<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>MAC Technical Reports (1963 - 1974)</title>
<link>https://hdl.handle.net/1721.1/150457</link>
<description/>
<pubDate>Sat, 11 Apr 2026 05:25:28 GMT</pubDate>
<dc:date>2026-04-11T05:25:28Z</dc:date>
<item>
<title>Decidability Questions for Petri Nets</title>
<link>https://hdl.handle.net/1721.1/149455</link>
<description>Decidability Questions for Petri Nets
Hack, Michel Henri Théodore
An understanding of the mathematical properties of Petri Nets is essential when one wishes to use Petri Nets as an abstract model for concurrent systems.  The decidability of various problems which arise in this context is an important aspect of this question. The fact that these problems also arise in the context of other mathematical theories, such as commutative, closure under linear relations,  Matrix Context-Free grammars, or Weak Counter Automata, provides further motivation.
</description>
<pubDate>Tue, 01 Jun 1976 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149455</guid>
<dc:date>1976-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Petri Net Language</title>
<link>https://hdl.handle.net/1721.1/149453</link>
<description>Petri Net Language
Hack, Michel Henri Théodore
In a labeled Petri Net we assign symbols from an alphabet to some or all the transitions of a Petri Net.  To each firing sequence of such a Labeled Petri Net corresponds to a string over the alphabet.  We study the languages obtained in this way by all firing sequences of a Petri Net, or by all firing sequences which reach a given final marking.
</description>
<pubDate>Mon, 01 Mar 1976 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149453</guid>
<dc:date>1976-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Some Data Base Applications of Constraint Expressions</title>
<link>https://hdl.handle.net/1721.1/149452</link>
<description>Some Data Base Applications of Constraint Expressions
Grossman, Richard Weaver
This report presents a novel network-like representation for information, called "constraint expressions" (CE).  CE makes use of some of the knowledge-representation techniques developed by Artificial Intelligence research.
</description>
<pubDate>Sun, 01 Feb 1976 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149452</guid>
<dc:date>1976-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Preliminary Study in Computer-aided Legal Analysis</title>
<link>https://hdl.handle.net/1721.1/149451</link>
<description>A Preliminary Study in Computer-aided Legal Analysis
Meldman, Jeffrey A.
This paper describes the prototype for a computer system that can perform a simple kind of legal analysis.  The system user, who is presumed to be a lawyer, describes to the system a hypothetical set of facts.  The system determines the extent to which these facts fall within certain legal doctrines (by syllogism), or near to these doctrines  (by analogy).
</description>
<pubDate>Sat, 01 Nov 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149451</guid>
<dc:date>1975-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>Minimizing the Naming Facilities Requiring Protection in a Computing Utility</title>
<link>https://hdl.handle.net/1721.1/149450</link>
<description>Minimizing the Naming Facilities Requiring Protection in a Computing Utility
Bratt, Richard Glenn
This thesis examines the various mechanisms for naming the information objects stored in a general-purpose computing utility, and isolates a basic set of naming facilities that must be protected to assure complete control over user interaction and that allow desired interactions among users to occur in a natural way. Minimizing the protected naming facilities consistent with functional objective of controlled, but natural, user interaction contribute to defining a security kernel for a general-purpose computing utility.
</description>
<pubDate>Mon, 01 Sep 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149450</guid>
<dc:date>1975-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Mechanization of Temporal Knowledge</title>
<link>https://hdl.handle.net/1721.1/149449</link>
<description>Mechanization of Temporal Knowledge
Kahn, Kenneth M.
The design and implementation of a collection of computer programs knowledgeable about time "in general," called the time specialist, is described.  The thesis that this time specialist can be placed in the service of larger more general problem solvers is demonstrated for two examples, medical diagnosis and the understanding of a time-travel story.
</description>
<pubDate>Mon, 01 Sep 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149449</guid>
<dc:date>1975-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Strategy Selection in Medical Diagnosis</title>
<link>https://hdl.handle.net/1721.1/149447</link>
<description>Strategy Selection in Medical Diagnosis
Miller, Peter B.
The recorded, verbal problem-solving behavior of doctors performing the diagnostic task of taking a present illness was analyzed in this research.  The goal of the analysis was to discover that data-acquisition strategies were used by the doctors to accomplish the task. A model called the strategy frame model was created to describe the strategies that were found and to provide a mechanism for the selection of a strategy.
</description>
<pubDate>Mon, 01 Sep 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149447</guid>
<dc:date>1975-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Equivalence Problems for Monadic Schemas</title>
<link>https://hdl.handle.net/1721.1/149446</link>
<description>Equivalence Problems for Monadic Schemas
Qualitz, Joseph E.
A class of monadic program schemas is defined.  This class, called iteration schemas, consists of schemas whose programs comprise assignment statements, conditional statements, and iteration statements.  These schemas are shown to correspond to program schemas which are structured, and are shown to be strictly less "powerful" than monadic program schemas.
</description>
<pubDate>Sun, 01 Jun 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149446</guid>
<dc:date>1975-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Automatic Test, Configuration and Repair of Cellular Arrays</title>
<link>https://hdl.handle.net/1721.1/149445</link>
<description>Automatic Test, Configuration and Repair of Cellular Arrays
Manning, Frank B.
A cellular array is an iterative array of identical information processing machines, cells.  The arrays discussed are rectangular arrays of programmable logic, in which information stored in a working cell tells the cell how to behave.  No signal line connects more than a few cells. A loading mechanism in each cell allows a computer directly connected to one cell to load any good cell that is not walled off by flawed cells.
</description>
<pubDate>Sun, 01 Jun 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149445</guid>
<dc:date>1975-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Portable Compiler for the Language C</title>
<link>https://hdl.handle.net/1721.1/149444</link>
<description>A Portable Compiler for the Language C
Snyder, Alan
This paper describes the implementation of a compiler for the language C.  The compiler has been designed to be able to be capable of producing assembly-language code for most register-oriented machines with only minor recoding.
</description>
<pubDate>Thu, 01 May 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149444</guid>
<dc:date>1975-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Program Restructuring for Virtual Memory Systems</title>
<link>https://hdl.handle.net/1721.1/149443</link>
<description>Program Restructuring for Virtual Memory Systems
Johnson, Jerry William
The problem area addressed in this report is program restructuring, a method of reordering the relocatable sectors of a program in its address space to increase the locality of the programs reference behavior, thereby reducing the number of page fetches require for execution in a virtual memory system.
</description>
<pubDate>Sat, 01 Mar 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149443</guid>
<dc:date>1975-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Formalization and Correctness Proof of the CGOL Language System</title>
<link>https://hdl.handle.net/1721.1/149442</link>
<description>A Formalization and Correctness Proof of the CGOL Language System
VanDeVanter, Michael Lee
In many important ways the design and implementation of programming languages are hindered rather than helped by BNF.  We present an alternative meta-language based on the work of Pratt which retains much of the effective power of BNF but is more convenient for designer, implementer, and user alike. Its amenability to formal treatment is demonstrated by a rigorous correctness proof of a simple implementation.
</description>
<pubDate>Sat, 01 Mar 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149442</guid>
<dc:date>1975-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Computational Complexity of Some Logical Theories</title>
<link>https://hdl.handle.net/1721.1/149441</link>
<description>The Computational Complexity of Some Logical Theories
Rackoff, Charles Weill
Upper and lower bounds on the inherent computational complexity of the decision problem for a number of logical theories are established.  A general form of Ehrenfeucht game technique for deciding theories is developed which involves analyzing the expressive power of formulas with given quantifier depth. The method allows one to decide the truth of sentences by limiting quantifiers to range over finite sets.
</description>
<pubDate>Sat, 01 Feb 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149441</guid>
<dc:date>1975-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Digitalis Therapy Advisory</title>
<link>https://hdl.handle.net/1721.1/149440</link>
<description>A Digitalis Therapy Advisory
Silverman, Howard
The physician administering digitalis makes use of the full richness of the clinical setting to form his/her impressions and decide on a therapeutic program.  The weakness of existing programs which formulate digitalis dosage regimens lies in their inability to use all of the clinical data available-both quantitative. and qualitative. This report describes the construction of a computer system which formulates digitalis dosage regimens and which adjusts this regimen by interpreting the patient's response to the original dosage regimen.
</description>
<pubDate>Wed, 01 Jan 1975 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149440</guid>
<dc:date>1975-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Some Problems in German in English Machine Translation</title>
<link>https://hdl.handle.net/1721.1/149439</link>
<description>Some Problems in German in English Machine Translation
Brown, Gretchen P.
This paper discusses some problems in the machine translation of natural language, in particular, for translation from German into English.  An implementation of some parts of the translating process has been built.  The system consists of a German interpretive grammar, to take in German text and output a set of semantic representation, and a generator, to produce English sentences from single semantic representations.
</description>
<pubDate>Sun, 01 Dec 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149439</guid>
<dc:date>1974-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>Naming and Protection in Extendable Operating Systems</title>
<link>https://hdl.handle.net/1721.1/149438</link>
<description>Naming and Protection in Extendable Operating Systems
Redell, David D.
The properties of capability-based extendible operating systems are described, and various aspects of such systems are discussed, with emphasis on the conflict between free distribution of access privileges and later revocation of those privileges.
</description>
<pubDate>Fri, 01 Nov 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149438</guid>
<dc:date>1974-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>Nondeterministic Time and Space Complexity Classes</title>
<link>https://hdl.handle.net/1721.1/149437</link>
<description>Nondeterministic Time and Space Complexity Classes
Seiferas, Joel Irvin
The marginal utility of the Turing machine computational resources running time and storage space are studied.  A technique is developed which, unlike diagonalization, applies equally well to nondeterministic and deterministic automata.  For f, g time or space bounding functions with f (n+1) small compared to g(n), it is shown that, in terms of word length n, there are languages which are accepted by Turing machines operating within time or space g(n) but which are accepted by no Turing machine operating within time or space f(n). The proof involves use of the recursion theorem together with "padding" or "translational" techniques of formal language theory.
</description>
<pubDate>Sun, 01 Sep 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149437</guid>
<dc:date>1974-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Functional Domains of Applicative Languages</title>
<link>https://hdl.handle.net/1721.1/149436</link>
<description>Functional Domains of Applicative Languages
Ward, Stephen A.
The expressive power of a particular applicative language may be characterized by the set of abstract functions directly representable in that language. The common FUNARG and applicative order problems are scrutinized in this way, and the effects of these weaknesses are related to the inexpressibility of classes of functions.
</description>
<pubDate>Sun, 01 Sep 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149436</guid>
<dc:date>1974-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Semantics of Data Structures and References</title>
<link>https://hdl.handle.net/1721.1/149435</link>
<description>Semantics of Data Structures and References
Ellis, David J.
Each programming language that handles data structures has its own set of rules for working with them.  Notions such as assignment and construction of structures values appear in a huge number of different and complicated versions.  This thesis presents a methodology which provides a common basis for describing ways in which programming languages deal with  data structures and reference to them.
</description>
<pubDate>Thu, 01 Aug 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149435</guid>
<dc:date>1974-08-01T00:00:00Z</dc:date>
</item>
<item>
<title>Removing the Dynamic Linker from the Security Kernel of a Computing Utility</title>
<link>https://hdl.handle.net/1721.1/149434</link>
<description>Removing the Dynamic Linker from the Security Kernel of a Computing Utility
Jason, Philippe Arnaud
In order to enforce the security of the information stored in a computing utility, it is necessary to certify that the protection mechanism is correctly implemented so that there exist no uncontrolled access path to the stored information.
</description>
<pubDate>Sat, 01 Jun 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149434</guid>
<dc:date>1974-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Mathematical Logic for Computer Scientists</title>
<link>https://hdl.handle.net/1721.1/149433</link>
<description>Mathematical Logic for Computer Scientists
Levin, Michael
This book is an introductory course in mathematical logic covering basic topics in quantification theory and recursive function theory, and is intended for the reader who is interested in artificial intelligence, computer linguistics, and other related areas. The text is theoretical, but organized with implementation in mind.
</description>
<pubDate>Sat, 01 Jun 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149433</guid>
<dc:date>1974-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Using Interactive Graphics in Simulating the Hospital Emergency Room</title>
<link>https://hdl.handle.net/1721.1/149432</link>
<description>Using Interactive Graphics in Simulating the Hospital Emergency Room
Weissberg, Richard W.
The hospital emergency room is a complex system having many interrelated factors contributing to its operation.  The emergency room administrator has limited control over certain of these factors: numbers of beds, nurses, doctors, x-ray units; for example. Other factors such as patient arrival rates and demands made upon available resources are largely uncontrollable.
</description>
<pubDate>Wed, 01 May 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149432</guid>
<dc:date>1974-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Computer Utility as a Marketplace for Computer Service</title>
<link>https://hdl.handle.net/1721.1/149431</link>
<description>The Computer Utility as a Marketplace for Computer Service
Frankston, Robert Mm.
Computers are unique in their ability to be programmed for a wide variety of applications.  This is in contrast with hardware dedicated to specific tasks such as the telephone system.  Because of its flexibility, a computer system can support, concurrently, many diverse services that do not require dedicated hardware.
</description>
<pubDate>Wed, 01 May 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149431</guid>
<dc:date>1974-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Experimental Analysis of Program Reference Patterns in the Multics Virtual Memory</title>
<link>https://hdl.handle.net/1721.1/149430</link>
<description>An Experimental Analysis of Program Reference Patterns in the Multics Virtual Memory
Greenberg, Bernard Stewart
This thesis reports the design, conducting, and results of an experiment intended to measure the paging rate of a virtual memory computer system as a function of paging memory size.  This experiment, conducted on the Multics computer system at MIT, a large interactive computer utility serving an academic community, sought to predict paging rates for paging memory sizes larger than existing memory at the time.
</description>
<pubDate>Wed, 01 May 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149430</guid>
<dc:date>1974-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Model-debugging System</title>
<link>https://hdl.handle.net/1721.1/149429</link>
<description>A Model-debugging System
Mark, William S.
</description>
<pubDate>Tue, 01 Jan 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149429</guid>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Verification of Programs Operating on Structured Data</title>
<link>https://hdl.handle.net/1721.1/149428</link>
<description>Verification of Programs Operating on Structured Data
Laventhal, Mark Steven
The major method for verifying the correctness of computer program is the inductive assertion approach.  This approach has been limited in the past by the lack of techniques for handling data structures.  In particular, there has been a need for concepts with which to describe structured data during intermediate and final stages of a computation.
</description>
<pubDate>Fri, 01 Mar 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149428</guid>
<dc:date>1974-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Introduction to Multics</title>
<link>https://hdl.handle.net/1721.1/149427</link>
<description>Introduction to Multics
Saltzer, Jerome H.
The Multics project was begun in 1964 by the Computer Systems Research group of M.I.T. Project MAC.  The goal was to create a prototype of a computer utility.  In 1965, the project became a cooperative venture of M.I.T. Project MAC, the General Electric Company Computer Department (now Honeywell Information Systems Inc. ) and Bell Telephone  Laboratories. In 1969, at the end of the research phase of the project, Bell Telephone Laboratories ended its active involvement.
</description>
<pubDate>Fri, 01 Feb 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149427</guid>
<dc:date>1974-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>On Lower Bounds for Selection Problems</title>
<link>https://hdl.handle.net/1721.1/149426</link>
<description>On Lower Bounds for Selection Problems
Yao, Foong Frances
Let V i (n) be the minimum number of binary comparisons that are required to determine the i-th largest of n elements drawn from a totally ordered set.  In this thesis we use adversary strategies to prove lower bounds on V i (n).  For i = 3, our lower bounds determine V 3(n) precisely for infinitely many values of n,and determine V 3(n) to within 2 for all n.
</description>
<pubDate>Fri, 01 Mar 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149426</guid>
<dc:date>1974-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Analysis of Asynchronous Concurrent Systems by Timed Petri Nets</title>
<link>https://hdl.handle.net/1721.1/149425</link>
<description>Analysis of Asynchronous Concurrent Systems by Timed Petri Nets
Ramchandani, Chander
This thesis is concerned with the modeling and performance analysis of systems which consist of concurrently acting components, an example of which is an asynchronous pipelined processor.  The work is divided into two parts.  In the first part, a suitable model is developed for describing the structure of asynchronous concurrent systems. In conventional automata theory, the finite-state machine model is used to describe the behavior of systems; the problem with this is that a large number of states results when practical systems are modelled.
</description>
<pubDate>Fri, 01 Feb 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149425</guid>
<dc:date>1974-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Abstract Model of a Research Institute: Simple Automatic Programming Approach</title>
<link>https://hdl.handle.net/1721.1/149424</link>
<description>An Abstract Model of a Research Institute: Simple Automatic Programming Approach
Briabrin, Victor
A problem of knowledge representation is considered in terms of designing a model for a simple sociological structure.  A version of the access language is proposed which is based on three kind of expressions accepted by the system - constructors, specificators and requests. In addition, some topics concerned with model implementation and extension are discussed.
</description>
<pubDate>Fri, 01 Mar 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149424</guid>
<dc:date>1974-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Input/Output Architecture for Virtual Memory Computer Systems</title>
<link>https://hdl.handle.net/1721.1/149423</link>
<description>An Input/Output Architecture for Virtual Memory Computer Systems
Clark, David D
In many large systems today, input/output is not performed directly by the user, but is done interpretively by the system for him, which causes additional overhead and also restricts the user to whatever algorithms the system has implemented.  Many causes contribute to this involvement of the system in user input/output, including the need to enforce protection requirements, the inability to provide adequate response to control signals from devices, and the difficulty of running devices in a virtual environment, especially a virtual memory.
</description>
<pubDate>Tue, 01 Jan 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149423</guid>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Backup and Recovery of On-line Information in a Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149422</link>
<description>Backup and Recovery of On-line Information in a Computer Utility
Stern, Jerry A.
This thesis describes a design for an automatic backup mechanism to be incorporated in a computer utility for the protection of on-line information against accidental or malicious destruction.  This protection is achieved by preserving on magnetic tape recent copies of all items of information known to the online system. In the event of a system failure, file system damage is automatically assessed and missing information is recovered from backup storage.
</description>
<pubDate>Tue, 01 Jan 1974 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149422</guid>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>On Reducibility Among Combinatorial Problems</title>
<link>https://hdl.handle.net/1721.1/149420</link>
<description>On Reducibility Among Combinatorial Problems
Herrmann, Paul Peter
A large class of combinatorial problems have been shown by Cook and Karp to be computationally equivalent to within a polynomial.  We exhibit some new problems in this class, and provide simpler proofs for some of the known reductions.
</description>
<pubDate>Sat, 01 Dec 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149420</guid>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>Productivity in Parallel Computational Schemata</title>
<link>https://hdl.handle.net/1721.1/149419</link>
<description>Productivity in Parallel Computational Schemata
Linderman, John P.
A general model for parallel computation is developed in three parts.  One part, the data flow graph, describes how actors which transform and test values are connected to the locations in a finite memory.  Another part, an interpretation, supplies information about the contents of memory and the detailed nature of the transformations and tests.
</description>
<pubDate>Sat, 01 Dec 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149419</guid>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>Complexity Classes of Recursive Functions</title>
<link>https://hdl.handle.net/1721.1/149418</link>
<description>Complexity Classes of Recursive Functions
Moll, Robert
An honest function is one whose size honestly reflects its computation time.  In 1969 Meyer and McCreight proved the "honesty theorem," which says that for every t, the t-computable functions are the same as the t'computable functions for some honest honest t'.
</description>
<pubDate>Fri, 01 Jun 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149418</guid>
<dc:date>1973-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Emptiness and Complementation Problems for Automata on Infinite Trees</title>
<link>https://hdl.handle.net/1721.1/149416</link>
<description>The Emptiness and Complementation Problems for Automata on Infinite Trees
Rackoff, Charles Weill
In [6] Rabin defines Automata on Infinite Trees, and the body of that paper is concerned with proving two theorems about these automata.  The result we consider in the first chapter says that there exists an effective procedure to determine, given an automaton on infinite trees, whether or not it accepts anything at all. We present a new decision procedure which is much simpler than Rabin's since we do not use an induction argument as he does.
</description>
<pubDate>Mon, 01 Jan 1973 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149416</guid>
<dc:date>1973-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Analysis of Sorting Networks</title>
<link>https://hdl.handle.net/1721.1/149415</link>
<description>An Analysis of Sorting Networks
Smith, Burton J.
Comparators which sort two numbers can be interconnected to form networks which sort n numbers for any n.  The input and output characteristics of comparator networks are analyzed from several different points of view.
</description>
<pubDate>Sun, 01 Oct 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149415</guid>
<dc:date>1972-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Cooperation of Mutually Suspicious Subsystems in a Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149414</link>
<description>Cooperation of Mutually Suspicious Subsystems in a Computer Utility
Schroeder, Michael D.
This thesis describes practical protection mechanisms that allow mutually suspicious subsystems to cooperate in a single computation and still be protected from one another.  The mechanisms are based on the division of a computation into independent domains of access privilege, each of which may encapsulate a protected subsystem. The central component of the mechanisms is a hardware processor that automatically enforces the access constraints associated with a multidomain computation implemented as a single execution point in a segmented virtual memory.
</description>
<pubDate>Fri, 01 Sep 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149414</guid>
<dc:date>1972-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Finite Tree Automata and W-Automata</title>
<link>https://hdl.handle.net/1721.1/149413</link>
<description>Finite Tree Automata and W-Automata
Hossley, Robert
Chapter I is a survey of finite automata as acceptors of finite labeled trees.  Chapter II is a survey of finite automata as acceptors of infinite strings on a finite alphabet.  Among the automata models considered in Chapter II are those used by McNaughton, Buchi, and Landweber. In Chapter II we also consider several new automata models based on a notion of a run of a finite automataton on  an infinite string suggested by Professor A.R. Meyer in private communication. We show that these new models are all equivalent to various previously formulated models.
</description>
<pubDate>Fri, 01 Sep 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149413</guid>
<dc:date>1972-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Relativization of the Theory of Computational Complexity</title>
<link>https://hdl.handle.net/1721.1/149410</link>
<description>Relativization of the Theory of Computational Complexity
Lynch, Nancy A.
Blum's machine-independent treatment of the complexity of partial recursive functions is extended to relative algorithms (as represented by Turing machines with oracles).  We prove relativizations of several results of Blum complexity theory, such as the compression theorem. A recursive relatedness theorem is proved, showing that any two relative complexity measures are related by fixed recursive function. This theorem allows us to obtain proofs of results  for all measures from proofs for a particular measure.
</description>
<pubDate>Thu, 01 Jun 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149410</guid>
<dc:date>1972-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Complexity of Finite Functions</title>
<link>https://hdl.handle.net/1721.1/149409</link>
<description>The Complexity of Finite Functions
Vilfan, Bostjan
Lower bounds on the length of formulas for finite functions are obtained from a generalization of a theorem  of Specker.  Let f: (0,1,...,d-1)    [0,1,...,d-1] be a function which can be represented by a formula of length  &lt; c.n. For any m, if n is sufficiently large, there is a restriction f': {0,1,...,d-1}m  &gt; {0,...,d-1} of f which, is representable by special class of formulas called homogeneous e-complexes.
</description>
<pubDate>Wed, 01 Mar 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149409</guid>
<dc:date>1972-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Autonomous, Synchronous Counters Constructed Only of J-K Flip-flops</title>
<link>https://hdl.handle.net/1721.1/149408</link>
<description>Autonomous, Synchronous Counters Constructed Only of J-K Flip-flops
Manning, Frank
This report describes research into some properties of autonomous, synchronous counters constructed with only the simplest form of J-K Flip-Flop.  The research revolved around a system with a special-purpose digital machine and a general-purpose computer. The special-purpose searched through all the possible counters constructed of five or fewer J-K Flip-Flops for all counters with a period equal to that specified by th input to the system.
</description>
<pubDate>Mon, 01 May 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149408</guid>
<dc:date>1972-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Essays in Algebraic Simplification</title>
<link>https://hdl.handle.net/1721.1/149407</link>
<description>Essays in Algebraic Simplification
Fateman, Richard J.
This thesis consists of essays on several aspects of the problem of algebraic simplification by computer.  Since simplification is at the core of most algebraic manipulations, efficient and effective simplification procedures are essential to building useful computer systems for non-numerical mathematics. Efficiency is attained through carefully designed and engineered algorithms, heuristics,and data types, while effectiveness is assured through theoretical considerations.
</description>
<pubDate>Sat, 01 Apr 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149407</guid>
<dc:date>1972-04-01T00:00:00Z</dc:date>
</item>
<item>
<title>Analysis of Production Schemata by Petri Nets</title>
<link>https://hdl.handle.net/1721.1/149406</link>
<description>Analysis of Production Schemata by Petri Nets
Hack, Michel Henri Théodore
Petri nets provide a powerful graphical tool for representing and analyzing complex concurrent systems.  Properties such as hang-up freeness, determinacy, conflict, concurrency and dependency, can be represented and studied.  The precise relationship between structural and behavioral properties, and between local and global properties is not well-understood for the most general class of Petri Nets.
</description>
<pubDate>Tue, 01 Feb 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149406</guid>
<dc:date>1972-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>Induction in Proofs about Programs</title>
<link>https://hdl.handle.net/1721.1/149405</link>
<description>Induction in Proofs about Programs
Greif, Irene Gloria
Four methods for proving equivalence of programs by induction are described and compared.  They are recursion induction, structural induction, mu-rule induction, and truncation induction.  McCarthy's formalism for conditional expressions as function definitions is used and reinterpreted in view of Park's work on results on results in lattice theory as related to proofs about programs. The possible application of this work to automatic program verification is commented upon.
</description>
<pubDate>Tue, 01 Feb 1972 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149405</guid>
<dc:date>1972-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>Evaluation of Definite Integrals by Symbolic Manipulation</title>
<link>https://hdl.handle.net/1721.1/149404</link>
<description>Evaluation of Definite Integrals by Symbolic Manipulation
Wang, Paul S.
A heuristic computer program for the evaluation of real definite integrals of elementary functions is described.  This program, called WANDERER (WANg's DEfinite integRal EvaluatoR), evaluates many proper and improper integrals.  The improper integrals may have a finite or infinite range of integration. Evaluation by contour integration and residue theory is among the methods used. A program called DELIMITER (DEfinitive LIMITEvaluatoR) is used for the limit computations needed in evaluating some definite integrals.
</description>
<pubDate>Wed, 01 Sep 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149404</guid>
<dc:date>1971-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Cost Analysis of Debugging Systems</title>
<link>https://hdl.handle.net/1721.1/149403</link>
<description>Cost Analysis of Debugging Systems
Lester, Bruce P.
A general method is presented for performing cost analysis of interactive debugging systems.  The method is based on an abstract model of program execution.  This model is derived from the interpreter used in the Vienna method of semantic definition of PL/I. A brief discussion of the overall operation and significance of Vienna interpreter is included.
</description>
<pubDate>Wed, 01 Sep 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149403</guid>
<dc:date>1971-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Primary Access Control in Large-scale Time-shared Decision Systems</title>
<link>https://hdl.handle.net/1721.1/149402</link>
<description>Primary Access Control in Large-scale Time-shared Decision Systems
Owens, Richard C., Jr.
The computer differs from other tools in that it presently does not provide its users with a working environment transparent to their desires; in particular, current computer systems do not support adequate mechanisms for controlled sharing of sensitive information. Four primary dimensions of the access control problem are identified.  They are: 1) the physical level at which to apply control; 2) the fineness of distinction applied to the term ""access"" 3) the meaning of the term "user identification",and 4) the degree of sophistication employed in automatically assigned restrictions to new data files.
</description>
<pubDate>Thu, 01 Jul 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149402</guid>
<dc:date>1971-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>Bounds on Information Retrieval Efficiency in Static File Structures</title>
<link>https://hdl.handle.net/1721.1/149401</link>
<description>Bounds on Information Retrieval Efficiency in Static File Structures
Welch, Terry A.
This research addresses the problem of file organization for efficient information retrieval when each file item may be accessed through any one of a large number of identification keys.  The emphasis is on library problems, namely large, low-update, directory-oriented files, but other types of files are discussed.
</description>
<pubDate>Tue, 01 Jun 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149401</guid>
<dc:date>1971-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Dynamic Reconfiguration in a Modular Computer System</title>
<link>https://hdl.handle.net/1721.1/149400</link>
<description>Dynamic Reconfiguration in a Modular Computer System
Schell, Roger R.
This thesis presents an orderly design approach for dynamically changing the configuration of constituent physical units in a modular computer system.  Dynamic reconfiguration contributes to high system availability by allowing preventative maintenance, development of new operating systems, and changes in system capacity on a non-interference basis.
</description>
<pubDate>Tue, 01 Jun 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149400</guid>
<dc:date>1971-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Automatic Creation of a Code Generator from a Machine Description</title>
<link>https://hdl.handle.net/1721.1/149399</link>
<description>Automatic Creation of a Code Generator from a Machine Description
Miller, Perry L.
This paper studies some of the problems involved in attaining machine independence for a code generator, similar to the language independence and the token independence attained by automatic parsing and automatic lexical systems.  In particular, the paper examines the logic involved in two areas of code generation: computation and data reference.
</description>
<pubDate>Sat, 01 May 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149399</guid>
<dc:date>1971-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Computer Analysis of Visual Properties of Curved Objects</title>
<link>https://hdl.handle.net/1721.1/149398</link>
<description>Computer Analysis of Visual Properties of Curved Objects
Krakauer, Lawrence J.
A  method is presented for the visual analysis of objects by computer.  It is particularly well suited for opaque objects with smoothly curved surfaces.  The method extracts information about the object's surface properties, including measures of its specularity, texture, and regularity. It also aids in determining the object's shape.
</description>
<pubDate>Sat, 01 May 1971 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149398</guid>
<dc:date>1971-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Design Strategies for File Systems</title>
<link>https://hdl.handle.net/1721.1/149395</link>
<description>Design Strategies for File Systems
Madnick, S.E.
This thesis describes a methodology for the analysis and synthesis of modern general purpose file systems.  The two basic concepts developed are (1) establishment of a uniform representation of a file's structure in the form of virtual memory or segmentation and (2) determination of a hierarchy of logical transformations within a file system.
</description>
<pubDate>Thu, 01 Oct 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149395</guid>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Complexity Measures for Language Recognition by Canonic Systems</title>
<link>https://hdl.handle.net/1721.1/149394</link>
<description>Complexity Measures for Language Recognition by Canonic Systems
Haggerty, Joseph P.
A canonic system C is a specification of a recursively enumerable set, such as a set of strings over a finite alphabet.  From this description C, it is possible to generate a system C , called a proof measure function, which is an indication of the complexity of the language defined. For certain simple but important classes of canonic system, algebraic bounds on these functions can be derived from the structure of the system.
</description>
<pubDate>Thu, 01 Oct 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149394</guid>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Deadlock-free Sharing of Resources in Asynchornous Systems</title>
<link>https://hdl.handle.net/1721.1/149393</link>
<description>Deadlock-free Sharing of Resources in Asynchornous Systems
Hebalkar, Prakash G.
Whenever resources are shared among several activities that hoard resources, the activities can attain a state of deadlock in which, for lack of resources, none of the activities can proceed.  Deadlocks can be prevented by coordination of the sharing. efficient running of the activities under such coordination requires knowledge of the patterns of use of resources by the activities.
</description>
<pubDate>Tue, 01 Sep 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149393</guid>
<dc:date>1970-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Integral Convex Polyhedra and an Approach to Integralization</title>
<link>https://hdl.handle.net/1721.1/149392</link>
<description>Integral Convex Polyhedra and an Approach to Integralization
Edelberg, Murray
Many combinatorial optimization problems may be formulated as integer linear programming problems - that is, problems of the form: given a convex polyhedron P contained in the non-negative orthant of n-dimensional space, find a integer point in P which maximizes (or minimizes) a given linear objective function. Well known linear programming methods would suffice to solve such a problem if:  (i) P is an integral convex polyhedron, or  (ii) P is transformed into the integral convex polyhedron that is the convex hull of the set of integer points in P, a process which is called integralization.
</description>
<pubDate>Sat, 01 Aug 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149392</guid>
<dc:date>1970-08-01T00:00:00Z</dc:date>
</item>
<item>
<title>Computer Recognition of Prismatic Solids</title>
<link>https://hdl.handle.net/1721.1/149391</link>
<description>Computer Recognition of Prismatic Solids
Griffith, Arnold Koons
An investigation is made into the problem of constructing a model of the appearance to an optical input device of scenes consisting of plane-faced geometric solids.  The goal is to study algorithms which find the real straight edges in the scenes, taking into account smooth variations in intensity over faces of the solids, blurring of edges and noise.
</description>
<pubDate>Sat, 01 Aug 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149391</guid>
<dc:date>1970-08-01T00:00:00Z</dc:date>
</item>
<item>
<title>Coordination of Asynchronous Event</title>
<link>https://hdl.handle.net/1721.1/149390</link>
<description>Coordination of Asynchronous Event
Patil, Suhas Shrikrishna
The way activity in a system proceeds is that events occur as a result of some conditions and lead to some new conditions which make other events possible.  Often it is necessary to coordinate such events to ensure proper behavior. Coordination nets for representing such coordinations and physically realizable structures for enforcing such coordinations are presented. These structures are modular and can be mechanically derived from the coordination nets. Coordination involved in concurrent management of resources are also discussed.
</description>
<pubDate>Mon, 01 Jun 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149390</guid>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Computer-controlled Graphical Display Processor</title>
<link>https://hdl.handle.net/1721.1/149389</link>
<description>A Computer-controlled Graphical Display Processor
Fiasconaro, James Gerard
A cathode-ray tube, (CRT), is frequently employed to display text and drawings generated by a digital computer.  Unfortunately, all of the commercially available CRT display systems are either very expensive or have limited dynamic capability resulting from the use of some form of storage-type CRT. A need exists to develop a low-cost, relatively sophisticated display compute-generated pictures.
</description>
<pubDate>Mon, 01 Jun 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149389</guid>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Generalized Organization of Large Data Bases: A Set-theoretic Approach to Relations</title>
<link>https://hdl.handle.net/1721.1/149388</link>
<description>Generalized Organization of Large Data Bases: A Set-theoretic Approach to Relations
Fillat, Andrew Irwin; Kraning, Leslie Alan
Problems inherent in representation and manipulation of large data bases are discussed.  Data management is considered as the manipulation of relationships among elements of a data base.  A detailed analogy introduces concepts embodied in a data management system. Set theory is used to describe a model for data-bases, and operations suitable for manipulation of relations are defined.
</description>
<pubDate>Mon, 01 Jun 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149388</guid>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Economies of Scale in Computer Use: Initial Test and Implication A for the Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149387</link>
<description>Economies of Scale in Computer Use: Initial Test and Implication A for the Computer Utility
Selwyn, Lee L.
This study is concerned with the existence of economies of scale in the production of data processing and other computing services, and the possible regulatory and public policy implications of such economies.  The rapid development of the technology of computation since the Second World War has raised many questions as to the supervision by public authorities of the use and progress of this technology.
</description>
<pubDate>Mon, 01 Jun 1970 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149387</guid>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Controlled Information Sharing in a Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149386</link>
<description>Controlled Information Sharing in a Computer Utility
Vanderbilt, Dean H.
A computer utility is envisioned as a large, multi-access computer system providing its users with the ability to store information and share its use with other system users.  This thesis considers the nature of information sharing and how a computer utility can provide facilities allowing such sharing to take place in a controlled manner.
</description>
<pubDate>Wed, 01 Oct 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149386</guid>
<dc:date>1969-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Recognition of Translators Invariants* By Iterative Arrays</title>
<link>https://hdl.handle.net/1721.1/149385</link>
<description>Recognition of Translators Invariants* By Iterative Arrays
Beyer, Wendel Terry
A study is made of the recognition and transformation of figures by iterative arrays of finite state automata. A figure is a finite rectangular two-dimensional array of symbols. The iterative arrays considered are also finite, rectangular and two-dimensional.
</description>
<pubDate>Wed, 01 Oct 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149385</guid>
<dc:date>1969-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Practical Translators for LR(k) Languages</title>
<link>https://hdl.handle.net/1721.1/149384</link>
<description>Practical Translators for LR(k) Languages
Deremer, Franklin Lewis
A context-free syntactical translator (CFST) is a machine which defines a translation from one context-free language to another.  A transduction grammar is a formal system based on a context-free grammar and it specifies a context-free syntactical translation. A simple suffix transduction grammar based on a context-free grammar which is LR(k) specifies a translation which can be defined by a deterministic push-down automation (DPDA).
</description>
<pubDate>Wed, 01 Oct 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149384</guid>
<dc:date>1969-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Graph Model for Parallel Computations</title>
<link>https://hdl.handle.net/1721.1/149383</link>
<description>A Graph Model for Parallel Computations
Rodrigues, Jorge E.
This report presents a computational model called program  graphs  which makes possible a precise description of parallel computations of arbitrary complexity on non-structured data.  In the model, the computation steps are represented by the nodes of a directed graph whose links represent elements of storage and transmission of data and /or control information.
</description>
<pubDate>Mon, 01 Sep 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149383</guid>
<dc:date>1969-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Case Study in Interactive Graphics Programming: A Circuit Drawing and Editing Program for Use with A Storage-tube Display Terminal</title>
<link>https://hdl.handle.net/1721.1/149382</link>
<description>Case Study in Interactive Graphics Programming: A Circuit Drawing and Editing Program for Use with A Storage-tube Display Terminal
Brackett, J.; Hammer, M.M.; Thornhill, D.
The concepts involved in building and manipulating a data structure through graphical interaction are presented, using the drawing and editing of electrical circuits as a vehicle. The circuit drawings program was designed to operate on an ARDS storage-tube display terminal attached to the M.I.T. Project MAC IBM 7094 Compatible Time-Sharing System.
</description>
<pubDate>Wed, 01 Oct 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149382</guid>
<dc:date>1969-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>EPS: An Interactive System for Solving Elliptic Boundary-Value Problems with Facilities for Data Manipulation</title>
<link>https://hdl.handle.net/1721.1/149381</link>
<description>EPS: An Interactive System for Solving Elliptic Boundary-Value Problems with Facilities for Data Manipulation
Tillman, Coyt C., Jr.
This appendix for the author's forthcoming thesis, "On-Line Solution of Elliptic Boundary-Value Problems," is a user's guide for EPS. EPS solves two-dimensional boundary-value problems for elliptic systems of second-order partial differential equations. It also has general-purpose capabilities which permit the on-line definition and execution  of arbitrary numerical procedures.
</description>
<pubDate>Sun, 01 Jun 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149381</guid>
<dc:date>1969-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Interactive Computer-mediated Animation</title>
<link>https://hdl.handle.net/1721.1/149380</link>
<description>Interactive Computer-mediated Animation
Baeker, Ronald M.
The use of interactive computer graphics in the construction of animated visual displays is investigated. The dissertation presents a process called interactive computer-mediated animation, in which dynamic displays are constructed by utilizing direct console commands, algorithms, free-hand sketches, and real-time actions. The resulting "movie" can then be immediately viewed and altered.
</description>
<pubDate>Sun, 01 Jun 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149380</guid>
<dc:date>1969-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Formal System for Defining the Syntax and Semantics of Computer Languages</title>
<link>https://hdl.handle.net/1721.1/149379</link>
<description>A Formal System for Defining the Syntax and Semantics of Computer Languages
Ledgard, Henry Francis
The thesis of this dissertation is that formal definitions of the syntax and semantics of computer languages are needed.  This dissertation investigates two candidates for formally defining computer languages: (1) the formalism of canonical systems for defining the syntax of a computer language and its translation into a target language for defining the semantics of a computer language.
</description>
<pubDate>Tue, 01 Apr 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149379</guid>
<dc:date>1969-04-01T00:00:00Z</dc:date>
</item>
<item>
<title>Computer Recognition of Three-Dimensional Objects in a Visual Scene</title>
<link>https://hdl.handle.net/1721.1/149378</link>
<description>Computer Recognition of Three-Dimensional Objects in a Visual Scene
Guzman-Arenas, Aldolfo
Methods are presented 1) to partition or decompose a visual scene into the bodies forming it; (2) to position these bodies in three-dimensional space, by combining two scenes that make a stereoscopic pair; 3) to find the regions or zones of a visual scene that belong to its background, (4) to carry out the isolation of objects in (1) when the input has inaccuracies.
</description>
<pubDate>Sun, 01 Dec 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149378</guid>
<dc:date>1968-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Simulator of Multiple Interactive Users to Drive a Time-shared Computer System</title>
<link>https://hdl.handle.net/1721.1/149377</link>
<description>A Simulator of Multiple Interactive Users to Drive a Time-shared Computer System
Greenbaum, Howard Jacques
In the construction and maintenance of a time-shared computer system the need arises for a tool which can provide a controlled, repeatable environment for the purpose of making performance measurements.  This thesis describes the use of a small second computer to simulate the actions of multiple interactive users over individual communication lines. Each simulated user exhibits responses similar to those of a "normal" interactive user.
</description>
<pubDate>Wed, 01 Jan 1969 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149377</guid>
<dc:date>1969-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Lambda Calculus Models of Programming Languages</title>
<link>https://hdl.handle.net/1721.1/149376</link>
<description>Lambda Calculus Models of Programming Languages
Morris, James H.
Two aspects of programming languages, recursive definitions and type declarations are analyzed in detail.  Church's -calculus is used as a model of a programming language for purposes of the analysis.  The main result on recursion is an analogue to Kleene's first recursion theorem: If A= FA for any A-expressions A and F, then A is an extension of YF in the sense that if E[YE], any expressions containing YF, has a normal form then E[F] =E {A]. Y is Curry's paradoxical combinator. The result is shown to be invariant for many different versions of Y.
</description>
<pubDate>Sun, 01 Dec 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149376</guid>
<dc:date>1968-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Integrated Hardware-software Systems for Computer Graphics in Time-sharing</title>
<link>https://hdl.handle.net/1721.1/149375</link>
<description>An Integrated Hardware-software Systems for Computer Graphics in Time-sharing
Thornhill, D.E.; Stotz, R.H.; Ross, D.T.; Ward, J.E.
This report describes the ESL Display Console and its associated user-oriented software systems developed by the M.I.T. Computer-Aided Design Project with Project MAC.  Console facilities include hardware projection of three-dimensional line drawings, automatic light pen tracking, and a flexible set of knob, switch, and push-button inputs. The console is attached to the Project MAC IBM 7094 Compatible Time-Sharing System either directly or through a PDP-7 Computer.
</description>
<pubDate>Sun, 01 Dec 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149375</guid>
<dc:date>1968-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>Implementing Multi-process Primitives in a Multiplexed Computer System</title>
<link>https://hdl.handle.net/1721.1/149374</link>
<description>Implementing Multi-process Primitives in a Multiplexed Computer System
Rappaport, Robert Lee
In any computer system primitive functions are needed to control the actions of processes in the system.  This thesis discusses a set of six such process control primitives which are sufficient to solve many of the problems involved in parallel processing as well as in the efficient multiplexing of  system resources among the many processes in a system.
</description>
<pubDate>Fri, 01 Nov 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149374</guid>
<dc:date>1968-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>Resource Allocation in Multiprocess Computer Systems</title>
<link>https://hdl.handle.net/1721.1/149370</link>
<description>Resource Allocation in Multiprocess Computer Systems
Denning, Peter James
The dynamic allocation for limited processor and main memory resources among members of a user community is investigated as a supply-and-demand problem.  The work is divided into four phases.  First phase is the construction of the working set model for program behavior. This model is based on locality, the concept that, during any interval of execution, a program favors a subset of its information; a computation's working set is a dynamic measure of this set of favored information. A working set storage management policy is one that allocates processors to a computation if and only if there is enough uncommitted  space in main memory to contain its working set.
</description>
<pubDate>Wed, 01 May 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149370</guid>
<dc:date>1968-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Incremental Simulation on a Time-shared Computer</title>
<link>https://hdl.handle.net/1721.1/149369</link>
<description>Incremental Simulation on a Time-shared Computer
Jones, Malcolm Murray
This thesis describes a system which allows simulation models to be built and tested incrementally.  It is called OPS-4 and is specifically designed to operate in the environment of the Multics system.  It represents a major expansion and improvement of the OPS-3 system implemented in CTSS and also includes many features adapted from other current simulation systems.
</description>
<pubDate>Mon, 01 Jan 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149369</guid>
<dc:date>1968-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Symbolic Integration</title>
<link>https://hdl.handle.net/1721.1/149368</link>
<description>Symbolic Integration
Moses, Joel
SIN and SOLDIER are heuristic programs written in LISP which solve symbolic integration problems.  SIN (Symbolic INtegrator) solves indefinite integration problems at the difficulty approaching those in the larger integral tables.  SIN contains several more methods than are used in the previous symbolic integration program SAINT, and solves most of the problems attempted by SAINT in less than one second. SOLDIER (SOLution of Ordinary Differential Equations Routine) solves first order, first degree ordinary differential equations at the level of a good college sophomore and at an average of about five seconds per problem attempted.
</description>
<pubDate>Fri, 01 Dec 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149368</guid>
<dc:date>1967-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Canonic Translator</title>
<link>https://hdl.handle.net/1721.1/149367</link>
<description>A Canonic Translator
Alsop, Joseph Wright
An algorithm to recognize and translate sets of character strings specified by canonic system is presented.  The ability of canonic systems to define the context sensitive features of strings and to specify their translation allows the algorithm to recognize and translate real computer languages. It is also applicable in other languages systems.
</description>
<pubDate>Wed, 01 Nov 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149367</guid>
<dc:date>1967-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>A System for Computer-aided Diagnosis</title>
<link>https://hdl.handle.net/1721.1/149365</link>
<description>A System for Computer-aided Diagnosis
Gorry, Gregory Anthony
This thesis describes a model diagnostic problem and a computer program designed to deal with this problem.  The model diagnostic problem is an abstract problem.  A major contention of this thesis, however, is that this problem subsumes the principal feature of a number of ostensibly different real diagnostic problems including certain problems of medical diagnosis and the diagnosis of machine failures. A second major contention of this thesis is that strategies for the solution of the model diagnostic problem can be formulated in terms sufficiently explicit to permit their incorporation in a computer program.
</description>
<pubDate>Fri, 01 Sep 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149365</guid>
<dc:date>1967-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Program Analysis by Digital Computer</title>
<link>https://hdl.handle.net/1721.1/149364</link>
<description>Program Analysis by Digital Computer
Wilde, Daniel Underwood
A comparison of the properties of non-modifying and self-modifying programs leads to the definition of independent and dependent instructions.  Because non-modifying programs contain only independent instructions, such programs can be analyzed by a straight forward, two -step analysis procedure. First, the program control flow is detected; second, that control flow is used to determine the program data flow or data processing. However, self-modifying programs can also contain dependent instructions, and the program control flows and data flows exhibit cyclic interaction.
</description>
<pubDate>Tue, 01 Aug 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149364</guid>
<dc:date>1967-08-01T00:00:00Z</dc:date>
</item>
<item>
<title>Design and Implementation of a Table-Driven Compiler System</title>
<link>https://hdl.handle.net/1721.1/149363</link>
<description>Design and Implementation of a Table-Driven Compiler System
Liu, Chung L.; Change, Gabriel D.; Marks, Richard E.
Our goal is to provide users of the table-driven compiler system with an environment within which they can freely design and produce their compilers.  The primary design criterion is generality so that the users can define a large class of input languages oriented toward any kind of problem-solving purposes, and can also define a large class of object programs to be executed on different computer systems. Therefore, in our system we do not limit the users to specific ways of doing syntactic analysis, or doing storage allocation, or producing binary programs of a specific format for a particular computer system. What we provide are mechanisms that are general enough for whichever way a user desires to build his compiler.
</description>
<pubDate>Sat, 01 Jul 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149363</guid>
<dc:date>1967-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>Surfaces for Computer-aided Design of Space Forms</title>
<link>https://hdl.handle.net/1721.1/149362</link>
<description>Surfaces for Computer-aided Design of Space Forms
Coons, Steven A.
The design of airplanes, ships, automobiles, and so-called ""sculptured parts"" involves the design, delineation, and mathematical description of bounding surfaces.  A method is described which makes possible the description of free-form doubly curved surfaces of a very general kind. An extension of these ideas to hyper-surfaces in higher dimensional spaces is also indicated.
</description>
<pubDate>Thu, 01 Jun 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149362</guid>
<dc:date>1967-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>On-line Analysis for Social Scientists</title>
<link>https://hdl.handle.net/1721.1/149361</link>
<description>On-line Analysis for Social Scientists
Miller, James R.
A library of computer routines has been compiled to facilitate the analysis of social science research data.  Many of these routines are designed to test statistical hypotheses.  All routines are operated on-line and permit conversational interaction between the user and a time-shared computer. Input data are typed directly into the computer through a teletype console. Explicit typing directions and error diagnostics, where appropriate, are printed out by each routine to guide the input process. Analyses are executed immediately, and computed results are printed out in typical publication language.
</description>
<pubDate>Mon, 01 May 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149361</guid>
<dc:date>1967-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>Syntax-based Analytic Reading of Musical Scores</title>
<link>https://hdl.handle.net/1721.1/149360</link>
<description>Syntax-based Analytic Reading of Musical Scores
Forte, Allen
As part of a larger research project in musical structure, a program has been written which ""reads"" scores encoded in an input language isomorphic to music notation.  The program is believed to be the first of its kind.  From a small number of parsing rules the program derives complex configurations, each of which is associated  with a set of reference points in a numerical representation of a time-comtinuum.  The logical structure of the program is such that all and only the defined classes of events are represented in the output.
</description>
<pubDate>Sat, 01 Apr 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149360</guid>
<dc:date>1967-04-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Low-cost Output Terminal for Time-shared Computers</title>
<link>https://hdl.handle.net/1721.1/149359</link>
<description>A Low-cost Output Terminal for Time-shared Computers
Rosenburg, Ronald C.; Kennedy, Daniel W.; Humphrey, Roger A.
This report describes a low-cost remote terminal to provide switch-form output from a time-shared digital computer.  The terminal consists of a modified model 35 KSR teletype and a local memory unit.  The unit is independent of any particular computer, and is easy to test and maintain. The states of the memory control and memory words are observable directly by indicator lights.
</description>
<pubDate>Wed, 01 Mar 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149359</guid>
<dc:date>1967-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Some Aspects of Pattrn Recognition by Computer</title>
<link>https://hdl.handle.net/1721.1/149358</link>
<description>Some Aspects of Pattrn Recognition by Computer
Guzman-Arenas, Adolfo
A computer may gather a lot of information from its environment in an optical or graphical manner.  A scene, as seen for instance from a TV camera or a picture, can be transformed into a symbolic description of points and lines or surfaces.  This thesis describes several programs, written in the language CONVERT, for the analysis of such descriptions in order to recognize, differentiate and identify desired objects or classes of objects in the scene. Examples are given in each case.
</description>
<pubDate>Wed, 01 Feb 1967 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149358</guid>
<dc:date>1967-02-01T00:00:00Z</dc:date>
</item>
<item>
<title>An On-line System for Algebraic Manipulation</title>
<link>https://hdl.handle.net/1721.1/149357</link>
<description>An On-line System for Algebraic Manipulation
Fenichel, Robert R.
This thesis describes an approach to the problem of programming a computer for algebraic manipulation.  The motivating threads of the work are first picked up in Chapter I.  To test the descriptive intuitions urged normatively in Chapter I, an experimental system was actually implemented. This system is described in Chapter II and in the Appendices.
</description>
<pubDate>Thu, 01 Dec 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149357</guid>
<dc:date>1966-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>Computer Design for Asynchronously Reproducible Multiprocessing</title>
<link>https://hdl.handle.net/1721.1/149356</link>
<description>Computer Design for Asynchronously Reproducible Multiprocessing
Van Horn, Earl C.
A concept is presented for designing either a computing system, or a programming language system, so that the following problem is avoided: during a multiprocess computation in which several processes communicate, and in which the relative timing of the processes is arbitrary, the output produced by the computation might not be a function of only the initial computation state, i.e., of only the inputs and initial program of the computation.
</description>
<pubDate>Tue, 01 Nov 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149356</guid>
<dc:date>1966-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>ADEPT: A Heuristic Program for Proving Theorems of Group Theory</title>
<link>https://hdl.handle.net/1721.1/149355</link>
<description>ADEPT: A Heuristic Program for Proving Theorems of Group Theory
Norton, Lewis Mark
A computer program, named ADEPT (A Distinctly  Empirical Prover of Theorems), has been written which proves theorems taken from the abstract theory of groups.  Its organization is basically heuristic, incorporating many of the techniques of the human mathematician in a "natural" way. This program has proved almost 100 theorems, as well as serving as a vehicle for testing and evaluating special-purpose heuristics.
</description>
<pubDate>Sat, 01 Oct 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149355</guid>
<dc:date>1966-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Pilot: A Step Towards Man-Computer Symbiosis</title>
<link>https://hdl.handle.net/1721.1/149354</link>
<description>Pilot: A Step Towards Man-Computer Symbiosis
Teitelman, Warren
PILOT  is a programming system constructed in LISP.  It is designed to facilitate the development of programs by easing the familiar sequence: write some code, run the program, make some changes, write some more code, run the program again, etc. As a program becomes more complex, making theses changes becomes harder and harder because the implications of changes are harder to anticipate.
</description>
<pubDate>Thu, 01 Sep 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149354</guid>
<dc:date>1966-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>Models and Data Structures for Digital Logic Simulation</title>
<link>https://hdl.handle.net/1721.1/149353</link>
<description>Models and Data Structures for Digital Logic Simulation
Smith, Donald Leigh
A digital  logic simulation system is proposed for design verification.  Logic to be simulated is specified with a high level register transfer design language, and the simulation system operates on-line on a large time-shared computer.  The problem of selecting adequate circuit and signal models for this purpose is considered. models are proposed with sufficient timing detail to allow the simulation system to detect timing errors which currently are found by manual checking or prototype.
</description>
<pubDate>Mon, 01 Aug 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149353</guid>
<dc:date>1966-08-01T00:00:00Z</dc:date>
</item>
<item>
<title>Traffic Control in a Multiplexed Computer System</title>
<link>https://hdl.handle.net/1721.1/149352</link>
<description>Traffic Control in a Multiplexed Computer System
Saltzer, Jerome H.
This thesis describes a scheme for processor multiplexing in a multiple user, multiple processor computer system.  The scheme is based upon a distributed supervisor which may be different for different users.  The processor multiplexing method provides smooth inter-process communication, treatment of input/output  control as a special case of inter-process communication, and provision for a user to specify parallel processing or simultaneous input/output without interrupt logic.
</description>
<pubDate>Fri, 01 Jul 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149352</guid>
<dc:date>1966-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>Search Procedures Based on Measures of Relatedness Between Documents</title>
<link>https://hdl.handle.net/1721.1/149351</link>
<description>Search Procedures Based on Measures of Relatedness Between Documents
Ivie, Evan Leon
In this thesis a new type of information retrieval system is suggested which utilizes data of the type generated by the users of the system instead of data generated by indexers.  The theoretical model on which the system is based consists of three basic elements. The first element is measure of the relatedness between document-pairs. It is derived from information theory.
</description>
<pubDate>Wed, 01 Jun 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149351</guid>
<dc:date>1966-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Input/Output in Time-shared, Segmented, Multiprocessor Systems</title>
<link>https://hdl.handle.net/1721.1/149350</link>
<description>Input/Output in Time-shared, Segmented, Multiprocessor Systems
Smith, Arthur Anshel
After introducing and defining the concepts of time-sharing, segmentation, and multiprocessing, two classes of systems incorporating these are introduced.  Both classes use associative memories, as 'look behind' devices to speed the operation of addressing the segment memory, with the distinction between classes being the location of the associative memory.
</description>
<pubDate>Wed, 01 Jun 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149350</guid>
<dc:date>1966-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Design of a Low-cost Character Generator for Remote Computer Displays</title>
<link>https://hdl.handle.net/1721.1/149348</link>
<description>Design of a Low-cost Character Generator for Remote Computer Displays
Cheek, Thomas Burrell
A requirement exists for a low-cost remote display terminal with alphanumeric and line-drawing capabilities for use with time-shared computer systems.  This thesis, conducted as part of the overall remote display design project, was undertaken to investigate novel approaches to character generation, with the goal of drastically reducing present-day costs for such devices.      A survey of existing devices and character generation techniques was carried out, and a design approach was chosen which takes advantage of mass-fabrication techniques.  This includes using a five-by-seven dot matrix raster and a resistor array "read-only" character memory for the 96 printable symbols of the Revised Proposed ASCII Code.  Circuits designed, included a dot matrix generator and a register array memory with selection logic sense amplifiers, and a shift register output buffer.  An experimental character generator with an eight-word memory was built, largely using integrated circuits and was found to work as desired.  It is concluded that the design approach will yield a character generator that is of low enough cost to find wide use in remote computer terminals.
</description>
<pubDate>Tue, 01 Mar 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149348</guid>
<dc:date>1966-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Investigation of an Analog Technique to Decrease Pentracking Time in Computer Display</title>
<link>https://hdl.handle.net/1721.1/149347</link>
<description>Investigation of an Analog Technique to Decrease Pentracking Time in Computer Display
Stratton, William David
Many modern digital computer systems contain cathode-ray tube display equipment to facilitate man-machine communications.  Through the use of a display and a light-sensitive pen, graphical material can be directly inserted into the computer by using the pen to control the position of the electron beam at the face of the CRT-a process called pen tracking.  Beam position is continually sampled by the computer, permitting continuous display of the material being sketched.  In present digital pen-tracking techniques, a tracking pattern (usually a cross) with a substantial number of points is generated on the face of the CRT and the binary response of the pen to the individual points of the pattern is employed to calculate pen position.  The large number of pattern points, and the phosphor decay time associated with each, yield a typical tracking cycle of 500 to 1000 microseconds.  Since the cycle must be repeated about 100 times per second, 5 to 10 percent of display time is consumed.      To reduce the time required by the tracking operation, an analog technique employing a four-point tracking pattern is proposed in this study, in which the amplitude response of the pen to corresponding pairs of points is used to determine the position of the pen relative to the center of the pattern.  To study the method, one channel of the proposed two-channel analog tracking system was designed, constructed, and coupled to the horizontal channel of a high-speed computer display console.  To avoid the phosphor-decay limitation, an experimental "Beam" pen capable of detecting the electron beam rather than the phosphor luminescence is employed.  The system included a pattern generator, sample-and-hold gates, difference amplifier, envelope detector and noise filter, and a threshold-logic analog-to-digital converter.  The time required to generate the tracking pattern and develop the binary equivalent of the horizontal distance separating pen and pattern center is only 25 microseconds.  Tracking is generally satisfactory, but some anomalies were noted, apparently due to the characteristics of the experimental pen being used.      It is concluded that the analog technique is feasible for improving the speed of pen tracking, but recommended that further studies be made of the limitations inherent in the method.
</description>
<pubDate>Tue, 01 Mar 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149347</guid>
<dc:date>1966-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>MAP: A System for On-line Mathematical Analysis</title>
<link>https://hdl.handle.net/1721.1/149346</link>
<description>MAP: A System for On-line Mathematical Analysis
Kaplow, Roy; Strong, Stephen; Brackett, John
This manual describes a computer suitable for use on the time-sharing facility at the M.I.T. Computation Center or at Project MAC.  Designated for direct computer access through a remote console, the system replaces the normal procedures of programming with a question and answer interchange between the user (hereinafter called U) and the computer (hereinafter called C).  The system is intended for the solution of mathematical problems.  It should be usable by a person with no knowledge of computers or programming and little knowledge of numerical analysis.  Within its range of capabilities, it should be as efficient as are the normal means of computer access for the more sophisticated user.      The system establishes a "conversation" between U and C with an electric typewriter as the means of communication.  U can give information to C and can ask it certain questions.  C can answer those questions if it is given enough information.  C can also ask questions and can therefore request any missing information.  In addition, C can explain procedures to U in order to help the latter transmit the required information in a proper form.  U, therefore, only needs to know a few basic rules, such as how to phrase his questions and how to name and tabulate his data.
</description>
<pubDate>Sat, 01 Jan 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149346</guid>
<dc:date>1966-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Programming Semantics for Multiprogrammed Computations</title>
<link>https://hdl.handle.net/1721.1/149345</link>
<description>Programming Semantics for Multiprogrammed Computations
Dennis, Jack B.; Van Jhorn, Earl C.
The semantics are defined for a number of meta-instructions which perform operations essential to the writing of programs in multiprogrammed computer systems.  These meta-instructions relate to parallel procession, protection of separate computations, program debugging, and the sharing among users of memory segments and other computing objects, the names of which are hierarchically structured.  The language sophistication contemplated is midway between an assembly language and an advanced algebraic language.
</description>
<pubDate>Wed, 01 Dec 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149345</guid>
<dc:date>1965-12-01T00:00:00Z</dc:date>
</item>
<item>
<title>The Priority Problem</title>
<link>https://hdl.handle.net/1721.1/149344</link>
<description>The Priority Problem
Greenberger, Martin
Priority decisions arise whenever limited facilities must be apportioned among competitive demands for service.  Broadly viewed, even the familiar first-come-first served discipline is a priority rule.  It favors the longest-waiting user, and guards against excessive delays.  Other priority rules, such as shortest-job-next, are keyed instead to considerations of operating efficiency.  Urgency of request is still another common consideration.  Since these considerations often conflict, the priority rule serves as mediator.  Use of a common cost measure can help effect this mediation, as results from recent job-shop simulations illustrate.      A priority operation of contemporary interest is scheduling a time-shared computer among its concurrent users.  Service requirements are not known in advance of execution.  To keep response times short for small requests, service intervals are partitioned and segments are served separately in round-robin fashion.  A mathematical analysis pinpoints the tradeoff between overhead and discrimination implicit in this procedure, and allows alternate strategies to be costed.  Extensions of the simple round-robin procedure are suggested, the objectives of time-sharing are reviewed, and implications are drawn for the design of future priority and pricing systems.
</description>
<pubDate>Mon, 01 Nov 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149344</guid>
<dc:date>1965-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>Queueing Models for File Memory Operation</title>
<link>https://hdl.handle.net/1721.1/149343</link>
<description>Queueing Models for File Memory Operation
Denning, Peter James
A model for the auxiliary memory function of a segmented, multiprocessor, time-shared computer system is set up.  A drum system in particular is discussed, although no loss of generality is implied by limiting the discussion to drums.  Particular attention is given to the queue of requests waiting for drum use.  It is shown that a shortest access time first queue discipline is the most efficient, with the access time being defined as the time required for the drum to be positioned, and is measured from the finish of service of the last request to the beginning of the data transfer for the present request.  A detailed study of the shortest access time queue is made, giving the minimum access time probability distribution, equations for the number in the queue, and equations for the wait in the queue.  Simulations were used to verify these equations; the results are discussed.  Finally, a general Markov Model for Queues is discussed in an Appendix.
</description>
<pubDate>Fri, 01 Oct 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149343</guid>
<dc:date>1965-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Calculaid: An On-line System for Algebraic Computation and Analysis</title>
<link>https://hdl.handle.net/1721.1/149342</link>
<description>Calculaid: An On-line System for Algebraic Computation and Analysis
Wantman, Mayer Elihu
OPS is an on-line system developed by M. Greenberger et al. at Project MAC.  The present work provides a powerful and simple way to perform numerical manipulations and calculations within OPS.  The program package is called CALCULAID.      A method of executing algebraic assignment statements, of which MAD and FORTRAN assignments are a subset, is provided.  When this assignment-statement ability is coupled with other features of the OPS system, such as unconditional transfers, general conditionals, and array and function declarations, most of the ability of a compiler language is provided.  Because the programs written in OPS are executed interpretively, OPS-3 programs can be changed and re-run immediately, without being compiled.      The other elements of CALCULAID are a program for creating multiple linear regression models, rank-ordering and counting data, and finding roots to polynomial equations in one unknown.      The applications of CALCULAID to the analysis of a round-robin scheduling model and to a process-control problem are discussed, and conclusions regarding the suitability of running computational programs in an interpretive mode are drawn.
</description>
<pubDate>Wed, 01 Sep 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149342</guid>
<dc:date>1965-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Heuristic Approach to Alternate Routing in a Job Shop</title>
<link>https://hdl.handle.net/1721.1/149341</link>
<description>A Heuristic Approach to Alternate Routing in a Job Shop
Russo, F.J.
The research reported here investigates the use of heuristics for selecting from several alternate routes resulting from partially ordered tasks in a job shop order file.  The experimental vehicle employed was digital simulation.      The concept of the "Alternate string" has been developed to generalize the existence of partially ordered operations.  That term is defined as a concatenation of operations that can be performed in any order, with the additional specification that all within the string can be attempted.  The presence of alternate strings with two or more member gives rise to the alternate routing problem, whose solution is approached by heuristic methods.      Choosing from among several alternate routes constitutes a three level decision problem.  At the lowest level, routes can be chosen when the order enters the shop.  This is equivalent to fixed routing.  At a higher level,  alternates can be selected at the time of transition from one work station to another.  The third decision level occurs at operation time, when one of the alternate operations is placed on a machine.  Heuristics were tested at the latter two levels.      There were two prior assertions that this thesis set out to prove.  The first was that alternate routing at the highest decision level would produce significant reductions in the mean tardiness of orders completed past their designated due dates, the improvement being both relative to fixed routing and to alternate routing heuristics implemented at lower decision levels.  Secondly, the contention was made that the improvement would be as such a magnitude that on-line, real-time systems become economically justifiable as a means of mitigating the attendant control problems caused by non-deterministic paths through the queuing network.      The methodology employed here was to conduct two passes of simulated shop runs.  The first, with two artificially high levels of alternate incidence, tested the efficiency of five different alternate routing heuristics in reducing mean tardiness.  The second pass consisted of runs with the best heuristic developed during the first experimental phase applied to a realistic length and frequency of alternate strings.      The results of the experiments strongly support the assertions made at the outset of the thesis.  The performance characteristics of the different heuristics are discussed at length.  In addition, some implications are drawn of the computational nature of alternate routing and the difficulties encountered in implementing alternate routing heuristics at operation time.
</description>
<pubDate>Tue, 01 Jun 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149341</guid>
<dc:date>1965-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>An Analysis of Time-Shared Computer Systems</title>
<link>https://hdl.handle.net/1721.1/149340</link>
<description>An Analysis of Time-Shared Computer Systems
Scherr, Allan Lee
Some of the aspects of the operation of time-shared, interactive computer systems are analyzed.  The emphasis is on the reaction of hardware systems to the demands that its users make upon it.  Simply shared systems and their users in order to be able to predict the performance of the two operating together.  Portions of this problem include the specification and measurement of user characteristics, the development and verification of both simulation and mathematical models for time-shared systems, and the specification and measurement of performance metrics for such systems.  The user and some of the performance measurements were made on Project MAC's "Compatible Time-Sharing System" (CTSS).      First, simulation models are used to study the effects of changing small details in the operation of CTS-like systems.  Then, a continuous-time Markov process model is derived to predict the performance of a broad class of systems.  Throughout, the CTSS data are used as a basis for comparison with model predictions.  In order to be able to take measurements and to build models, many definitions of commonly used time-shared system terminology are made precise.
</description>
<pubDate>Tue, 01 Jun 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149340</guid>
<dc:date>1965-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Time Sharing on a Multiconsole Computer</title>
<link>https://hdl.handle.net/1721.1/149339</link>
<description>Time Sharing on a Multiconsole Computer
Samuel, Arthur L.
After a brief historical review and a description of the three basic types for time-sharing systems, the general purpose time-sharing system as exemplified by the M.I.T. CTSS system is described in general terms, with particular attention to the way the system looks to the user.
</description>
<pubDate>Mon, 01 Mar 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149339</guid>
<dc:date>1965-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>CTSS Technical Notes</title>
<link>https://hdl.handle.net/1721.1/149338</link>
<description>CTSS Technical Notes
Saltzer, Jerome H.
This report is a technical description of the 7094 Compatible Time-Sharing System in use at Project MAC and the M.I.T. Computation Center.  It is designed to acquaint a system programmer with the techniques of construction which were used in this particular time-sharing system.  Separate chapters discuss the overall supervisor program flow: console message input and output: the scheduling and storage algorithms: and a thumbnail sketch is given of each of the subroutines which make up the supervisor program.      This report was prepared with the aid of the compatible time-sharing system and the TYPSET and RUNOFF  commands.
</description>
<pubDate>Mon, 01 Mar 1965 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149338</guid>
<dc:date>1965-03-01T00:00:00Z</dc:date>
</item>
<item>
<title>Use of CTSS in a Teaching Environment</title>
<link>https://hdl.handle.net/1721.1/149337</link>
<description>Use of CTSS in a Teaching Environment
Roos, Daniel
Computer time-sharing offers many interesting possibilities for use in teaching computer technology.  It might be expected that with proper hardware and software, students using time-sharing as a teaching machine could acquire proficiency in the fundamentals of programming more easily than using batch-processing.  To test this hypothesis, the M.I.T. Department of Civil Engineering divided a freshman programming class so that half the students used batch-processing methods, and half used the Project MAC time-sharing system to do the same work.  This paper describes the experiment and its tentative results.
</description>
<pubDate>Sun, 01 Nov 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149337</guid>
<dc:date>1964-11-01T00:00:00Z</dc:date>
</item>
<item>
<title>A New Methodology for Computer Simulation</title>
<link>https://hdl.handle.net/1721.1/149336</link>
<description>A New Methodology for Computer Simulation
Greenberger, Martin
Computer simulation is a cooperative venture between researcher and information processor, but the processor's role customarily begins too late.  The researcher can benefit substantially by bringing  the computer up into the earlier, creative phases of the simulation process.  An on-line computer system that makes this possible is described.
</description>
<pubDate>Thu, 01 Oct 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149336</guid>
<dc:date>1964-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>The MAC System: A Progress Report</title>
<link>https://hdl.handle.net/1721.1/149335</link>
<description>The MAC System: A Progress Report
Fano, Robert M.
The notion of machine-aided cognition implies an intimate collaboration between a human user and a computer in a real-time dialogue on the solution of a problem, in which the two parties contribute their best capabilities.  In order for this intimate collaboration to be possible, a computer system is needed that can serve simultaneously a large number of people, and that is easily accessible to them, both physically and intellectually.  The present MAC System is a first step toward this goal.  The purpose of this paper is to present a brief description of the current system, to report on the experience gained from its operation, and to indicate directions along which future developments are like to proceed.
</description>
<pubDate>Thu, 01 Oct 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149335</guid>
<dc:date>1964-10-01T00:00:00Z</dc:date>
</item>
<item>
<title>Program Structure in a Multi-access Computer</title>
<link>https://hdl.handle.net/1721.1/149334</link>
<description>Program Structure in a Multi-access Computer
Dennis, Jack B.
A multi-access computer (MAC) system consists of processing  units  and directly addressable main  memory  in which procedure information is interpreted as sequences of operations on data, a system of terminal  devices  through which users may communicate with procedures operating for them, and mass memory where procedures and data may be held when not required for immediate reference.  One fundamental attraction of the MAC concept is the increased productivity of "computer catalyzed research" that results from close man-machine interaction.  Another attraction is wealth of data and procedures that are accessible to a large user community through the file memory of a MAC system.  In this report thoughts are developed which form an adequate model of program structure.  These concepts have grown out of many discussions with colleges in Project MAC, and our experience to date in the design and operation of multi-access computer systems.
</description>
<pubDate>Fri, 01 May 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149334</guid>
<dc:date>1964-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>The OPS-1 Manual</title>
<link>https://hdl.handle.net/1721.1/149333</link>
<description>The OPS-1 Manual
Greenberger, Martin
The recent attainment and continuing development of personally accessible computer facilities have opened another chapter in the use of machines by man.  A number of current research efforts, including Project MAC at M.I.T., are designing new conceptual systems to adapt the emerging technology to a wide range of human activity.  Activities relating to management are the concern of a trial system at Project MAC called OPS-1.  The OPS-1 system and the experiment that launched it are described in this manual. {AD 604-681}
</description>
<pubDate>Fri, 01 May 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149333</guid>
<dc:date>1964-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>OPL-I An Open Ended Programming System Within CTSS</title>
<link>https://hdl.handle.net/1721.1/149332</link>
<description>OPL-I An Open Ended Programming System Within CTSS
Weizenbaum, Joseph
OPL-1, an incremental programming system presently operating with CTSS, permits the user to augment both his program and his data base during widely separated successive sessions at his terminal.  Facilities are provided which make it possible for the user to operate on his already established data base both by means of built-in operators and in terms of operators (functions) which the user has previously defined in the language of the system.  Underlying the system is a powerful list processing scheme embedded in FORTRAN (SLIP).  The machinery of this fundamental language drives the system and is also largely available to the user.  The data base generated by the user is therefore a set of list structures (trees), and most of the operators available to him are list processing  operators.  Data structures with considerably complex inter-relational properties may therefore be treated quite directly.
</description>
<pubDate>Wed, 01 Jan 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149332</guid>
<dc:date>1964-01-01T00:00:00Z</dc:date>
</item>
<item>
<title>Stress: A Problem-oriented Language for Structural Engineering</title>
<link>https://hdl.handle.net/1721.1/149331</link>
<description>Stress: A Problem-oriented Language for Structural Engineering
Biggs, John M.; Logcher, Robert D.
STRESS  is a general purpose programming system for the analysis of structures.  Compared to most other structural programs it has three distinguishing characteristics: (1)  The input language is that of the structural engineer which makes possible direct communication between the engineer and the machine; (2)  The system is capable of analyzing a wide variety of structural types and loading conditions thus permitting industrial use on a routine basis; and (3)  The design process is expedited by the fact that modifications of the original structure for alternate designs can be easily executed.  This last capability is most effective when STRESS  is used in the time-sharing mode.  These features combine to provide a system which not only reduces the effort required for structural analysis but, more significantly, enhances the designer's ability to evolve an efficient structure.
</description>
<pubDate>Fri, 01 Jul 1966 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149331</guid>
<dc:date>1966-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>CARPS, A Program Which Solves Calculus Word Problems</title>
<link>https://hdl.handle.net/1721.1/149330</link>
<description>CARPS, A Program Which Solves Calculus Word Problems
Charniak, Eugene
</description>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149330</guid>
</item>
<item>
<title>Verbal and Graphical Language for the AED System: A Progress Report</title>
<link>https://hdl.handle.net/1721.1/149329</link>
<description>Verbal and Graphical Language for the AED System: A Progress Report
Ross, Douglas T.; Feldman, Clarence G.
For Computer-Aided Design, use of time-sharing a single language which can take either verbal or graphical form is required.  This paper describes how a single language processing technique, which is in turn a special application of more general concepts concerning the step-by-step growth and processing of large structures of interrelated elements, can efficiently process both language forms in the same manner.  Illustrations of the concepts involved are also drawn from the methods used in the AED-O Compiler, an efficient ALGOL-60-based compiler used in Computer-Aided Design work, which is available as a public command in the Project MAC CTSS.
</description>
<pubDate>Fri, 01 May 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149329</guid>
<dc:date>1964-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>System Requirements for Multiple  -Access, Time-shared Computers</title>
<link>https://hdl.handle.net/1721.1/149328</link>
<description>System Requirements for Multiple  -Access, Time-shared Computers
Corbató, Fernando J.
It is now clear that it is possible to create a general-purpose time-shared multiple access system on most contemporary computers.  However, it is equally clear that none of the existent computers are well designed for multiple access systems.  At present, good service to a few dozen simultaneous users is considered state-of-the-art.      Discussions include: clocks, memory protection and supervisor mode, program relocation and common subroutines which expose the reader to the difficulties encountered with contemporary machines when multiple user multiple-processor systems are considered.
</description>
<pubDate>Fri, 01 May 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149328</guid>
<dc:date>1964-05-01T00:00:00Z</dc:date>
</item>
<item>
<title>SIR: A Computer Program for Semantic Information Retrieval</title>
<link>https://hdl.handle.net/1721.1/149327</link>
<description>SIR: A Computer Program for Semantic Information Retrieval
Raphael, Bertram
SIR  is a computer system, programmed in the LISP language, which accepts information and answers questions expressed in a restricted form of English.  This system demonstrates what can reasonably be called an ability to "understand" semantic information.  SIR's  semantic and deductive ability is based on the construction of an internal model, which uses word associations and property lists, for the relational information normally conveyed in conversational statements.      A format-matching procedure extracts semantic content from English sentences.  If an input sentence is declarative, the system adds appropriate information to the model.  If an input sentence is a question, the system searches the model until it either finds the answer or determines why it cannot find the answer.  In all cases SIR  reports its conclusions.  The system has some capacity to recognize exceptions to general rules, resolve certain semantic ambiguities, and modify its model structure in order to save computer memory space.      Judging from its conversational ability, SIR  is more "intelligent" than any existing question-answering system.  The author describes how this ability was developed and how the basic features of SIR  compare with those of other systems.       The working system, SIR , is a first step toward intelligent machine communication.  The author proposes a next step by describing how to construct a more general system which is less complex and yet more powerful than SIR .  This proposed system contains a generalized version of the SIR  model, a formal logical system called SIR1 , and a computer program for testing the truth of SIR1  statements with respect to the generalized model by using partial proof procedures in the predicate calculus.  The thesis also describes the formal properties of SIR1  and how they relate to the logical structure of SIR .
</description>
<pubDate>Mon, 01 Jun 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149327</guid>
<dc:date>1964-06-01T00:00:00Z</dc:date>
</item>
<item>
<title>Natural Language Input for a Computer Problem Solving System</title>
<link>https://hdl.handle.net/1721.1/149326</link>
<description>Natural Language Input for a Computer Problem Solving System
Bobrow, Daniel .G
The STUDENT  problem solving system, programmed in LISP, accepts as input a comfortable but restricted subset of English which can express a wide variety of algebra story problems.  STUDENT  finds the solution to a large class of these problems.  STUDENT  can utilize a store of global information not specific to any one problem, and may make assumptions about the interpretation of ambiguities in the wording of the problem being solved.  If it uses such information, or makes any assumptions, STUDENT communicates this fact to the user.       The thesis includes a summary of other English language question-answering systems.  All these systems, and STUDENT are evaluated according to four standard criteria.      The linguistic analysis in STUDENT  is a first approximation to the analytic portion of a semantic theory of discourse outlined in the thesis.  STUDENT  finds the set of kernel sentences which are the base of the input discourse, and transforms this sequence of kernel sentences into a set of simultaneous equations which form the semantic base of the Student  system.  STUDENT  then tries to solve this set of equations for the values of requested unknowns.  If it is successful it gives the answers in English.  If not, STUDENT  asks the user for more information, and indicates the nature of the desired information.  The STUDENT  system is a first step toward natural language communication with computers.  Further work on the semantic theory proposed should result in much more sophisticated systems.
</description>
<pubDate>Tue, 01 Sep 1964 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/149326</guid>
<dc:date>1964-09-01T00:00:00Z</dc:date>
</item>
<item>
<title>CARPS: A Program which Solves Calculus Word Problems</title>
<link>https://hdl.handle.net/1721.1/6901</link>
<description>CARPS: A Program which Solves Calculus Word Problems
Charniak, Eugene
A program was written to solve calculus word  problems. The program, CARPS (CALculus  Rate Problem Solver), is restricted to rate  problems. The overall plan of the program is  similar to Bobrow's STUDENT, the primary  difference being the introduction of  "structures" as the internal model in CARPS.  Structures are stored internally as trees. Each  structure is designed to hold the information  gathered about one object. A description of  CARPS is given by working through two  problems, one in great detail. Also included is  a critical analysis of STUDENT.
</description>
<pubDate>Mon, 01 Jul 1968 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/6901</guid>
<dc:date>1968-07-01T00:00:00Z</dc:date>
</item>
<item>
<title>A Modern Differential Geometric Approach to Shape from Shading</title>
<link>https://hdl.handle.net/1721.1/6826</link>
<description>A Modern Differential Geometric Approach to Shape from Shading
Saxberg, Bror V. H.
How the visual system extracts shape  information from a single grey-level image  can be approached by examining how the  information about shape is contained in the  image. This technical report considers the  characteristic equations derived by Horn as a  dynamical system. Certain image critical  points generate dynamical system critical  points. The stable and unstable manifolds of  these critical points correspond to convex and  concave solution surfaces, giving more  general existence and uniqueness results. A  new kind of highly parallel, robust shape from  shading algorithm is suggested on  neighborhoods of these critical points. The  information at bounding contours in the image  is also analyzed.
</description>
<pubDate>Thu, 01 Jun 1989 00:00:00 GMT</pubDate>
<guid isPermaLink="false">https://hdl.handle.net/1721.1/6826</guid>
<dc:date>1989-06-01T00:00:00Z</dc:date>
</item>
</channel>
</rss>
