, June 12, 1970
Graham, Robert M.
The subject of these notes is file management. We will develop the problems of file management within the environment of a large information and computing service, often called a computer utility or general purpose time-sharing system. We do this for two reasons. First, this environment imposes the most severe constraints. Other environments are obtained by relaxing these constraints. Secondly, large information and computing services will become more prevalent in the years to come.   Let us first look briefly at those objectives of an information and computing service which are significant to this discussion.
</description>
<pubDate>Tue, 01 Sep 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148842</guid>
<dc:date>1970-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Description and Flow Chart of the PDP-7/9 Communications Package</title>
<link>https://hdl.handle.net/1721.1/148841</link>
<description>Description and Flow Chart of the PDP-7/9 Communications Package
Ward, Philip W.
The PDP-7/9 Communications Package was written to provide data transfers between the buffer controller (PDP-7 or PDP-9) of an ESL Display Console and a host computer via a 50-kilobit serial Dataphone link. Initially, only one of the displays  (with a PDP-9 buffer controller) was to be operated remotely over q 50-kilobit line, and the only feasible access to the 7094 CTSS host computer was via the PDP-7 buffer controller of the other display, which is directly connected to CTSS channel D. For this connection, the PDP-7 could be looked upon as the "host" for the PDP-9, although it merely served as a message-handling intermediary for the real host, the 7094
</description>
<pubDate>Wed, 01 Jul 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148841</guid>
<dc:date>1970-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>Interactive Design Coordination for the Building Industry</title>
<link>https://hdl.handle.net/1721.1/148840</link>
<description>Interactive Design Coordination for the Building Industry
Jackson, James N.
The problem of effective communication in the process of building design and construction is widely recognized. The involvement of several design disciplines combined with the tendency for designers to work in distinct offices results in little capacity for them to investigate the influence of their design decisions on other design areas.  One of the responses to the need for effective Interaction in the use of computers for design project is the supersytem concept proposed for ICES, the Integrated Civil Engineering System. The supersystem is defined as the cooperative effort on the part of the designers of several problem oriented computer capabilities to implement project capabilities by allowing each of their problem oriented subsystem to reference a single file of project data. The supersystem would allow design interaction by having each of the problem oriented computer subsystem reference a single file of information specifying the project.   Future work in the application of computers to interactive and project oriented design in the building industry will have to concentrate on the file structure to be used in the Implementation of a computer building design supersystem.
</description>
<pubDate>Mon, 01 Jun 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/148840</guid>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>CARPS: A Program which Solves Calculus Word Problems</title>
<link>https://hdl.handle.net/1721.1/6901</link>
<description>CARPS: A Program which Solves Calculus Word Problems
Charniak, Eugene
A program was written to solve calculus word  problems. The program, CARPS (CALculus  Rate Problem Solver), is restricted to rate  problems. The overall plan of the program is  similar to Bobrow's STUDENT, the primary  difference being the introduction of  "structures" as the internal model in CARPS.  Structures are stored internally as trees. Each  structure is designed to hold the information  gathered about one object. A description of  CARPS is given by working through two  problems, one in great detail. Also included is  a critical analysis of STUDENT.
</description>
<pubDate>Mon, 01 Jul 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/6901</guid>
<dc:date>1968-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Modern Differential Geometric Approach to Shape from Shading</title>
<link>https://hdl.handle.net/1721.1/6826</link>
<description>A Modern Differential Geometric Approach to Shape from Shading
Saxberg, Bror V. H.
How the visual system extracts shape  information from a single grey-level image  can be approached by examining how the  information about shape is contained in the  image. This technical report considers the  characteristic equations derived by Horn as a  dynamical system. Certain image critical  points generate dynamical system critical  points. The stable and unstable manifolds of  these critical points correspond to convex and  concave solution surfaces, giving more  general existence and uniqueness results. A  new kind of highly parallel, robust shape from  shading algorithm is suggested on  neighborhoods of these critical points. The  information at bounding contours in the image  is also analyzed.
</description>
<pubDate>Thu, 01 Jun 1989 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/6826</guid>
<dc:date>1989-06-01T00:00:00Z</dc:date>
</item>
</channel>
</rss>
