<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel rdf:about="https://hdl.handle.net/1721.1/29810">
<title>LCS Publications</title>
<link>https://hdl.handle.net/1721.1/29810</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149977.4"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149977.3"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149977.2"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149930.3"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149930.2"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149254.2"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149247.2"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149246.2"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149173.2"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149164.2"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149155.2"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149994"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149993"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149992"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149991"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149990"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149989"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149988"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149987"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149986"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149985"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149984"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149983"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149982"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149981"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149980"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149979"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149978"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149977"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149976"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149975"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149974"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149973"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149972"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149971"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149970"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149969"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149968"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149967"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149966"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149965"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149964"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149963"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149962"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149961"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149960"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149959"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149958"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149957"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149956"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149955"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149954"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149953"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149952"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149951"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149950"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149949"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149948"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149947"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149946"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149945"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149944"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149943"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149942"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149941"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149940"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149939"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149938"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149937"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149936"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149935"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149934"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149933"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149932"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149931"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149930"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149929"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149928"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149927"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149926"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149925"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149924"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149923"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149922"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149921"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149920"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149919"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149918"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149917"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149916"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149915"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149914"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149913"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149912"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149911"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149910"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149909"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149908"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149907"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149906"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149905"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149904"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149903"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149902"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149901"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149900"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149899"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149898"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149897"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149896"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149895"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149894"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149893"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149892"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149891"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149890"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149889"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149888"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149887"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149886"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149885"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149884"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149883"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149882"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149881"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149880"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149879"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149878"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149877"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149876"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149875"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149874"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149873"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149872"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149871"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149870"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149869"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149868"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149867"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149866"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149865"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149864"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149863"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149862"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149861"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149859"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149858"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149857"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149856"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149855"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149854"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149853"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149852"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149851"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149850"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149849"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149848"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149847"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149846"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149845"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149844"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149843"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149842"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149841"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149840"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149839"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149838"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149836"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149835"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149834"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149833"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149832"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149831"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149830"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149829"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149828"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149827"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149826"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149825"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149824"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149823"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149822"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149821"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149820"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149819"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149818"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149817"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149816"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149815"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149814"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149813"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149812"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149811"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149810"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149809"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149808"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149806"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149805"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149804"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149803"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149802"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149801"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149800"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149799"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149798"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149797"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149796"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149795"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149794"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149793"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149792"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149791"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149790"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149789"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149788"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149787"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149786"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149785"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149784"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149783"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149782"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149781"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149780"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149779"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149778"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149777"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149776"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149775"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149774"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149773"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149772"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149771"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149770"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149769"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149768"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149767"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149766"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149765"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149764"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149763"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149762"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149761"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149760"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149759"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149758"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149757"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149756"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149755"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149754"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149753"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149752"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149751"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149750"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149749"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149748"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149747"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149746"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149745"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149744"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149743"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149742"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149741"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149740"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149739"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149738"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149737"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149736"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149735"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149734"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149733"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149732"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149731"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149730"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149729"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149728"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149727"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149726"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149725"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149724"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149723"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149722"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149721"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149720"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149719"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149718"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149717"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149716"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149715"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149714"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149713"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149712"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149711"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149710"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149709"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149708"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149707"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149706"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149705"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149704"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149703"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149702"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149701"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149700"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149699"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149698"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149697"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149696"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149695"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149694"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149693"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149692"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149691"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149690"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149689"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149688"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149687"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149686"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149685"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149684"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149683"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149682"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149681"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149680"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149679"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149678"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149677"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149676"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149675"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149674"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149673"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149672"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149671"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149670"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149669"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149668"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149667"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149666"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149665"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149664"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149663"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149662"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149661"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149660"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149659"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149658"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149657"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149656"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149655"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149654"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149653"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149652"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149651"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149650"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149649"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149648"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149647"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149646"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149645"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149644"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149643"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149642"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149641"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149640"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149639"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149638"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149637"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149636"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149635"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149634"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149633"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149632"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149631"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149630"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149629"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149628"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149627"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149626"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149625"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149624"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149623"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149622"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149621"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149620"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149619"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149618"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149617"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149616"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149615"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149614"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149613"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149612"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149611"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149610"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149609"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149608"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149607"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149606"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149605"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149604"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149603"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149602"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149601"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149600"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149599"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149598"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149597"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149596"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149595"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149594"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149593"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149592"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149591"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149590"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149589"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149588"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149587"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149586"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149585"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149584"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149583"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149582"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149581"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149580"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149579"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149578"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149577"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149576"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149575"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149574"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149573"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149572"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149571"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149570"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149569"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149568"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149567"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149566"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149565"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149564"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149563"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149562"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149561"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149560"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149559"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149558"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149557"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149556"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149555"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149554"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149553"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149552"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149551"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149550"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149549"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149548"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149547"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149546"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149545"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149544"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149543"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149542"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149541"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149540"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149539"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149538"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149537"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149536"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149535"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149534"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149533"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149532"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149531"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149530"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149529"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149528"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149527"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149526"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149525"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149524"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149523"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149522"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149521"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149520"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149519"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149518"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149517"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149516"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149515"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149514"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149513"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149512"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149511"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149510"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149509"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149508"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149507"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149506"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149505"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149504"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149503"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149502"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149501"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149500"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149499"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149498"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149497"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149496"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149495"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149494"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149493"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149492"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149491"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149490"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149489"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149488"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149487"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149486"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149485"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149484"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149483"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149482"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149481"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149480"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149479"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149478"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149477"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149476"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149475"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149474"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149473"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149472"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149471"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149470"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149469"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149468"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149467"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149466"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149465"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149464"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149463"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149462"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149461"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149460"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149459"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149458"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149457"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149456"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149455"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149454"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149453"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149452"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149451"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149450"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149449"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149448"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149447"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149446"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149445"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149444"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149443"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149442"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149441"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149440"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149439"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149438"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149437"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149436"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149435"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149434"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149433"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149432"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149431"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149430"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149429"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149428"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149427"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149426"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149425"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149424"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149423"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149422"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149421"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149420"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149419"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149418"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149417"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149416"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149415"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149414"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149413"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149412"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149411"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149410"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149409"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149408"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149407"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149406"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149405"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149404"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149403"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149402"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149401"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149400"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149399"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149398"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149397"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149396"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149395"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149394"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149393"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149392"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149391"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149390"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149389"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149388"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149387"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149386"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149385"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149384"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149383"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149382"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149381"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149380"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149379"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149378"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149377"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149376"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149375"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149374"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149373"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149372"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149371"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149370"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149369"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149368"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149367"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149366"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149365"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149364"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149363"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149362"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149361"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149360"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149359"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149358"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149357"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149356"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149355"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149354"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149353"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149352"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149351"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149350"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149349"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149348"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149347"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149346"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149345"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149344"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149343"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149342"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149341"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149340"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149339"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149338"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149337"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149336"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149335"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149334"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149333"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149332"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149331"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149330"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149329"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149328"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149327"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149326"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149325"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149324"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149323"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149322"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149321"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149320"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149319"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149318"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149317"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149316"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149315"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149314"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149313"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149312"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149311"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149310"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149309"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149308"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149307"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149306"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149305"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149304"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149303"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149302"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149301"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149300"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149299"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149298"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149297"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149296"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149295"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149294"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149293"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149292"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149291"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149290"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149289"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149288"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149287"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149286"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149285"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149284"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149283"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149282"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149281"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149280"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149279"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149278"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149277"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149276"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149275"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149274"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149273"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149272"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149271"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149270"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149269"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149268"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149267"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149266"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149265"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149264"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149263"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149262"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149261"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149260"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149259"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149258"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149257"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149256"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149255"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149254"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149253"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149252"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149251"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149250"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149249"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149248"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149247"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149246"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149245"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149244"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149243"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149242"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149241"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149240"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149239"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149238"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149237"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149236"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149235"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149234"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149233"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149232"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149231"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149230"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149229"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149228"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149227"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149226"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149225"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149224"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149223"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149222"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149221"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149220"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149219"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149218"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149217"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149216"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149215"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149214"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149213"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149212"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149211"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149210"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149209"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149208"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149207"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149206"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149205"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149204"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149203"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149202"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149201"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149200"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149199"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149198"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149197"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149196"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149195"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149194"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149193"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149192"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149191"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149190"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149189"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149188"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149187"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149186"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149185"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149184"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149183"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149182"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149181"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149180"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149179"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149178"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149177"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149176"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149175"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149174"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149173"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149172"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149171"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149170"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149169"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149168"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149167"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149166"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149165"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149164"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149163"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149162"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149161"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149160"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149159"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149158"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149157"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149156"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149155"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149154"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149153"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149152"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149151"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149150"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149149"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149148"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149147"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149146"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149145"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149144"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149143"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149142"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149141"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149140"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149139"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149138"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149137"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149136"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149135"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149134"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149133"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149132"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149131"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149130"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149129"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149128"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149127"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149126"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149125"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149124"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149123"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149122"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149121"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149120"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149119"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149118"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149117"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149116"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149115"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149114"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149113"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149112"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149111"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149110"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149109"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149108"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149107"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149106"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149105"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149104"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149103"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149102"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149101"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149100"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149099"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149098"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149097"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149096"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149095"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149094"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149093"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149092"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149091"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149090"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149089"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149088"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149087"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149086"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149085"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149084"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149083"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149082"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149081"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149080"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149079"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149078"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149077"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149076"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149075"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149074"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149073"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149072"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149071"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149070"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149069"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149068"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149067"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149066"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149065"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149064"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149063"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149062"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149061"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149060"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149059"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149058"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149057"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149056"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149055"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149054"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149053"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149052"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149051"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149050"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149049"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149048"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149047"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149046"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149045"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149044"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149043"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149042"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149041"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149040"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149039"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149038"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149037"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149036"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149035"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149034"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149033"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149032"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149031"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149030"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149029"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149028"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149027"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149026"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149025"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149024"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149023"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149022"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149021"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149020"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149019"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149018"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149017"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149016"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149015"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149014"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149013"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149012"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149011"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149010"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149009"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149008"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149007"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149006"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149005"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149004"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149003"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149002"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149001"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/149000"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148999"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148998"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148997"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148996"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148995"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148994"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148993"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148992"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148991"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148990"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148989"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148988"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148987"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148986"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148985"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148984"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148983"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148982"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148981"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148980"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148979"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148978"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148977"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148976"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148975"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148974"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148973"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148972"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148971"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148970"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148969"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148968"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148967"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148966"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148965"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148964"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148963"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148962"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148961"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148960"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148959"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148958"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148957"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148956"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148955"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148954"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148953"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148952"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148951"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148950"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148949"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148948"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148947"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148946"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148945"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148944"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148943"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148942"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148941"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148940"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148939"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148938"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148937"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148936"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148935"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148934"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148933"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148932"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148931"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148930"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148929"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148928"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148927"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148926"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148925"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148924"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148923"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148922"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148921"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148920"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148919"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148918"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148917"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148916"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148915"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148914"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148913"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148912"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148911"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148910"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148909"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148908"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148907"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148906"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148905"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148904"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148903"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148902"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148901"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148900"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148899"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148898"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148897"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148896"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148895"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148894"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148893"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148892"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148891"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148890"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148889"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148888"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148887"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148886"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148885"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148884"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148883"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148882"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148881"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148880"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148879"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148878"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148877"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148876"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148875"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148874"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148873"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148872"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148871"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148870"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148869"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148868"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148867"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148866"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148865"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148864"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148863"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148862"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148861"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148860"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148859"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148858"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148857"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148856"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148855"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148854"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148853"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148852"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148851"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148850"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148849"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148848"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148847"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148846"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148845"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148844"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148843"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148842"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148841"/>
<rdf:li rdf:resource="https://hdl.handle.net/1721.1/148840"/>
</rdf:Seq>
</items>
<dc:date>2026-04-07T19:22:47Z</dc:date>
</channel>
<item rdf:about="https://hdl.handle.net/1721.1/149977.4">
<title>The AEGIS Processor Architecture for Tamper-Evident and Tamper-Resistant Processing</title>
<link>https://hdl.handle.net/1721.1/149977.4</link>
<description>The AEGIS Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
Suh, G. Edward; Clarke, Dwaine; Gassend, Blaise; van Dijk, Marten; Devadas, Srinivas
We describe the architecture for a single-chip AEGIS processor which can be used to build computing systems secure against both physical and software attacks. Our architecture assumes that all components external to the processor, such as memory, are untrusted. We show two different implementations. In the first case, the core functionality of the operating system is trusted and implemented in a security kernel. We also describe a variant implementation assuming an untrusted operating system. AEGIS provides users with  tamper-evident, authenticated environments in which any physical or software tampering by an adversary is guaranteed to be detected, and private and authenticated tamper-resistant environments where additionally the adversary is unable to obtain any information about software or data by tampering with, or otherwise observing, system operation. AEGIS enables many applications, such as commercial grid computing, secure mobile agents, software licensing, and digital rights management. We also present a new encryption/decryption method that successfully hides a significant portion of encryption/decryption latency, in comparison to a conventional direct encryption scheme. Efficient memory encryption and integrity verification enable the implementation of a secure computing system with the only trusted component being a single-chip AEGIS CPU. Preliminary simulation results indicate that the overhead of security mechanisms in AEGIS is reasonable.
</description>
<dc:date>2003-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149977.3">
<title>The AEGIS Processor Architecture for Tamper-Evident and Tamper-Resistant Processing</title>
<link>https://hdl.handle.net/1721.1/149977.3</link>
<description>The AEGIS Processor Architecture for Tamper-Evident and Tamper-Resistant Processing
Suh, G. Edward; Clarke, Dwaine; Gassend, Blaise; van Dijk, Marten; Devadas, Srinivas
We describe the architecture of the AEGIS processor which can be used to build computing systems secure against both physical and software attacks. AEGIS assumes that the operating system and all components external to it, such as memory, are untrusted. AEGIS provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be detected, and private and authenticated, tamper-resistant environments where additionally the adversary is unable to obtain any information about software or data by tampering with, or otherwise observing, system operation. AEGIS enables many applications, such as commercial grid computing, software licensing, and digital rights management. We present a new encryption/decryption method that successfully hides a significant portion of encryption/decryption latency, in comparison to a conventional direct encryption scheme. Efficient memory encryption and integrity verification enable the implementation of a secure computing system with the only trusted component being a single-chip AEGIS CPU. Detailed simulation results indicate that the performance overhead of security mechanisms in AEGIS is reasonable.
</description>
<dc:date>2003-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149977.2">
<title>AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing</title>
<link>https://hdl.handle.net/1721.1/149977.2</link>
<description>AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing
Suh, G. Edward; Clarke, Dwaine; Gassend, Blaise; van Dijk, Marten; Devadas, Srinivas
We describe the architecture for a single-chip AEGIS processor which can be used to build computing systems secure against both physical and software attacks. Our architecture assumes that all components external to the processor, such as memory, are untrusted. We show two different implementations. In the first case, the core functionality of the operating system is trusted and implemented in a security kernel. We also describe a variant implementation assuming an untrusted operating system. AEGIS provides users with tamper-evident, authenticated environments in which any physical or software tampering by an adversary is guaranteed to be detected, and private and authenticated tamper-resistant environments where additionally the adversary is unable to obtain any information about software or data by tampering with, or otherwise observing, system operation. AEGIS enables many applications, such as commercial grid computing, secure mobile agents, software licensing, and digital rights management. Preliminary simulation results indicate that the overhead of security mechanisms in AEGIS is reasonable.
</description>
<dc:date>2003-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149930.3">
<title>Hybrid I/O Automata*</title>
<link>https://hdl.handle.net/1721.1/149930.3</link>
<description>Hybrid I/O Automata*
Lynch, Nancy A.; Segala, Roberto; Vaandrager, Frits
Hybrid systems are systems that exhibit a combination of discrete and continuous behavior. Typical hybrid systems include computer components, which operate in discrete program steps, and real-world components, whose behavior over time intervals evolves according to physical constraints. Important examples of hybrid systems include automated transportation systems, robotics systems, process control systems, systems of embedded devices, and mobile computing systems. Such systems can be very complex, and very difficult to describe and analyze. This paper presents the Hybrid Input/Output Automaton (HIOA) modeling framework, a basic mathematical framework to support description and analysis of hybrid systems. An important feature of this model is its support for decomposing hybrid system descriptions. In particular, the framework includes a notion of external behavior for a hybrid I/O automaton, which captures its discrete and continuous interactions with its environment. The framework also defines what it means for one HIOA to implement another, based on an inclusion relationship between their external behavior sets, and defines a notion of simulation, which provides a sufficient condition for demonstrating implementation relationships. The framework also includes a composition operation for HIOAs, which respects external behavior, and a notion of receptiveness, which implies that an HIOA does not block the passage of time. The framework is intended to support analysis methods from both computer science and control theory. This work is a simplification of an earlier version of the HIOA model [49, 50]. The main simplification in the new model is a clearer separation between the mechanisms used to model discrete and continuous interaction between components. In particular, the new model removes the dual use of external variables for discrete and continuous interaction.
</description>
<dc:date>2003-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149930.2">
<title>Hybrid I/O Automata*</title>
<link>https://hdl.handle.net/1721.1/149930.2</link>
<description>Hybrid I/O Automata*
Lynch, Nancy A.; Segala, Roberto; Vaandrager, Frits
Hybrid systems are systems that exhibit a combination of discrete and continuous behavior. Typical hybrid systems include computer components, which operate in discrete program steps, and real-world components, whose behavior over time intervals evolves according to physical constraints. Important examples of hybrid systems include automated transportation systems, robotics systems, process control systems, systems of embedded devices, and mobile computing systems. Such systems can be very complex, and very difficult to describe and analyze. This paper presents the Hybrid Input/Output Automaton (HIOA) modeling framework, a basic mathematical framework to support description and analysis of hybrid systems. An important feature of this model is its support for decomposing hybrid system descriptions. In particular, the framework includes a notion of external behavior for a hybrid I/O automaton, which captures its discrete and continuous interactions with its environment. The framework also defines what it means for one HIOA to implement another, based on an inclusion relationship between their external behavior sets, and defines a notion of simulation, which provides a sufficient condition for demonstrating implementation relationships. The framework also includes a composition operation for HIOAs, which respects external behavior, and a notion of receptiveness, which implies that an HIOA does not block the passage of time. The framework is intended to support analysis methods from both computer science and control theory. This work is a simplification of an earlier version of the HIOA model [49, 50]. The main simplification in the new model is a clearer separation between the mechanisms used to model discrete and continuous interaction between components. In particular, the new model removes the dual use of external variables for discrete and continuous interaction.
</description>
<dc:date>2002-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149254.2">
<title>Enhanced Certificate Revocation</title>
<link>https://hdl.handle.net/1721.1/149254.2</link>
<description>Enhanced Certificate Revocation
Micali, Silvio
We apply off-line/on-line signatures to provide an alternative solution to the problem of certificate revocation. The new systems dismiss with traditional CRLs (Certificate Revocation Lists) and yield public-key infrastructures that are substantially cheaper to run than traditional ones.
</description>
<dc:date>1996-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149247.2">
<title>What are principal typings and what are they good for?</title>
<link>https://hdl.handle.net/1721.1/149247.2</link>
<description>What are principal typings and what are they good for?
Jim, Trevor
We demonstrate the pragmatic value of the principal typing property, a property more general than ML's principal type property, by studying a type system with principal typings. The type system is based on rank 2 intersection types and is closely related to ML. Its principal typing property provides elegant support for separate compilation, including "smartest recompilation" and incremental type inference, and for accurate type error messages. Moreover, it motivates a novel rule for typing recursive definitions that can type many examples of polymorphic recursion.
</description>
<dc:date>1995-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149246.2">
<title>Rank 2 Type Systems and Recursive Definitions</title>
<link>https://hdl.handle.net/1721.1/149246.2</link>
<description>Rank 2 Type Systems and Recursive Definitions
Jim, Trevor
We demonstrate an equivalence between the rank 2 fragments of the polymorphic lambda calculus (System F) and the intersection type discipline: exactly the same terms are typable in each system.  An immediate consequence is that typability in the rank 2 intersection system is DEXPTIME-complete. We introduce a rank 2 system combining intersections and polymorphism and prove that it types exactly the same terms as the other rank 2 systems. The combined system suggests a new rule for typing recursive definitions. The result is a rank 2 type system with decidable type inference that can type some interesting examples of polymorphic recursion. Finally, we discuss some applications of the type system in data representation optimizations such as unboxing and overloading.
</description>
<dc:date>1995-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149173.2">
<title>An Autoimmune Mechanism for AIDS' T4 Lymphopenia</title>
<link>https://hdl.handle.net/1721.1/149173.2</link>
<description>An Autoimmune Mechanism for AIDS' T4 Lymphopenia
Micali, Silvio
We put forward a new model for the T4 lymphopenia occuring in AIDS by suggesting a mechanism whose net effect is blocking the generation of T4 cells during HIV infection. Supporting evidence for this mechanism is derived from the experiments in the recent literature.
</description>
<dc:date>1991-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149164.2">
<title>Randomness-efficient Sampling of Arbitrary Functions</title>
<link>https://hdl.handle.net/1721.1/149164.2</link>
<description>Randomness-efficient Sampling of Arbitrary Functions
Bellare, Mihir; Rompel, John
</description>
<dc:date>1990-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149155.2">
<title>A Modular Drinking Philosophers Algorithm</title>
<link>https://hdl.handle.net/1721.1/149155.2</link>
<description>A Modular Drinking Philosophers Algorithm
Welch, Jennifer Lundelius; Lynch, Nancy A.
A variant of the drinking philosphers algorithm of Chandy and Misra is described and proved correct in a module way, using the I/O automaton model of Lynch and Tuttle. The algorithm of Chandy and Misra is based on an particular dining philosophers algorithm, and relies on certain properties of its implementation. The drinking philosophers algorithm presented in this paper is able to use an arbitrary dining philosophers algorithm as a true subroutine; nothing about the implementation needs to be known, only that is solves the dining philosophers problem. An important advantage of this modularity is that by substituting a more time-efficient dining philosophers algorithm with O(1) worst-case waiting time is obtained, whereas the drinking philosophers algorithm of Chandy and Misra has O(n) worst-case waiting time (for n philosophers). Formal definitions are given to distinguish the drinking and dining philosophers problems and to specify precisely varying degrees of concurrency.
</description>
<dc:date>1992-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149994">
<title>Bandwidth Management in Wireless Sensor Networks</title>
<link>https://hdl.handle.net/1721.1/149994</link>
<description>Bandwidth Management in Wireless Sensor Networks
Hull, Bret; Jamieson, Kyle; Balakrishnan, Hari
Wireless sensor networks are often used in monitoring and control applications, where software running on generalpurpose computers ÔøΩpullÔøΩ information from remote sensors and ÔøΩpushÔøΩ actuations into the network. The sensors themselves form a multihop wireless network communicatingwith one or more sensor access points (SAPs) that interface between application software and the sensor network. This paper addresses the problem of managing wireless network bandwidth and improving network capacity in a sensor network deployed as a shared infrastructure, concurrently used by different applications. Our bandwidth management architecture incorporates three ideas: first, we develop a simple rule system that allows applications and the network administrator to specify how traffic generated by sensors should be treated by the sensor network. Each rule is a function that maps a sensor data type and generated value to a transmission rate and a traffic class. Second, we show how using multiple SAPs and SAP selection method that considers packet loss probabilities, path load, and path lengths improves the capacity of the network and the performance of individual sensor streams. Third, we show that hopby- hop flow control, rather than end-to-end congestion control, is a better way to cope with the nature of sensor network traffic and avoids unnecessary packet losses that waste valuable wireless network bandwidth. Our experimental results from a 40-node indoor wireless sensor testbed show that these three techniques are simple to implement and allow scarce network bandwidth to be used efficiently.
</description>
<dc:date>2003-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149993">
<title>Computer-Enforced Immutability for the Java Language</title>
<link>https://hdl.handle.net/1721.1/149993</link>
<description>Computer-Enforced Immutability for the Java Language
Birka, Adrian
This thesis presents the design, implementation, and evaluation of an extension to the Java language, ConstJava, that is capable of expressing immutability constraints and verifying them at compile time. The specific constraint expressed in ConstJava is that the transitive state of the object to which a given reference refers cannot be modified using that reference. In addition to the ability to specify and enforce this basic constraint, ConstJava includes several other features, such as mutable fields, immutable classes, templates, and the const cast operator, that make ConstJava a more useful language. The thesis evaluates the utility of ConstJava via experiments involving writing ConstJava code and converting Java code to ConstJava code. The evaluation of ConstJava shows that the language provides tangible benefits in early detection and correction of bugs that would otherwise be difficult to catch. There are also costs associated with the use of ConstJava. These are minimized by ConstJavaÔøΩs backward compatibility with Java, and by the high degree of inter-operability of the two languages, which allows for a less painful transition from Java to ConstJava. This technical report is a revision of the authorÔøΩs MasterÔøΩs thesis, which was advised by Prof. Michael D. Ernst.
</description>
<dc:date>2003-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149992">
<title>Compositionality for Probabilistic Automata</title>
<link>https://hdl.handle.net/1721.1/149992</link>
<description>Compositionality for Probabilistic Automata
Lynch, Nancy A.; Segala, Roberto; Vaandrager, Frits
We establish that on the dfomain of probabilistic automata, the trace distribution preorder coincides with the simulation preorder.
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149991">
<title>Subexponential Parameterized Algorithms on Graphs of Bounded Genus and H-minor-free Graphs</title>
<link>https://hdl.handle.net/1721.1/149991</link>
<description>Subexponential Parameterized Algorithms on Graphs of Bounded Genus and H-minor-free Graphs
Demaine, Erik D.; Fomin, Fedor V.; Hajiaghayi, Mohammad Taghi; Thilikos, Dimitrios M.
We introduce a new framework for designing fixed-parameter algorithms with subexponential running time---2^O(sqrt k) n^O(1).  Our results apply to a broad family of graph problems, called bidimensional problems, which includes many domination and covering problems such as vertex cover, feedback vertex set, minimum maximal matching, dominating set, edge dominating set, clique-transversal set, and many others restricted to bounded genus graphs. Furthermore, it is fairly straightforward to prove that a problem is bidimensional.  In particular, our framework includes as special cases all previously known problems to have such subexponential algorithms.  Previously, these algorithms applied to planar graphs, single-crossing-minor-free graphs, and/or map graphs; we extend these results to apply to bounded-genus graphs as well.  In a parallel development of combinatorial results, we establish an upper bound on the treewidth (or branchwidth) of a bounded-genus graph that excludes some planar graph H as a minor.  This bound depends linearly on the size |V(H)| of the excluded graph H and the genus g(G) of the graph G, and applies and extends the graph-minors work of Robertson and Seymour.   Building on these results, we develop subexponential fixed-parameter algorithms for dominating set, vertex cover, and set cover in any class of graphs excluding a fixed graph H as a minor.  In particular, this general category of graphs includes planar graphs, bounded-genus graphs, single-crossing-minor-free graphs, and any class of graphs that is closed under taking minors. Specifically, the running time is 2^O(sqrt k) n^h, where h is a constant depending only on H, which is polynomial for k = O(log^2 n).  We introduce a general approach for developing algorithms on H-minor-free graphs, based on structural results about H-minor-free graphs at the heart of Robertson and Seymour's graph-minors work.  We believe this approach opens the way to further development on problems in H-minor-free graphs.
</description>
<dc:date>2003-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149990">
<title>Fixed Parameter Algorithms for Minor-Closed Graphs (of Locally Bounded Treewidth)</title>
<link>https://hdl.handle.net/1721.1/149990</link>
<description>Fixed Parameter Algorithms for Minor-Closed Graphs (of Locally Bounded Treewidth)
Demaine, Erik D.; Hajiaghayi, Mohammad Taghi
Frick and Grohe showed that for each property phi that is definable in first-order logic, and for each class of minor-closed graphs of locally bounded treewidth, there is an O(n^(1+epsilon))-time algorithm deciding whether a given graph has property phi. In this paper, we extend this result for fixed-parameter algorithms and show that any minor-closed [contraction-closed] bidimensional parameter which can be computed in polynomial time on graphs of bounded treewidth is also fixed-parameter tractable on general minor-closed graphs [minor-closed class of graphs of locally bounded treewidth].  These parameters include many domination and covering parameters such as vertex cover, feedback vertex set, dominating set, and clique-transversal set.  Our algorithm is very simple and its running time is explicit (in contrast to the work of Frick and Grohe).  Along the way, we obtain interesting combinatorial bounds between the aforementioned parameters and the treewidth of the graphs.
</description>
<dc:date>2003-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149989">
<title>Equivalence of Local Treewidth and Linear Local Treewidth and its Algorithmic Applications</title>
<link>https://hdl.handle.net/1721.1/149989</link>
<description>Equivalence of Local Treewidth and Linear Local Treewidth and its Algorithmic Applications
Demaine, Erik D.; Hajiaghayi, Mohammad Taghi
We solve an open problem posed by Eppstein in 1995 and re-enforced by Grohe concerning locally bounded treewidth in minor-closed families of graphs. A graph has bounded local treewidth if the subgraph induced by vertices within distance r of any vertex has treewidth bounded by a function of r (not n). Eppstein characterized minor-closed families of graphs with bounded local treewidth as precisely minor-closed families that minor-exclude an apex graph, where an apex graph has one vertex whose removal leaves a planar graph. In particular, Eppstein showed that all apex-minor-free graphs have bounded local treewidth, but his bound is doubly exponential in r, leaving open whether a tighter bound could be obtained.  We improve this doubly exponential bound to a linear bound, which is optimal. In particular, any minor-closed graph family with bounded local treewidth has linear local treewidth. Our bound generalizes previously known linear bounds for special classes of graphs proved by several authors.  As a consequence of our result, we obtain substantially faster polynomial-time approximation schemes for a broad class of problems in apex-minor-free graphs, improving the running time from 2^(2^(2^O(1/epsilon))) n^O(1) to 2^O(1/epsilon) n^O(1).
</description>
<dc:date>2003-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149988">
<title>Snapshots in a Distributed Persistent Object Storage System</title>
<link>https://hdl.handle.net/1721.1/149988</link>
<description>Snapshots in a Distributed Persistent Object Storage System
Moh, Chuang-Hue
</description>
<dc:date>2003-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149987">
<title>Incremental Multiset Hash Functions and their Application to Memory Integrity Checking</title>
<link>https://hdl.handle.net/1721.1/149987</link>
<description>Incremental Multiset Hash Functions and their Application to Memory Integrity Checking
Clarke, Dwaine; Devadas, Srinivas; van Dijk, Marten; Gassend, Blaise; Suh, G. Edward
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). They map multisets of arbitrary finite size to strings (hashes) of fixed length. They are incremental in that, when new members are added to the multiset, the hash can be updated in time proportional to the change. The functions may be multiset-collision resistant in that it is diÔøΩcult to find two multisets which produce the same hash, or just set-collision resistant in that it is diÔøΩcult to find a set and a multiset which produce the same hash. In particular, we introduce four multiset hash functions, each with its own advantages. MSet-XOR-Hash uses the XOR operation and is very eÔøΩcient; however, it uses a secret key and is only set-collision resistant. MSet-Add-Hash uses addition modulo a large integer and, thus, is slightly less eÔøΩcient than MSet-XOR-Hash; MSet-Add-Hash also uses a secret key but it is multiset-collision resistant. MSet-Mu-Hash uses finite field arithmetic and is not as eÔøΩcient as the other two hash functions; however, MSet-Mu-Hash is multiset-collision resistant, and unlike the other two hash functions, does not require a secret key. MSet-VAdd-Hash is more eÔøΩcient than MSet-Mu-Hash; it is also multiset-collision resistant, and does not use a secret key, but the hashes it produces are significantly longer than the hashes of the other functions. The proven security of MSet-XOR-Hash and MSet-Add-Hash is quantitative. We reduce the hardness of finding collisions to the hardness of breaking the underlying pseudorandom functions. The proven security of MSet-Mu-Hash is in the random oracle model and is based on the hardness of the discrete logarithm problem. The proven security of MSet-VAdd-Hash is also in the random oracle model and is based on the hardness of the worst-case shortest vector problem. We demonstrate how set-collision resistant multiset hash functions make an existing oÔøΩine memory integrity checker secure against active adversaries. We improve on this checker such that it can use smaller time stamps without increasing the frequency of checks. The improved checker uses multiset-collision resistant hash functions
</description>
<dc:date>2003-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149986">
<title>Improving Application-level Network Services with Regions</title>
<link>https://hdl.handle.net/1721.1/149986</link>
<description>Improving Application-level Network Services with Regions
Li, Ji
The underlying premise of the Region Project is that the concept of a region should be a new architecture capability in networking. A region is an entity that encapsulates and implements scoping, grouping, subdividing, and crossing boundaries of sets of entities. It is a powerful tool for managing the increasingly complex demands on the Internet and its successors, and thus should be made into an explicit, first-class component of the network architecture. Autonomous Systems and peer-to-peer networks can be viewed as two simple forms of existing regions. In this work, we explore the utility of informing members in one region of the membership of those same entities in different regions. Specifically, we improve peer-to-peer networks with information derived from Autonomous Systems. This thesis makes three notable contributions. Firstly, we provide a general peer-to-peer simulation framework for different optimization schemes. Secondly, we achieve performance improvements in the lookup, caching and replication of peer-to-peer system. Finally, we enhance our overall understanding of regions through the simulation, as well as their utilities to improve system performance.
</description>
<dc:date>2003-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149985">
<title>Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks</title>
<link>https://hdl.handle.net/1721.1/149985</link>
<description>Sift: A MAC Protocol for Event-Driven Wireless Sensor Networks
Jamieson, Kyle; Balakrishnan, Hari; Tay, Y.C.
Nodes in sensor networks often encounter spatially-correlated contention, where multiple nodes in the same neighborhood all sense an event they need to transmit information about. Furthermore, in many sensor network applications, it is sufficient if a subset of the nodes that observe the same event report it. We show that traditional carrier-sense multiple access (CSMA) protocols like 802.11 do not handle the first constraint adequately, and do not take advantage of the second property, leading to degraded latency and throughput as the network scales in size.   We present Sift, a medium access protocol for wireless sensor networks designed with the above observations in mind. Sift is a randomized CSMA protocol, but unlike previous protocols, does not use a time-varying contention window from which a node randomly picks a transmission slot. Rather, to reduce the latency for the delivery of event reports, Sift uses a fixed-size contention window and a carefully-chosen, non-uniform probability distribution of transmitting in each slot within the window. We show using simulations that Sift can offer up to a 7-fold latency reduction compared to 802.11 as the size of the sensor network scales up to 500 nodes. We then analytically prove bounds on the best latency achievable by a decentralized CSMA-based MAC protocol for sensor networks where one report of each event is enough, and show that Sift comes close to meeting this bound.
</description>
<dc:date>2003-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149984">
<title>Anchor-free Distributed Localization in Sensor Networks</title>
<link>https://hdl.handle.net/1721.1/149984</link>
<description>Anchor-free Distributed Localization in Sensor Networks
Priyantha, Nissanka B.; Balakrishnan, Hari; Demaine, Erik; Teller, Seth
Many sensor network applications require that each node's sensor stream be annotated with its physical location in some common coordinate system. Manual measurement and configuration methods for obtaining location don't scale and are error-prone, and equipping sensors with GPS is often expensive and does not work in indoor and urban deployments. Sensor networks can therefore benefit from a self-configuring method where nodes cooperate with each other, estimate local distances to their neighbors, and converge to a consistent coordinate assignment. This paper describes a fully decentralized algorithm called AFL (Anchor-Free Localization) where nodes start from a random initial coordinate assignment and converge to a consistent solution using only local node interactions. The key idea in AFL is fold-freedom, where nodes first configure into a topology that resembles a scaled and unfolded version of the true configuration, and then run a force-based relaxation procedure. We show using extensive simulations under a variety of network sizes, node densities, and distance estimation errors that our algorithm is superior to previously proposed methods that incrementally compute the coordinate of nodes in the network, in terms of its ability to computer correct coordinates under a wider variety of conditions and its robuestness to measurement errors.
</description>
<dc:date>2003-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149983">
<title>System Dependence Graph Construction for Aspect-Oriented Programs</title>
<link>https://hdl.handle.net/1721.1/149983</link>
<description>System Dependence Graph Construction for Aspect-Oriented Programs
Zhao, Jianjun; Rinard, Martin
We extend previous dependence-based representations called system dependence graphs (SDGs) to represent aspect-oriented programs and present an SDG construction algorithm. This algorithm first constructs a module dependence graph (MDG) for each piece of advice, introduction, and method in aspects and classes. It then uses existing techniques to connect the MDGs at call sites to form a partial SDG. Finally, it weaves the MDG for each piece of advice into the partial SDG for those methods whose behavior may be affected by the advice. The result is the complete SDG. Our SDGs capture the additional structure present in many aspect-oriented features such as join points, advice, introduction, aspects, and aspect inheritance, and various types of interactions between aspects and classes. They also correctly reflect the semantics of aspect-oriented concepts such as advice precedence, introduction scope, and aspect weaving. SDGs therefore provide a solid foundation for the further analysis of aspect-oriented programs.
</description>
<dc:date>2003-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149982">
<title>RAMBO II: Rapidly Reconfigurable Atomic Memory for Dynamic Networks</title>
<link>https://hdl.handle.net/1721.1/149982</link>
<description>RAMBO II: Rapidly Reconfigurable Atomic Memory for Dynamic Networks
Gilbert, Seth; Lynch, Nancy A.; Shvartsman, Alexander A.
Future civilian rescue and military operations will depend on a complex system of communicating devices that can operate in highly dynamic environments. In order to present a consistent view of a complex world, these devices will need to maintain data objects with atomic (linearizable) read/write semantics.
</description>
<dc:date>2003-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149981">
<title>Inference of Generic Types in Java</title>
<link>https://hdl.handle.net/1721.1/149981</link>
<description>Inference of Generic Types in Java
Donovan, Alan; Ernst, Michael D.
Future versions of Java will include support for parametric polymorphism, or generic classes.  This will bring many benefits to Java programmers, not least because current Java practise makes heavy use of pseudo-generic classes.  Such classes (for example, those in package java.util) have logically generic specifications and documentation, but the type system cannot prove their patterns of use to be safe.   This work aims to solve the problem of automatic translation of Java source code into Generic Java (GJ) source code.  We present two algorithms that together can be used to translate automatically a Java source program into a semantically-equivalent GJ program with generic types.   The first algorithm infers a candidate generalisation for any class, based on the methods of that class in isolation.  The second algorithm analyses the whole program; it determines a precise parametric type for every value in the program.  Optionally, it also refines the generalisations produced by the first analysis as required by the patterns of use of those classes in client code.
</description>
<dc:date>2003-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149980">
<title>Building Data Structures on Untrusted Peer-to-Peer Storage with Per-participant Logs</title>
<link>https://hdl.handle.net/1721.1/149980</link>
<description>Building Data Structures on Untrusted Peer-to-Peer Storage with Per-participant Logs
Chen, Benjie; Gil, Thomer M.; Muthitacharoen, Athicha; Morris, Robert T.
L* is a technique for building multi-user distributed data structures out of untrusted peer-to-peer distributed hash tables (DHTs). L* uses multiple logs, one log per participant, to store changes to the data structure. Each participant finds data by consulting all logs, but performs modifications by appending only to its own log. This dencentralized structure allows L* to maintain meta-data consistency without locking and to isolate users' changes from each other, an appropriate arrangement for unreliable users. Applications use L* to maintain consistent data structures. L* interleaves multiple logs deterministically so that decentralized clients can agree on the order of completed operations, even if those operations where issued concurrently. When the data structure is quiescent, L* guarantees that clients agree on the state of the data structure. L* optionally provides mutual exclusion for applications that need to ensure atomicity for multi-step operations. The Ivy file system, built on top of L*, demonstrates that L*'s consistency guarantees are useful and can be used and implemented efficiently.
</description>
<dc:date>2003-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149979">
<title>Efficient Consistency Proofs on a Committed Database</title>
<link>https://hdl.handle.net/1721.1/149979</link>
<description>Efficient Consistency Proofs on a Committed Database
Ostrovsky, Rafail; Rackoff, Charles; Smith, Adam
A consistent query protocol allows a database owner to publish a very short string c which commits her to a particular database D with special consistency property (i.e., given c, every allowable query has unique and well-defined answer with respect to D.)  Moreover, when a user makes a query, any server hosting the database can answer the query, and provide a very short proof P that the answer is well-defined, unique, and consistent with c (and hence with D).  One potential application of consistent query protocols is for guaranteeing the consistency of many replicated copies of D---the owner can publish c, and users can verify the consistency of a query to some copy of D by making sure P is consistent with c.  This strong guarantee holds even for owners who try to cheat, while creating c.  The task of consistent query protocols was originally proposed for membership queries by Micali and Rabin, and subsequently and independently, by Kilian. In this setting a server can prove to a client whether or not a given key is present or not in a database, based only on a short public commitment c.  We strengthen their results in several ways. For membership queries, we improve the communication complexity; more importantly, we provide protocols for more general types of queries and more general relational databases.  For example, we consider databases in which entries have several keys and where we allow range queries (e.g. we allow a client to ask for all entries within a certain age range and a certain salary range).   Towards this goal, we introduce query algorithms with certain inherent robustness properties---called data-robust algorithms---and show how this robustness can be achieved. In particular, we illustrate our general technique by constructing an efficient data-robust algorithm for proving consistency of orthogonal range queries (a particular case of a ``join''query).  The server's proof convinces the client not only that all the matching entries provided are in D, but also that no others are present.  Our guarantees hold even if the answer is the empty set.  In the case of one-dimensional range queries we also show a new data-hiding technique---called explicit hashing---which allows us to a execute consistent query protocol P and at the same time protect the privacy of all other information in the database efficiently. In particular, we avoid the NP reductions required in a generic zero-knowledge proof.
</description>
<dc:date>2003-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149978">
<title>REX: Secure, modular remote execution through file descriptor passing</title>
<link>https://hdl.handle.net/1721.1/149978</link>
<description>REX: Secure, modular remote execution through file descriptor passing
Kaminsky, Michael; Peterson, Eric; Fu, Kevin; Mazières, David; Kaashoek, M. Frans
The ubiquitous SSH package has demonstrated the importance of   secure remote login and execution.  This paper presents a new system,   REX, designed to provide remote login and execution in the context of   the SFS secure distributed file system.  REX departs from traditional   remote login design and is built around two main mechanisms---file   descriptor passing and a user agent process.        File descriptor passing allows REX to be split into several   smaller pieces; privileged code can run as its own process to   provide enhanced security guarantees.  REX also emulates secure file   descriptor passing over network connections, allowing users to build   extensions to REX outside of the core REX software.        REX uses and extends SFS's agent mechanism to provide a   transparent distributed computing environment to users.  The   agent stores private keys, server nicknames, and other per-user   configuration state; REX makes the SFS agent available to programs   that it executes on remote machines.        We have an implementation of REX and demonstrate that its   flexibility does not come at the cost of performance.  Initial REX   connections are comparable to those of SSH in speed, while subsequent   connections are much faster because REX exploits the SFS agent to   cache connection state to avoid costly public-key operations.
</description>
<dc:date>2003-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149977">
<title>The AEGIS Processor Architecture for Tamper-Evident and Private Tamper-Resistant Processing</title>
<link>https://hdl.handle.net/1721.1/149977</link>
<description>The AEGIS Processor Architecture for Tamper-Evident and Private Tamper-Resistant Processing
Suh, G. Edward; Clarke, Dwaine; Gassend, Blaise; van Dijk, Marten; Devadas, Srinivas
We describe the architecture of the AEGIS processor which can be used to build computing systems secure against both physical and software attacks. AEGIS assumes that the operating system and all components external to it, such as memory, are untrusted. AEGIS provides tamper-evident, authenticated environments in which any physical or software tampering by the adversary is guaranteed to be detected, and private and authenticated, tamper-resistant environments where additionally the adversary is unable to obtain any information about software or data by tampering with, or otherwise observing, system operation. AEGIS enables many applications, such as commercial grid computing, software licensing, and digital rights management. We present a new encryption/decryption method that successfully hides a significant portion of encryption/decryption latency, in comparison to a conventional direct encryption scheme. Efficient memory encryption and integrity verification enable the implementation of a secure computing system with the only trusted component being a single-chip AEGIS CPU. Detailed simulation results indicate that the performance overhead of security mechanisms in AEGIS is reasonable.
</description>
<dc:date>2003-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149976">
<title>Efficient Web Browsing for Mobile Clients using HTTP Compression</title>
<link>https://hdl.handle.net/1721.1/149976</link>
<description>Efficient Web Browsing for Mobile Clients using HTTP Compression
Krashinsky, Ronny
Efficient web browsing on mobile computers presents a unique challenge.  These machines are different from other classes of client computers since they have relatively low-bandwidth connections and they are battery-powered and therefore limited by their energy consumption.  However, they tend to interact with the same servers for the delivery of web content.  This project investigates optimizing the final critical link between a mobile client and a stationary base station by compressing HTTP request and response messages.  Using a split proxy design, compression of individual request messages reduces bandwidth by 26% to 34% across a variety of benchmark traces, and applying compression to response messages yields savings of 59% to 82% of the compressible data.  Higher compression rates are achieved by using streaming compression algorithms to compress the streams of request and response messages.  In this case, the bandwidth for requests sees an order of magnitude improvement, and the response stream obtains additional savings of 7% to 25% on top of the savings achieved with per-response compression.
</description>
<dc:date>2003-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149975">
<title>Physical Random Functions</title>
<link>https://hdl.handle.net/1721.1/149975</link>
<description>Physical Random Functions
Gassend, Blaise
In general, secure protocols assume that participants are able to maintain secret key information. In practice, this assumption is often incorrect as an increasing number of devices are vulnerable to physical attacks.  Typical examples of vulnerable devices are smartcards and Automated Teller Machines.   To address this issue, Physical Random Functions are introduced. These are Random Functions that are physically tied to a particular device. To show that Physical Random Functions solve the initial problem, it must be shown that they can be made, and that it is possible to use them to provide secret keys for higher level protocols. Experiments with Field Programmable Gate Arrays are used to evaluate the feasibility of Physical Random Functions in silicon.
</description>
<dc:date>2003-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149974">
<title>On the Theory of Structural Subtyping</title>
<link>https://hdl.handle.net/1721.1/149974</link>
<description>On the Theory of Structural Subtyping
Kuncak, Viktor; Rinard, Martin
We show that the first-order theory of structural subtyping of non-recursive types is decidable.   Let Sigma be a language consisting of function symbols (representing type constructors) and C a decidable structure in the relational language L containing a binary relation &lt;. C represents primitive types; &lt; represents a subtype ordering.  We introduce the notion of Sigma-term-power of C, which generalizes the structure arising in structural subtyping.  The domain of the Sigma-term-power of C is the set of Sigma-terms over the set of elements of C.   We show that the decidability of the first-order theory of C implies the decidability of the first-order theory of the Sigma-term-power of C.  This result implies the decidability of the first-order theory of structural subtyping of non-recursive types.   Our decision procedure is based on quantifier elimination and makes use of quantifier elimination for term algebras and Feferman-Vaught construction for products of decidable structures.   We also explore connections between the theory of structural subtyping of recursive types and monadic second-order theory of tree-like structures.  In particular, we give an embedding of the monadic second-order theory of infinite binary tree into the first-order theory of structural subtyping of recursive types.
</description>
<dc:date>2003-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149973">
<title>Boosting Fault-Tolerance in Asynchronous Message Passing Systems is Impossible</title>
<link>https://hdl.handle.net/1721.1/149973</link>
<description>Boosting Fault-Tolerance in Asynchronous Message Passing Systems is Impossible
Attie, Paul C.; Lynch, Nancy A.; Rajsbaum, Sergio
</description>
<dc:date>2002-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149972">
<title>Economic Mechanisms for Efficient Wireless Coexistence</title>
<link>https://hdl.handle.net/1721.1/149972</link>
<description>Economic Mechanisms for Efficient Wireless Coexistence
Aftab, Omar
</description>
<dc:date>2002-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149971">
<title>Automatic Detection and Repair of Errors in Data Structures</title>
<link>https://hdl.handle.net/1721.1/149971</link>
<description>Automatic Detection and Repair of Errors in Data Structures
Demsky, Brian; Rinard, Martin
We present a system that accepts a specification of key data structure constraints, then dynamically detects and repairs violations of these constraints. Our experience using our system indicates that the specifications are relatively easy to develop once one understands the data structures. Furthermore, for our set of benchmark applications, our system can effectively repair errors to deliver consistent data structures that allow the program to continue to operate successfully within its designed operating envelope.
</description>
<dc:date>2002-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149970">
<title>A Type System and Analysis for the Automatic Extraction and Enforcement of Design Information</title>
<link>https://hdl.handle.net/1721.1/149970</link>
<description>A Type System and Analysis for the Automatic Extraction and Enforcement of Design Information
Lam, Patrick; Rinard, Martin
We present a new type system and associated type checker, analysis, and model extraction algorithms for automatically extracting models that capture aspects of the design of the program. Our type system enables the developer to place a _token_ on each object; this token serves as the object's representative during the analysis and model extraction. The polymorphism in our type system enables the use of general-purpose classes whose instances may serve different purposes in the computation; programmers may also hide the details of internal data structures by placing the same token on all of the objects in these data structures.  Our combined type system and analysis provide the model extraction algorithms with sound heap aliasing information. Our algorithms can therefore extract both structural models that characterize object referencing relationships and behavioral models that capture indirect interactions mediated by objects in the heap. Previous approaches, in contrast, in the absence of aliasing information, have focused on control-flow interactions that take place at procedure call boundaries. We have implemented our type checker, analysis, and model extraction algorithms and used them to produce design models. Our experience indicates that it is straightforward to produce the token annotations and that the extracted models provide useful insight into the structure and behavior of the program.
</description>
<dc:date>2002-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149969">
<title>A Dynamic Primary View Group Communication Service</title>
<link>https://hdl.handle.net/1721.1/149969</link>
<description>A Dynamic Primary View Group Communication Service
De Prisco, Roberto; Fekete, Alan; Lynch, Nancy A.; Shvartsman, Alexander A.
</description>
<dc:date>2002-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149968">
<title>Hardware Mechanisms for Memory Integrity Checking</title>
<link>https://hdl.handle.net/1721.1/149968</link>
<description>Hardware Mechanisms for Memory Integrity Checking
Suh, G. Edward; Clarke, Dwaine; Gassend, Blaise; van Dijk, Marten; Devadas, Srinivas
Memory integrity verification is a useful primitive when implementing  secure processors that are resistant to attacks on hardware components.  This paper proposes new hardware schemes to verify the integrity of  untrusted external memory using a very small amount of trusted on-chip  storage. Our schemes maintain incremental multiset hashes of all memory  reads and writes at run-time, and can verify a {\\em sequence} of memory  operations at a later time. We study the advantages and disadvantages of  the two new schemes and two existing integrity checking schemes, MACs  and hash trees, when implemented in hardware in a microprocessor.  Simulations show that the new schemes outperform existing schemes of  equivalent functionality when integrity verification is infrequent.
</description>
<dc:date>2002-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149967">
<title>Offline Integrity Checking of Untrusted Storage</title>
<link>https://hdl.handle.net/1721.1/149967</link>
<description>Offline Integrity Checking of Untrusted Storage
Clarke, Dwaine; Gassend, Blaise; Suh, G. Edward; van Dijk, Marten; Devadas, Srinivas
</description>
<dc:date>2002-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149966">
<title>Access-Controlled Resource Discovery for Pervasive Networks</title>
<link>https://hdl.handle.net/1721.1/149966</link>
<description>Access-Controlled Resource Discovery for Pervasive Networks
Raman, Sanjay; Clarke, Dwaine; Burnside, Matt; Devadas, Srinivas; Rivest, Ronald L.
Networks of the future will be characterized by a variety of computational devices that display a level of dynamism not seen in traditional wired networks. Because of the dynamic nature of these networks, resource discovery is one of the fundamental problems that must be faced. While resource discovery systems are not a novel concept, securing these systems in an efficient and scalable way is challenging. This paper describes the design and implementation of an architecture for access-controlled resource discovery. This system achieves this goal by integrating access control with the Intentional Naming System (INS), a resource discovery and service location system. The integration is scalable, efficient, and fits well within a proxy-based security framework designed for dynamic networks. We provide performance experiments that show how our solution outperforms existing schemes. The result is a system that provides secure, access-controlled resource discovery that can scale to large numbers of resources and users
</description>
<dc:date>2002-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149965">
<title>A Type System for Safe Region-Based Memory Management in Real-Time Java</title>
<link>https://hdl.handle.net/1721.1/149965</link>
<description>A Type System for Safe Region-Based Memory Management in Real-Time Java
Salcianu, Alexandru; Boyapati, Chandrasekhar; Beebee, William S., Jr.; Rinard, Martin
The Real-Time Specification for Java (RTSJ) allows a program to create real-time threads with hard real time constraints. Real-time threads use immortal memory and region-based memory management to avoid unbounded pauses caused by interference from the garbage collector. The RTSJ uses runtime checks to ensure that deleting a region does not create dangling references and that real-time threads do not access references to objects allocated in the garbage-collected heap. This paper presents a static type system that guarantees that these runtime checks will never fail for well-typed programs. Our type system therefore 1) provides an important safety guarantee for real-time programs and 2) makes it possible to eliminate the runtime checks and their associated overhead. Our system also makes several contributions over previous work on region types. For object-oriented programs, it combines region types and ownership types in a unified type system framework. For multithreaded programs, it allows long-lived threads to share objects without using the heap and without having memory leaks. For real-time programs, it ensures that real-time threads do not interfere with the garbage collector. We have implemented several programs in our system. Our experience indicates that our type system is sufficiently expressive and requires little programming overhead. We also ran these programs on our RTSJ platform. Our experiments show that eliminating the RTSJ runtime checks using a static type system can significantly decrease the execution time of a real-time program.
</description>
<dc:date>2002-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149964">
<title>A Formal Venture into Reliable Multicast Territory</title>
<link>https://hdl.handle.net/1721.1/149964</link>
<description>A Formal Venture into Reliable Multicast Territory
Livadas, Carolos; Lynch, Nancy A.
</description>
<dc:date>2002-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149963">
<title>The Case for Exploiting Packet Loss Locality in Multicast Loss Recovery</title>
<link>https://hdl.handle.net/1721.1/149963</link>
<description>The Case for Exploiting Packet Loss Locality in Multicast Loss Recovery
Livadas, Carolos; Keidar, Idit
</description>
<dc:date>2002-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149962">
<title>Blueware: Bluetooth Simulator for ns</title>
<link>https://hdl.handle.net/1721.1/149962</link>
<description>Blueware: Bluetooth Simulator for ns
Tan, Godfrey
</description>
<dc:date>2002-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149961">
<title>Tetris is Hard, Even to Approximate</title>
<link>https://hdl.handle.net/1721.1/149961</link>
<description>Tetris is Hard, Even to Approximate
Demaine, Erik D.; Hohenberger, Susan; Liben-Nowell, David
</description>
<dc:date>2002-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149960">
<title>The Facility Location Problem with Concave Cost Functions</title>
<link>https://hdl.handle.net/1721.1/149960</link>
<description>The Facility Location Problem with Concave Cost Functions
Hajiaghayi, Mohammad Taghi; Mahdian, Mohammad; Mirrokni, Vahab S.
</description>
<dc:date>2002-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149959">
<title>Scalar Operand Networks: On-chip interconnect for ILP in Partitioned Architechures</title>
<link>https://hdl.handle.net/1721.1/149959</link>
<description>Scalar Operand Networks: On-chip interconnect for ILP in Partitioned Architechures
Taylor, Michael Bedford; Lee, Walter; Amarasinghe, Saman; Agarwal, Anant
</description>
<dc:date>2002-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149958">
<title>Ownership Types and Safe Lazy Upgrades in Object-Oriented Databases</title>
<link>https://hdl.handle.net/1721.1/149958</link>
<description>Ownership Types and Safe Lazy Upgrades in Object-Oriented Databases
Boyapati, Chandrasekhar; Liskov, Barbara H.; Shrira, Liuba
</description>
<dc:date>2002-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149957">
<title>Caches and Merkle Trees for Efficient Memory Authentication</title>
<link>https://hdl.handle.net/1721.1/149957</link>
<description>Caches and Merkle Trees for Efficient Memory Authentication
Gassend, Blaise; Suh, G. Edward; Clarke, Dwaine; van Dijk, Marten; Devadas, Srinivas
</description>
<dc:date>2002-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149956">
<title>Delay-Based Circuit Authentication With Application to Key Cards</title>
<link>https://hdl.handle.net/1721.1/149956</link>
<description>Delay-Based Circuit Authentication With Application to Key Cards
Gassend, Blaise; Clarke, Dwaine; van Dijk, Marten; Devadas, Srinivas
</description>
<dc:date>2002-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149955">
<title>Safe Runtime Downcasts With Ownership Types</title>
<link>https://hdl.handle.net/1721.1/149955</link>
<description>Safe Runtime Downcasts With Ownership Types
Boyapati, Chandrasekhar; Lee, Robert; Rinard, Martin
</description>
<dc:date>2002-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149954">
<title>Automatic Generation and Checking of Program Specifications</title>
<link>https://hdl.handle.net/1721.1/149954</link>
<description>Automatic Generation and Checking of Program Specifications
Nimmer, Jeremy
</description>
<dc:date>2002-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149953">
<title>Safe Lazy Software Upgrades in Object-Oriented Databases</title>
<link>https://hdl.handle.net/1721.1/149953</link>
<description>Safe Lazy Software Upgrades in Object-Oriented Databases
Liskov, Barbara H.; Moh, Chuang-Hue; Richman, Steven; Shrira, Liuba; Chueng, Yin; Boyapati, Chandrasekhar
</description>
<dc:date>2002-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149952">
<title>Combining Abstraction with Byzantine Fault-Tolerance</title>
<link>https://hdl.handle.net/1721.1/149952</link>
<description>Combining Abstraction with Byzantine Fault-Tolerance
Rodrigues, Rodrigo
</description>
<dc:date>2001-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149951">
<title>A Scalable Byzantine Fault Tolerant Secure Domain Name Service</title>
<link>https://hdl.handle.net/1721.1/149951</link>
<description>A Scalable Byzantine Fault Tolerant Secure Domain Name Service
Ahmed, Sarah
</description>
<dc:date>2001-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149950">
<title>Improving Test Suites via Generated Specifications</title>
<link>https://hdl.handle.net/1721.1/149950</link>
<description>Improving Test Suites via Generated Specifications
Harder, Michael
</description>
<dc:date>2002-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149949">
<title>A Trusted Third-Party Computation Service</title>
<link>https://hdl.handle.net/1721.1/149949</link>
<description>A Trusted Third-Party Computation Service
Ajmani, Sameer; Morris, Robert T.; Liskov, Barbara H.
</description>
<dc:date>2001-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149948">
<title>A Trusted Execution Platform for Multiparty Computation</title>
<link>https://hdl.handle.net/1721.1/149948</link>
<description>A Trusted Execution Platform for Multiparty Computation
Ajmani, Sameer
</description>
<dc:date>2000-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149947">
<title>Controlled Physical Unknown Functions: Applications to Secure Smartcards and Certified Execution</title>
<link>https://hdl.handle.net/1721.1/149947</link>
<description>Controlled Physical Unknown Functions: Applications to Secure Smartcards and Certified Execution
Gassend, Blaise; Clarke, Dwaine; van Dijk, Marten; Devadas, Srinivas
</description>
<dc:date>2002-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149946">
<title>A Double-Pulsed Set-Conditional-Reset Flip-Flop</title>
<link>https://hdl.handle.net/1721.1/149946</link>
<description>A Double-Pulsed Set-Conditional-Reset Flip-Flop
Ma, Albert; Asanovi_, Krste
</description>
<dc:date>2002-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149945">
<title>The IOA Simulator</title>
<link>https://hdl.handle.net/1721.1/149945</link>
<description>The IOA Simulator
Kaynar, Dilsun Kirh; Chefter, Anna; Dean, Laura; Garland, Stephen J.; Lynch, Nancy A.; Ne Win, Toh; Ramírez-Robredo, Antonio
</description>
<dc:date>2002-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149944">
<title>Towards An Extensible Virtual Machine</title>
<link>https://hdl.handle.net/1721.1/149944</link>
<description>Towards An Extensible Virtual Machine
Boyapati, Chandrasekhar
</description>
<dc:date>2002-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149943">
<title>Verifying Distributed Algorithms via Dynamic Analysis and Theorem Proving</title>
<link>https://hdl.handle.net/1721.1/149943</link>
<description>Verifying Distributed Algorithms via Dynamic Analysis and Theorem Proving
Ne Win, Toh; Ernst, Michael D.
</description>
<dc:date>2002-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149942">
<title>Early-Delivery Dynamic Atomic Broadcast</title>
<link>https://hdl.handle.net/1721.1/149942</link>
<description>Early-Delivery Dynamic Atomic Broadcast
Bar-Joseph, Ziv; Keidar, Idit; Lynch, Nancy A.
</description>
<dc:date>2002-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149941">
<title>A Type System for Preventing Data Races and Deadlocks in Java Programs</title>
<link>https://hdl.handle.net/1721.1/149941</link>
<description>A Type System for Preventing Data Races and Deadlocks in Java Programs
Boyapati, Chandrasekhar; Lee, Robert; Rinard, Martin
</description>
<dc:date>2002-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149940">
<title>Exponential Speedup of Fixed Parameter Algorithms K_{3,3}-minor-free or K_5-minor-free Graphs</title>
<link>https://hdl.handle.net/1721.1/149940</link>
<description>Exponential Speedup of Fixed Parameter Algorithms K_{3,3}-minor-free or K_5-minor-free Graphs
Demaine, Erik D.; Hajiaghayi, Mohammad Taghi; Thilikos, Dimitrios M.
</description>
<dc:date>2002-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149939">
<title>L+: Scalable Landmark Routing and Address Lookup for Multi-hop Wireless Networks</title>
<link>https://hdl.handle.net/1721.1/149939</link>
<description>L+: Scalable Landmark Routing and Address Lookup for Multi-hop Wireless Networks
Chen, Benjie; Morris, Robert T.
</description>
<dc:date>2002-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149938">
<title>Effects of Loss Rate on Ad Hoc Wireless Routing</title>
<link>https://hdl.handle.net/1721.1/149938</link>
<description>Effects of Loss Rate on Ad Hoc Wireless Routing
DeCouto, Douglas S.J.; Aguayo, Daniel; Chambers, Benjamin A.; Morris, Robert
This paper uses measurements from two deployed wireless ad hoc networks to illustrate the effects of link loss rates on routing protocol performance. Measurements of these networks show that the radio links between the majority of nodes have substantial loss rates. These loss rates are high enough to prevent existing ad hoc routing protocols from using the links. Link-level retransmission can mask high loss rates, at the cost of substantial decreases in throughput. Simulations, driven by the observed loss rates, show that the shortest paths chosen by existing routing protocols tend to find routes with much less capacity than is available along the best route. Based on these observations, we present a routing metric intended to allow routing protocols to find good routes in wireless ad hoc networks. The metric is the expected total number of transmissions required to deliver a packet along a route. This metric favors routes with high throughput and low total impact on spectrum. It is expected to perform better than existing techniques that eliminate links based on loss rate thresholds.
</description>
<dc:date>2002-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149937">
<title>Write Barrier Removal by Static Analysis</title>
<link>https://hdl.handle.net/1721.1/149937</link>
<description>Write Barrier Removal by Static Analysis
Zee, Karen; Rinard, Martin
</description>
<dc:date>2002-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149936">
<title>Silicon Physical Unknown Functions and Secure Smartcards</title>
<link>https://hdl.handle.net/1721.1/149936</link>
<description>Silicon Physical Unknown Functions and Secure Smartcards
Gassend, Blaise; Clarke, Dwaine; van Dijk, Marten; Devadas, Srinivas
</description>
<dc:date>2002-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149935">
<title>Fine-Grain Dynamic Leakage Reduction</title>
<link>https://hdl.handle.net/1721.1/149935</link>
<description>Fine-Grain Dynamic Leakage Reduction
Heo, Seongmoo; Barr, Kenneth; Hampton, Mark; Asanovi_, Krste
</description>
<dc:date>2002-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149934">
<title>Leakage-Biased Domino Circuits for Dynamic Fine-Grain Leakage Reduction</title>
<link>https://hdl.handle.net/1721.1/149934</link>
<description>Leakage-Biased Domino Circuits for Dynamic Fine-Grain Leakage Reduction
Heo, Seongmoo; Asanovi_, Krste
</description>
<dc:date>2002-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149933">
<title>An Information-Theoretic Approach to Interest Making</title>
<link>https://hdl.handle.net/1721.1/149933</link>
<description>An Information-Theoretic Approach to Interest Making
Koh, Waikit
The Internet has brought a new meaning to the term communities. Geography is no longer a barrier to international communications. However, the paradigm of meeting new interesting people remains entrenched in traditional means; meeting new interesting people on the Internet still relies on chance and contacts. This thesis explores a new approach towards matching users in online communities in an effective fashion.  Instead of using the conventional feature vector scheme to profile users, each user is represented by a personalized concept hierarchy (or an ontology) that is learnt from the user's behavior in the system. Each concept hierarchy is then interpreted within the Information Theory framework as a probabilistic decision tree. The matching algorithm uses the Kullback-Leiber distance as a measure of deviation between two probabilistic decision trees. Thus, in an online community, where a personalized concept hierarchy represents each user, the Kullback-Leiber distance imposes a full- order rank on the level of similarity of all the users with respect to a particular user in question.  The validity and utility of the proposed scheme of matching users is then applied in a set of simulations, using the feature-vector-overlap measure as a baseline. The results of the simulations show that the Kullback Leiber distance, when used in conjunction with the concept hierarchy, is more robust to noise and is able to make a stronger and more distinctive classification of users into similar groups in comparison to the conventional keyword-overlap scheme. A graphical agent system that relies upon the ontology-based interest matching algorithm, called the Collaborative Sanctioning Network, is also described in this thesis.
</description>
<dc:date>2001-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149932">
<title>2RegionRED: a Congestion Control Mechanism for the High Speed Internet</title>
<link>https://hdl.handle.net/1721.1/149932</link>
<description>2RegionRED: a Congestion Control Mechanism for the High Speed Internet
Wang, Karen
This thesis proposes a new Active Queue Management (AQM) scheme called 2RegionRED.  It is superior to the classic Random Early Detection (RED) algorithm in that there is an intuitive way to set its parameters and it is self-tuning.  Its design is motivated by an original principle to sustain the smallest queue possible while still allowing for maximum link utilization.  2RegionRED uses the number of competing TCPs as its measure of load.  However it does not keep an explicit count.  The result is a novel algorithm that adjusts the drop rate according to two regions of operation: that requiring less than and greater than one drop per round-trip time (RTT).  This thesis also analyzes methods for measuring the persistent queue and proposes the ABSMIN method.  Simulations of 2RegionRED using ABSMIN reveal some difficulties and insights.  Basic comparisons to the Adaptive RED and Flow Proportional Queuing (FPQ) adaptive algorithms are also demonstrated through simulation
</description>
<dc:date>2001-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149931">
<title>Inferring Congestion Sharing and Path Characteristics from Packet Interarrival Times</title>
<link>https://hdl.handle.net/1721.1/149931</link>
<description>Inferring Congestion Sharing and Path Characteristics from Packet Interarrival Times
Katabi, Dina; Blake, Charles
</description>
<dc:date>2001-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149930">
<title>Hybrid I/O Automata*</title>
<link>https://hdl.handle.net/1721.1/149930</link>
<description>Hybrid I/O Automata*
Lynch, Nancy A.; Segala, Roberto; Vaandrager, Frits
Hybrid systems are systems that exhibit a combination of discrete and continuous behavior. Typical hybrid systems include computer components, which operate in discrete program steps, and real-world components, whose behavior over time intervals evolves according to physical constraints. Important examples of hybrid systems include automated transportation systems, robotics systems, process control systems, systems of embedded devices, and mobile computing systems. Such systems can be very complex, and very difficult to describe and analyze. This paper presents the Hybrid Input/Output Automaton (HIOA) modeling framework, a basic mathematical framework to support description and analysis of hybrid systems. An important feature of this model is its support for decomposing hybrid system descriptions. In particular, the framework includes a notion of external behavior for a hybrid I/O automaton, which captures its discrete and continuous interactions with its environment. The framework also defines what it means for one HIOA to implement another, based on an inclusion relationship between their external behavior sets, and defines a notion of simulation, which provides a sufficient condition for demonstrating implementation relationships. The framework also includes a composition operation for HIOAs, which respects external behavior, and a notion of receptiveness, which implies that an HIOA does not block the passage of time. The framework is intended to support analysis methods from both computer science and control theory. This work is a simplification of an earlier version of the HIOA model [49, 50]. The main simplification in the new model is a clearer separation between the mechanisms used to model discrete and continuous interaction between components. In particular, the new model removes the dual use of external variables for discrete and continuous interaction.
</description>
<dc:date>2001-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149929">
<title>Forming Scatternets from Bluetooth Personal Area Networks</title>
<link>https://hdl.handle.net/1721.1/149929</link>
<description>Forming Scatternets from Bluetooth Personal Area Networks
Tan, Godfrey; Mui, Allen; Guttag, John V.; Balakrishnan, Hari
There is increasing interest in wireless ad hoc networks built from portable devices equipped with short-range wireless network interfaces. This paper addresses issues related to internetworking such networks to form larger ÔøΩscatternets.ÔøΩ  Within the constraints imposed by the emerging standard Bluetooth link layer and MAC protocol, we describe an efficient online topology formation algorithm, called TSF (Tree Scatternet Formation) to build scatternets. TSF connects nodes in a tree structure that simplifies packet routing and scheduling. The design allows nodes to arrive and leave arbitrarily, incrementally building the topology and healing partitions when they occur. We present simulation results that show that TSF has low tree formation latency and also generates an efficient topology for forwarding packets.
</description>
<dc:date>2001-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149928">
<title>Scalable, Controlled Imagery Capture in Urban Environments</title>
<link>https://hdl.handle.net/1721.1/149928</link>
<description>Scalable, Controlled Imagery Capture in Urban Environments
Teller, Seth
We describe the design considerations underlying a system for scalable, automated capture of precisely controlled imagery in urban scenes. The system operates for architectural scenes in which, from every camera position, some  two vanishing points are visible. It has been used to capture thousands of controlled images in outdoor environments spanning hundreds of meters. The proposed system architecture forms the foundation for a future, fully robotic outdoor mapping capability for urban areas, analogous to existing, satellite-based robotic mapping systems which acquire images and models of natural terrain.  Four key ideas distinguish our approach from other methods. First, our sensor acquires georeferencing metadata with every image, enabling related images to be efficiently identified and registered. Second, the sensor acquires omni-directional images; we show strong experimental evidence that such images are fundamentally more powerful observations than conventional (narrow-FOV) images. Third, the system uses a probabilistic, projective error formulation to account for uncertainty. By treating measurement error in an appropriate depth-free framework, and by deferring decisions about camera calibration and scene structure until many noisy observations can be fused, the system achieves superior robustness and accuracy. Fourth, the system's computational requirements scale linearly in the input size, the area of the acquisition region, and the size of the output model. This is in contrast to most previous methods, which either assume constant-size inputs or exhibit quadratic running time (or worse) asymptotically. These attributes enable the system to operate in a regime of scale and physical extent which is unachievable by any other method, whether manual or automated. Consequently, it can acquire the most complex calibrated terrestrial image sets in existence, while operating faster thanany existing manual or algorithmic method.
</description>
<dc:date>2001-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149927">
<title>Location Proxies and Intermediate Node Forwarding for Practical Geographic Forwarding</title>
<link>https://hdl.handle.net/1721.1/149927</link>
<description>Location Proxies and Intermediate Node Forwarding for Practical Geographic Forwarding
De Couto, Douglas S.J.; Morris, Robert T.
</description>
<dc:date>2001-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149926">
<title>Automatic Generation and Checking of Program Specifications</title>
<link>https://hdl.handle.net/1721.1/149926</link>
<description>Automatic Generation and Checking of Program Specifications
Nimmer, Jeremy W.; Ernst, Michael D.
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149925">
<title>Roles Are Really Great!</title>
<link>https://hdl.handle.net/1721.1/149925</link>
<description>Roles Are Really Great!
Kuncak, Viktor; Lam, Patrick; Rinard, Martin
</description>
<dc:date>2001-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149924">
<title>On the Cost of Fault-Tolerant Consensus When There Are No Faults - A Tutorial</title>
<link>https://hdl.handle.net/1721.1/149924</link>
<description>On the Cost of Fault-Tolerant Consensus When There Are No Faults - A Tutorial
Keidar, Idit; Rajsbaum, Sergio
</description>
<dc:date>2001-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149923">
<title>Using precise feedback for controlling congestion in the Internet</title>
<link>https://hdl.handle.net/1721.1/149923</link>
<description>Using precise feedback for controlling congestion in the Internet
Katabi, Dina; Handley, Mark
</description>
<dc:date>2001-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149922">
<title>Chord: A scalable peer-to-peer lookup service for Internet applications</title>
<link>https://hdl.handle.net/1721.1/149922</link>
<description>Chord: A scalable peer-to-peer lookup service for Internet applications
Stoica, Ion; Morris, Robert T.; Karger, David R.; Kaashoek, M. Frans; Balakrishnan, Hari
</description>
<dc:date>2001-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149921">
<title>Client Authentication on the Web</title>
<link>https://hdl.handle.net/1721.1/149921</link>
<description>Client Authentication on the Web
Fu, Kevin; Sit, Emil; Smith, Kendra; Feamster, Nick
</description>
<dc:date>2001-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149920">
<title>Practical Byzantine Fault Tolerance</title>
<link>https://hdl.handle.net/1721.1/149920</link>
<description>Practical Byzantine Fault Tolerance
Castro, Miguel
Our growing reliance on online services accessible on the Internet demands highly-available systemsthat provide correct service without interruptions. Byzantine faults such as software bugs, operatormistakes, and malicious attacks are the major cause of service interruptions. This thesis describesa new replication algorithm, BFT, that can be used to build highly-available systems that tolerateByzantine faults. It shows, for the first time, how to build Byzantine-fault-tolerant systems that canbe used in practice to implement real services because they do not rely on unrealistic assumptionsand they perform well. BFT works in asynchronous environments like the Internet, it incorporatesmechanisms to defend against Byzantine-faulty clients, and it recovers replicas proactively. Therecovery mechanism allows the algorithm to tolerate any number of faults over the lifetime of thesystem provided fewer than 1=3 of the replicas become faulty within a small windowof vulnerability.The window may increase under a denial-of-service attack but the algorithm can detect and respondto such attacks and it can also detect when the state of a replica is corrupted by an attacker.BFT has been implemented as a generic program library with a simple interface. The BFTlibrary provides a complete solution to the problem of building real services that tolerate Byzantinefaults. We used the library to implement the first Byzantine-fault-tolerant NFS file system, BFS. TheBFT library and BFS perform well because the library incorporates several important optimizations.The most important optimization is the use of symmetric cryptography to authenticate messages.Public-key cryptography, which was the major bottleneck in previous systems, is used only toexchange the symmetric keys. The performance results show that BFS performs 2% faster to 24%slower than production implementations of the NFS protocol that are not replicated. Therefore, webelieve that the BFT library can be used to build practical systems that tolerate Byzantine faults.
</description>
<dc:date>2001-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149919">
<title>Object Models, Heaps and Interpretations</title>
<link>https://hdl.handle.net/1721.1/149919</link>
<description>Object Models, Heaps and Interpretations
Rinard, Martin; Kuncak, Viktor
This paper explores the use of object models for specifying verifiable heap invariants.  We define a simple language based on sets and relations and illustrate its use through examples.  We give formal semantics of the laguage by translation into predicate calculus and interpretation of predicates in terms of objects and references in the program heap.
</description>
<dc:date>2001-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149918">
<title>Perspectives on the Use of the Internet in Sri Lanka</title>
<link>https://hdl.handle.net/1721.1/149918</link>
<description>Perspectives on the Use of the Internet in Sri Lanka
Shrestha, Govinda; Amarasinghe, Saman
The survey examines the use of computers and the Internet in Sri Lanka from the perspective of the Internet Service Provider (ISP) members. It attempts to describe the general nature of IT use in terms of the availability, access, familiarity and general conditions associated with using computers and the Internet in the country.  The survey was conducted in July 1999. Questionnaires were e-mailed to 9448 ISP members in Sri Lanka, using e-mail addresses available to us at that time. Altogether, 560 members completed and returned questionnaires via e-mail to MIT's Laboratory for Computer Science.  Descriptive analysis of both quantitative and qualitative data was then conducted.    Major quantitative findings include:  *Over 60% of the respondents were members of their respective ISPs for two or less years, and over half had first used a computer sometime during the 1990-99 period. *Sixty-two percent of the respondents had sent 10 or more e-mails per week over the past six (or less) months, and 52% had received 15 or more e-mails per week during the same period. *Nearly half of the respondents used a computer at home, and 48% indicated 33.6K as the baud rate to connect their ISPs. *Seventy-eight percent of the respondents spent 1-9 hours per week sending and receiving e-mails, and a large majority (68%) spent 1-9 hours surfing the Web. *A majority of the respondents were positive about conditions in the workplace, such as the number and quality of opportunities for training and skill development, the quality of telecommunications facilities, and the quality and reliability of Internet connections. *An overwhelming majority of the respondents indicated that ISP subscriber fees, computer hardware and software costs, and telecommunications charges were generally high. *Most respondents were generally positive about 1) the quality of access to the Internet, 2) the quality of access to e-mails, Web pages and other Internet-based features, and 3) various benefits of Internet access. *Seventy-one percent of the respondents were male; nearly half were younger than 35, and a large majority were educated (with at least a high school diploma.)  Private company employees and people in business comprised over half of the respondents.  Major qualitative findings include: * It is crucially important to have faster access to information, increased communication at low costs, online-education and training, and increased efficiency in business, professional and organizational activities. * Matters of considerable concern include the low bandwidth, the high telecommunications charges, the low quality of Internet services, and the lack of organized information and databases. * Greatly needed is a raising of awareness, a change in the current regulatory environment, an open government, and a set of local information resources to support commerce.
</description>
<dc:date>2000-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149917">
<title>Automatic Recovery of Camera Positions in Urban Scenes</title>
<link>https://hdl.handle.net/1721.1/149917</link>
<description>Automatic Recovery of Camera Positions in Urban Scenes
Antone, Matthew E.; Teller, Seth
Accurate camera calibration is crucial to the reconstruction of three-dimensional geometry and the recovery of photometric scene properties. Calibration involves the determination of intrinsic parameters (e.g. focal length, principal point, and radial lens distortion) and extrinsic parameters (orientation and position).  In urban scenes and other environments containing sufficient geometric structure, it is possible to decouple extrinsic calibration into rotational and translational components that can be treated separately, simplifying the registration problem. Here we present such a decoupled formulation and describe methods for automatically recovering the positions of a large set of cameras given intrinsic calibration, relative rotations, and approximate positions.  Our algorithm first estimates the directions of translation (up to an unknown scale factor) between adjacent camera pairs using point features but without requiring explicit correspondence between them. This technique combines the robustness and simplicity of a Hough transform with the accuracy of Monte Carlo expectation maximization. We then find a set of distances between the pairs that produces globally-consistent camera positions. Novel uncertainty formulations and match plausibility criteria improve reliability and accuracy.  We assess our system's performance using both synthetic data and a large set of real panoramic imagery. The system produces camera positions accurate to within 5 centimeters in image networks extending over hundreds of meters.
</description>
<dc:date>2000-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149916">
<title>Fine-Grained Failover Using Connection Migration</title>
<link>https://hdl.handle.net/1721.1/149916</link>
<description>Fine-Grained Failover Using Connection Migration
Snoeren, Alex C.; Andersen, David G.; Balakrishnan, Hari
This paper presents a set of techniques for providing fine-grained failover of long-running connections across a distributed collection of replica servers, and is especially useful for fault-tolerant and load-balanced delivery of streaming media and telephony sessions. Our system achieves connection-level failover across both local- and wide-area server replication, without requiring a front-end transport- or application-layer switch. Our approach is enabled by the recently-developed end-to-end ``connection migration'' mechanism for transport protocols such as TCP, combined with a soft-state session synchronization protocol between replica servers.   The end result is a robust, fast, and fine-grained server failover mechanism that is transparent to both the client and server applications. We describe the details of our design and Linux implementation, as well as experiments with our implementation that show that this approach to failover is an attractive way to engineer robust systems for distributing long-running streams; connections suffer relatively low performance degradation even when server redirection occurs every few seconds, and overhead is negligible when compared to standard techniques. In particular, we observe the performance impact of migrating TCP connections depends on the length of time between migration and the most recent loss-recovery event.
</description>
<dc:date>2000-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149915">
<title>Programming Language Techniques for Modular Router Configurations</title>
<link>https://hdl.handle.net/1721.1/149915</link>
<description>Programming Language Techniques for Modular Router Configurations
Kohler, Eddie; Chen, Benjie; Kaashoek, M. Frans; Morris, Robert T.; Poletto, Massimiliano
This paper applies programming language techniques to a high-level system description, both to optimize the system and to prove useful properties about it. The system in question is Click, a modular software router framework. Click routers are built from components called elements. Elements are written in C++, but the user creates a configuration using a simple, declarative data flow language. This language is amenable to data flow analysis and other conventional programming language techniques. Applied to a router configuration, these techniques have high-level results---for example, optimizing the router or verifying its high-level properties. This paper describes several programming language techniques that have been useful in practice, including optimization tools that remove virtual function calls from router definitions and remove redundant parts of adjacent routers. We also present performance results for an extensively optimized standards-compliant IP router. On conventional PC hardware, this router can forward up to 456,000 64-byte packets per second.
</description>
<dc:date>2000-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149914">
<title>An Efficient Boosting Algorithm for Combining Preferences</title>
<link>https://hdl.handle.net/1721.1/149914</link>
<description>An Efficient Boosting Algorithm for Combining Preferences
Iyer, Raj Dharmarajan, Jr.
The problem of combining preferences arises in several applications, such as combining the results of di_x000B_erent search engines. This work describes an effcient algorithm for combining multiple preferences. We _x000C_rst give a formal framework for the problem. We then describe and analyze a new boosting algorithm for combining preferences called RankBoost. We also describe an effcient implementation of the algorithm for certain natural cases. We discuss two experiments we carried out to assess the performance of RankBoost. In the _x000C_rst experiment, we used the algorithm to combine di_x000B_erent WWW search strategies, each of which is a queryexpansion for a given domain. For this task, we compare the performance of RankBoost to the individual search strategies. The second experiment is a collaborative-filtering task for making movie recommendations. Here, we present results comparing RankBoost to nearest-neighbor and regression algorithms.
</description>
<dc:date>1999-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149913">
<title>TrendFinder: Automated Detection of Alarmable Trends</title>
<link>https://hdl.handle.net/1721.1/149913</link>
<description>TrendFinder: Automated Detection of Alarmable Trends
Tsien, Christine L.
</description>
<dc:date>2000-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149912">
<title>System Support for Bandwidth Management and Content Adaptation in Internet Applications</title>
<link>https://hdl.handle.net/1721.1/149912</link>
<description>System Support for Bandwidth Management and Content Adaptation in Internet Applications
Andersen, David; Bansal, Deccuk; Curtis, Dorothy; Seshan, Srinivasan; Balakrishnan, Hari
</description>
<dc:date>2000-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149911">
<title>An Analysis of Short-Term Fairness in Wireless Media Access Protocols</title>
<link>https://hdl.handle.net/1721.1/149911</link>
<description>An Analysis of Short-Term Fairness in Wireless Media Access Protocols
Koksal, Can Emre; Kassab, Hisham; Balakrishnan, Hari
We investigate the problem of unfairness over short time scales in decentralized wireless media access (MAC) protocols.  Motivated by experimental results over a CSMA/CA-based WaveLAN wireless LAN that shows starvation and degraded TCP performance, we see
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149910">
<title>TCP-friendly Congestion Control for Real-time Streaming Applications</title>
<link>https://hdl.handle.net/1721.1/149910</link>
<description>TCP-friendly Congestion Control for Real-time Streaming Applications
Bansal, Deepak; Balakrishnan, Hari
This paper introduces and analyzes a class of nonlinear congestion control algorithms called binomial algorithms, motivated in part by the needs of streaming audio and video applications for which a drastic reduction in transmission rate upon congestion i
</description>
<dc:date>2000-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149909">
<title>On Building Blocks for Distributed Systems</title>
<link>https://hdl.handle.net/1721.1/149909</link>
<description>On Building Blocks for Distributed Systems
De Prisco, Robert
</description>
<dc:date>1999-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149908">
<title>The Static Single Information Form</title>
<link>https://hdl.handle.net/1721.1/149908</link>
<description>The Static Single Information Form
Ananian, C. Scott
The Static Single Information (SSI) form is a compiler intermediate representation that allows efficient sparse implementations of predicated analysis and backward dataflow algorithms.  It possesses several attractive graph-theoretic properties which aid
</description>
<dc:date>1999-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149907">
<title>Maps:  A Compiler-Managed Memory System for Software-Exposed Architectures</title>
<link>https://hdl.handle.net/1721.1/149907</link>
<description>Maps:  A Compiler-Managed Memory System for Software-Exposed Architectures
Barua, Rajeev
Microprocessors must exploit both instruction-level parallelism (ILP) and memory parallelism for high performance.  Sophisticated techniques for ILP have boosted the ability of modern-day microprocessors to exploit ILP when available. Unfortunately, impro
</description>
<dc:date>2000-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149906">
<title>QoS Preserving Totally Ordered Multicast</title>
<link>https://hdl.handle.net/1721.1/149906</link>
<description>QoS Preserving Totally Ordered Multicast
Bar-Joseph, Ziv; Keidar, Idit; Anker, Tal; Lynch, Nancy A.
This paper studies the Quality of Service (QoS) guarantees of totally ordered multicast algorithms. The paper shows that totally ordered multicast can coexist with guaranteed predictable delays in certain network models. The paper considers two reservatio
</description>
<dc:date>2000-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149905">
<title>Compositional Pointer and Escape Analysis for Multithreaded Java Programs</title>
<link>https://hdl.handle.net/1721.1/149905</link>
<description>Compositional Pointer and Escape Analysis for Multithreaded Java Programs
Rinard, Martin; Whaley, John
</description>
<dc:date>1999-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149904">
<title>A Client-Server Approach to Virtually Synchronous  Group Multicast: Specifications, Algorithms, and Proofs</title>
<link>https://hdl.handle.net/1721.1/149904</link>
<description>A Client-Server Approach to Virtually Synchronous  Group Multicast: Specifications, Algorithms, and Proofs
Keidar, Idit; Khazan, Roger
This paper presents a formal design for a novel group multicast service that provides virtually synchronous semantics in asynchronous fault-prone environments.  The design employs a client-server architecture in which group membership is maintained not by
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149903">
<title>Information Technology Use in Developing Countries</title>
<link>https://hdl.handle.net/1721.1/149903</link>
<description>Information Technology Use in Developing Countries
Shrestha, Govinda
</description>
<dc:date>2000-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149902">
<title>Group Communication Specifications: A Comprehensive Study</title>
<link>https://hdl.handle.net/1721.1/149902</link>
<description>Group Communication Specifications: A Comprehensive Study
Vitenberg, Roman; Keidar, Idit; Chockler, Gregory V.; Dolev, Danny
View-oriented group communication is an important and widely used building block for many distributed applications. Much current research has been dedicated to specifying the semantics and services of view-oriented Group Communication Systems (GCSs). Howe
</description>
<dc:date>1999-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149901">
<title>I/O Automaton Models and Proofs for Shared-Key Communication Systems</title>
<link>https://hdl.handle.net/1721.1/149901</link>
<description>I/O Automaton Models and Proofs for Shared-Key Communication Systems
Lynch, Nancy A.
The combination of two security protocols, a simple shared-key communication protocol and the Diffie-Hellman key distribution protocol, is modeled formally and proved correct. The modeling is based on the I/O automaton model for distributed algorithms, an
</description>
<dc:date>1999-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149900">
<title>Natural Selection and Loop Analysis</title>
<link>https://hdl.handle.net/1721.1/149900</link>
<description>Natural Selection and Loop Analysis
Mohtashemi, Mojdeh
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149899">
<title>Weak Consistency: A Generalized Theory and Optimistic Implementations for Distributed Transactions</title>
<link>https://hdl.handle.net/1721.1/149899</link>
<description>Weak Consistency: A Generalized Theory and Optimistic Implementations for Distributed Transactions
Adya, Atul
Current commercial databases allow application programmers to trade off consistency for performance.  However, existing definitions of weak consistency levels are either imprecise or they disallow efficient implementation techniques such as optimism.  Rul
</description>
<dc:date>1999-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149898">
<title>Portable High-Performance Programs</title>
<link>https://hdl.handle.net/1721.1/149898</link>
<description>Portable High-Performance Programs
Frigo, Matteo
This dissertation discusses how to write computer programs that attain both high performance and portability, despite the fact that current computer systems have different degrees of parallelism, deep memory hierarchies, and diverse processor architecture
</description>
<dc:date>1999-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149897">
<title>Immediate-Mode Ray-Casting</title>
<link>https://hdl.handle.net/1721.1/149897</link>
<description>Immediate-Mode Ray-Casting
Alex, John; Teller, Seth
We propose a simple modification to the classical polygon rasterization pipeline that enables exact, efficient raycasting of bounded implicit surfaces without the use of a global spatial data structure bounding hierarchy.  Our algorithm requires two descr
</description>
<dc:date>1999-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149896">
<title>Mostly-Static Decentralized Information Flow Control</title>
<link>https://hdl.handle.net/1721.1/149896</link>
<description>Mostly-Static Decentralized Information Flow Control
Myers, Andrew C.
The growing use of mobile code in downloaded programs such as applets and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Common security mechanisms such as sandboxing and access control are either too restrictive or
</description>
<dc:date>1999-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149895">
<title>Performance Nonmonotonicities:  A Case Study of the UltraSPARC Processor</title>
<link>https://hdl.handle.net/1721.1/149895</link>
<description>Performance Nonmonotonicities:  A Case Study of the UltraSPARC Processor
Kushman, Nathaniel A.
Modern microprocessor architectures are very complex designs. Consequently, they exhibit many idiosyncrasies. In fact, situations exist in which the addition or removal of a single instruction changes the performance of a program by a factor of 3 to 4. I
</description>
<dc:date>1998-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149894">
<title>Regions:  A Scalable Infrastructure for Scoped Service Location in Ubiquitous Computing</title>
<link>https://hdl.handle.net/1721.1/149894</link>
<description>Regions:  A Scalable Infrastructure for Scoped Service Location in Ubiquitous Computing
Benedicto, Kathryn Flores
Until recently, most efforts in service location have focused on finding local services.  However, service location is also useful in large-scale networked environments containing numerous, possibly non-local services.  Regions address this need for scala
</description>
<dc:date>1999-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149893">
<title>Creating and Rendering Image-Based Visual Hulls</title>
<link>https://hdl.handle.net/1721.1/149893</link>
<description>Creating and Rendering Image-Based Visual Hulls
Buehler, Chris; Matusik, Wojciech; McMillan, Leonard
In this paper, we present efficient algorithms for creating and rendering image-based visual hulls. These algorithms are motivated by our desire to render real-time views of dynamic, real-world scenes. We first describe the visual hull, an abstract geomet
</description>
<dc:date>1999-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149892">
<title>Providing QoS Guarantees in Input Buffered Crossbar Switches with Speedup</title>
<link>https://hdl.handle.net/1721.1/149892</link>
<description>Providing QoS Guarantees in Input Buffered Crossbar Switches with Speedup
Charney, Anna
</description>
<dc:date>1998-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149891">
<title>Dynamically Reparameterized Light Fields</title>
<link>https://hdl.handle.net/1721.1/149891</link>
<description>Dynamically Reparameterized Light Fields
Isaksen, Aaron; McMillan, Leonard; Gortler, Steven J.
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149890">
<title>Teaching Policy to Computer Science Students</title>
<link>https://hdl.handle.net/1721.1/149890</link>
<description>Teaching Policy to Computer Science Students
Blumenthal, Marjory S.
Computing motivates more and more attention by policy-makers at all levels of government, and policy interests of all kind can touch on computer scienceÔøΩboth inspiring new research directions or constraining technology development.  Understanding public p
</description>
<dc:date>1998-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149889">
<title>Credible Compilers</title>
<link>https://hdl.handle.net/1721.1/149889</link>
<description>Credible Compilers
Rinard, Martin C.
This paper presents a new concept in compiler correctness: instead of proving that the compiler performs all of its transformations correctly, the compiler generates a proof that the transformed program correctly implements the input program. A simple pro
</description>
<dc:date>1999-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149888">
<title>An Architecture for Intentional Name Resolution and Application-level Routing</title>
<link>https://hdl.handle.net/1721.1/149888</link>
<description>An Architecture for Intentional Name Resolution and Application-level Routing
Adjie-Winoto, William; Schwartz, Elliot; Balakrishnan, Hari
</description>
<dc:date>1999-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149887">
<title>An Integrated Congestion Management Architecture for Internet Hosts</title>
<link>https://hdl.handle.net/1721.1/149887</link>
<description>An Integrated Congestion Management Architecture for Internet Hosts
Balakrishnan, Hari; Rahul, Hariharan S.; Seshan, Srinivasan
This paper presents a novel framework for managing network congestion from an end-to-end perspective.  Our work is motivated by several trends in traffic patterns that threaten the long-term stability of the Internet. These trends include the use of multi
</description>
<dc:date>1999-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149886">
<title>Fast Place and Route Approaches for FPGAs</title>
<link>https://hdl.handle.net/1721.1/149886</link>
<description>Fast Place and Route Approaches for FPGAs
Tessier, Russell G.
</description>
<dc:date>1999-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149885">
<title>The Case for SRPT Scheduling in Web Servers</title>
<link>https://hdl.handle.net/1721.1/149885</link>
<description>The Case for SRPT Scheduling in Web Servers
Harchol-Balter, Mor; Crovella, Mark E.; Park, SungSim
</description>
<dc:date>1998-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149884">
<title>Polygonal Approximation of Voronoi Diagrams of Set of Triangles in Three Dimensions</title>
<link>https://hdl.handle.net/1721.1/149884</link>
<description>Polygonal Approximation of Voronoi Diagrams of Set of Triangles in Three Dimensions
Teichmann, Marek; Teller, Seth
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149883">
<title>A Model for Window Based Flow Control Packet-Switched Networks</title>
<link>https://hdl.handle.net/1721.1/149883</link>
<description>A Model for Window Based Flow Control Packet-Switched Networks
Yang, Xiaowei
Recently, networks have increased rapidly both in scale and speed. Problems related to the control and management are of increasing interest. However, there is no satisfactory tool to study the behavior of such networks. The traditional event driven simul
</description>
<dc:date>1998-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149882">
<title>Providing QoS Guarantees in Input Buffered Crossbar Switches with Speedup</title>
<link>https://hdl.handle.net/1721.1/149882</link>
<description>Providing QoS Guarantees in Input Buffered Crossbar Switches with Speedup
Charny, Anna
</description>
<dc:date>1998-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149881">
<title>Fast Thread Communication and Synchronization Mechanisms for a Scalable Single Chip Multiprocessor</title>
<link>https://hdl.handle.net/1721.1/149881</link>
<description>Fast Thread Communication and Synchronization Mechanisms for a Scalable Single Chip Multiprocessor
Keckler, Stephen William
</description>
<dc:date>1998-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149880">
<title>Scalable Inter-Cluster Communications Systems for Clustered Microprocessors</title>
<link>https://hdl.handle.net/1721.1/149880</link>
<description>Scalable Inter-Cluster Communications Systems for Clustered Microprocessors
Jiang, Xiaohu; Yeung, Donald
As workstation clusters move away from uniprocessors in favor of multiprocessors to support the increasing computational needs of distributed applications, greater demands are placed on the communication interfaces that couple individual workstations.  th
</description>
<dc:date>1998-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149879">
<title>Algorithms for Data-Race Detection in Multithreaded Programs</title>
<link>https://hdl.handle.net/1721.1/149879</link>
<description>Algorithms for Data-Race Detection in Multithreaded Programs
Cheng, Guang-Ien
Two parallel accesses to the same location, at least one of which is a write, form a race. Debugging such races is complicated by atomic critical sections. In programs without critical sections, a race is usually a bug causing nondeterminism. In programs
</description>
<dc:date>1998-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149878">
<title>On Choosing a Task Assignment Policy for a Distributed Server System</title>
<link>https://hdl.handle.net/1721.1/149878</link>
<description>On Choosing a Task Assignment Policy for a Distributed Server System
Harchol-Balter, Mor; Crovella, Mark E.; Murta, Cristina D.
We consider a distributed server system model and ask which policy should be used for assigning tasks to hosts.  In our model each host processes tasks in First-Come-First-Serve order and the task's service demand is known in advance.  We consider four ta
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149877">
<title>Exploring Optimal Cost-Performance Designs for RAW processors</title>
<link>https://hdl.handle.net/1721.1/149877</link>
<description>Exploring Optimal Cost-Performance Designs for RAW processors
Moritz, Csaba Andras; Yeung, Donald; Agarwal, Anant
The semiconductor industry roadmap projects that advances in VLSI technology will permit more than one billion transistors on a chip by the year 2010.  The MIT Raw microprocessor is a proposed architecture that strives to exploit these chip-level resource
</description>
<dc:date>1998-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149876">
<title>A  Model for Interactive Computation: Applications to Speech Research</title>
<link>https://hdl.handle.net/1721.1/149876</link>
<description>A  Model for Interactive Computation: Applications to Speech Research
McCandless, Michael Kyle
The speech research community has developed numerous toolkits to support ongoing research, e.g. Sapphire, Spire, ISP, ESPS/Waves+, HTK, CSLU Toolkit, LNKNet.  While these toolkits contain extensive and useful functionality, they typically offer limited en
</description>
<dc:date>1998-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149875">
<title>Debugging Multithreaded Programs that Incorporate User-Level Locking</title>
<link>https://hdl.handle.net/1721.1/149875</link>
<description>Debugging Multithreaded Programs that Incorporate User-Level Locking
Stark, Andrew F.
A multithreaded program with a bug may behave nondeterministically, and this nondeterminism typically makes the bug hard to localize.  This thesis presents a debugging tool, the Nondeterminator-2, which automatically finds certain nondeterminacy bugs in pr
</description>
<dc:date>1998-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149874">
<title>Cilk: Efficient Multithreaded Computing</title>
<link>https://hdl.handle.net/1721.1/149874</link>
<description>Cilk: Efficient Multithreaded Computing
Randall, Keith H.
</description>
<dc:date>1998-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149873">
<title>Bounded-Error Interactive Ray Tracing</title>
<link>https://hdl.handle.net/1721.1/149873</link>
<description>Bounded-Error Interactive Ray Tracing
Bala, Kavita; Dorsey, Julie; Teller, Seth
</description>
<dc:date>1998-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149872">
<title>An Efficient Virtual Network Interface in the Fugu Scalable Workstation</title>
<link>https://hdl.handle.net/1721.1/149872</link>
<description>An Efficient Virtual Network Interface in the Fugu Scalable Workstation
Mackenzie, Kenneth Martin
A scalable workstation is one vision of a mainstream parallel computer: a machine that combines scalable, fine-grain communication facilities for parallel applications with virtual memory and pre-emptive multiprogramming to support general-purpose workloa
</description>
<dc:date>1998-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149871">
<title>Integrated Shared-Memory and Message-Passing Communication in the Alewife Multiprocessor</title>
<link>https://hdl.handle.net/1721.1/149871</link>
<description>Integrated Shared-Memory and Message-Passing Communication in the Alewife Multiprocessor
Kubiatowicz, John David
To date, MIMD multiprocessors have been divided into two classes based on hardware communication models: those supporting shared memory and those supporting message passing. Breaking with tradition, this thesis argues that multiprocessors should integrate
</description>
<dc:date>1998-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149870">
<title>Multigrain Shared Memory</title>
<link>https://hdl.handle.net/1721.1/149870</link>
<description>Multigrain Shared Memory
Yeung, Donald
Designers of parallel computers have to decide how to apportion a machine's resources between processing, memory, and communication.  How these resources are apportioned determine the grain and balance of the resulting machine.  Often, these design decisio
</description>
<dc:date>1998-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149869">
<title>An Interactive Approach to the Identification and Extraction of Visual Events</title>
<link>https://hdl.handle.net/1721.1/149869</link>
<description>An Interactive Approach to the Identification and Extraction of Visual Events
Stasior, William F.
</description>
<dc:date>1998-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149868">
<title>An Interactive Approach to the Indentification and Extraction of Visual Events</title>
<link>https://hdl.handle.net/1721.1/149868</link>
<description>An Interactive Approach to the Indentification and Extraction of Visual Events
Stasior, William F.
This report describes an interactive approach to the computerized processing and interpretation of visual information.  The objective is to facilitate the development of interactive applications that analyze and interpret video input.  The approach is to
</description>
<dc:date>1998-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149867">
<title>Frustum Casting for Progressive, Interactive Rendering</title>
<link>https://hdl.handle.net/1721.1/149867</link>
<description>Frustum Casting for Progressive, Interactive Rendering
Teller, Seth; Alex, John
Efficient visible surface determination algorithms have long been a fundamental goal of computer graphics.  We discuss the well-known ray casting problem: given a geometric scene description, a synthetic camera, and a viewport which discretizes the camer
</description>
<dc:date>1998-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149866">
<title>Planning and control in stochastic domains with imperfect information</title>
<link>https://hdl.handle.net/1721.1/149866</link>
<description>Planning and control in stochastic domains with imperfect information
Hauskrechts, Milos
</description>
<dc:date>1996-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149865">
<title>Speech Perception Using Real-Time Phoneme Detection: The BeBe System</title>
<link>https://hdl.handle.net/1721.1/149865</link>
<description>Speech Perception Using Real-Time Phoneme Detection: The BeBe System
Sweeny, Latanya; Thompson, Patrick
We define a new approach to speech recognition based on auditory perception and modeled after the human brain's tendency to automatically categorize speech sounds [House 1962; Liberman 1957]. As background, today's speech recognition systems are knowle
</description>
<dc:date>1998-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149864">
<title>Boolean Compilation of Relational Specifications</title>
<link>https://hdl.handle.net/1721.1/149864</link>
<description>Boolean Compilation of Relational Specifications
Jackson, Daniel
A new method for analyzing relational specifications is described. A property to be checked is cast as a relational formula, which, if the property holds, has no finite models. The relational formula is translated into a boolean formula that has a model f
</description>
<dc:date>1998-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149863">
<title>Decoding Reed Solomon Codes beyond the Error-Correction Diameter</title>
<link>https://hdl.handle.net/1721.1/149863</link>
<description>Decoding Reed Solomon Codes beyond the Error-Correction Diameter
Sudan, Madhu
</description>
<dc:date>1997-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149862">
<title>Algorithmic issues in coding theory</title>
<link>https://hdl.handle.net/1721.1/149862</link>
<description>Algorithmic issues in coding theory
Sudan, Madhu
</description>
<dc:date>1997-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149861">
<title>Formal Verification of Safety-Critical Hybrid Systems</title>
<link>https://hdl.handle.net/1721.1/149861</link>
<description>Formal Verification of Safety-Critical Hybrid Systems
Livadas, Carolos
This thesis investigates how the formal modeling and verification techniques of computer science can be used for the analysis of hybrid systems [1,2,3,4]---systems involving both discrete and continuous behavior. The motivation behind such research lies i
</description>
<dc:date>1997-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149859">
<title>Automatic Extraction of Textured Vertical Facades from Pose Imagery</title>
<link>https://hdl.handle.net/1721.1/149859</link>
<description>Automatic Extraction of Textured Vertical Facades from Pose Imagery
Coorg, Satvan; Teller, Seth
Extracting 3-dimensional structure from real-world imagery and rendering it from unrestricted viewpoints is an important problem in computer vision, and increasingly, computer graphics. Despite many years of research, a system that automatically recovers
</description>
<dc:date>1998-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149858">
<title>The Fastest Fourier Transform in the West</title>
<link>https://hdl.handle.net/1721.1/149858</link>
<description>The Fastest Fourier Transform in the West
Frigo, Matteo; Johnson, Steven G.
</description>
<dc:date>1997-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149857">
<title>Garbage Collection in a Large, Distributed Object Store</title>
<link>https://hdl.handle.net/1721.1/149857</link>
<description>Garbage Collection in a Large, Distributed Object Store
Maheshwari, Umesh
</description>
<dc:date>1997-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149856">
<title>View-based abstraction: Enhancing Maintainability and Modularity in the presence of Implementation Dependencies</title>
<link>https://hdl.handle.net/1721.1/149856</link>
<description>View-based abstraction: Enhancing Maintainability and Modularity in the presence of Implementation Dependencies
Rodriguez, Luis H., Jr.
This dissertation presents a new, backwards compatible, language independent, and incremental programming methodology called view-based abstraction. Unlike the well-known black-box abstraction approach, view-based abstraction enables programmers to maintain program modularity even in the presence of implementation couplings, i.e., dependencies among the code modules that rely on otherwise "hidden" implementation details not specified in the module interfaces. This dissertation also presents a transformation-based implementation of view-based abstraction, called ViewForm. ViewForm acts as a source-to-source preprocessor that automatically performs an implementation coupling expressed by the programmer. When the original code is later updated, ViewForm automatically attempts to reapply the implementation coupling to the updated code. ViewForm will modify the updated source code only if the coupling is still valid. In this way, by performing some extra work up front, the programmer performing an implementation coupling saves future programmers from having to pay for the consequences of broken modularity. To aid in writing this up-front ViewForm code, this dissertation presents a structured approach for using view-based abstraction and writing ViewForm transformations constructs.   To demonstrate view-based abstraction, ViewForm is used to produce automated, performance-based implementation couplings in three example programs: an amorphous computing simulator, a conditional-probability pedigree computation, and ViewForm itself. Unlike other approaches that also use interprocedural program analyses, the results indicate that view-based abstraction is practical and scales gracefully - the extra automation increased compilation time from a typical 34%, to 40% in the worst case, despite a less than fully optimized ViewForm implementation. Each optimization required the programmer to write only 65 to 137 lines of ViewForm code for programs of size 167 lines to 7,616 lines. This work is amortized as time saved by programmers modifying the original program in the future. In all three examples, ViewForm maintained modularity by regenerating correct code when the original modules were modified - even when those modifications were to the optimization-dependent sections of the original code.
</description>
<dc:date>1997-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149855">
<title>Managing Scheduled Routing with a High-level Communication Language</title>
<link>https://hdl.handle.net/1721.1/149855</link>
<description>Managing Scheduled Routing with a High-level Communication Language
Metcalf, Christopher D.
</description>
<dc:date>1997-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149854">
<title>An Optimized Hardware Architecture and Communication Protocol for  Scheduled Communication</title>
<link>https://hdl.handle.net/1721.1/149854</link>
<description>An Optimized Hardware Architecture and Communication Protocol for  Scheduled Communication
Shoemaker, David
</description>
<dc:date>1997-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149853">
<title>Building an Active Node on the Internet</title>
<link>https://hdl.handle.net/1721.1/149853</link>
<description>Building an Active Node on the Internet
Murphy, David M.
</description>
<dc:date>1997-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149852">
<title>Message-Driven Dynamics</title>
<link>https://hdl.handle.net/1721.1/149852</link>
<description>Message-Driven Dynamics
Lethin, Richard Anton
</description>
<dc:date>1997-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149851">
<title>HULA: An Efficient Protocol for Reliable Delivery of Messages</title>
<link>https://hdl.handle.net/1721.1/149851</link>
<description>HULA: An Efficient Protocol for Reliable Delivery of Messages
Maheshwari, Umesh
We present a new protocol for reliable delivery of messages over a network that might lose, duplicate, reorder, or arbitrarily delay packets. It is the first protocol that guarantees exactly-once and ordered delivery on a connection while avoidin
</description>
<dc:date>1997-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149850">
<title>Experimental Study of Minimum Cut Algorithms</title>
<link>https://hdl.handle.net/1721.1/149850</link>
<description>Experimental Study of Minimum Cut Algorithms
Levine, Matthew S.
Recently, several new algorithms have been developed for the minimum cut problem that substantially improve worst-case time bounds for the problem. These algorithms are very different from the earlier ones and from each other.  We conduct an experimental
</description>
<dc:date>1997-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149849">
<title>A Model-Based Expert System for interpretation of hemodynamic data from ICU patients</title>
<link>https://hdl.handle.net/1721.1/149849</link>
<description>A Model-Based Expert System for interpretation of hemodynamic data from ICU patients
Zhao, Ruilin
</description>
<dc:date>1997-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149848">
<title>Revisiting the Paxos Algorithm</title>
<link>https://hdl.handle.net/1721.1/149848</link>
<description>Revisiting the Paxos Algorithm
De Prisco, Roberto
The Paxos algorithm is an efficient and highly fault-tolerant algorithm, devised by Lamport, for reaching consensus in a distributed system.  Although it appears to be practical, it seems to be not widely known or understood.  This thesis contains a new p
</description>
<dc:date>1997-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149847">
<title>Relieving Hot Spots on the World Wide Web</title>
<link>https://hdl.handle.net/1721.1/149847</link>
<description>Relieving Hot Spots on the World Wide Web
Panigrahy, Rina
We describe a family of caching protocols for distributed networks that can be used to decrease or eliminate the occurrence of hot spots in the network. Hot spots are web sites that swamped by a large number of requests for their pages.  Our protocols are
</description>
<dc:date>1997-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149846">
<title>A Random Server Model for Private Information Retrieval (or Information Theoretic PIR Avoiding Database Replication</title>
<link>https://hdl.handle.net/1721.1/149846</link>
<description>A Random Server Model for Private Information Retrieval (or Information Theoretic PIR Avoiding Database Replication
Gertner, Yael; Goldwasser, Shafi; Malkin, Tal
Private information retrieval (PIR) schemes provide a user with information from a database while keeping his query secret from the database manager.  We propose a new model for PIR, utilizing auxiliary random servers providing privacy services for databas
</description>
<dc:date>1997-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149845">
<title>Efficient distributed 1 out of n oblivious transfer</title>
<link>https://hdl.handle.net/1721.1/149845</link>
<description>Efficient distributed 1 out of n oblivious transfer
Gertner, Yael; Malkin, Tal
</description>
<dc:date>1997-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149844">
<title>Fine-Grained Control of Java Applets Using a Simple Constraint Language</title>
<link>https://hdl.handle.net/1721.1/149844</link>
<description>Fine-Grained Control of Java Applets Using a Simple Constraint Language
Mehta, Nimisha V.
The use of the internet has increased extensively with a growing number of inexperienced users surfing the Web.  Lurking in Web pages, Java applets are automatically executed on users' machines.  As a result, popular Web browsers are understandably con
</description>
<dc:date>1997-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149843">
<title>Engineering a Global Resolution Service</title>
<link>https://hdl.handle.net/1721.1/149843</link>
<description>Engineering a Global Resolution Service
Slottow, Edward C.
As the World Wide Web continues to balloon in size the issue of a robust information infrastructure has become increasingly important.  Currently, Web links are based on fragile names that have limited life due to semantic content.  Uniform Resource Na
</description>
<dc:date>1997-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149842">
<title>Modularity in the Presence of Subclassing</title>
<link>https://hdl.handle.net/1721.1/149842</link>
<description>Modularity in the Presence of Subclassing
Stata, Raymie
Classes are harder to subclass than they need be.  This report addresses this problem, showing how to design classes that are more modular and easier to subclass without sacrificing the extensibility that makes subclassing useful.  In the context of singl
</description>
<dc:date>1997-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149841">
<title>Demand-Based Coscheduling of Parallel Jobs on Multiprogrammed Multiprocessors</title>
<link>https://hdl.handle.net/1721.1/149841</link>
<description>Demand-Based Coscheduling of Parallel Jobs on Multiprogrammed Multiprocessors
Sobalvarro, Patrick Gregory
</description>
<dc:date>1997-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149840">
<title>Baring it all to Software: The Raw Machine</title>
<link>https://hdl.handle.net/1721.1/149840</link>
<description>Baring it all to Software: The Raw Machine
Waingold, Elliot; Taylor, Michael; Sarkar, Vivek; Lee, Walter; Lee, Victor; Kim, Jang; Frank, Matthew; Finch, Peter; Devabhaktuni, Srikrishna; Barua, Rajeev; Babb, Jonathan; Amarasinghe, Saman; Agarwal, Anant
Rapid advances in technology force a quest for computer architectures that exploit new opportunities and shed existing mechanisms that do not scale.  Current architectures, such as hardware scheduled superscalars, are already hitting performance and comple
</description>
<dc:date>1997-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149839">
<title>Optimism vs. Locking: A Study of Concurrency Control for Client-Server Object-Oriented Databases</title>
<link>https://hdl.handle.net/1721.1/149839</link>
<description>Optimism vs. Locking: A Study of Concurrency Control for Client-Server Object-Oriented Databases
Gruber, Robert Edward
Many client-server object-oriented database systems (OODBs) run applications at clients and perform all accesses on cached copies of database objects. Moving both data and computation to the clients can improve response time, throughput, and scalability.
</description>
<dc:date>1997-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149838">
<title>Replication Control in Distributed B-Trees</title>
<link>https://hdl.handle.net/1721.1/149838</link>
<description>Replication Control in Distributed B-Trees
Cosway, Paul R.
B-trees are a commonly used data structure to associate symbols with related information, as in a symbol table or file index.  The performance of B-tree algorithms is well understood for sequential processing and even concurrent processing on small-scale
</description>
<dc:date>1997-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149836">
<title>Learning Algorithms with Applications to Robot Navigation and Protein Folding</title>
<link>https://hdl.handle.net/1721.1/149836</link>
<description>Learning Algorithms with Applications to Robot Navigation and Protein Folding
Singh, Mona
</description>
<dc:date>1996-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149835">
<title>Public-Key Cryptosystems from Lattice Reduction Problems</title>
<link>https://hdl.handle.net/1721.1/149835</link>
<description>Public-Key Cryptosystems from Lattice Reduction Problems
Goldreich, Oded; Goldwasser, Shafi; Halevi, Shai
We present a new proposal for a trapdoor one-way function, from which  we derive  public-key encryption  and digital signatures. The security of the new construction is based on the conjectured computational difficulty of lattice-reduction proble
</description>
<dc:date>1996-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149834">
<title>Code Importing Techniques for Fast, Safe Client/Server Access</title>
<link>https://hdl.handle.net/1721.1/149834</link>
<description>Code Importing Techniques for Fast, Safe Client/Server Access
Bank, Joseph A.
</description>
<dc:date>1996-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149833">
<title>The Cilk System for Parallel Multithreaded Computing</title>
<link>https://hdl.handle.net/1721.1/149833</link>
<description>The Cilk System for Parallel Multithreaded Computing
Joerg, Christopher Frank
</description>
<dc:date>1996-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149832">
<title>On Consulting a Set of Experts and Searching</title>
<link>https://hdl.handle.net/1721.1/149832</link>
<description>On Consulting a Set of Experts and Searching
Galperin, Igal
Two chapters of this thesis analyze expert consulting problemas via game theoretic models; the first points out a close connectionn between the problem of consulting a set of experts and the problem of searching. The last chapter presents a solution to th
</description>
<dc:date>1996-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149831">
<title>Partitioned Garbage Collection of a Large Object Store</title>
<link>https://hdl.handle.net/1721.1/149831</link>
<description>Partitioned Garbage Collection of a Large Object Store
Maheshwari, Umesh; Liskov, Barbara H.
This paper describes a new garbage collection scheme for large persisten object stores that makes efficient use of the disk and main memory. The heap is divided into partitions that are collected independently using information about inter-partit
</description>
<dc:date>1997-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149830">
<title>Shared Memory Versus Message Passing for Iterative Solution of Sparse, Irregular Problems</title>
<link>https://hdl.handle.net/1721.1/149830</link>
<description>Shared Memory Versus Message Passing for Iterative Solution of Sparse, Irregular Problems
Chong, Frederic T.; Agarwal, Anant
The benefits of hardware support for shared memory versus those formessage passing are difficult to evaluate without an in-depth study ofreal applications on a common platform.  We evaluate the communicationmechanisms of the MIT Alewife machine, a multipr
</description>
<dc:date>1996-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149829">
<title>The Computer Science Technical Report (CS-TR) Project: Considerations from the Library Perspective</title>
<link>https://hdl.handle.net/1721.1/149829</link>
<description>The Computer Science Technical Report (CS-TR) Project: Considerations from the Library Perspective
Anderson, Greg; Lasher, Rebecca; Reich, Vicky
In 1992 the Advanced Research Projects Agency (ARPA) funded a three year grant to investigate the questions related to large-scale, distributed, digital libraries. The award focused research on Computer Science Technical Reports (CS-TR) and was granted to
</description>
<dc:date>1996-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149828">
<title>Efficient Garbage Collection for Large Object-Oriented Databases</title>
<link>https://hdl.handle.net/1721.1/149828</link>
<description>Efficient Garbage Collection for Large Object-Oriented Databases
Ng, Tony C.
This thesis presents the design of an efficient garbage collection scheme for large, persistent object-oriented databases in a client-server environment. The scheme uses a partitioned approach. A database is divided into disjoint partitions and each parti
</description>
<dc:date>1996-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149827">
<title>A Security Model for the Information Mesh</title>
<link>https://hdl.handle.net/1721.1/149827</link>
<description>A Security Model for the Information Mesh
Condell, Matthew N.
Many distributed systems that are currently being designed are object based.  These sytems require a model for authentication and access control which conforms to the object model.  They need a model that allows objects to control their own security.  In
</description>
<dc:date>1996-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149826">
<title>Encapsulated Key Escrow</title>
<link>https://hdl.handle.net/1721.1/149826</link>
<description>Encapsulated Key Escrow
Bellare, Mihir; Goldwasser, Shafi
</description>
<dc:date>1996-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149825">
<title>Phonological Parsing for Bi-directional Letter-to-Sound/Sound-to-Letter Generation</title>
<link>https://hdl.handle.net/1721.1/149825</link>
<description>Phonological Parsing for Bi-directional Letter-to-Sound/Sound-to-Letter Generation
Meng, Helen Mei-Ling
This thesis proposes a unified framework for integrating a variety of linguistic knowledge sources for representing speech, in order to facilitiate their concurrent utilization in spoken language systems.  The feasibility of the proposed methodology is de
</description>
<dc:date>1995-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149824">
<title>On the Structure of the Scaffolding Core of Bacteriophage T4 and Its Role in Head Length</title>
<link>https://hdl.handle.net/1721.1/149824</link>
<description>On the Structure of the Scaffolding Core of Bacteriophage T4 and Its Role in Head Length
Berger, Bonnie A.; Hoest, Gunnar W.; Paulson, James R.; Shor, Peter W.
</description>
<dc:date>1996-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149823">
<title>Correctness of Vehicle Control Systems: A Case Study</title>
<link>https://hdl.handle.net/1721.1/149823</link>
<description>Correctness of Vehicle Control Systems: A Case Study
Weinberg, Henri B.
</description>
<dc:date>1996-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149822">
<title>Time-lock Puzzles and Timed-release Crypto</title>
<link>https://hdl.handle.net/1721.1/149822</link>
<description>Time-lock Puzzles and Timed-release Crypto
Rivest, Ronald L.; Shamir, Adi; Wagner, David A.
Our motivation is the notion of ``timed-release crypto,'' where the goal is to encrypt a message so that it can not be decrypted by anyone, not even the sender, until a pre-determined amount of time has passed.  The goal is to ``send information into the
</description>
<dc:date>1996-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149821">
<title>Translucent Cyrptography: An Alternative to Key Escrow, and its Implementation via Fractional Oblivious Transfer</title>
<link>https://hdl.handle.net/1721.1/149821</link>
<description>Translucent Cyrptography: An Alternative to Key Escrow, and its Implementation via Fractional Oblivious Transfer
Bellare, Mihir; Rivest, Ronald L.
</description>
<dc:date>1996-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149820">
<title>Adaptively Secure Multi-party Computation</title>
<link>https://hdl.handle.net/1721.1/149820</link>
<description>Adaptively Secure Multi-party Computation
Canetti, Ran; Feige, Uri; Goldreich, Oded; Naor, Moni
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries (i.e., adversaries that may choose the corrupted parties during the course of the computation), in a setting where the channels are insecure and secur
</description>
<dc:date>1996-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149819">
<title>A Theory of Clock Synchronization</title>
<link>https://hdl.handle.net/1721.1/149819</link>
<description>A Theory of Clock Synchronization
Patt, Boaz
We consider the problem of clock synchronization in a system with uncertain message delays and clocks with bounded drift. To analyze this classical problem, we introduce the concept of synchronization graphs, and show that the tightest achievable synchron
</description>
<dc:date>1994-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149818">
<title>Admission Control and Routing: Theory and Practice</title>
<link>https://hdl.handle.net/1721.1/149818</link>
<description>Admission Control and Routing: Theory and Practice
Gawlick, Rainer
Emerging high speed Broadband Integrated Services Digital Networks (B-ISDN) will carry traffic for services such as video-on-demand and video teleconferencing, which require resource reservation along the path on which the traffic is sent. As a result, su
</description>
<dc:date>1995-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149817">
<title>Identifying and Merging Related Bibliographic Records</title>
<link>https://hdl.handle.net/1721.1/149817</link>
<description>Identifying and Merging Related Bibliographic Records
Hylton, Jeremy A.
Bibliographic records freely available on the Internet can be used to construct a high-quality,  digital finding aid that provides the ability to discover paper and electronic documents.  The key challenge to providing such a service is integrating mixed-
</description>
<dc:date>1996-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149816">
<title>Executing Multithreaded Programs Efficiently</title>
<link>https://hdl.handle.net/1721.1/149816</link>
<description>Executing Multithreaded Programs Efficiently
Blumofe, Robert D.
This thesis presents the theory, design, and implementation of Cilk (pronounced "silk") and Cilk-NOW.   Cilk is a C-based language and portable runtime system for programming and executing multithreaded parallel programs.  Cilk-NOW is an implementation of
</description>
<dc:date>1995-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149815">
<title>Modeling and Verification of Randomized Distributed Real -Time Systems</title>
<link>https://hdl.handle.net/1721.1/149815</link>
<description>Modeling and Verification of Randomized Distributed Real -Time Systems
Segala, Roberto
Randomization is an excellent tool for the design of distributed algorithms, sometimes yielding efficient solutions to problems that are inherently complex, or even unsolvable, in the setting of deterministic algorithms.  However, this tool has a price: e
</description>
<dc:date>1996-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149814">
<title>High-Performance All-Software Distributed Shared Memory</title>
<link>https://hdl.handle.net/1721.1/149814</link>
<description>High-Performance All-Software Distributed Shared Memory
Johnson, Kirk L.
The C Region Library (CRL) is a new all-software distributed shared memory (DSM) system.  CRL requires no special compiler, hardware, or operating system support beyond the ability to send and receive messages between processing nodes.  It provides a simp
</description>
<dc:date>1996-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149813">
<title>Aurora at MIT</title>
<link>https://hdl.handle.net/1721.1/149813</link>
<description>Aurora at MIT
Clark, David D; Houh, Henry; Tennenhouse, David L.
</description>
<dc:date>1995-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149812">
<title>Decentralized Channel Management in Scalable Multihop Spread-Spectrum Packet Radio Networks</title>
<link>https://hdl.handle.net/1721.1/149812</link>
<description>Decentralized Channel Management in Scalable Multihop Spread-Spectrum Packet Radio Networks
Shepard, Timothy Jason
This thesis addresses the problems of managing the transmissions of stations in a spread-spectrum packet ratio network so that the system can remain effective when scaled to millions of nodes concentrated in a metropolitan area.  The principal difficulty
</description>
<dc:date>1995-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149811">
<title>Theta Reference Manual</title>
<link>https://hdl.handle.net/1721.1/149811</link>
<description>Theta Reference Manual
Liskov, Barbara; Curtis, Dorothy; Day, Mark; Ghemawat, Sanjay; Gruber, Robert; Johnson, Paul; Myers, Andrew C.
</description>
<dc:date>1995-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149810">
<title>Lottery and Stride Scheduling: Flexible Proportional-share Resource Management</title>
<link>https://hdl.handle.net/1721.1/149810</link>
<description>Lottery and Stride Scheduling: Flexible Proportional-share Resource Management
Waldspurger, Carl A.
This thesis presents flexible abstractions for specifying resource management policies, together with efficient mechanisms for implementing those abstractions.  Several novel scheduling techniques are introduced, including both randomized and deterministi
</description>
<dc:date>1995-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149809">
<title>The Modified Object Buffer: A Storage Management Technique for Object-Oriented Databases</title>
<link>https://hdl.handle.net/1721.1/149809</link>
<description>The Modified Object Buffer: A Storage Management Technique for Object-Oriented Databases
Ghemawat, Sanjay
</description>
<dc:date>1995-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149808">
<title>Dynamic Computation Migration in Distributed Shared Memory Systems</title>
<link>https://hdl.handle.net/1721.1/149808</link>
<description>Dynamic Computation Migration in Distributed Shared Memory Systems
Hsieh, Wilson Cheng-Yi
</description>
<dc:date>1995-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149806">
<title>Reactive Synchronization Algorithms for Multiprocessors</title>
<link>https://hdl.handle.net/1721.1/149806</link>
<description>Reactive Synchronization Algorithms for Multiprocessors
Lim, Beng-Hong
Efficient synchronization algorithms are hard to design because their performance depends on run-time factors that are hard to predict. In particular, the designer has a choice of protocols to implement the synchronization operation, and a choice of wait
</description>
<dc:date>1995-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149805">
<title>Restricted Branching Programs and Hardware Verification</title>
<link>https://hdl.handle.net/1721.1/149805</link>
<description>Restricted Branching Programs and Hardware Verification
Ponzio, Stephen J.
Recent developments in the field of digital design and hardware verification have found great use for restricted forms of branching programs.  In particular, oblivious read-once branching programs (also called "OBDD's") are central to a very common techni
</description>
<dc:date>1995-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149804">
<title>Computationally Efficient Error-Correcting Codes and Holographic Proofs</title>
<link>https://hdl.handle.net/1721.1/149804</link>
<description>Computationally Efficient Error-Correcting Codes and Holographic Proofs
Spielman, Daniel Alan
We present computationally efficient error-correcting codes and holographic proofs.Our error-correcting codes are asymptotically good and can be encoded and decoded in linear time.Our construction of holographic proofs provide, for every proof of any theo
</description>
<dc:date>1995-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149803">
<title>Link Architecture for a Global Information Infrastructure</title>
<link>https://hdl.handle.net/1721.1/149803</link>
<description>Link Architecture for a Global Information Infrastructure
Van Dyke, Jeffrey R.
</description>
<dc:date>1995-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149802">
<title>Increasing Cross-Domain Call Batching Using Promises and Batched Control Structures</title>
<link>https://hdl.handle.net/1721.1/149802</link>
<description>Increasing Cross-Domain Call Batching Using Promises and Batched Control Structures
Zondervan, Quinton Y.
In a client-server system, it may be possible for the client to corrupt server data through unsafe access methods  or programming error.  A common method for protecting the server data is to separate the client and server into distinct protection domains,
</description>
<dc:date>1995-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149801">
<title>Noise Tolerant Algorithms for Learning and Searching</title>
<link>https://hdl.handle.net/1721.1/149801</link>
<description>Noise Tolerant Algorithms for Learning and Searching
Aslam, Javed Alexander
We consider the problem of developing robust algorithms which cope with noisy data. In the Probably Approximately Correct model of machine learning, we develop a general technique which allows nearly all PAC learning algorithms to be converted into highly
</description>
<dc:date>1995-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149800">
<title>Quantitative Performance Modeling of Scientific Computations</title>
<link>https://hdl.handle.net/1721.1/149800</link>
<description>Quantitative Performance Modeling of Scientific Computations
Toledo, Sivan Abraham
The first part of the thesis demonstrates that the performance of programs can be predicted accurately, automatically, and rapidly using a method called benchmapping.  The key aspects benchmapping are: automatic creation of detailed performance models, pr
</description>
<dc:date>1995-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149799">
<title>Reducing Synchronization Overhead in Parallel Simulation</title>
<link>https://hdl.handle.net/1721.1/149799</link>
<description>Reducing Synchronization Overhead in Parallel Simulation
Legedza, Ulana
Synchronization is often the dominant cost in conservative parallel simulation, particularly in simulations of parallel computers, in which low-latency simulated communication requires frequent synchronization.  This thesis presents local barriers and pre
</description>
<dc:date>1995-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149798">
<title>Connecting Homes to the Internet: An Engineering Cost Model of Cable vs. ISDN</title>
<link>https://hdl.handle.net/1721.1/149798</link>
<description>Connecting Homes to the Internet: An Engineering Cost Model of Cable vs. ISDN
Gillett, Sharon Eisner
Using the World Wide Web at 28.8 Kbps (or less) can be a frustrating experience: a multimedia page that takes a fraction of a second to download at Ethernet speeds takes many seconds at modem rates. Two enhancements to existing infrastructure have the pot
</description>
<dc:date>1995-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149797">
<title>An Interchange Standard and System for Browsing Digital Documents</title>
<link>https://hdl.handle.net/1721.1/149797</link>
<description>An Interchange Standard and System for Browsing Digital Documents
Kass, Andrew Jonathan
With the advent of fast global digital communication networks, information will increasingly be delivered in electronic form.  In addition, as libraries become increasingly more computerized, not just card catalogs but entire books will be stored on-line.
</description>
<dc:date>1995-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149796">
<title>Client Cache management in a Distributed Object Database</title>
<link>https://hdl.handle.net/1721.1/149796</link>
<description>Client Cache management in a Distributed Object Database
Day, Mark Stuart
A distributed object database stores persistently at servers.  Applications run on client machines, fetching objects into a client-side cache of objects.  If fetching and cache management are done in terms of objects, rather than fixed-size units such as
</description>
<dc:date>1995-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149795">
<title>Randomness Versus Non-Determinism in Distributed Computing</title>
<link>https://hdl.handle.net/1721.1/149795</link>
<description>Randomness Versus Non-Determinism in Distributed Computing
Saias, Alain Isaac
This thesis is devoted to the analysis and illustration of the effects of the interplay between randomness and non-determinism in randomized computing.  Using ideas from game theory , we provide a general model for randomized computing which formalizes th
</description>
<dc:date>1994-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149794">
<title>Quickstep: A System for Performance Monitoring and Debugging Parallel Applications on the Alewife Multiprocessor</title>
<link>https://hdl.handle.net/1721.1/149794</link>
<description>Quickstep: A System for Performance Monitoring and Debugging Parallel Applications on the Alewife Multiprocessor
Mitra, Sramana
</description>
<dc:date>1995-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149793">
<title>A Distributed Programming System for Media Applications</title>
<link>https://hdl.handle.net/1721.1/149793</link>
<description>A Distributed Programming System for Media Applications
Phillips, Brent M.
</description>
<dc:date>1995-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149792">
<title>Functional Encapsulation and Type Reconstruction in a Strongly-typed, Polymorphic Language</title>
<link>https://hdl.handle.net/1721.1/149792</link>
<description>Functional Encapsulation and Type Reconstruction in a Strongly-typed, Polymorphic Language
Gupta, Shail Aditya
</description>
<dc:date>1995-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149791">
<title>A Statistical Approach to Language Modelling for the ATIS Problem</title>
<link>https://hdl.handle.net/1721.1/149791</link>
<description>A Statistical Approach to Language Modelling for the ATIS Problem
Koppelman, Joshua D.
</description>
<dc:date>1995-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149790">
<title>Synchronized MIMD Computing</title>
<link>https://hdl.handle.net/1721.1/149790</link>
<description>Synchronized MIMD Computing
Kuszmaul, Bradley C.
Fast global synchronization provides simple, efficient solutions to many of the system problems of parallel computing.  It achieves this by providing composition of both performance and correctness.  If you understand the performance and meaning of parall
</description>
<dc:date>1994-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149789">
<title>Mechanisms and Interfaces for Software-Extended Coherent Shared Memory</title>
<link>https://hdl.handle.net/1721.1/149789</link>
<description>Mechanisms and Interfaces for Software-Extended Coherent Shared Memory
Chaiken, David L.
Software-extended systems use a combination of hardware and software to implement shared memory on large-scale multiprocessors.  Hardware mechanisms accelerate common-case accesses, while software handles exceptional events.  This dissertation proposes, d
</description>
<dc:date>1995-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149788">
<title>Small-Depth Counting Networks and Related Topics</title>
<link>https://hdl.handle.net/1721.1/149788</link>
<description>Small-Depth Counting Networks and Related Topics
Klugerman, Michael Richard
</description>
<dc:date>1994-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149787">
<title>Statistical Trajectory Models for Phonetic Recognition</title>
<link>https://hdl.handle.net/1721.1/149787</link>
<description>Statistical Trajectory Models for Phonetic Recognition
Goldenthal, William David
The main goal of this work is to develop an alternative methodology for acoustic-phonetic modelling of speech sounds.  The approach utilizes a segment-based framework to capture the dynamical behavior and statistical dependencies of the acoustic attribute
</description>
<dc:date>1994-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149786">
<title>On-Line Algorithms for Robot Navigation and Server Problems</title>
<link>https://hdl.handle.net/1721.1/149786</link>
<description>On-Line Algorithms for Robot Navigation and Server Problems
Kleinberg, Jon M.
</description>
<dc:date>1994-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149785">
<title>An Interactive Programming System for Media Computation</title>
<link>https://hdl.handle.net/1721.1/149785</link>
<description>An Interactive Programming System for Media Computation
Wetherall, David J.
As digital video is manipulated by increasingly powerful computers, many new applications are becoming viable.  This report investigates the programming language aspects of controlling such video applications.  It presents the design, implementation, and
</description>
<dc:date>1994-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149784">
<title>The Structure of Near-minimum Edge Cuts</title>
<link>https://hdl.handle.net/1721.1/149784</link>
<description>The Structure of Near-minimum Edge Cuts
Benczúr, András A.
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149783">
<title>Serializing Parallel Programs by Removing Redundant Computation</title>
<link>https://hdl.handle.net/1721.1/149783</link>
<description>Serializing Parallel Programs by Removing Redundant Computation
Ernst, Michael D.
</description>
<dc:date>1994-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149782">
<title>A Programming system for the Dynamic Manipulation of Temporally Sensitive Data</title>
<link>https://hdl.handle.net/1721.1/149782</link>
<description>A Programming system for the Dynamic Manipulation of Temporally Sensitive Data
Lindblad, Christopher J.
In computer-participative multimedia applications, the computer not only manipulates media, but also digests it and performs independent actions based on media content.  In this report I discuss an approach to the design of environments to support the dev
</description>
<dc:date>1994-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149781">
<title>Failsafe Key Escrow</title>
<link>https://hdl.handle.net/1721.1/149781</link>
<description>Failsafe Key Escrow
Kilian, Joseph; Leighton Frank Thomson
</description>
<dc:date>1994-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149780">
<title>A Scheme Shell</title>
<link>https://hdl.handle.net/1721.1/149780</link>
<description>A Scheme Shell
Shivers, Olin
</description>
<dc:date>1994-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149779">
<title>Time Optimal Self-Stabilizing Spanning Tree Algorithms</title>
<link>https://hdl.handle.net/1721.1/149779</link>
<description>Time Optimal Self-Stabilizing Spanning Tree Algorithms
Aggarwal, Sudhanshu Madan
</description>
<dc:date>1994-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149778">
<title>An Integrated Approach to Dynamic Decision Making under Uncertainty</title>
<link>https://hdl.handle.net/1721.1/149778</link>
<description>An Integrated Approach to Dynamic Decision Making under Uncertainty
Leong, Tze-Yun
</description>
<dc:date>1994-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149777">
<title>Global Partitioning of Parallel loops and Data Arrays for Caches and Distributed Memory in Multiprocessors</title>
<link>https://hdl.handle.net/1721.1/149777</link>
<description>Global Partitioning of Parallel loops and Data Arrays for Caches and Distributed Memory in Multiprocessors
Barua, Rajeev K.
</description>
<dc:date>1994-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149776">
<title>Using Specifications to Check Source Code</title>
<link>https://hdl.handle.net/1721.1/149776</link>
<description>Using Specifications to Check Source Code
Evans, David
</description>
<dc:date>1994-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149775">
<title>Automatic Acquisition of Language Models for Speech Recognition</title>
<link>https://hdl.handle.net/1721.1/149775</link>
<description>Automatic Acquisition of Language Models for Speech Recognition
McCandless, Michael Kyle
</description>
<dc:date>1994-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149774">
<title>Transaction Management for Mobile Objects Using Optimistic Concurrency Control</title>
<link>https://hdl.handle.net/1721.1/149774</link>
<description>Transaction Management for Mobile Objects Using Optimistic Concurrency Control
Adya, Atul
We present computationally efficient error-correcting codes and holographic proofs. Our error-correcting codes are asymptotically good and can be  encoded and decoded in linear time. Our construction of holographic proofs provide, for every proof of any t
</description>
<dc:date>1994-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149773">
<title>A Safe, Efficient Object Database Interface Using Batched Futures</title>
<link>https://hdl.handle.net/1721.1/149773</link>
<description>A Safe, Efficient Object Database Interface Using Batched Futures
Bogle, Phillip Lee
For many systems such as operating systems and databases it is important to run client code in a separate protection domain so that it cannot interfere with the correct operation of the system.  Clients communicate with the server by making cross domain c
</description>
<dc:date>1994-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149772">
<title>Time Surveying:  Clock Synchronization over packet Networks</title>
<link>https://hdl.handle.net/1721.1/149772</link>
<description>Time Surveying:  Clock Synchronization over packet Networks
Troxel, Gregory D.
</description>
<dc:date>1994-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149771">
<title>Investigation of a Preemptive Network Architecture</title>
<link>https://hdl.handle.net/1721.1/149771</link>
<description>Investigation of a Preemptive Network Architecture
Lefelhocz, Christopher James
Two network architectures, cell and packet, form the basis of most high bandwidth network research.  If analyzed from the perspective of building a switch,  both  architectures have unique advantages.  The preemptive architecture described herein proposes
</description>
<dc:date>1994-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149770">
<title>Formal Specification Techniques for Promoting Software Modularity, Enhancing Documentation, and Testing Specifications</title>
<link>https://hdl.handle.net/1721.1/149770</link>
<description>Formal Specification Techniques for Promoting Software Modularity, Enhancing Documentation, and Testing Specifications
Tan, Yang Meng
This thesis presents three ideas.  First, it presents a novel use of formal specification to promote a programming style based on specified interfaces and data abstraction in a programming language that lacks such supports.  Second, it illustrates the uses of claims about specifications.
</description>
<dc:date>1994-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149769">
<title>Observing "True" Concurrency</title>
<link>https://hdl.handle.net/1721.1/149769</link>
<description>Observing "True" Concurrency
Jategaonkar, Lalita A.
In concurrent process theory, processors are often modeled by state machines and Petri Nets.  Algebraic process theories based on state machines, exemplified by Milner's CCS and Hoare's CSP, have been more fully developed than Net-based theories, but are inadequate for modeling "true" concurrency concepts such as non-atomic actions, action refinement, locality of actions, and multithreadedness.
</description>
<dc:date>1993-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149768">
<title>Efficient Implementation of High-Level Languages on User-Level Communications Architectures</title>
<link>https://hdl.handle.net/1721.1/149768</link>
<description>Efficient Implementation of High-Level Languages on User-Level Communications Architectures
Hsieh, Wilson C.; Johnson, Kirk L.; Kaashoek, M. Frans; Wallach, Deborah A.; Weihl, William E.
User-level communication architectures --- parallel architectures that give user code direct but protected access to the network --- provide communication performance that is an order of magnitude higher than previous-generation message-passing architectures. Unfortunately, in order to take advantage of his level of performance, programmers must concern themselves with low-level issues that are often hardware dependent (e.g., what primitives to use for large and small data transfers, and either to use interrupts or polling).
</description>
<dc:date>1994-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149767">
<title>Cellular Automata Methods in Mathematical Physics</title>
<link>https://hdl.handle.net/1721.1/149767</link>
<description>Cellular Automata Methods in Mathematical Physics
Smith, Mark Andrew
Cellular automata (CA) are fully discrete, spatially-distributed dynamical systems which can serve as an alternative framework for mathematical descriptions of physical systems.  Furthermore, they constitute intrinsically parallel models of computation which can be efficiently realized with special-purpose cellular automata machines.
</description>
<dc:date>1994-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149766">
<title>A Timing Analysis and Optimization System for Level-clocked Circuitry</title>
<link>https://hdl.handle.net/1721.1/149766</link>
<description>A Timing Analysis and Optimization System for Level-clocked Circuitry
Papaefthymiou, Marios Christos
This thesis investigates timing analysis and optimization issues in synchronous circuitry.  The major thrust of our work is a collection of provably correct and efficient algorithms that perform a variety of architectural-level operations on level-clocked
</description>
<dc:date>1993-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149765">
<title>Guardian Angel: Patient-Centered Health Information Systems</title>
<link>https://hdl.handle.net/1721.1/149765</link>
<description>Guardian Angel: Patient-Centered Health Information Systems
Szolovits, Peter; Doyle, Jon; Long, William J.; Kohane, Isaac; Pauker, Stephen G.
</description>
<dc:date>1994-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149764">
<title>Distributing Information for Collaborative Filtering on Usenet Net News</title>
<link>https://hdl.handle.net/1721.1/149764</link>
<description>Distributing Information for Collaborative Filtering on Usenet Net News
Maltz, David A.
As part of the Information Revolution," the amount of raw information available to computer users has increased as never before.  Unfortunately , there has been a corresponding jump in the amount of unrelated information users must search through in order
</description>
<dc:date>1994-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149763">
<title>The Vidboard:A Video Capture and Processing Peripheral for the ViewStation System</title>
<link>https://hdl.handle.net/1721.1/149763</link>
<description>The Vidboard:A Video Capture and Processing Peripheral for the ViewStation System
Adam, Joel F.; Tennenhouse, David L.
With the growth of multimedia applications, video is increasingly being handled within the computing environment.  Since video presents serious technological challenges to the current generation of personal computers and networks, other systems based on t
</description>
<dc:date>1992-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149762">
<title>An Algorithm for Rate Allocation in a Packet-Switching Network With Feedback</title>
<link>https://hdl.handle.net/1721.1/149762</link>
<description>An Algorithm for Rate Allocation in a Packet-Switching Network With Feedback
Charny, Anna
As the speed and complexity of computer networks evolve, sharing network resources becomes increasingly important.  thus, the issue of how to allocate the available bandwidth among the multitude of users needs to be addressed.  Such allocation needs to be
</description>
<dc:date>1994-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149761">
<title>Function-Based Indexing for Object-Oriented Databases</title>
<link>https://hdl.handle.net/1721.1/149761</link>
<description>Function-Based Indexing for Object-Oriented Databases
Hwang, Deborah Jing-Hwa
Object-oriented databases should support queries over user-defined sets based on properties computed using user-defined functions.  This dissertation presents a new function-based indexing scheme to make these queries run faster.  These indexes are diffic
</description>
<dc:date>1994-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149760">
<title>Fast Object Operations in a  Persistent Programming System</title>
<link>https://hdl.handle.net/1721.1/149760</link>
<description>Fast Object Operations in a  Persistent Programming System
Myers, Andrew C.
</description>
<dc:date>1994-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149759">
<title>Exploiting Specifications to Improve Program Performance</title>
<link>https://hdl.handle.net/1721.1/149759</link>
<description>Exploiting Specifications to Improve Program Performance
Vandevoorde, Mark T.
Although programmers benefit from interface specifications when reasoning about programs, existing compilers do not.  In this thesis, I discuss how to incorporate specifications into a programming language to improve performance.  I use specifications in
</description>
<dc:date>1994-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149758">
<title>Run-time Thread Management for Large-Scale Distributed-Memory Multiprocessors</title>
<link>https://hdl.handle.net/1721.1/149758</link>
<description>Run-time Thread Management for Large-Scale Distributed-Memory Multiprocessors
Nussbaum, Daniel
Effective thread management is crucial to achieving good performance on large-scale distributed-memory multiprocessors that support dynamic threads.  For a given parallel computation with some associated task constraints imposed by the task graph, a thread-management algorithm produces a running schedule as output, subject to the precedence constraints imposed by the task graph and the constraints imposed by the interprocessor communications network.
</description>
<dc:date>1993-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149757">
<title>compiler analysis to implement point-to-point synchronization in parallel programs</title>
<link>https://hdl.handle.net/1721.1/149757</link>
<description>compiler analysis to implement point-to-point synchronization in parallel programs
Nguyen, John
The shared-memory data-parallel model presents an attractive interface for programming multiprocessors by allowing for easy management of parallel tasks while hiding details of the underlying machine architecture.
</description>
<dc:date>1993-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149756">
<title>Closing the Window of Vulnerability in Multiphase memory transaction: The alewife transaction store</title>
<link>https://hdl.handle.net/1721.1/149756</link>
<description>Closing the Window of Vulnerability in Multiphase memory transaction: The alewife transaction store
Kubiatowicz, John David
Multiprocessor architects have begun to explore several mechanisms such as prefetching, context-switching and software-assisted dynamic cache-coherence, which transform single-phase memory transactions in conventional memory systems into multi-phase operations.
</description>
<dc:date>1993-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149755">
<title>Automatic language Identification Using a Segment-Based Approach</title>
<link>https://hdl.handle.net/1721.1/149755</link>
<description>Automatic language Identification Using a Segment-Based Approach
Hazen, Timothy J.
Automatic language Identification (ALI) is the problem of automatically identifying the language of an utterance through the use of a computer.  In 1977, House and Neuburg proposed an approach to ALI which focused on the phonotactic constraints of different languages.
</description>
<dc:date>1993-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149754">
<title>Correctness of Communications Protocols, A case Study</title>
<link>https://hdl.handle.net/1721.1/149754</link>
<description>Correctness of Communications Protocols, A case Study
Søgaard-Andersen, Jørgen; Lynch, Nancy A.; Lampson, Butler W.
During the past few years, the technology for formal specification and verification of communication protocols has matured to the point where we believe that it now provides practical assistance for protocol design and validation.
</description>
<dc:date>1993-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149753">
<title>Correctness Proof for a Network Synchronizer</title>
<link>https://hdl.handle.net/1721.1/149753</link>
<description>Correctness Proof for a Network Synchronizer
Devarajan, Harish; Fekete, Alan; Lynch, Nancy A.; Shrira, Liuba
In this paper we offer a formal, rigorous proof of the correctness of Awerbuch's algorithm for network synchronization [1]. We specify both the algorithm and the correctness condition using the I/O automaton model.
</description>
<dc:date>1993-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149752">
<title>Liveness in Timed and Untimed Systems</title>
<link>https://hdl.handle.net/1721.1/149752</link>
<description>Liveness in Timed and Untimed Systems
Gawlick, Rainer; Segala, Roberto; Søgaard-Andersen, Jørgen; Lynch, Nancy A.
When proving the correctness of algorithms in distributed systems, one generally considers safety conditions and liveness conditions. The Input /Output (I/)0 automaton model and its timed version have used successfully, but have focused on safety conditions and on a restricted from of liveness called fairness.
</description>
<dc:date>1993-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149751">
<title>Virtual Wires: Overcoming Pin Limitations in FPGA-based Logic Emulation</title>
<link>https://hdl.handle.net/1721.1/149751</link>
<description>Virtual Wires: Overcoming Pin Limitations in FPGA-based Logic Emulation
Babb, Jonathan William
Existing FPGA-based logic emulators are limited by inter-chip communication bandwidth, resulting in low gate utilization (10 to 20 percent of usable gates).  This resource imbalance increases the number of chips needed to emulate a particular logic design and thereby decreases emulation speed, since signals must cross more chip boundaries.
</description>
<dc:date>1993-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149750">
<title>Reordering with Hindsight</title>
<link>https://hdl.handle.net/1721.1/149750</link>
<description>Reordering with Hindsight
Spiers, Bradford T.
This report presents the reordering technique for parallel debugging. This technique is useful for debugging ordering errors, caused when actions a programmer meant to occur in a specific order occur in a different, unintended order.
</description>
<dc:date>1993-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149749">
<title>Self-stabilization By Local Checking and Correction</title>
<link>https://hdl.handle.net/1721.1/149749</link>
<description>Self-stabilization By Local Checking and Correction
Varghese, George
A self-stabilizing protocol begins to behave correctly in bounded time, no matter what state it starts in.  Self-stabilization abstracts the ability to tolerate arbitrary faults that stop.  This thesis describes a simple paradigm called local checking and correction for the design of stabilizing network protocols.
</description>
<dc:date>1992-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149748">
<title>Cache Performance of Garbage-collected Programming Languages</title>
<link>https://hdl.handle.net/1721.1/149748</link>
<description>Cache Performance of Garbage-collected Programming Languages
Reinhold, Mark B.
As processor speeds continue to improve relative to main-memory access times, cache performance is becoming an increasingly important component of program performance.
</description>
<dc:date>1993-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149747">
<title>Structured Video: A Data Type with Content-based Access</title>
<link>https://hdl.handle.net/1721.1/149747</link>
<description>Structured Video: A Data Type with Content-based Access
Duda, Andrzej; Weiss, Ron
We describe structured video, a general video data model allowing free form annotation, composition, and content-based access to video segments. The structured video abstraction provides an efficient means of organizing and manipulating video data by assigning logical representations to the underlying video streams and their contents.
</description>
<dc:date>1993-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149746">
<title>Fair Cryptosystems</title>
<link>https://hdl.handle.net/1721.1/149746</link>
<description>Fair Cryptosystems
Micali, Silvio
</description>
<dc:date>1993-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149745">
<title>A Content Routing System for Distributed Information Systems</title>
<link>https://hdl.handle.net/1721.1/149745</link>
<description>A Content Routing System for Distributed Information Systems
Sheldon, Mark A.; Duda, Andrzej; Weiss, Ron; O'Toole, James; Gifford, David K.
We describe the first system that provides query based associative access to the contents of distributed information servers. Queries describe desired object attributes, and are automatically forwarded to servers that contain relevant information.
</description>
<dc:date>1993-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149744">
<title>I-95 The Information Market</title>
<link>https://hdl.handle.net/1721.1/149744</link>
<description>I-95 The Information Market
</description>
<dc:date>1993-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149743">
<title>Distributed Garbage Collection in a Client-server, Transaction, Persistent Object System</title>
<link>https://hdl.handle.net/1721.1/149743</link>
<description>Distributed Garbage Collection in a Client-server, Transaction, Persistent Object System
Maheshwari, Umesh
We present a design for distributed garbage collection in a object-oriented database system called Thor. Garbage collection in Thor is different from that in conventional distributed systems because Thor has a client-server architecture, in which clients fetch copies of objects from multiple servers ans run transactions.
</description>
<dc:date>1993-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149742">
<title>Implementing Orthogonal Persistence: A Simple Optimization Based on Replicating Collection</title>
<link>https://hdl.handle.net/1721.1/149742</link>
<description>Implementing Orthogonal Persistence: A Simple Optimization Based on Replicating Collection
Nettels, Scott; O'Toole James
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149741">
<title>Concurrent Garbage Collection of Persistent Heaps</title>
<link>https://hdl.handle.net/1721.1/149741</link>
<description>Concurrent Garbage Collection of Persistent Heaps
O'Toole, James; Nettles, Scott; Gifford, David K.
We describe the first concurrent compacting garbage collector for a persistent heap.  Client threads read and write the heap in primary memory, and can independently commit or about their write operations.
</description>
<dc:date>1993-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149740">
<title>Real-time Replication GC: An Implementation Report</title>
<link>https://hdl.handle.net/1721.1/149740</link>
<description>Real-time Replication GC: An Implementation Report
O'Toole, James; Nettles, Scott
</description>
<dc:date>1993-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149739">
<title>Logical Disk: A Simple New Approach to Improving File System Performance</title>
<link>https://hdl.handle.net/1721.1/149739</link>
<description>Logical Disk: A Simple New Approach to Improving File System Performance
de Jonge, Wiebren; Kaashoek, M. Frans; Hsieh, Wilson C.
Making a file system efficient usually requires extensive modifications.  For example, making a file system log-structured requires the introduction of new data structures that are tightly coupled with the general file system code.
</description>
<dc:date>1993-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149738">
<title>An Evaluation of Multiprocessor Support for Fine-grain Synchronization in Preconditioned Conjugate Gradient</title>
<link>https://hdl.handle.net/1721.1/149738</link>
<description>An Evaluation of Multiprocessor Support for Fine-grain Synchronization in Preconditioned Conjugate Gradient
Yeung, Donald
This thesis explores the use of fine-grain synchronization in the preconditioned conjugate gradient (PCG) method using the modified incomplete Cholesky factorization of the coefficient matrix as a preconditioner.
</description>
<dc:date>1993-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149737">
<title>The Category of Functors from State Shapes to Bottomless CPOs in Adequate for Block Structure</title>
<link>https://hdl.handle.net/1721.1/149737</link>
<description>The Category of Functors from State Shapes to Bottomless CPOs in Adequate for Block Structure
Lent, Arthur Franklin
We present a programming language EoA, which embodies what Reynolds has described as the ``essence of ALGOL.''  In particular, EoA allows higher-order procedures and the declaration of block structured local variables.
</description>
<dc:date>1993-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149736">
<title>A Constructive Approach to Artificial Intelligence Reexamined</title>
<link>https://hdl.handle.net/1721.1/149736</link>
<description>A Constructive Approach to Artificial Intelligence Reexamined
Ramstad, Robert Matthew
Made-Up Minds:  A Constructivist Approach to Artificial Intelligence, a Ph.D. thesis by Gary Drescher (MIT, Computer Science, September 1989) and a book published by MIT Press (1991) describe a learning system which controls a simulated robot and gathers information about causes and effects for various actions within the software simulated world the robot inhabits.
</description>
<dc:date>1992-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149735">
<title>Family Values: A Beahvior Notion of Subtyping</title>
<link>https://hdl.handle.net/1721.1/149735</link>
<description>Family Values: A Beahvior Notion of Subtyping
Liskov, Barbara; Wing, Jeannette M.
</description>
<dc:date>1993-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149734">
<title>A History of CLU</title>
<link>https://hdl.handle.net/1721.1/149734</link>
<description>A History of CLU
Liskov, Barbara H.
The idea of a data abstraction has had a significant impact on the development of programming languages and on programming methodology.  CLU was the first implemented programming language to provide direct linguistic support for data abstraction.
</description>
<dc:date>1993-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149733">
<title>A Process Algebraic View of I/O Automata</title>
<link>https://hdl.handle.net/1721.1/149733</link>
<description>A Process Algebraic View of I/O Automata
Segala, Roberto
The Input/Output Automata formalism of Lynch and Tuttle is a widely used framework for the specification and verification of concurrent algorithms. Unfortunately, it has never been provided with an algebraic characterization, a formalization which has been fundamental for the success of theories like CSP, CCP and ACP.
</description>
<dc:date>1992-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149732">
<title>Concurrent Timestamping Made Simple</title>
<link>https://hdl.handle.net/1721.1/149732</link>
<description>Concurrent Timestamping Made Simple
Gawlick, Rainer
Concurrent Timestamp Systems  (CTSS) allow processes to temporally order concurrent events in an asynchronous shared memory system. Bounded memory constructions of a CTSS are extremely powerful tools for concurrency control, and are the basis for solutions to many coordination problems including mutual exclusion, randomized consensus, and multiwriter multireader atomic registers.
</description>
<dc:date>1992-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149731">
<title>Compiler-directed Storage Reclamation Using Object Lifetime Analysis</title>
<link>https://hdl.handle.net/1721.1/149731</link>
<description>Compiler-directed Storage Reclamation Using Object Lifetime Analysis
Hicks, James Edward, Jr.
Many heap-oriented languages such as Lisp and Id depend on run-time garbage collection to reclaim storage.  Garbage collection can be a significant run-time expense, especially for functional languages that tend to allocate structures often.
</description>
<dc:date>1992-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149730">
<title>Managing Storage for Multithreaded Computations</title>
<link>https://hdl.handle.net/1721.1/149730</link>
<description>Managing Storage for Multithreaded Computations
Blumofe, Robert D.
Multithreading has become a  dominant paradigm in general purpose MIMD parallel computation.  To execute a multithread computation on a parallel computer, a scheduler must order and allocate threads to run on the individual processors.
</description>
<dc:date>1992-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149729">
<title>Performance Assertion Checking</title>
<link>https://hdl.handle.net/1721.1/149729</link>
<description>Performance Assertion Checking
Perl, Sharon Esther
Performance assertion checking  is an approach to describing and monitoring the performance of complex software systems.  The idea is simple:  system implementors write assertions that capture their expectations for performance, the system is instrumented to collect performance data, and then the assertions are checked automatically against the data to detect violations signifying potential performance bugs.
</description>
<dc:date>1992-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149728">
<title>Proceedings of the 1992 MIT Student Workshop on VLSI and Parallel Systems</title>
<link>https://hdl.handle.net/1721.1/149728</link>
<description>Proceedings of the 1992 MIT Student Workshop on VLSI and Parallel Systems
Leiserson, C.E.
Proceedings of the 1992 MIT Student Workshop on VLSI and Parallel Systems. The papers in this volume were submitted to the 1992 MIT Student Workshop on VLSI and Parallel Systems. The workshop was organized by the VLSI and Parallel Systems  Group at MIT to promote an interchange of ideas among the various research activities at MIT in VSLI and parallel systems.  It was held on July 21, 1992 at the MIT Endicott House in Dedham, Massachusetts. Of 54 papers in this proceedings, 16 were chosen for presentation at the workshop. These papers are marked with an asterisk.
</description>
<dc:date>1992-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149727">
<title>Video Coding and the Application Level Framing Protocol Architecture</title>
<link>https://hdl.handle.net/1721.1/149727</link>
<description>Video Coding and the Application Level Framing Protocol Architecture
Heybey, Andrew T.
As networks and computers become faster, real time video transmission is expected to become common.  Variable bit rate video coders will be used in order to take advantage of the statistical multiplexing gain and bandwidth efficiency of packet switched networks.
</description>
<dc:date>1992-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149726">
<title>PIPES: Linguistic Support for Ordered Asynchronous Invocations</title>
<link>https://hdl.handle.net/1721.1/149726</link>
<description>PIPES: Linguistic Support for Ordered Asynchronous Invocations
Colbrook, Adrian; Brewer, Eric A.; Hsieh, Wilson C.; Wang, Paul; Weihl, William E.
We describe pipes, a new linguistic mechanism for sequences of ordered asynchronous procedure calls in multiprocessor systems.  Pipes allow a sequence of remote invocations to be performed in order, but asynchronously with respect to the calling thread.
</description>
<dc:date>1992-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149725">
<title>Organization of Systems with Bussed Interconnections</title>
<link>https://hdl.handle.net/1721.1/149725</link>
<description>Organization of Systems with Bussed Interconnections
Kipnis, Shlomo
This thesis explores using busses in communication architectures and control structures.  First, we investigate the organization of permutation architectures with bussed interconnections.  We explore how to efficiently permute data among VLSI chips in accordance with a predetermined set of permutations.
</description>
<dc:date>1992-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149724">
<title>Algorithms for Exploring an Unknown Graph</title>
<link>https://hdl.handle.net/1721.1/149724</link>
<description>Algorithms for Exploring an Unknown Graph
Betke, Margrit
We consider the problem of exploring an unknown strongly connected directed graph.  We use the exploration model introduced by Deng and Papadimitriou [DP90].  An explorer follows the edges of an unknown graph until she has seen all the edges and vertices of the graph.
</description>
<dc:date>1992-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149723">
<title>On the Sample Complexity of PAC-learning using Random and Chosen Examples</title>
<link>https://hdl.handle.net/1721.1/149723</link>
<description>On the Sample Complexity of PAC-learning using Random and Chosen Examples
Eisenberg, Bronwyn Bonnie
Two protocols used for learning under the pac-learning model introduced by Valiant are learning from random examples and learning from memberships queries.  Membership queries have been used to efficiently and exactly learn a concept class  C   that is too difficult  to pac-learn using random examples.
</description>
<dc:date>1992-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149722">
<title>Modeling Speaker Variability and Imposing Speaker Constrainst in Phonetic Classification</title>
<link>https://hdl.handle.net/1721.1/149722</link>
<description>Modeling Speaker Variability and Imposing Speaker Constrainst in Phonetic Classification
Niyogi, Partha
This thesis deals with intra-speaker correlation analyses of speech sounds, and the possible utilization of this correlation to speech recognition.  Current approaches to phonetic classification, regardless of whether they use context-dependent or -independent models, achieve classification based on locally optimum criteria.
</description>
<dc:date>1992-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149721">
<title>A Distributed Data-balanced Dictionary Based on the B-link tree</title>
<link>https://hdl.handle.net/1721.1/149721</link>
<description>A Distributed Data-balanced Dictionary Based on the B-link tree
Johnson, Theodore; Colbrook, Adrian
Many concurrent dictionary data structures have been proposed, but usually in the context of shared memory multiprocessors.  In this paper, we present an algorithm for a concurrent distributed B-tree that can be implemented on message passing paralle
</description>
<dc:date>1992-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149720">
<title>The Design and Implementation of a Parallel Persistent Object System</title>
<link>https://hdl.handle.net/1721.1/149720</link>
<description>The Design and Implementation of a Parallel Persistent Object System
Heytens, Michael L.
This report describes Anga, an experimental persistent object system that we have developed that utilizes parallelism in a fundamental way to enhance performance.  Parallelism is incorporated into the design of the system at all levels.  We begin wit
</description>
<dc:date>1992-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149719">
<title>File Systems with Multiple File Implementations</title>
<link>https://hdl.handle.net/1721.1/149719</link>
<description>File Systems with Multiple File Implementations
Stata, Raymie
This thesis proposes ideas for designing file system software for the large, high-performance file server hardware we feel will be common in the middle to late nineties.  In particular, the thesis examines the value and pragmatics of file systems wit
</description>
<dc:date>1992-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149718">
<title>Preventing Recursion Deadlock in Concurrent Object-oriented Systems</title>
<link>https://hdl.handle.net/1721.1/149718</link>
<description>Preventing Recursion Deadlock in Concurrent Object-oriented Systems
Brewer, Eric A.; Waldspurger, Carl A.
This paper presents solutions to the problem of deadlock due to recursion in concurrent object-oriented programming languages.  Two language-independent, system-level mechanisms for solving this problem are proposed:  a novel technique using multi-ported objects, and a named-threads scheme that borrows from previous work in distributed computing.  We compare the solutions and present an analysis of their relative merits.
</description>
<dc:date>1992-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149717">
<title>Full Abstraction and the Context Lemma 1</title>
<link>https://hdl.handle.net/1721.1/149717</link>
<description>Full Abstraction and the Context Lemma 1
Jim, Trevor; Meyer, Albert R.
It is impossible to add a combinator to PCF to achieve full abstraction for models such as Berry's stable domains in a way analogous to the addition of the "parallel-or" combinator that achieves full abstraction for the familiar cpo model.
</description>
<dc:date>1991-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149716">
<title>Scalable Reader-writer Locks for Parallel Systems</title>
<link>https://hdl.handle.net/1721.1/149716</link>
<description>Scalable Reader-writer Locks for Parallel Systems
Hsieh, William C.; Weihl, William E.
Current algorithms for reader-writer synchronization exhibit poor scalability because they do not allow readers to acquire locks independently.  We describe two new algorithms for reader-writer synchronization that allow parallelism among readers during lock acquisition.
</description>
<dc:date>1991-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149715">
<title>PRELUDE: A System for Portable Parallel Software</title>
<link>https://hdl.handle.net/1721.1/149715</link>
<description>PRELUDE: A System for Portable Parallel Software
Weihl, William Edward; Brewer, Eric A.; Colbrook, Adrian; Dellarocas, Chrysanthos N.; Hsieh, Wilson; Joseph, Anthony; Waldspurger, Carl; Wang, Paul
This paper describes PRELUDE, a programming language and accompanying system support for writing portable MIMD parallel programs.  PRELUDE supports a methodology for designing and organizing parallel programs that makes them easier to tune for particular architectures and to port to new  architectures.
</description>
<dc:date>1991-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149714">
<title>The Real-time Cost of Timing Uncertainty: Consensus and Failure Detection</title>
<link>https://hdl.handle.net/1721.1/149714</link>
<description>The Real-time Cost of Timing Uncertainty: Consensus and Failure Detection
Ponzio, Stephen J.
In real distributed systems, processes may have only inexact information about the amount of real time needed for primitive operations such as process steps.  This thesis studies the effect of this timing uncertainty on the real-time behavior of distributed systems.
</description>
<dc:date>1991-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149713">
<title>Algorithms for Search Trees on Message-passing Architectures</title>
<link>https://hdl.handle.net/1721.1/149713</link>
<description>Algorithms for Search Trees on Message-passing Architectures
Colbrook, Adrian; Brewer, Eric A.; Dellarocas, Chrysanthos N.; Weihl, William E.
In this paper we describe a new algorithm for maintaining a balanced search tree on a message-passing MIMD architecture; the algorithm is particularly well suited for implementation on a small number of processors.
</description>
<dc:date>1991-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149712">
<title>Proteus: A High-performance Parallel-architecture Simulator</title>
<link>https://hdl.handle.net/1721.1/149712</link>
<description>Proteus: A High-performance Parallel-architecture Simulator
Brewer, Eric A.; Dellarocas, Chrysanthos N.; Colbrook, Adrian; Weihl, William E.
PROTEUS is a high-performance simulator for MIMD multiprocessors.  It is fast, accurate, and flexible:  it is one to two orders of magnitude faster than comparable simulators, it can reproduce results from real multiprocessors, and it is easily configured to simulate a wide range of architectures.
</description>
<dc:date>1991-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149711">
<title>The Use of Distinctive Features for Automatic Speech Recognition</title>
<link>https://hdl.handle.net/1721.1/149711</link>
<description>The Use of Distinctive Features for Automatic Speech Recognition
Meng, Helen Mei-Ling
One of the most critical and yet unsolved problems in phonetic recognition is the transformation of the continuous speech signal to a discrete representation for accessing words in the lexicon. In order to find an efficient description of speech for recognition tasks, our research investigates to use distinctive features.
</description>
<dc:date>1991-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149710">
<title>Secure Computation (Preliminary Report)</title>
<link>https://hdl.handle.net/1721.1/149710</link>
<description>Secure Computation (Preliminary Report)
Micali, Silvio; Rogaway, Phillip
We define what it means for a network of communicating players to securely compute a function of privately held inputs. Intuitively, we wish to correctly compute its value in a computer manner which protects the privacy of each player's contribution, even though a powerful adversary may endeavor to disrupt this enterprise.
</description>
<dc:date>1991-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149709">
<title>An Information-theoretical Approach to Studying Phoneme Collocational Constrainst</title>
<link>https://hdl.handle.net/1721.1/149709</link>
<description>An Information-theoretical Approach to Studying Phoneme Collocational Constrainst
Kassel, Robert Howard
This thesis describe a lexical study of phoneme collocational constraints using a metric motivated by information theory.  Phonologists have been describing the permissible combination of phonemes in the form of phonotactic rules. They have shown that these rules often can be expressed in terms of phoneme equivalence classes.
</description>
<dc:date>1991-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149708">
<title>Algorithms for Approximate Graph Coloring</title>
<link>https://hdl.handle.net/1721.1/149708</link>
<description>Algorithms for Approximate Graph Coloring
Blum, Avrim
</description>
<dc:date>1991-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149707">
<title>A High-performance Retargetable Simulator for Parallel Architectures</title>
<link>https://hdl.handle.net/1721.1/149707</link>
<description>A High-performance Retargetable Simulator for Parallel Architectures
Dellarocas, Chrysanthos N.
The complexity of the interaction between software and hardware in MIMD machines makes experimental evaluation of parallel programs an import complement to theoretical analysis. Traditional techniques used to monitor the direct execution of programs are intrusive an d may lead to inaccurate  results  when applied to parallel programs.
</description>
<dc:date>1991-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149706">
<title>Knowledge Representation for Supporting Decision Model Formulation in Medicine</title>
<link>https://hdl.handle.net/1721.1/149706</link>
<description>Knowledge Representation for Supporting Decision Model Formulation in Medicine
Leong, Tze-Yun
Clinical decision making involves a large, complex, and ever-changing body of knowledge.  Characterizing such knowledge illuminates the representational and computational requirements for automated clinical decision analysis.
</description>
<dc:date>1991-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149705">
<title>The Round Complexity of Secure Protocols</title>
<link>https://hdl.handle.net/1721.1/149705</link>
<description>The Round Complexity of Secure Protocols
Rogaway, Phillip
Assume we have a network of three of more players, each player in possession of some private input. The players want to compute some function of these private inputs, but in a way which protects the privacy of each participant's contribution.
</description>
<dc:date>1991-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149704">
<title>Performance Tradeoffs in Multithreaded Processors</title>
<link>https://hdl.handle.net/1721.1/149704</link>
<description>Performance Tradeoffs in Multithreaded Processors
Agarwal, Anant
High network latencies in large-scale multiprocessors can cause a significant drop in processor utilization.  By maintaining multiple process contexts in hardware and switching among them in a few cycles, multithreaded processors can overlap computation with memory accesses and reduce processor idle time.
</description>
<dc:date>1991-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149703">
<title>Randomness and Robustness in Hypercube Computation</title>
<link>https://hdl.handle.net/1721.1/149703</link>
<description>Randomness and Robustness in Hypercube Computation
Newman, Mark Joseph
In this thesis we explore means by which hypercubes can compute despite faulty processors and links.  We also study techniques which enable hypercubes to simulate dynamically changing networks and data structures.
</description>
<dc:date>1991-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149702">
<title>Waiting Algorithms for Synchornization in Large-scale Multiprocessors</title>
<link>https://hdl.handle.net/1721.1/149702</link>
<description>Waiting Algorithms for Synchornization in Large-scale Multiprocessors
Lim, Beng-Hong; Agarwal, Anant
Through analysis and experiments, this paper investigates two-phase waiting algorithms to minimize the cost of waiting for synchronization in large-scale multiprocessors. In a two-phase algorithm, a thread first waits by polling a synchronization variable.
</description>
<dc:date>1991-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149701">
<title>An Evaluation of Concurrent Priority Queue Algorithms</title>
<link>https://hdl.handle.net/1721.1/149701</link>
<description>An Evaluation of Concurrent Priority Queue Algorithms
Huang, Qin
The priority queue is a fundamental data structure that is used in a large variety of parallel algorithms, such as multiprocessor scheduling and parallel best-first search of state-space graphs.
</description>
<dc:date>1991-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149700">
<title>The Spectral Norm of Finite Functions</title>
<link>https://hdl.handle.net/1721.1/149700</link>
<description>The Spectral Norm of Finite Functions
Bellare, Mihir
In many recent results in learning and computational complexity theory which rely on Fourier analysis, the spectral norm plays a key role.  An understanding of this quantity would appear to be useful in both gauging and exploiting these results, and in understanding the underlying techniques.
</description>
<dc:date>1991-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149699">
<title>TCP Packet Trace Analysis</title>
<link>https://hdl.handle.net/1721.1/149699</link>
<description>TCP Packet Trace Analysis
Shepard, Timothy Jason
Examination of a trace of packets collected from the network is often the only method available for diagnosing protocol performance problems in computer networks.  This thesis explores the use of packet traces to diagnose performance problems of the transport protocol TCP.
</description>
<dc:date>1991-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149698">
<title>Cache Coherence Protocols for Large-Scale Multiprocessors</title>
<link>https://hdl.handle.net/1721.1/149698</link>
<description>Cache Coherence Protocols for Large-Scale Multiprocessors
Chaiken, David Lars
Caches have the potential to provide multiprocessors with an automatic mechanism for reducing both network traffic and average memory access latency.  However, cache-based systems must address the problem of cache coherence.
</description>
<dc:date>1990-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149697">
<title>An Incremental Type Inference System for the Programming Language ID</title>
<link>https://hdl.handle.net/1721.1/149697</link>
<description>An Incremental Type Inference System for the Programming Language ID
Gupta, Shail Aditya
Modern computing environments strive to be robust and reliable, and at the same time, aim at providing enough flexibility to an interactive user to edit, debug, and test programs easily and efficiently.
</description>
<dc:date>1990-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149696">
<title>Specification and Verification of Real-team Constraints in Coarse-grain Dataflow</title>
<link>https://hdl.handle.net/1721.1/149696</link>
<description>Specification and Verification of Real-team Constraints in Coarse-grain Dataflow
Henry, Dana S.
We present a method for verifying real-time constraints in a distributed, coarse-grain dataflow environment starting with a program which has already been allocated onto a machine.  The user specifies the timing of each module together with real-time constraints; and we verify the constraints.
</description>
<dc:date>1991-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149695">
<title>On Retiming Synchronous Circuitry and Mixed-integer Optimization</title>
<link>https://hdl.handle.net/1721.1/149695</link>
<description>On Retiming Synchronous Circuitry and Mixed-integer Optimization
Papaefthymiou, Marios Christos
In this paper we investigate properties of retiming, a circuit transformation which preserves the behavior of the circuit as a whole.  We present an algorithm which transforms a given combinational circuit into a functionally equivalent pipelined circuit with minimum latency and clock-period no greater than a given upper bound c.
</description>
<dc:date>1990-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149694">
<title>Lazy Replication: Exploiting the Semantics of Distributed Services</title>
<link>https://hdl.handle.net/1721.1/149694</link>
<description>Lazy Replication: Exploiting the Semantics of Distributed Services
Ladin, Rivka; Liskov, Barbara; Shrira, Liuba; Ghemawat, Sanjay
To provide high availability for services such as mail or bulletin boards, data must be replicated.  One way to guarantee consistency of replicated data is to force service operations to occur in the same order at all sites, but this approach is expensive.
</description>
<dc:date>1990-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149693">
<title>Design and Implementation of a Packet Switched Routing Chip</title>
<link>https://hdl.handle.net/1721.1/149693</link>
<description>Design and Implementation of a Packet Switched Routing Chip
Joerg, Christopher Frank
Monsoon is a parallel processing dataflow computer that will require a high bandwidth interconnection network.  A packet switched routing chip (PaRC) is described that will be used as the basis of this network.  PaRC is a 4 by 4 routing switch which has been designed and fabricated as a CMOS gate array.
</description>
<dc:date>1990-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149692">
<title>On the Complexity of Computing Algebraic Functions</title>
<link>https://hdl.handle.net/1721.1/149692</link>
<description>On the Complexity of Computing Algebraic Functions
Mansour, Yishay
This research addresses the problem of proving lower bounds on the complexity of algebraic computations involving the floor operation.  The model of computation considered is a computation tree with the set of basic operations {+,-,*,*,[.],._ }.                         The constants available to the computation are 0 and 1, and every other constant needs to be generated explicitly.
</description>
<dc:date>1990-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149691">
<title>Analysis of the Held-Karp Heuristic for the Traveling Salesman Problem</title>
<link>https://hdl.handle.net/1721.1/149691</link>
<description>Analysis of the Held-Karp Heuristic for the Traveling Salesman Problem
Williamson, D.P.
The Held-Karp heuristic for the Traveling Salesman Problem (TSP) has in practice provided near-optimal lower bounds on the cost of solutions to the TSP.  We analyze the structure of Held-Karp solutions in order to shed light on their quality.
</description>
<dc:date>1990-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149690">
<title>Efficient At-most-once Messages Based on Synchronized Clocks</title>
<link>https://hdl.handle.net/1721.1/149690</link>
<description>Efficient At-most-once Messages Based on Synchronized Clocks
Liskov, Barbara; Shrira, Liuba; Wroclawski, John
This paper describes a new message passing protocol that provides guaranteed detection of duplicate messages even when the receiver has no state stored for the sender.
</description>
<dc:date>1990-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149689">
<title>Disconnected Actions: An Asynchronous Extensions to a Nested Atomic Action System</title>
<link>https://hdl.handle.net/1721.1/149689</link>
<description>Disconnected Actions: An Asynchronous Extensions to a Nested Atomic Action System
Ben-Zvi, Boaz
Nested transactions, a generalization of atomic transactions, provide a uniform mechanism for coping with failures and obtaining concurrency within an action.
</description>
<dc:date>1990-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149688">
<title>Automatic Replication for Highly Available Services</title>
<link>https://hdl.handle.net/1721.1/149688</link>
<description>Automatic Replication for Highly Available Services
Ghemawat, Sanjay
Replicating various components of a system is a common technique for providing highly available services in the presence of failures.  A replication scheme is a mechanism for organizing these replicas so that as a group they provide a service that has the same semantics as the original unreplicated service. Viewstamped replication is a new replication scheme for providing high availability.
</description>
<dc:date>1990-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149687">
<title>Rate-based Congestion Control in Networks with Smart Links</title>
<link>https://hdl.handle.net/1721.1/149687</link>
<description>Rate-based Congestion Control in Networks with Smart Links
Heybey, Andrew Tyrrell
I use a network simulator to explore rate-based congestion control in networks with "smart" links that can feed back information to tell senders to adjust their transmission rates. This method differs in a very important way from congestion control in
</description>
<dc:date>1990-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149686">
<title>ML with Extended Pattern Matching and Subtypes</title>
<link>https://hdl.handle.net/1721.1/149686</link>
<description>ML with Extended Pattern Matching and Subtypes
Jategaonkar, Lalita A.
We extend a fragment of the programming language ML by incorporating a more general form of record pattern matching and providing for user-declared subtypes. Together, these two enhancements may be used to support a restricted object-oriented program
</description>
<dc:date>1989-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149685">
<title>Probabilistic Reasoning in the Domain of Genetic Counseling</title>
<link>https://hdl.handle.net/1721.1/149685</link>
<description>Probabilistic Reasoning in the Domain of Genetic Counseling
Harris, Nomi L.
This paper describes a program, GENINFER, which uses belief networks to calculate risks of inheriting genetic disorders.  GENINFER is based on Judea Pearl's [17] algorithm for fusion and propagation in probabilistic belief networks.  These networks allow the effects of various pieces of information to be propagated and fused in such a way that, when equilibrium is reached, each proposition can be assigned a degree of believe consistent with the axioms of probability theory.
</description>
<dc:date>1989-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149684">
<title>Should a Function Continue?</title>
<link>https://hdl.handle.net/1721.1/149684</link>
<description>Should a Function Continue?
Riecke, Jon Gary
We show that two l-calculus terms can be observationally congruent (i.e., agree in all contexts) but their continuation-passing transforms may not be.  We also show that two terms may be congruent in all untyped contexts but fail to be congruent in a language with call/ cc operators, and that two terms may have the same meaning in a direct semantics but in a continuation semantics.
</description>
<dc:date>1989-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149683">
<title>Typechecking is Undecidable when 'Type' is a Type</title>
<link>https://hdl.handle.net/1721.1/149683</link>
<description>Typechecking is Undecidable when 'Type' is a Type
Reinhold, Mark B.
A function has a dependent type when the type of its result depends upon the value of its argument. The type of all types  is the type of every type, including itself. In a typed l-calculus, these two features synergize in a conceptually clean and uniform way to yield enormous expressive power at very little apparent cost. By reconstructing and analyzing a paradox due to Girard, we argue that there is no effective typechecking algorithm for such a language.
</description>
<dc:date>1989-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149682">
<title>Using Cycles and Scaling in Parallel Algorithms</title>
<link>https://hdl.handle.net/1721.1/149682</link>
<description>Using Cycles and Scaling in Parallel Algorithms
Stein, Clifford
We introduce the technique of decomposing an undirected graph by finding a maximal set of edge-disjoint cycles.  We give a parallel algorithm to find this decomposition in O(log n) time on (m+ n)/log n  processors.  We then use this decomposition to to give the first efficient parallel algorithm for finding an approximation to a minimum cycle cover.
</description>
<dc:date>1989-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149681">
<title>ParaTran: A Transparent, Transaction Based Runtime Mechanism for Parallel Execution of Scheme</title>
<link>https://hdl.handle.net/1721.1/149681</link>
<description>ParaTran: A Transparent, Transaction Based Runtime Mechanism for Parallel Execution of Scheme
Katz, Morry
The number of applications requiring high speed symbolic computation and the performance requirements of these projects are both rapidly increasing.  However, the computer science community's ability to produce high performance uniprocessor hardware is being outstripped by these needs. Therefore, we propose a unique multiprocessing solution to the high speed, symbolic computation problem. Our approach is to develop a transparent runtime mechanism for executing standard, sequential Lisp code on a multiprocessor computer.
</description>
<dc:date>1989-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149680">
<title>Optimistic Concurrency Control for Nested Distributed Transactions</title>
<link>https://hdl.handle.net/1721.1/149680</link>
<description>Optimistic Concurrency Control for Nested Distributed Transactions
Gruber, Robert Edward
Optimistic concurrency control techniques allow atomic transactions (or actions for short) to execute without synchronization, relying on commit-time validation to ensure serializability.  Previous work in this area has focussed on single-level actions. This thesis extends previous work on optimistic concurrency control to distributed system with nested actions.
</description>
<dc:date>1989-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149679">
<title>A Study of Backoff Barrier Synchronization</title>
<link>https://hdl.handle.net/1721.1/149679</link>
<description>A Study of Backoff Barrier Synchronization
Cherian, Mathews Malieakkal
Shared-memory multiprocessors commonly use shared variables for synchronization.  Simulations of real parallel applications show that large-scale cache-coherent multiprocessors suffer significant amounts of invalidation traffic due to synchronization. Large multiprocessors that do not cache synchronization variables are often more severely impacted.
</description>
<dc:date>1989-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149678">
<title>Network Layer Protocols with Byzantine Robustness</title>
<link>https://hdl.handle.net/1721.1/149678</link>
<description>Network Layer Protocols with Byzantine Robustness
Perlman, Radia
The Network Layer of a network architecture is a distributed protocol that facilitates packet delivery across multiple hops.  One of its chief functions is the calculation of routes throughout the network.  Traditional Network Layer protocols have addressed robustness in the face of  simple failures, i.e. nodes or links becoming inoperative. This thesis examines Network Layer protocol designs that are robust in the presence in the Byzantine failures, i.e., nodes that through  malice or malfunction exhibit arbitrary behavior such as corrupting, forging, or delaying routing protocol messages.
</description>
<dc:date>1988-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149677">
<title>Code-mapping Policies for the Tagged-token Dataflow Architecture</title>
<link>https://hdl.handle.net/1721.1/149677</link>
<description>Code-mapping Policies for the Tagged-token Dataflow Architecture
Maa, Gino K.
Multiprocessing seems to be the only viable way to gain significant speedup beyond that afforded by performance advances in semiconductor devices and hardware construction, which are beginning to face the limitations of physics.  Although it is relatively easy to improve the "raw" computational performance of a system simply by adding more processors to it, the far more difficult task is to insure that the additional resources actually reduce a program's computing time.
</description>
<dc:date>1988-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149676">
<title>A Fault-tolerant Network Kernel for Linda</title>
<link>https://hdl.handle.net/1721.1/149676</link>
<description>A Fault-tolerant Network Kernel for Linda
Xu, Andrew S.
The parallel programming system Linda consists of a number of processes and a shared memory called the tuple space.  In a distributed implementation of Linda, processes and the tuple space reside on different computing nodes connected by a communications network subject to a variety of node and network failures.
</description>
<dc:date>1988-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149675">
<title>Viewstamped Replication for Highly Available Distributed Systems</title>
<link>https://hdl.handle.net/1721.1/149675</link>
<description>Viewstamped Replication for Highly Available Distributed Systems
Oki, Brian Masao
This dissertation presents viewstamped replication, a new algorithm for the implementation of highly available computer services that continue to be usable in spite of node crashes and network partitions.  Our goal is to design an efficient mechanism that makes it easy for programmers to implement these services without complicating the programming model.
</description>
<dc:date>1988-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149674">
<title>FX-87 Performance Measurements: Dataflow Implementation</title>
<link>https://hdl.handle.net/1721.1/149674</link>
<description>FX-87 Performance Measurements: Dataflow Implementation
Hammel, R. Todd; Gifford, David K.
We analyze how much the FX-87 static effect system can improve the execution times of five benchmark programs on a parallel graph interpreter.  Three of our benchmark programs do not use side-effects (factorial, fibonacci, and polynomial division) an
</description>
<dc:date>1988-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149673">
<title>Compsoing Data &amp; Process Descriptions in the Design of Software Systems</title>
<link>https://hdl.handle.net/1721.1/149673</link>
<description>Compsoing Data &amp; Process Descriptions in the Design of Software Systems
Jackson, Daniel
Two paradigms are dominant in software development, the data paradigm and the process paradigm.  Our contention is that relying exclusively on either is counter-productive.  In the data paradigm, a system is specified as operations acting on states. The process paradigm focuses on sequences of events.
</description>
<dc:date>1988-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149672">
<title>Automatic Qualitative Analysis of Ordinary Differential Equations Using Piecewise Linear Approximations</title>
<link>https://hdl.handle.net/1721.1/149672</link>
<description>Automatic Qualitative Analysis of Ordinary Differential Equations Using Piecewise Linear Approximations
Sacks, Elisha, Peretz
This thesis explores automating the qualitative analysis of physical systems.  Scientists and engineers model many physical systems with ordinary differential equations.  They deduce the behavior of the system by analyzing the equations.  Most realistic models are nonlinear, hence difficult or impossible to solve explicitly.
</description>
<dc:date>1988-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149671">
<title>A High-level Signal Processing Programming Language</title>
<link>https://hdl.handle.net/1721.1/149671</link>
<description>A High-level Signal Processing Programming Language
Hicks, James Edward, Jr.
The motivations for an abstract, diagrammatic signal processing language are presented along with a study of the semantics that such language should have.  D-PICT, the proposed Digital Signal Processing Pictorial Language, is thoroughly described. D-PICT has a diagrammatic representation with a corresponding textual representation.
</description>
<dc:date>1988-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149670">
<title>Diversity-based Inference of Finite Automata</title>
<link>https://hdl.handle.net/1721.1/149670</link>
<description>Diversity-based Inference of Finite Automata
Schapire, Robert Elias
We present a new procedure for inferring the structure of a finite-state automaton (FSA) from its input/output behavior, using access to the automaton to perform experiments.  Our procedure uses a new representation for FSA's, based on the notion of equivalence between tests.
</description>
<dc:date>1988-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149669">
<title>Constructing a Highly-available Location Service for a Distributed Environment</title>
<link>https://hdl.handle.net/1721.1/149669</link>
<description>Constructing a Highly-available Location Service for a Distributed Environment
Jing-Hwa Hwang, Deborah
One possible advantage a distributed system has over a centralized system is the ability to move objects from one node to another.  For example, we may want to move an object if the node where it resides is overloaded. This thesis proposes to use a location service to aid in finding objects that move.
</description>
<dc:date>1988-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149668">
<title>A Technique for Constructing Highly-Available Services</title>
<link>https://hdl.handle.net/1721.1/149668</link>
<description>A Technique for Constructing Highly-Available Services
Ladin, Rivka; Liskov, Barbara; Shrira, Liuba
This paper describes a general method for constructing a highly available service for use in a distributed system.  It gives a specific implementation of the method and proves the implementation correct.  The service consists of replicas that reside at several different locations in a network. It presents its clients with a consistent view of its state, but the view may contain old information.
</description>
<dc:date>1988-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149667">
<title>CALVIN: A Rule Based Expert System for Improving Arrhymia Detector Performance During Noisy ECGS</title>
<link>https://hdl.handle.net/1721.1/149667</link>
<description>CALVIN: A Rule Based Expert System for Improving Arrhymia Detector Performance During Noisy ECGS
Muldrow, Warren K.
Human experts far outperform automated arrhythmia detectors in analyzing ECG data corrupted by noise and artifact.  Humans make use of considerable a priori knowledge about cardiac electrophysiology and knowledge acquired from the specific ECG under analysis. R-R interval, coupling intervals of ectopic beats, and commonly occurring beat patterns observed during noise-free ECG segments form a knowledge base which is used in accurately detecting and classifying true QRS complexes in the presence of severe noise.
</description>
<dc:date>1987-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149666">
<title>A Framework for Incorporating Abstraction Mechanisms into the Logic Programming Paradigm</title>
<link>https://hdl.handle.net/1721.1/149666</link>
<description>A Framework for Incorporating Abstraction Mechanisms into the Logic Programming Paradigm
Zachary, Joseph Lawrence
To help make logic programming more suitable for writing large systems, we develop linguistic mechanisms that permit the organization of logic programs around abstractions.  In particular, we present the design of Danali, an equational logic programming language that supports predicate and data abstraction.
</description>
<dc:date>1987-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149665">
<title>Rule Based Analysis of Computer Security</title>
<link>https://hdl.handle.net/1721.1/149665</link>
<description>Rule Based Analysis of Computer Security
Baldwin, Robert W.
Computers are rarely as secure as they could be.  Users are lax or inconsistent in the way they configure a computer's protection system, and these user mistakes often lead to serious security holes.  For example, a privileged user might accidentally make his login initialization file publicly writable and that mistake could allow ordinary users to acquire super-user privileges.
</description>
<dc:date>1988-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149664">
<title>Argus Reference Manual</title>
<link>https://hdl.handle.net/1721.1/149664</link>
<description>Argus Reference Manual
Liskov, Barbara; Day, M.; Herlihy, M.; Johnson, P.; Leavens, G.
Argus is an experimental language/system designed to support the construction and execution of distributed programs.  Argus is intended to support only a subset of the applications that could benefit from being implemented by a distributed program. Two properties distinguish these applications: they make use of on-line data that must remain consistent in spite of concurrency and hardware failures, and they provide services under real-time constraints that are not severe.
</description>
<dc:date>1987-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149663">
<title>Walter User's Manual (Version 1.0)</title>
<link>https://hdl.handle.net/1721.1/149663</link>
<description>Walter User's Manual (Version 1.0)
Gifford, David K.; Cote, Robert G.; Segal, David A.
Walter is a UNIX program that provides access to databases located at MIT via the DARPA Internet.  The databases provided by Walter include the full-text of the New York Times for the past 90 days.  A sophisticated full-text query language is provided, and Walter uses a query routing algorithm to direct requests to the proper database server at MIT.
</description>
<dc:date>1987-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149662">
<title>Clipping Service User's Manual (Version 1.2)</title>
<link>https://hdl.handle.net/1721.1/149662</link>
<description>Clipping Service User's Manual (Version 1.2)
Gifford, David K.; Cote, Robert G.; Segal, David A.
The Clipping Service is a program that will send selected stories from the New York Times and other information sources to you via electronic mail.  In order to use the Clipping Service, you first describe your interests to the Clipping Service in a simple  full-text query language, and then mail this interest profile to the DARPA Internet mail address clip@db.lcs.mit.edu.
</description>
<dc:date>1987-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149661">
<title>Boston Community Information System - 1986 Experimental Test Results</title>
<link>https://hdl.handle.net/1721.1/149661</link>
<description>Boston Community Information System - 1986 Experimental Test Results
Gifford, David K.; Heitmann, Dawn; Segal, David A.; Cote, Robert G.; Tanacea, Kendra; Burmaster, David E.
This report describes the first year of an experimental test of the Boston Community Information System (Boston CommInS).  The experiment implements new ideas of data communication and database design in the transmission and reception of data.  The system offers the Associated Press and New York Times to participants and is provided in exchange for their monthly feedback.
</description>
<dc:date>1987-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149660">
<title>KOLA: Knowledge Organization Language</title>
<link>https://hdl.handle.net/1721.1/149660</link>
<description>KOLA: Knowledge Organization Language
Jang, Yeona
The focus of this research is on a representation of knowledge that captures the structure of a domain into the computational model for efficient retrieval and reasoning.  With this desideratum in mind, a concept-based knowledge representation system KOLA (Knowledge Organization LAnguage ) is described.
</description>
<dc:date>1988-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149659">
<title>Communication Patterns in a Symbolic Multiprocessor</title>
<link>https://hdl.handle.net/1721.1/149659</link>
<description>Communication Patterns in a Symbolic Multiprocessor
Nuth, Peter Robert
An important design decision for large scale multiprocessors is the balance of processor power to communication network bandwidth.  In order to evaluate different design alternatives, it is necessary to be able to predict the load imposed on the network by a programming model. This thesis quantifies that communication load for a model of parallel symbolic computing using the Multilisp language.
</description>
<dc:date>1987-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149658">
<title>Dynamic Programming on Graphs with Bounded Treewidth</title>
<link>https://hdl.handle.net/1721.1/149658</link>
<description>Dynamic Programming on Graphs with Bounded Treewidth
Bodlaender, Hans L.
In this paper we study the complexity of graph decision problems, restricted to the class of graphs with treewidth   k, (or equivalently, the class of partial k-trees), for fixed k.  We introduce two classes of graph decision problems, LCC and ECC, and subclasses C-LCC, and C-ECC. We show that each problem in LCC (or C-LCC) is solvable in polynomial (O(nc)) time, when restricted to graphs with fixed up-perbounds on the treewidth and degree; and that each problem in ECC (or C- ECC) is solvable in polynomial  (O(n c)) time, when restricted to graphs with a fixed upperbound on the treewidth (with given corresponding tree-decomposition).
</description>
<dc:date>1987-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149657">
<title>Synthesis of Self-timed VLSI Circuits from Graph-theoretic Specifications</title>
<link>https://hdl.handle.net/1721.1/149657</link>
<description>Synthesis of Self-timed VLSI Circuits from Graph-theoretic Specifications
Chu, Tam-Anh
This thesis presents an approach for direct and efficient synthesis of self-timed (asynchronous) control circuits from formal specifications called Signal Transition Graphs (STGs).  Control circuits synthesized from this graph model are speed-independent and capable of performing concurrent operation.
</description>
<dc:date>1987-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149656">
<title>MAM: A Semi-automatic Debugging Tool for Distrubuted Programs</title>
<link>https://hdl.handle.net/1721.1/149656</link>
<description>MAM: A Semi-automatic Debugging Tool for Distrubuted Programs
Kolodney, Lawrence Kenneth
Traditional debuggers, designed to examine single process serial programs, do not provide sufficient functionality for efficient debugging of distributed programs.  There are a number of fundamental differences in the way in which a programmer understands the execution of a distributed programs, and a debugger must present data to its user in light of that fact.
</description>
<dc:date>1987-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149655">
<title>Efficient Methods for Calculating Maximum Entropy Distributions</title>
<link>https://hdl.handle.net/1721.1/149655</link>
<description>Efficient Methods for Calculating Maximum Entropy Distributions
Goldman, Sally A.
We present a new algorithm for computing the maximum entropy probability distribution satisfying a set of constraints.  Unlike previous approaches, our method is integrated with the planning of data collection and tabulation.  We show how adding constraints and performing the associated additional  tabulations can substantially speed up computation by replacing the usual iterative techniques with a straight-forward computation.
</description>
<dc:date>1987-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149654">
<title>Data Replication in Nested Transaction Systems</title>
<link>https://hdl.handle.net/1721.1/149654</link>
<description>Data Replication in Nested Transaction Systems
Goldman, Kenneth J.
Gifford's basic Quorum Consensus algorithm for data replication is generalized to accommodate nested transactions and transaction failures (aborts).  A formal description of the generalized algorithm is presented using the new Lynch-Merritt input-output automaton model for nested transaction systems.
</description>
<dc:date>1987-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149653">
<title>Temporal Reasoning in Medical Expert Systems</title>
<link>https://hdl.handle.net/1721.1/149653</link>
<description>Temporal Reasoning in Medical Expert Systems
Kohane, Isaac S.
Diseases develop and change over time.  Much of the distinction between pathophysiological complexes rests on the temporal relations of their component events.  Therefore, knowledge bases that fail to capture the temporal component of the course of disease omit useful diagnostic knowledge.
</description>
<dc:date>1987-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149652">
<title>An Expert System for Diagnosing Gait for Cerebral Palsy Patients</title>
<link>https://hdl.handle.net/1721.1/149652</link>
<description>An Expert System for Diagnosing Gait for Cerebral Palsy Patients
Hirsch, David Edward
Many first generation expert systems in medicine assumed that a single fault was the cause of the patient's problems.  However, this is not always so and in the domain of gait analysis this is usually not the case.  This work looks at an expert system for performing gait analysis on cerebral palsy patients. The system is able to handle cases where there are many interacting faults causing the patient's gait deviations.
</description>
<dc:date>1987-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149651">
<title>Hierarchical Correctness Proofs for Distributed Algorithms</title>
<link>https://hdl.handle.net/1721.1/149651</link>
<description>Hierarchical Correctness Proofs for Distributed Algorithms
Lynch, Nancy A.; Tuttle, Mark S.
This thesis introduces a new model for distributed computation in asynchronous networks, the input-output automaton.  This simple, powerful model captures in a novel way the game-theoretical interaction between a system and its environment, and allows fundamental properties of distributed computation such as fair computation to be naturally expressed.
</description>
<dc:date>1987-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149650">
<title>A Simulation Environment for Schema</title>
<link>https://hdl.handle.net/1721.1/149650</link>
<description>A Simulation Environment for Schema
St.Pierre, Margaret Ann
In present day circuit design, many independent simulation tools are available for analyzing circuits at various levels of detail.  This thesis presents a framework to tie these tools into the Simulation Environment in Schema, an integrated CAD system. The framework easily incorporates additional simulators, serves as a foundation upon which to build new analysis tools, and provides the ability for mixed-mode simulation.
</description>
<dc:date>1986-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149649">
<title>Data Flow Computer Architecture Final Report</title>
<link>https://hdl.handle.net/1721.1/149649</link>
<description>Data Flow Computer Architecture Final Report
Dennis, Jack B.
This report covers the work done by Computation Structures Group of the MIT Laboratory for Computer Science on developing models, languages, and architectures for data flow computation from 1966 to the end 1985. The work was supported by research grants and contracts from NSF, the University of California, DOE, NASA, and DARPA having periods of support as follows: Advanced Research Projects Agency (DARPA).
</description>
<dc:date>1987-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149648">
<title>Remote Pipe and Procedures for Efficient Distributed Communication</title>
<link>https://hdl.handle.net/1721.1/149648</link>
<description>Remote Pipe and Procedures for Efficient Distributed Communication
Gifford, D.
A new communication model for distributed systems is described that combines the advantages of remote procedure call with  the efficient transfer of bulk data. Three ideas form the basis of this model. First, remote procedures are first-class values which can be freely exchanged among nodes, thus enabling a greater variety of protocols to be directly implemented in a remote procedure call framework.
</description>
<dc:date>1986-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149647">
<title>Congestion Control in Routing Networks</title>
<link>https://hdl.handle.net/1721.1/149647</link>
<description>Congestion Control in Routing Networks
Chien, Andrew Andai
Multistage routing networks present an attractive cost-effective method of interconnection for medium to large scale multiprocessors.  Recent results concerning performance degradation in the presence of "hot spots" have raised serious questions about the robustness of previous performance estimates for these routing networks. Research to date has focused on a limited class of hot spots-those in which all the hot spot traffic is destined for the same memory address.
</description>
<dc:date>1986-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149646">
<title>Logic Simulation of a Multiprocessor</title>
<link>https://hdl.handle.net/1721.1/149646</link>
<description>Logic Simulation of a Multiprocessor
Bradley, Elizabeth
The performance of circuit simulators running on SISD computers is fundamentally limited by the Von Neumann bottleneck.  Multiprocessors do not share this limitation.  The task of solving the equations for the many parallel signal paths found in most circuits lends itself readily to concurrent computation. for both of these reasons, parallel processing is a highly promising approach to circuit simulation. This thesis explores several facets of this problem.
</description>
<dc:date>1986-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149645">
<title>The Notion of Security for Probabilistic Public-key Cryptosystems</title>
<link>https://hdl.handle.net/1721.1/149645</link>
<description>The Notion of Security for Probabilistic Public-key Cryptosystems
Sloan, Robert Hal
The purpose of a cryptosystem is to allow people to communicate securely over an open channel.  Before one can discuss whether a cryptosystem meets this goal, however, one must first rigorously define what is meant by security.  Three very different formal definitions of security for public-key cryptosystems have been proposed-two by Goldwasser and Micali and one by Yao. In this thesis, it is shown that the three definitions are essentially equivalent.
</description>
<dc:date>1986-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149644">
<title>MACE: A Multiprocessing Approach to Circuit Extraction</title>
<link>https://hdl.handle.net/1721.1/149644</link>
<description>MACE: A Multiprocessing Approach to Circuit Extraction
Levitin, Samuel M.; Terman, Christopher J.; Slater, Kenneth H.
The ever-increasing complexity of VLSI chips threaten to choke out all available computer power unless methods are devised to keep the CAD tasks conveniently sized.  A review of the current methods of multiprocessing approaches in the domain of layout verification precedes the discussion of current work.
</description>
<dc:date>1986-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149643">
<title>Long Atomic Computations</title>
<link>https://hdl.handle.net/1721.1/149643</link>
<description>Long Atomic Computations
Ng, Pui
Distributed computing systems are becoming commonplace and offer interesting opportunities for new applications.  In a practical system, the problems of synchronizing concurrent computations and recovering from failures must be dealt with effectively.
</description>
<dc:date>1986-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149642">
<title>Replication and Reconfiguration in a Distributed Mail Repository</title>
<link>https://hdl.handle.net/1721.1/149642</link>
<description>Replication and Reconfiguration in a Distributed Mail Repository
Day, Mark S.
Conventional approaches to programming produce centralized programs that run on a single computer.  However, an unconventional approach can take advantage of low-cost communication and small, inexpensive computers.  A distributed program provides service through programs executing at several nodes of a distributed system.
</description>
<dc:date>1987-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149641">
<title>Efficient Graph Algorithms for Sequential and Parallel Computers</title>
<link>https://hdl.handle.net/1721.1/149641</link>
<description>Efficient Graph Algorithms for Sequential and Parallel Computers
Goldberg, Andrew V.
</description>
<dc:date>1987-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149640">
<title>Boston Community Information System User's Manual</title>
<link>https://hdl.handle.net/1721.1/149640</link>
<description>Boston Community Information System User's Manual
Segal, David A.; Gifford, David K.; Lucassen, John M.; Henderson, James B.; Berlin, Stephen T.; Burmaster, David E.
The Boston Community Information System turns your computer into a personal information assistant that monitors the news as it happens.  This experiment, CommInS, tests a new way of distributing world news as it happens and features from the New York Times and the Associate Press wire service directly to personal computers via radio waves.
</description>
<dc:date>1987-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149639">
<title>Compaction with Automatic Job Introduction</title>
<link>https://hdl.handle.net/1721.1/149639</link>
<description>Compaction with Automatic Job Introduction
Maley, F. Miller
This thesis presents an algorithm for one-dimensional compaction of VLSI layouts.  It differs from older methods in treating wires not as objects to be moved, but as constraints on the positions of other circuit components.  These constraints are determined for each wiring layer using the theory of planar routing.
</description>
<dc:date>1986-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149638">
<title>A Compiler for the MIT Tagged-token Dataflow Architecture</title>
<link>https://hdl.handle.net/1721.1/149638</link>
<description>A Compiler for the MIT Tagged-token Dataflow Architecture
Traub, Kenneth R.
Compilation of the programming language Id Nouveau into machine code for the MIT tagged-token dataflow architecture is thoroughly described.  Id Nouveau is a higher-order functional language augmented with a novel data structure facility known as I-Structures. The tagged-token dataflow  architecture is a dataflow computer of the dynamic variety.
</description>
<dc:date>1986-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149637">
<title>Programming Simultaneous Action Using Common Knowledge</title>
<link>https://hdl.handle.net/1721.1/149637</link>
<description>Programming Simultaneous Action Using Common Knowledge
Moses, Yoram; Tuttle, Mark R.
This work applies the theory of knowledge in distributed systems to the design of efficient fault-tolerant protocols.  We define a large class of problems requiring coordinated, simultaneous action in synchronous systems, and give a method of transforming specifications of such problems into protocols that are optimal in all runs: for every possible input to the system and faculty processor behavior, these protocols are guaranteed to perform the simultaneous actions as soon as any other protocol could possibly perform them.
</description>
<dc:date>1987-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149636">
<title>The X Window System</title>
<link>https://hdl.handle.net/1721.1/149636</link>
<description>The X Window System
Scheifler, Robert W.; Gettys, Jim
An overview of the X Window System is presented, focusing on the system substrate and the low-level facilities provided to build applications and to manage the desktop.  The system provides high-performance, high-level, device-independent graphics.
</description>
<dc:date>1986-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149635">
<title>Introduction to the Theory of Nested Transactions</title>
<link>https://hdl.handle.net/1721.1/149635</link>
<description>Introduction to the Theory of Nested Transactions
Lynch, Nancy A.; Merritt, Michael
A new formal model is presented for studying concurrency and resiliency properties for nested transactions.  The model is used to state and prove correctness of a well-known locking algorithm.
</description>
<dc:date>1986-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149634">
<title>The Clock Distribution Systems of the Multiprocessor Emulation Facility</title>
<link>https://hdl.handle.net/1721.1/149634</link>
<description>The Clock Distribution Systems of the Multiprocessor Emulation Facility
Younis, Saed G.
Consisting of 32 high-speed processors, the multiple processor emulation facility communicates data between its processors through the use of synchronous, high-bandwidth packet switches residing on the ports of every processor.  Because of the synchronous nature of these packet switches, there was a need to design a clock distribution system that can distribute a clock signal to the 32 ports with as little clock skew as possible.
</description>
<dc:date>1986-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149633">
<title>ID World: An Environment for the Development of a Dataflow Programs Written in ID</title>
<link>https://hdl.handle.net/1721.1/149633</link>
<description>ID World: An Environment for the Development of a Dataflow Programs Written in ID
Morais, Dinarte R.
The ID WORLD involves the interfacing of a compiler, interpreter, debugger and editor mode to create an environment for the development of dataflow programs written in ID.  It replaces the Tagged-Token Dataflow Architecture (TTDA) Emulator as the foundation for Multiprocessor Emulation Facility at the Laboratory for Computer Science,M.I.T.
</description>
<dc:date>1986-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149632">
<title>Correctness Conditions for Highly Available Replicated Databases</title>
<link>https://hdl.handle.net/1721.1/149632</link>
<description>Correctness Conditions for Highly Available Replicated Databases
Lynch, Nancy A.; Blaustein, Barbara; Siegel, Michael
Correctness conditions are given which describe some of the properties exhibited by highly available distributed database systems such as the SHARD (System for Highly Available Replicated Data) system currently being developed at Computer Corporation of America. This system allows a database application to continue operation in the face of communication failures, including network partitions.
</description>
<dc:date>1986-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149631">
<title>Exploiting Parallelism in VLSI CAD</title>
<link>https://hdl.handle.net/1721.1/149631</link>
<description>Exploiting Parallelism in VLSI CAD
Marantz, Joshua David
In the domain of computer science, particularly VLSI CAD, an increasing amount of engineering time is spent running compute-bound programs.  Many of these programs have an intrinsic parallelism that is externally accessible.  This thesis describes a novel software system that uses a small number of independent computers connected by a network to exploit the parallelism inherent in existing software, and thereby, reduce its running time.
</description>
<dc:date>1986-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149630">
<title>Simulating Applicative Architectures on the Connection Machine</title>
<link>https://hdl.handle.net/1721.1/149630</link>
<description>Simulating Applicative Architectures on the Connection Machine
Kuszmaul, Bradley C.
The Connection Machine (CM) is a highly parallel single instruction multiple data (SIMD) computer, which has been described as "a huge piece of hardware looking for a programming methodology.'  Applicative languages, on the other hand, can be described as a programming methodology looking for a parallel computing engine.
</description>
<dc:date>1986-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149629">
<title>Bounded Width Branching Programs</title>
<link>https://hdl.handle.net/1721.1/149629</link>
<description>Bounded Width Branching Programs
Barrington, David A.
We examine the branching program model of computation and in particular the classes of languages which can be recognized when the width of the programs is bounded by a constant.  After slightly revising the framework of definitions to sharpen analogies with other models, we prove that width 5 polynomial size branching programs can recognize exactly the parallel complexity class NC1, refuting a conjecture of Borodin et al. in [BDFP83].
</description>
<dc:date>1986-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149628">
<title>Intelligent Physiologic Modeling</title>
<link>https://hdl.handle.net/1721.1/149628</link>
<description>Intelligent Physiologic Modeling
Kunstaetter, Robert
This thesis describes the design and implementation of a knowledge based physiologic modeling systems (KBPMS) and a preliminary evaluation of its use as a learning resource within the context of an experimental medical curriculum--the Harvard New Pathway. KBPMS posesses combined numeric and qualitative simulation capabilities and provide explanations of its knowledge and behaviour.
</description>
<dc:date>1986-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149627">
<title>A CATV-Based High-speed Packet-switching Network Design</title>
<link>https://hdl.handle.net/1721.1/149627</link>
<description>A CATV-Based High-speed Packet-switching Network Design
Feldmeier, David Charles
A high-speed packet-switching data network to the home can be built on an existing, unmodified, residential cable television (CATV) system.  This thesis considers the theoretical and practical technical aspects of providing such a service and suggest a possible system design.
</description>
<dc:date>1986-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149626">
<title>Primitives for Real-time Animation in Three Dimensions</title>
<link>https://hdl.handle.net/1721.1/149626</link>
<description>Primitives for Real-time Animation in Three Dimensions
Chaing, Carol J.
We present a general purpose imaging model which can efficiently produce computer-generated animated scenes.  Displaying sophisticated graphics scenes is a computationally complex operation.  Thus, an efficient imaging model is necessary for producing real-time motion.
</description>
<dc:date>1986-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149625">
<title>Computation Management in a Single Address Space System</title>
<link>https://hdl.handle.net/1721.1/149625</link>
<description>Computation Management in a Single Address Space System
Gibson, James C.
A multiprogramming operating system needs a mechanism to recover from the termination of one of its computations.  Cleaning up, or unlinking a terminated computation from those remaining requires identifying the end of a computation, freeing resources that the computation was using, and shutting down its interfaces with other computations.
</description>
<dc:date>1986-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149624">
<title>Logical Structure for Functional Languages</title>
<link>https://hdl.handle.net/1721.1/149624</link>
<description>Logical Structure for Functional Languages
Beckerle, Michael J.
Functional Programming is frequently advocated as an appropriate  programming discipline for parallel processing because of the difficulty of extracting parallelism from programs written in conventional sequential programming languages.  Unfortunately, the use of Functional operations often implies excessive copying or unnecessary sequentiality in the access and construction of data structures.
</description>
<dc:date>1986-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149623">
<title>Data Structure Management in a Data Flow Computer System</title>
<link>https://hdl.handle.net/1721.1/149623</link>
<description>Data Structure Management in a Data Flow Computer System
Guharoy, Bhaskar
VIM is an experimental computer system being developed at MIT for supporting functional programming.  The execution mechanism of the computer is based on data flow.  This thesis presents mechanisms for managing data structures in this system. This thesis also develops a methodology for designing computers, which is based on successive refinement of formal models of the computer.
</description>
<dc:date>1985-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149622">
<title>Remote Evaluation</title>
<link>https://hdl.handle.net/1721.1/149622</link>
<description>Remote Evaluation
Stamos, James William
A new technique for computer-to-computer communication is presented that can increase the generality and performance of distributed systems.  This technique, called Remote Evaluation, lets one computer send another computer a request in the form of a program. A computer that receives such a request executes the program in the request and returns the results to the sending computer.
</description>
<dc:date>1986-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149621">
<title>Data Backup and Recovery in a Computer Architecture for Functional</title>
<link>https://hdl.handle.net/1721.1/149621</link>
<description>Data Backup and Recovery in a Computer Architecture for Functional
Jagannathan, Suresh
The Vim computer system, an experimental project under development in the MIT/LCS Computation Structures Group, is intended to examine the efficient implementation of functional languages using the principles of data flow computation.  In this thesis, we examine how to incorporate backup and recovery mechanisms into this system to guarantee that no online information is lost because of hardware malfunction.
</description>
<dc:date>1985-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149620">
<title>Boston Community Information System User Manual (Version 6.0)</title>
<link>https://hdl.handle.net/1721.1/149620</link>
<description>Boston Community Information System User Manual (Version 6.0)
Lucassen, John M.; Gifford, David K.; Berlin, Stephen T.; Burmaster, David E.
The Boston Community Information System turns your computer into a personal information assistant that monitors the news as it happens.  This experiment, CommInS, tests a new way of distributing world news and features from the New York Times and the Associated Press (AP) wire service directly to personal computers via radio waves.
</description>
<dc:date>1986-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149619">
<title>The Complexity of Graph Layour and Channel Routing for VLSI</title>
<link>https://hdl.handle.net/1721.1/149619</link>
<description>The Complexity of Graph Layour and Channel Routing for VLSI
Bhatt, Sandeep N.
This thesis is motivated by the need for a clearer understanding of various issues in VLSI layout.  Within a formal setting, we identify critical properties of circuits that determine the quality of their layouts.
</description>
<dc:date>1984-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149618">
<title>Design and Implementation of a Distributed Program for Collaborative Editing</title>
<link>https://hdl.handle.net/1721.1/149618</link>
<description>Design and Implementation of a Distributed Program for Collaborative Editing
Seliger, R.
This thesis presents the design and implementation of a distributed program for the support of multi-author collaboration on shared documents.  The Collaborative Editing System, CES, provides an environment in which authors working on a document can cooperate and coordinate their individual contributions to a single document.
</description>
<dc:date>1985-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149617">
<title>On Playing Well in a Sum of Games</title>
<link>https://hdl.handle.net/1721.1/149617</link>
<description>On Playing Well in a Sum of Games
Yedwab, Laura
Many games are naturally described as a sum of games, e.g., nim and the endgame of Go.  Let G  ,...,G  represent n games.  Then a move in the sum G + ...+G   consists of picking a component game G  and making a move in G ..  This thesis analyzes play in a sum of games from three different perspective: computational complexity, approximate solutions, and optimal research algorithms.
</description>
<dc:date>1985-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149616">
<title>A Relative-motion Microworld</title>
<link>https://hdl.handle.net/1721.1/149616</link>
<description>A Relative-motion Microworld
Morecroft, Linda E.
A relative-motion microworld has been designed to aid high-school students in understanding the concepts of relative motion and frames of reference.  Relative motion and frames of reference are usually introduced in a high-school physics or mathematics course. Most students, and many teachers too, have difficulty understanding the concepts and applying them to solve problems. The traditional approach to relative motion uses vector algebra. However, vector terminology is complex and it does not allow a mental picture of what is happening to be easily built. students do not understand what it means to be in a different frame of reference and how moving objects appear within this reference frame. Most people have a much more intuitive approach to motion problems.
</description>
<dc:date>1985-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149615">
<title>Equational Theories and Database Constraints</title>
<link>https://hdl.handle.net/1721.1/149615</link>
<description>Equational Theories and Database Constraints
Cosmadakis, Stavros Stylianos
The implication problem for database constraints is central in the fields of automated schema design and query optimization and has been traditionally approached with resolution-based techniques.  We present a novel approach to database constraints, using equations instead of Horn clauses.
</description>
<dc:date>1985-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149614">
<title>A Generalized Approach to Equational Unification</title>
<link>https://hdl.handle.net/1721.1/149614</link>
<description>A Generalized Approach to Equational Unification
Yelick, Katherine Anne
Given a set of equational axioms and two terms containing function symbols and variables, the equational unification problem is to find a uniform replacement of terms for the variables that makes the terms provably equal from the axioms.  In the variable-only case, the two terms contain only variables and function symbols from the axioms. In the general case, the terms may contain symbols not appearing in the axioms, there may be more than on instance of a set of anxioms, and there may  be more than one set of axioms.
</description>
<dc:date>1985-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149613">
<title>A Program for Generating and Analyzing Term Rewriting Systems</title>
<link>https://hdl.handle.net/1721.1/149613</link>
<description>A Program for Generating and Analyzing Term Rewriting Systems
Forgaard, Randy
This thesis presents new results in the use of term rewriting systems for automatic theorem proving.  The design and implementation of REVE 2, a computer program that incorporates these results, is described.  In addition, an introduction to the basic theory, procedures, and algorithms of term rewriting is provided, in a manner suitable for non-specialists.
</description>
<dc:date>1984-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149612">
<title>Foundations of a Theory of Specification for Distributed Systems</title>
<link>https://hdl.handle.net/1721.1/149612</link>
<description>Foundations of a Theory of Specification for Distributed Systems
Stark, Eugene W.
This thesis investigates a particular approach, called state-transition specification, to the problem of describing the behavior of modules in a distributed or concurrent computer system.  A state-transition specification consists of: (1) a state machine, which incorporates the safety or invariance properties of the module, and (2) validity conditions on the computations of the machine, which capture the desired liveness or eventuality properties.
</description>
<dc:date>1984-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149611">
<title>Routing Networks for Packet Communication Systems</title>
<link>https://hdl.handle.net/1721.1/149611</link>
<description>Routing Networks for Packet Communication Systems
Boughton, George Andrew
This thesis examines the design of geographically centralized high performance packet switched networks called routing networks.  Each of these networks is intended to be used to interconnect the modules of a highly parallel computer system.  The design of such networks is considered in present (1984) technology where only a small number of network nodes can be placed on a single chip and in  VLSI technology where a large number of nodes can be placed on a chip.
</description>
<dc:date>1984-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149610">
<title>Reasoning about Preference Models</title>
<link>https://hdl.handle.net/1721.1/149610</link>
<description>Reasoning about Preference Models
Wellman, Michael Paul
Programs that make decisions need mechanisms for representing and reasoning about the desirability of the possible consequences of their choices.  This work is an exploration of preference models  based on utility theory.  The framework presented is distinguished by a qualitative view of preferences and a knowledge-based approach to the application of utility theory. The design for a comprehensive preference modeler is implemented in part by the Utility Reasoning Package (URP), a collection of  facilities for constructing and analyzing preference models.
</description>
<dc:date>1985-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149609">
<title>Generic Software for Emulating Multiporocessor Architectures</title>
<link>https://hdl.handle.net/1721.1/149609</link>
<description>Generic Software for Emulating Multiporocessor Architectures
Soley, Richard Mark
The expense of designing, prototyping, and testing a new computer architecture (particularly non-traditional supercomputer architectures, such as the dataflow machine) is enormous.  The relative inflexibility of hardware to experimental changes increases the need to fully test a new architectural idea.
</description>
<dc:date>1985-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149608">
<title>Towards a Problem Solving System for Molecular Genetics</title>
<link>https://hdl.handle.net/1721.1/149608</link>
<description>Towards a Problem Solving System for Molecular Genetics
Koton, Phyllis A.
This paper describes a program called GENEX that reasons about the behavior of bacterial operons.  It is the first step towards a generalized system that will reason about genetic control mechanisms.  The system is easily extensible and able to produce detailed explanations without relying on canned text. Problems in molecular genetics are complicated by uncertainty introduced when reasoning about conformations.
</description>
<dc:date>1985-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149607">
<title>Some Implications of Complexity Theory on Pseudo-random Bit Generation</title>
<link>https://hdl.handle.net/1721.1/149607</link>
<description>Some Implications of Complexity Theory on Pseudo-random Bit Generation
Trilling, Stephen
A recent area of interest in theoretical computer science has been in the construction of so-called pseudo-random bit generators.  These generators "stretch" a short sequence of truly random bits into a longer sequence of "pseudo-random" bits.  These bits are sufficiently indistinguishable from truly random bits to be useful in deterministic simulation of probabilistic computation.
</description>
<dc:date>1985-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149606">
<title>Synchornizing Clocks in a Distributed System</title>
<link>https://hdl.handle.net/1721.1/149606</link>
<description>Synchornizing Clocks in a Distributed System
Lundelius, Jennifer
Keeping the local times of processes in distributed system synchronized in the presence of arbitrary faults is important in many applications and is an interesting theoretical problem in its own right.  In order to be practical, any algorithm to synchronize clocks must be able to deal with process failures and repairs, clock drift, and varying message delivery times, but these conditions complicate the design and analysis of algorithms.
</description>
<dc:date>1984-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149605">
<title>An Approach to Functional Office Automation</title>
<link>https://hdl.handle.net/1721.1/149605</link>
<description>An Approach to Functional Office Automation
Zarmer, Craig L.
Current efforts in office automation emphasize developing tools for supporting common, low-level tasks such as word processing and electronic mail.  While they have a wide market, they are not very sophisticated.  At the other end of the spectrum are office-specific systems, designed with complete knowledge of the office's operations. Unfortunately, such systems have a market size of one, and so are not very practical.
</description>
<dc:date>1984-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149604">
<title>Parallel Simulation of Digital LSI Circuits</title>
<link>https://hdl.handle.net/1721.1/149604</link>
<description>Parallel Simulation of Digital LSI Circuits
Aronld, Jeffrey M.
Integrated circuit technology has been advancing at a phenomenal rate over the last several years, and promises to continue to do so.  If circuit design is to keep pace with fabrication technology, radically new approaches to computer-aided design will be necessary. One appealing approach is general purpose parallel processing. This explores the issues involved in developing a framework for circuit simulation  which exploits the locality exhibited by circuit operation to achieve a high degree of parallelism.
</description>
<dc:date>1985-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149603">
<title>Resource Management for the Tagged Token Dataflow Architecture</title>
<link>https://hdl.handle.net/1721.1/149603</link>
<description>Resource Management for the Tagged Token Dataflow Architecture
Culler, David E.
The Tagged Token Dataflow Architecture is a multiprocessor based on the U-interpreter model of dataflow computation.  It captures the essential execution mechanism of the U-interpreter precisely; operations are enabled for execution by the availability of operated data. However, computational resources in the model and the machine are viewed quite differently. This thesis addresses four major resource management issues essential to bridge the gap between the U-interpreter and the Tagged Token Dataflow Architecture.
</description>
<dc:date>1985-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149602">
<title>Distributed Name Management</title>
<link>https://hdl.handle.net/1721.1/149602</link>
<description>Distributed Name Management
Sollins, Karen Rosin
The problem being addressed in this research is the design of a naming facility achieving the following goals.  First, two functions on names must be supported: accessing a named object, and acting as a place holder for the named object.  Second, it must be possible to share those names. Third , communication of the names as well as communication by use of the names must be possible. Finally, feasibility of implementation is a goal.
</description>
<dc:date>1985-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149601">
<title>Qualitative Mathematical Reasoning</title>
<link>https://hdl.handle.net/1721.1/149601</link>
<description>Qualitative Mathematical Reasoning
Sacks, Elisha
Qualitative analysis is the study of abstract causal reasoning.  It explores the mechanisms whereby humans analyze complex systems abstractly, while ignoring unimportant and unknown low-level details.  Previous research has focused on qualitative simulation techniques, analogous to numerical simulation, that use local information  about a system to predict its short-term behavior. This thesis presents a new, calculus based, type of qualitative analysis, called qualitative mathematical reasoning. It derives functional descriptions of systems and uses them to predict global behavior.
</description>
<dc:date>1984-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149600">
<title>Debugging Distributed Computations in a Nest Atomic Action System</title>
<link>https://hdl.handle.net/1721.1/149600</link>
<description>Debugging Distributed Computations in a Nest Atomic Action System
Chiu, Sheng Yang
Concurrent and distributed programs are hard to debug.  In this thesis, we argue that structuring activities as nested atomic actions can make debugging such programs much like debugging traditional sequential programs.  To support the argument, we present a method for debugging computations in the Argus language and system. Our method is applicable to other action systems since it depends only on the atomicity properties of actions.
</description>
<dc:date>1984-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149599">
<title>Orphan Detection in the Argus System</title>
<link>https://hdl.handle.net/1721.1/149599</link>
<description>Orphan Detection in the Argus System
Walker, Edward Franklin
In a distributed system, an activity running at one node can request another node to perform some service.  This request results in an activity being created at the latter node to perform the requested service.  The former node may then crash, destroying the activity that requested the service, but leaving behind the activity performing the service. Such surviving are known as orphans [Nelson81]. Orphans are undesirable since they waste resources and can view inconsistent data.
</description>
<dc:date>1984-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149598">
<title>Using Untypes Lambda Calculus to Computer with Atoms</title>
<link>https://hdl.handle.net/1721.1/149598</link>
<description>Using Untypes Lambda Calculus to Computer with Atoms
Weiss, Paul G.
Axioms and verification rules are given for typeless  A -calculus with a conditional test for equality between atoms.  A semantic completeness theorem is proved and a deterministic evaluator is proposed.
</description>
<dc:date>1984-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149597">
<title>Partial Evaluation as a Means of Language Extensibility</title>
<link>https://hdl.handle.net/1721.1/149597</link>
<description>Partial Evaluation as a Means of Language Extensibility
Schooler, Richard
An optimization technique known as partial evaluation is explored.  A partial evaluator optimizes code by making use of static information about program values.  Our partial evaluator is designed to optimize mainly applicative code.  Un-checked assertions are used to identify applicative constructs in the input code and guide the partial evaluator. Side-effects in the input code are retained but are not optimized.
</description>
<dc:date>1984-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149596">
<title>Efficient Implementation of Applicative Languages</title>
<link>https://hdl.handle.net/1721.1/149596</link>
<description>Efficient Implementation of Applicative Languages
Ackerman, William B.
The analysis of parallelism in an applicative program is much easier than in a program written in a conventional statement-oriented style.  This makes it possible for an optimizing compiler to prepare such a program for extremely efficient execution on a suitable enormously parallel computer. This thesis explores the transformations that must be made to achieve very high performance for numerical programs when executed on a computer that uses data flow principles in its operation.
</description>
<dc:date>1984-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149595">
<title>Routing the Power and Ground Wires on a VLSI Chip</title>
<link>https://hdl.handle.net/1721.1/149595</link>
<description>Routing the Power and Ground Wires on a VLSI Chip
Moulton, Andrew Strout
This thesis presents four new algorithms to route noncrossing power and ground trees in one metal layer of a VLSI chip.  The implementation of the best algorithm forms MIT's Placement-Interconnect (PI) Project's power-ground routing phase.  The input to this power-ground algorithm is a set of rectangular modules on a rectangular chip.
</description>
<dc:date>1984-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149594">
<title>Type Checking in Vimval</title>
<link>https://hdl.handle.net/1721.1/149594</link>
<description>Type Checking in Vimval
Kuszmaul, Bradley C.
A type system is developed for the revised version of the Val programming language (VimVal) which has the following features: (1) Type Inference:  allows programs to be written with incomplete type specifications.  The type checker infers the types of expressions from their context. (2) Polymorphism: allows modules to be written which operate on more than one type, performing analogous operations on different types of data. (3) higher order functions: are first class data in VIMVAL. (4) Recursive types: a type may to itself.
</description>
<dc:date>1984-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149593">
<title>Coordinating Pebble Motion on Graphs, The Diameter of Permutation Groups, and Applications</title>
<link>https://hdl.handle.net/1721.1/149593</link>
<description>Coordinating Pebble Motion on Graphs, The Diameter of Permutation Groups, and Applications
Kornhauser, Daniel Martin
The problem of memory management in totally distributed computing systems leads to the following movers' problem on graphics:  Let G be a graph with n vertices with k &lt; n pebbles number 1...,k on distinct vertices.  A move consists of transferring a pebble to an adjacent unoccupied vertex. The problem is to decide whether one arrangement of the pebbles is reachable from another, and to find the shortest sequence of moves to find the rearrangement when it is possible.
</description>
<dc:date>1984-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149592">
<title>Replication Methods for Abstract Data Types</title>
<link>https://hdl.handle.net/1721.1/149592</link>
<description>Replication Methods for Abstract Data Types
Herlihy, Maurice Peter
Replication can enhance the availability of data in a distributed system.  This thesis introduces a new method for managing replicated data.  We propose new techniques to address four problems associated with replication: (i) the representation and manipulation of replicated data, (iii) on- the-fly reconfiguration, and (iv) enhancing availability in the presence of partitions.
</description>
<dc:date>1984-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149591">
<title>A Constraint Representation and Explanation Facility for Renal Physiology</title>
<link>https://hdl.handle.net/1721.1/149591</link>
<description>A Constraint Representation and Explanation Facility for Renal Physiology
Asbell, Irwin
Current research in Artificial Intelligence has yielded computer programs which have potential to augment the physician's ability to diagnose illness.  The medical diagnoses programs of the first generation contain medical facts representing associations between diseases and findings. A most important step is the development of computer programs that have models of physiological processes and have the ability to derive physiological justifications of observed signs and symptoms.
</description>
<dc:date>1984-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149590">
<title>An Abstract Architecture for Parallel Graph Reduction</title>
<link>https://hdl.handle.net/1721.1/149590</link>
<description>An Abstract Architecture for Parallel Graph Reduction
Traub, Kenneth R.
An implementation technique for functional languages that has received recent attention is graph reduction, which offers opportunity for the exploitation of parallelism by multiple processors.  While several proposals for parallel graph reduction machines have been made, differing terminology and approaches make these proposals difficult to compare.
</description>
<dc:date>1984-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149589">
<title>Extending Binary Byzantine Agreement to Multivalued Byzantine Agreement</title>
<link>https://hdl.handle.net/1721.1/149589</link>
<description>Extending Binary Byzantine Agreement to Multivalued Byzantine Agreement
Turpin, Russell; Coan, Brian A.
A binary Byzantine agreement algorithm can be extended to produce a multivalued Byzantine agreement algorithm.  The resulting multivalued algorithm is cheaper than previously published algorithms when the cost of transmitting values from the multival
</description>
<dc:date>1984-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149588">
<title>Specification and Implementation of Atomic Data Types</title>
<link>https://hdl.handle.net/1721.1/149588</link>
<description>Specification and Implementation of Atomic Data Types
Weihl, William Edward
Maintaining the consistency of long-lived, on-line data is a difficult task, particularly in a distributed system.  This dissertation focuses on atomicity as a fundamental organizational concept for such systems.  It explores an approach in which
</description>
<dc:date>1984-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149587">
<title>The Design and Implementation of an Online Directory Assistance System</title>
<link>https://hdl.handle.net/1721.1/149587</link>
<description>The Design and Implementation of an Online Directory Assistance System
Koile, Kimberle
This thesis describes the design and implementation of an online directory assistance system called DIRSYS that was modeled after the white pages of a paper telephone book and a full-screen display editor such as Emacs.  As the user begins typing a n
</description>
<dc:date>1983-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149586">
<title>Cohesion in Computer Text Generation: Lexical Substitution</title>
<link>https://hdl.handle.net/1721.1/149586</link>
<description>Cohesion in Computer Text Generation: Lexical Substitution
Granville, Robert Alan
This report describes Paul, a computer text generation system designed to create cohesive text.  The device used to a achieve this cohesion is lexical substitution.  Through the use of syntactic and semantic information, the system is able to determine which type of lexical substitution will provide the necessary information to generate an understandable reference, while no providing so much information that the reference is confusing or unnatural.
</description>
<dc:date>1983-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149585">
<title>A Formal Model of Non-Determinate Dataflow Computation</title>
<link>https://hdl.handle.net/1721.1/149585</link>
<description>A Formal Model of Non-Determinate Dataflow Computation
Brock, Jarvis Dean
Almost ten years ago, Gilles Kahn used the fixed point theory of Dana Scott to define a formal and elegant model of computation for determinate dataflow graphs, networks of determinate processes communicating asynchronously through unbounded channels.
</description>
<dc:date>1983-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149584">
<title>Reliable Object Storage to Support Atomic Actions</title>
<link>https://hdl.handle.net/1721.1/149584</link>
<description>Reliable Object Storage to Support Atomic Actions
Oki, Brian Masao
To preserve the consistency of on-line, long-lived, distributed data in the presence of concurrency and in the event of hardware failures, it is necessary to ensure atomicity and data resiliency in applications.  The programming language Argus is designed to support such applications. This thesis investigates the mechanism needed to support the notion of data resiliency present in Argus.
</description>
<dc:date>1983-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149583">
<title>Preliminary Report on the Larch Shared Language*</title>
<link>https://hdl.handle.net/1721.1/149583</link>
<description>Preliminary Report on the Larch Shared Language*
Guttag, John V.; Horning, J.J.
Each member of the Larch family of formal specification languages has a component derived from a programming language and another component common to all programming languages.  We call the former interface languages, and the latter the Larch Shared Language.
</description>
<dc:date>1983-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149582">
<title>PADL - A Packet Architecture Description Language: A Preliminary Reference Manual</title>
<link>https://hdl.handle.net/1721.1/149582</link>
<description>PADL - A Packet Architecture Description Language: A Preliminary Reference Manual
Leung, Clement Kin Cho; William Y-P.
PADL is a hardware description language for specifying the behavior and structure of packet communication systems.  In such systems, hardware units called modules communicate by sending and receiving packets.  The behavior of such a system can be specified by providing the algorithm it executes and the data structures it manipulates. On the other hand, the structure of a system is specified by giving the components or of the system and their interconnection.
</description>
<dc:date>1983-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149581">
<title>A Framework for Solving VSLI Graph Layout Problems</title>
<link>https://hdl.handle.net/1721.1/149581</link>
<description>A Framework for Solving VSLI Graph Layout Problems
Bhatt, Sandeep N.; Leighton, Frank Thomson
This paper introduces a new divide-and-conquer framework for VLSI graph layout.  Universally close upper and lower bounds are obtained for important cost functions such as layout area and propagation delay.  The framework is also effectively used to design regular and configuration layouts, to assemble large networks of processors using restructurable chips, and to configure networks around faulty processors. it is also shown how good graph partitioning heuristics may be used to develop a provably good layout strategy.
</description>
<dc:date>1983-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149580">
<title>Simulation Tools for Digital LSI Design</title>
<link>https://hdl.handle.net/1721.1/149580</link>
<description>Simulation Tools for Digital LSI Design
Terman, Christopher J.
This thesis proposes a timing simulator (RSIM) based on a uniquely simple transistor model.  RSIM allows a designer to determine both the functional and approximate timing characteristics of a MOS network with more accuracy than gate-level simulation, and using larger circuits than are accommodated by circuit analysis programs. In RSIM, transistors are modeled as resistors; the logic states of a transistor's terminal nodes determine its effective resistance.
</description>
<dc:date>1983-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149579">
<title>Dynamic Module Replacement in a Distributed Programming System</title>
<link>https://hdl.handle.net/1721.1/149579</link>
<description>Dynamic Module Replacement in a Distributed Programming System
Bloom, Toby
The replacement of parts of software systems is an important aspect of programming methodology.  Most of the research in this area has centered around support for modular construction and the clear separation of interface from implementation.  The emphasis has been on producing easily modified static program structures.
</description>
<dc:date>1983-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149578">
<title>A Multiprocessor Emulation Facility</title>
<link>https://hdl.handle.net/1721.1/149578</link>
<description>A Multiprocessor Emulation Facility
Arvind,; Dertouzos, Michael L.; Lannucci, Robert A.
Interest in multiprocessor computer architectures has increased dramatically in the last ten years.  However, it has become clear that, in order to effectively use multiprocessors in a general way, some fundamental changes in the model of computation are necessary. Moreover, experimentation in the field is hindered by low-performance simulation tools and high-cost hardware modeling schemes.
</description>
<dc:date>1983-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149577">
<title>Creating a Computer-based Learning Environment for Physically Handicapped Children</title>
<link>https://hdl.handle.net/1721.1/149577</link>
<description>Creating a Computer-based Learning Environment for Physically Handicapped Children
Valente, Jose Armando
The objective of this research is to develop a computer-based learning environment for children physically handicapped by cerebral palsy and to study several issues related to the use of this environment for diagnostic, educational, and remedial purposes. The study is motivated by the desire to better understand the intellectual and motoric deficiencies of cerebral palsied children and to use this information in the development of teaching methods to accommodate each child's particular needs.
</description>
<dc:date>1983-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149576">
<title>An Argument for Soft Layering of Protocols</title>
<link>https://hdl.handle.net/1721.1/149576</link>
<description>An Argument for Soft Layering of Protocols
Cooper, Geoffrey Howard
This thesis is about the efficiency of protocol layering.  It examines the technique of protocol layering in an abstract way and finds two major sources of inefficiency in protocol implementations which are caused by the imposition on them of a layered structure. The conventional approach to making layered protocol implementations run efficiently--- for avoiding the sources of inefficiency discussed herein --- are all independent of the protocol specification, and thus all decrease the value of the protocol specification as a guide for implementing protocols.
</description>
<dc:date>1983-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149575">
<title>A Two-tiered Approach to Specifying Programs</title>
<link>https://hdl.handle.net/1721.1/149575</link>
<description>A Two-tiered Approach to Specifying Programs
Marie Wing, Jeannette
Current research in specifications is beginning to emphasize the practical use of formal specifications in program design.  This thesis presents a specification approach, a specification language that supports that approach, and some ways to evaluate specifications written that language.
</description>
<dc:date>1983-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149574">
<title>Video Games and Computer Aided Instruction</title>
<link>https://hdl.handle.net/1721.1/149574</link>
<description>Video Games and Computer Aided Instruction
Krugler, Ken
This document will briefly outline the evolution of video games, discuss current video game theory, and describe a program to teach typing on the IBM Personal Computer.
</description>
<dc:date>1983-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149573">
<title>Fundamental Design Problems of Distributed Systems for the Hard-real-time Environment</title>
<link>https://hdl.handle.net/1721.1/149573</link>
<description>Fundamental Design Problems of Distributed Systems for the Hard-real-time Environment
Mok, Aloysisu Ka-Lau
Software designed to function in a hard-real-time environment where strict timing constraints must be met often entails implicit assumptions about a programming language and the underlying system which supports it.  Programs which are logically correct, i.e., implement the intended algorithms, may not function correctly if their assumed timing characteristics are not met.
</description>
<dc:date>1983-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149572">
<title>The MDL Programming Environment</title>
<link>https://hdl.handle.net/1721.1/149572</link>
<description>The MDL Programming Environment
Lebling, P. David
</description>
<dc:date>1980-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149571">
<title>The MDL Programming Language</title>
<link>https://hdl.handle.net/1721.1/149571</link>
<description>The MDL Programming Language
Galley, S.W.; Pfister, Greg
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149570">
<title>The MDL Programming Language Primer</title>
<link>https://hdl.handle.net/1721.1/149570</link>
<description>The MDL Programming Language Primer
Dornbrook, Michael; Blank, Marc
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149569">
<title>The Impact of Layer Assignment Methods on Layout Algorithms for Integrated Circuits</title>
<link>https://hdl.handle.net/1721.1/149569</link>
<description>The Impact of Layer Assignment Methods on Layout Algorithms for Integrated Circuits
Pinter, Ron Yair
Programs for integrated circuit layout at the module assembly level are typically decomposed into two phases - placement and routing.  In this thesis we investigate a third phase which is often implicitly assumed - layer assignment.  This thesis studies how layer assignment methodologies interact with placement and routing.
</description>
<dc:date>1983-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149568">
<title>An Office Analysis and Diagnosis Methodology</title>
<link>https://hdl.handle.net/1721.1/149568</link>
<description>An Office Analysis and Diagnosis Methodology
Sutherland, Juliet
With the advent of computer technology designed for use in the office, office analysis, or the process of understanding office work for the purposes of introducing technology, has become increasingly important.  The Office Analysis and Diagnosis Methodology (OADM) is a tool to help the analyst gather the data required to decide how, and whether, to introduce office automation technology into a particular office, OADM is best suited for studying semi-structured offices, rather than pure processing operations or special projects. OADM is used to perform a detailed study of a single office and is not designed for use in determining the general automation needs of a large organization.
</description>
<dc:date>1983-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149567">
<title>Office Analysis: Methodology and Case Studies</title>
<link>https://hdl.handle.net/1721.1/149567</link>
<description>Office Analysis: Methodology and Case Studies
Sirbu, Marvin A., Jr.; Schoichet, Sandor R.; Kunin, Jay S.; Hammer, Michael M.; Sutherland, Juliet B.; Zarmer, Craig L.
The Office Analysis Methodology (OAM) is a structured methodology for understanding the current operations of an office.  OAM provides guidance in interviewing techniques and approaches to establishing a positive atmosphere for possible office automation efforts. It is designed to be to learn so that people with experience in office work but little experience in analysis can easily perform a study.
</description>
<dc:date>1983-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149566">
<title>On Computing Galois Groups and Its Application To Solvability by Radicals</title>
<link>https://hdl.handle.net/1721.1/149566</link>
<description>On Computing Galois Groups and Its Application To Solvability by Radicals
Laudau, Susan Eva
This thesis presents a polynomial time algorithm for the basic question of Galois theory, checking the solvability by radicals of a monic irreducible polynomial over the integers.  It also presents polynomial time algorithms for factoring polynomials over algebraic number fields, for computing blocks of imprimitivity of roots of a polynomial under the transitive action of the Galois group on the roots of the polynomial, and for computing intersections algebraic number fields.
</description>
<dc:date>1983-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149565">
<title>On Bisecting Random Graphs</title>
<link>https://hdl.handle.net/1721.1/149565</link>
<description>On Bisecting Random Graphs
Bui, Thang Nguyen
A bisection of a graph with an even number of vertices is a partition of the vertex set into two disjoint sets of equal size.  Given a bisection, the number of edges having one end in each of the two subsets of the bisection is called the size of the bisection. The bisection size of a graph is the minimum size of all possible bisections of the graph.
</description>
<dc:date>1983-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149564">
<title>Internal Consistency of a Distributed Transaction System with Orphan Detection</title>
<link>https://hdl.handle.net/1721.1/149564</link>
<description>Internal Consistency of a Distributed Transaction System with Orphan Detection
Goree, John A., Jr.
This thesis defines a property called "view-serializability", which formalizes internal consistency for a system of nested atomic transactions.  Internal consistency is a stronger condition than the usual notion of data base consistency, because it takes into account the views of transactions which will never commit. In a distributed system, local aborts of remote subactions and crashes of nodes can generate orphans: active actions which are descendants of actions that have aborted or are guaranteed to abort.
</description>
<dc:date>1983-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149563">
<title>Concurrency Control for Resilient Nested Transaction</title>
<link>https://hdl.handle.net/1721.1/149563</link>
<description>Concurrency Control for Resilient Nested Transaction
Lynch, Nancy A.
Concurrency control theory is extended to handle nested transactions with failures. The theory is used to present a rigorous correctness proof of a variant of Moss' locking algorithm for implementing nested transactions. The proof has an interesting structure using many levels of abstraction.
</description>
<dc:date>1983-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149562">
<title>Translating Updates of Relational Database Views</title>
<link>https://hdl.handle.net/1721.1/149562</link>
<description>Translating Updates of Relational Database Views
Cosmadakis, Stavros Stylianos
We study the problem of translating updates of data base views.  We disambiguate a view update by requiring that a specified view compliment (i.e. a second view which contains all the data base information omitted from the given view) remains constant during the translation. We study some of the computational problems related to the application of this general methodology in the context of relational databases.
</description>
<dc:date>1983-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149561">
<title>A Comparative Study of Computer-aided Clinical Diagnosis</title>
<link>https://hdl.handle.net/1721.1/149561</link>
<description>A Comparative Study of Computer-aided Clinical Diagnosis
Sherman, Howard Bruce
In recent years many computer systems have been developed to assist in medical decision making.  Two of these systems in particular, INTERNIST and the Present Illness Program (PIP), have been proposed as suitable for performing general medical diagnosis. However, there has been no way of comparing the performance of these two programs since the medical data used by the programs differs extensively.
</description>
<dc:date>1981-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149560">
<title>Impossibility of Distributed Consensus with One Faulty Process*atio</title>
<link>https://hdl.handle.net/1721.1/149560</link>
<description>Impossibility of Distributed Consensus with One Faulty Process*atio
Fischer, Michael J.; Lynch, Nancy A.; Paterson, Michael S.
The consensus problem involves an asynchronous system of processes, some of which may be unreliable.  The problem is for the reliable processes to agree on a binary value.  We show that every protocol for this problem has the possibility of nontermination, even with only one faulty process. By way of contrast, solutions are known for the synchronous case, the "Byzantine Generals" problem.
</description>
<dc:date>1982-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149559">
<title>Multilevel Atomicity: A New Correctness Criterion for Database Concurrency Control</title>
<link>https://hdl.handle.net/1721.1/149559</link>
<description>Multilevel Atomicity: A New Correctness Criterion for Database Concurrency Control
Lynch, Nancy A.
Multilevel atomicity, a new correctness criteria for database concurrency control, is defined.  It weakens the usual notion of serializability by permitting controlled interleaving among transactions.  It appears to be especially suitable for applications in which the set of transactions has a natural hierarchical structure based on the hierarchical structure of an organization.
</description>
<dc:date>1982-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149558">
<title>An Implementation Scheme for Array Operations in Static Data Flow Computers</title>
<link>https://hdl.handle.net/1721.1/149558</link>
<description>An Implementation Scheme for Array Operations in Static Data Flow Computers
Guang-Rong, Gao
The mapping of array operations in VAL programs on a static data flow machine with array memory is studied.  The flow dependency graph is introduced as a model of array operations in VAL programs.  The balancing and optimization of the flow dependency graphs is presented. The class of well-be VAL programs which can be modeled by flow dependency graphs is specified.
</description>
<dc:date>1982-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149557">
<title>The Design of a Multiprocessor Development System</title>
<link>https://hdl.handle.net/1721.1/149557</link>
<description>The Design of a Multiprocessor Development System
Anderson, Thomas Lee
A multiprocessor development system has been designed and a prototype system is being constructed.  The system, known as Concert, is intended to support multiprocessor research efforts at M.I.T.  The motivation for Concert and the project history are summarized briefly. Some intended applications are also identified.
</description>
<dc:date>1982-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149556">
<title>Display Management in an Integrated Office</title>
<link>https://hdl.handle.net/1721.1/149556</link>
<description>Display Management in an Integrated Office
Rosenstein, Larry S.
Advances in technology now make it possible to build office workstations that have a large amount of local computing power and high-resolution output devices.  Such workstations can be used for various office applications, such as document preparation, personal databases, and electronic mail.
</description>
<dc:date>1982-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149555">
<title>Efficient Modeling for Short Channel MOS Circuit Cimulation</title>
<link>https://hdl.handle.net/1721.1/149555</link>
<description>Efficient Modeling for Short Channel MOS Circuit Cimulation
Johnson, Mark Griffin
Existing circuit models for short-channel MOS transistors represent a compromise between speed and ease of use.  Empirical models are very fast to evaluate, but their parameters must be fitted from experimental measurements.  Theoretical models require longer computation time, but they may be used to predict the performance of new, unmeasured MOS technologies since their parameters are not curve-fitted from experimental data.
</description>
<dc:date>1982-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149554">
<title>Automatic Synthesis of Implementations for Abstract Data Types from Algebraic Specifications</title>
<link>https://hdl.handle.net/1721.1/149554</link>
<description>Automatic Synthesis of Implementations for Abstract Data Types from Algebraic Specifications
Srivas, Mandayam K.
Algebraic specifications have been used extensively to prove properties of abstract data types and to establish the correctness of implementations of data types.  This thesis explores an automatic method of synthesizing implementations for data types from their algebraic specifications.
</description>
<dc:date>1982-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149553">
<title>Analysis and Specification of Office Procedures</title>
<link>https://hdl.handle.net/1721.1/149553</link>
<description>Analysis and Specification of Office Procedures
Kunuin, Jay S.
Conventional approaches to "office automation" focus on the lowest common denominator of office work: typing, filing, filling in forms, etc.  As a consequence, the process of office systems analysis lacks tools and techniques that address the office in terms of business functions rather than as manipulation of paper artifacts.
</description>
<dc:date>1982-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149552">
<title>Layouts for the Shuffle-exchange Graph and Lower Bound Techniques for VLSI</title>
<link>https://hdl.handle.net/1721.1/149552</link>
<description>Layouts for the Shuffle-exchange Graph and Lower Bound Techniques for VLSI
Leighton, Frank Thomson
The thesis is divided into two parts.  In the first part, we describe and analyze several new VLSI layouts for the shuffle-exchange graph.  These include:1) an asymptotically optimal,   (N  /log  N)-area layout for the N-node shuffle-exchange graph, and 2) several practical layouts for small shuffle-exchange graphs.
</description>
<dc:date>1982-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149551">
<title>Data Communications via Cable Television Networks: Technical and Policy Considerations</title>
<link>https://hdl.handle.net/1721.1/149551</link>
<description>Data Communications via Cable Television Networks: Technical and Policy Considerations
Estrin, Deborah Lynn
Cable television networks offer peak communication data rates that are orders of magnitude greater than the telephone local loop.  Although one-way television signal distribution continues to be the primary application of cable television systems, the cable television network can be used for two-way data communication.
</description>
<dc:date>1982-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149550">
<title>Procedural Reflection in Programming Languages Volume I</title>
<link>https://hdl.handle.net/1721.1/149550</link>
<description>Procedural Reflection in Programming Languages Volume I
Smith, Brian Cantwell
We show how a computational system can be constructed to "reason," effectively and consequentially, about its own inferential processes.  The analysis proceeds in two parts.  First, we consider the general question of computational semantics, rejecting traditional approaches, and arguing that the declarative and procedural aspects of computational symbols (what they stand for, and what behaviour  they engender) should be analysed independently, in order that they may be coherently related.
</description>
<dc:date>1982-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149549">
<title>A Computer System for Decision Analysis in Hodgkins Disease</title>
<link>https://hdl.handle.net/1721.1/149549</link>
<description>A Computer System for Decision Analysis in Hodgkins Disease
Rutherford, Cynthia, J.; Davies, Byron; Barnett, Arnold I.; Desforges, Jane F.
This report draws together the diverse strands involved in developing a unique computer-based system to stage and manage Hodgkins Disease (HD). Those of us worked on the final version of this project included two hematologists, a computer scientist, and a statistician.
</description>
<dc:date>1982-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149548">
<title>The Design of a Routing Service for Campus-wide Internet Transport</title>
<link>https://hdl.handle.net/1721.1/149548</link>
<description>The Design of a Routing Service for Campus-wide Internet Transport
Singh, Vineet
A campus-wide network requires many subnetworks connected by gateways and it has a relatively loose administration.  Modularization of network implementing is important in this environment to make efficient use of ever-improving technologies and protocols.
</description>
<dc:date>1982-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149547">
<title>The Complexity of Concurrency Control for Distributed Databases</title>
<link>https://hdl.handle.net/1721.1/149547</link>
<description>The Complexity of Concurrency Control for Distributed Databases
Kanellakis, Paris C.
This study is an analysis of the distributed version of data base concurrency control.  It provides concrete mathematical evidence that the distributed problem is an inherently more complex task than the centralized one.  The notions of transaction, concurrency, history, serializability, scheduler, etc, for centralized databases are now well-understood both from a theoretical and a practical point of view.
</description>
<dc:date>1981-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149546">
<title>Derived Pairs, Overlap Closures, and Rewrite Dominoes: New Tools for Analyzing Term Rewriting Systems</title>
<link>https://hdl.handle.net/1721.1/149546</link>
<description>Derived Pairs, Overlap Closures, and Rewrite Dominoes: New Tools for Analyzing Term Rewriting Systems
Guttag, John V.; Kapur, Deepak; Musser, David R.
Starting from the seminal work of Knuth and Bendix, we develop several notions useful in the study of term rewriting systems.  In particular we introduce the notions of "derived pairs" and "overlap closure" and show that they are useful in analyzing sets of rewrite rules for various properties related to termination. We also introduce a new representation, based on rewrite dominoes, for rewrite rules and sequences of rewrites.
</description>
<dc:date>1981-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149545">
<title>Causal Representation of Patient Illness for Electrolyte and Acid-base Diagnosis</title>
<link>https://hdl.handle.net/1721.1/149545</link>
<description>Causal Representation of Patient Illness for Electrolyte and Acid-base Diagnosis
Patil, Ramesh S.
Much of the medical knowledge in the first generation Al in Medicine programs is phenomenological; that is, it describes the associations among phenomena without knowledge of the underlying causal mechanisms.  Although these AIM programs provide a good first approximation to the way clinicians reason, they fail to produce clinicians reasoning based on a deaper understanding of the phenomens.
</description>
<dc:date>1981-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149544">
<title>An Ease of Use Evaluation of an Integrated Editor and Formatter</title>
<link>https://hdl.handle.net/1721.1/149544</link>
<description>An Ease of Use Evaluation of an Integrated Editor and Formatter
Good, Michael
Etude is an integrated text editor and formatter that was designed to be easy to learn and easy to use.  To measure Etude's success in meeting these goals, twenty-one computer-naive temporary office workers were taught to use Etude in a controlled experiment. Ninety percent of the subjects were able to create and edit letters after a training period of less than two hours and twenty minutes, though they were not able to perform these tasks as quickly as they could when using a typewriter.
</description>
<dc:date>1981-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149543">
<title>A Data Flow Architecture with Improved Asymptotic Performance</title>
<link>https://hdl.handle.net/1721.1/149543</link>
<description>A Data Flow Architecture with Improved Asymptotic Performance
Thomas, Robert E.
Large scale integration presents a unique opportunity to design a computer compromising large numbers of small, inexpensive processors.  This paper presents a design for such a machine based on the asynchronous and functional semantics of data flow.
</description>
<dc:date>1981-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149542">
<title>Interactive Debigging in a Distributed Computational Envrionment</title>
<link>https://hdl.handle.net/1721.1/149542</link>
<description>Interactive Debigging in a Distributed Computational Envrionment
Schiffenbauer, Robert David
</description>
<dc:date>1981-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149541">
<title>Propositional Dynamic Logic of Looping and Converse</title>
<link>https://hdl.handle.net/1721.1/149541</link>
<description>Propositional Dynamic Logic of Looping and Converse
Streett, Robert S.
Dynamic logic [5,6,15,16] applies concepts from modal logic to a relational semantics of programs to yield various systems for reasoning about the before-after behavior of programs. Analogues to the modal logic assertions ?p (possibly p) and ?p(necessarily p) are the dynamic logic constructs &lt;a&gt;p and [a]p. If a is a program and p is an assertion about the state of a computation, then ,&lt;a&gt;p asserts that after executing a, p can be the case, and [a]p asserts that after executing a, p must be the case.
</description>
<dc:date>1981-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149540">
<title>High Level VAL Constructs in a Static Data Flow Machine</title>
<link>https://hdl.handle.net/1721.1/149540</link>
<description>High Level VAL Constructs in a Static Data Flow Machine
Todd, Kenneth Wayne
The Dennis-Misunas Form 1 Data Flow Machine can best be described as a static and scalar machine.  Despite these two limiting characteristics, it is still possible to translate the whole of the functional programming language VAL into the base language of this machine. Methods for translating the various high constructs of VAL are presented which exploit the parallelism inherent in programs written in VAL mainly by pipelining through a single expression (vertical parallelism) rather than employing many copies of that same expression (horizontal parallelism), although the latter is not ruled out.
</description>
<dc:date>1981-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149539">
<title>A Switch-level Simulation Model for Integrated Logic Circuits</title>
<link>https://hdl.handle.net/1721.1/149539</link>
<description>A Switch-level Simulation Model for Integrated Logic Circuits
Bryant, Randal Everitt
Switch-level simulators model a metal oxide semiconductor (MOS) large scale integrated (LSI) circuits as a network of transistor "switches". They can simulate many aspects of MOS circuits which cannot be expressed in the Boolean logic gate model, such as bidrecttional pass transistors, dynamic storage, and charge sharing.
</description>
<dc:date>1981-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149538">
<title>A Design Methodology for Self-time Systems</title>
<link>https://hdl.handle.net/1721.1/149538</link>
<description>A Design Methodology for Self-time Systems
Singh, Narinder Pal
This thesis presents a design methodology for self-timed systems which will be extremely attractive for implementing systems in VLSI.  Self-timed systems are characterized by the absence of a timing reference to which all operations are synchronized.
</description>
<dc:date>1981-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149537">
<title>Application of Data Flow Architecture to Computer Music Synthesis</title>
<link>https://hdl.handle.net/1721.1/149537</link>
<description>Application of Data Flow Architecture to Computer Music Synthesis
Cesari, Carol Andrea
A computer music synthesis system is the most flexible of synthesis systems.  It offers a composer extensive control over the sound of his piece.  A user of such a system describes his composition in some synthesis language.  The computer uses this description to calculate samples of a voltage waveform that can be fed to D/A converters at a specified sampling rate.
</description>
<dc:date>1981-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149536">
<title>Semiautomatic Translation of Cobol In Hibol</title>
<link>https://hdl.handle.net/1721.1/149536</link>
<description>Semiautomatic Translation of Cobol In Hibol
Faust, Gregory Gerard
A severe software crisis is currently being experienced by the data processing community due to intolerable maintenance costs.  A system is introduced to reduce those costs by the translation of existing COBOL software into HIBOL; a very high level language that is significantly easier to maintain.
</description>
<dc:date>1981-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149535">
<title>Protecting Externally Supplied Software in Small Computers</title>
<link>https://hdl.handle.net/1721.1/149535</link>
<description>Protecting Externally Supplied Software in Small Computers
Kent, Stephen T.
The increasing decentralization of computing resources and the proliferation of personal and small business computers create new problems in computer security.  One such problem is the protection of externally supplied software, i.e., software supplied by other than the users/owners of these small computers. In the case of personal and small business computers, proprietary software serves as the primary example.
</description>
<dc:date>1981-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149534">
<title>An Integrated Approach to Formatted Document Production</title>
<link>https://hdl.handle.net/1721.1/149534</link>
<description>An Integrated Approach to Formatted Document Production
Ilson, Richard
Recent advances in printing technology have reduced the cost of typeset quality printers.  Unfortunately, the production of attractively formatted documents requires typographic skill and special training on computer-based text processing systems. The principal characteristics of Etude are that it embodies substantial typographic expertise, and is based on concepts familiar to untrained users . Furthermore, Etude provides a real-time display facility that allows the results of editing and formatting operations to be seen immediately. Thus, Etude supports the entire process of producing decorously formatted documents.
</description>
<dc:date>1981-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149533">
<title>Recovery of the Swallow Repository</title>
<link>https://hdl.handle.net/1721.1/149533</link>
<description>Recovery of the Swallow Repository
Arens, Gail C.
This thesis presents the design of a set of recovery mechanisms for the Swallow repository.  Swallow is a distributed data storage system that supports highly reliable long term storage of arbitrary sized data objects with special mechanisms for implementing multi-site atomic actions. The Swallow repository is a data storage server that keeps permanent data in write-once stable storage such as optical disk.
</description>
<dc:date>1981-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149532">
<title>Producing Explanations and Justifications of Expert Consulting Programs</title>
<link>https://hdl.handle.net/1721.1/149532</link>
<description>Producing Explanations and Justifications of Expert Consulting Programs
Swartout, William R.
Traditional methods for explaining programs provide explanations by converting to English the code of the program or traces of the execution of that code.  While such methods can provide adequate explanations of what the program does or did, they typically cannot provide justifications of the code without resorting to canned-text explanations. That is, such systems cannot tell why what the system is doing is a reasonable thing to be doing.
</description>
<dc:date>1981-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149531">
<title>Fault Tolerance in Packet Communication Computer Archiectures</title>
<link>https://hdl.handle.net/1721.1/149531</link>
<description>Fault Tolerance in Packet Communication Computer Archiectures
Leung, Clement Kin Cho
It is attractive to implement a large scale parallel processing system as a self-timed hardware system with decentralized control and to improve maintainability and availability in such a system through fault tolerance.  In this thesis we show how to tolerate hardware failures in a self-timed hardware system with a packet communication architecture, designed to execute parallel programs organized by data flow concepts.
</description>
<dc:date>1980-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149530">
<title>Computers and People: Personal Computation</title>
<link>https://hdl.handle.net/1721.1/149530</link>
<description>Computers and People: Personal Computation
Turkle, Sherry
In  the January 1975 issue of Popular Electronics, MITs, short for Micro Instrumentation and Telementry System, a small computer company in Albequerque, New Mexico, announced the Altair, a computer small enough to sit on a desktop, powerful  enough to support high level language programming, and that you could build for only $429.
</description>
<dc:date>1980-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149529">
<title>Algorithms for Integrated Circuit Layout: An Analytic Approach</title>
<link>https://hdl.handle.net/1721.1/149529</link>
<description>Algorithms for Integrated Circuit Layout: An Analytic Approach
LaPaugh, Andrea Suzanne
In this thesis, the problem of designing the layout of integrated circuits is examined.  The layout of an integrated circuit specifies the position of the chip of functional components and wires interconnecting the components.  We use a general model
</description>
<dc:date>1980-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149528">
<title>Interprocedural Data Flow Analysis in the Presence of Pointers, Procedure Variables, and Label Variables</title>
<link>https://hdl.handle.net/1721.1/149528</link>
<description>Interprocedural Data Flow Analysis in the Presence of Pointers, Procedure Variables, and Label Variables
Weihl, William Edward
The compilation of highly modular programs requires extensive interprocedural analysis in order to produce reasonable object code. Such analysis is greatly complicated when the source language contains such constructs as procedure variables and label variables.
</description>
<dc:date>1980-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149527">
<title>A Survey of the Logic of Effective Definitions</title>
<link>https://hdl.handle.net/1721.1/149527</link>
<description>A Survey of the Logic of Effective Definitions
Tiuryn, J.
LED, the Logic of Effective Definitions, is an extension of first order predicate calculus used for making assertions about programs.  Programs are modeled as effective definitional schemes (following Friedman).  Logical properties of LED and its relations to classical logics and other programming logics are surveyed.
</description>
<dc:date>1980-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149526">
<title>On Memory Limitations in Natural Language Processing</title>
<link>https://hdl.handle.net/1721.1/149526</link>
<description>On Memory Limitations in Natural Language Processing
Church, Kenneth Ward
This paper proposes a welcome hypothesis: a computationally simple device is sufficient for processing natural language.  Traditionally it has been argued that processing natural language syntax requires very powerful machinery.  Many engineers have come to this rather grim conclusion: almost all working parsers are actually Turing Machines (TM). For example, Woods specifically designed his Augmented Transition Networks (ATNs) to be Turing Equivalent.
</description>
<dc:date>1980-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149525">
<title>Data Driven Loops</title>
<link>https://hdl.handle.net/1721.1/149525</link>
<description>Data Driven Loops
Ruth, Gregory R.
The notion of the data driven loop arises in connection with our work in the Very High Level Language HIBOL and the automatic programming system (ProtoSystem I) that supports it.  Although the concept is of general interest outside of VHLL's and automatic programming, we find it profitable to use HIBOL as a vehicle for our discussion and a means of narrowing the scope of our discussion. Therefore we first present description of the domain which HIBOL treats.
</description>
<dc:date>1980-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149524">
<title>Management of Object Histories in the Swallow Repository</title>
<link>https://hdl.handle.net/1721.1/149524</link>
<description>Management of Object Histories in the Swallow Repository
Svobodova, Liba
SWALLOW is an experimental distributed data storage system that provides personal computers with a uniform interface to their local data and the data stored in shared remote servers called repositories.  The SWALLOW repositories provide reliable, secure reliable, secure, and efficient long-term storage for both very small and very large objects and support updating of a group of objects at one or several repositories in a single atomic action.
</description>
<dc:date>1980-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149523">
<title>Simulations Amond Multidimensional Turing Machines</title>
<link>https://hdl.handle.net/1721.1/149523</link>
<description>Simulations Amond Multidimensional Turing Machines
Loui, Michael Conrad
This thesis presents three independent papers: nearly optimal on-line simulations among multidimensional Turing machines, a space bound for one-tape multidimensional Turing machines, and new proofs in the pebble game.
</description>
<dc:date>1980-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149522">
<title>Representation and Analysis of Real-Time Control Structures</title>
<link>https://hdl.handle.net/1721.1/149522</link>
<description>Representation and Analysis of Real-Time Control Structures
Archer, Rowland F., Jr.
A new notation is introduced for representing real-time scheduling at the task and event level.  These schedules are called control structures.  The primary constructs included which direct the flow of control are sequencing, iteration, and preemption. Additional notation allows the representation of interrupt masking, task termination by external events, task restart as well as resumption from the point of preemption and codestripping. Algorithms are given for finding the presentation structures of a  given control structure in the notation.
</description>
<dc:date>1980-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149521">
<title>Safety and Optimization Transformations for Data Flow Programs</title>
<link>https://hdl.handle.net/1721.1/149521</link>
<description>Safety and Optimization Transformations for Data Flow Programs
Montz, Lynn Barbara
The data flow  concept of computation seeks to achieve high performance by allowing concurrent execution of instructions based on the availability of data.  This thesis explores the translation of a subset of the high level languages VAL to data flow graphs. The major problem in performing this translation for the target machine. the Dennis-Misunas data flow computer, stems from the restriction that graph execution sequences place at most one value on any given are at any time. The data/acknowledge are pair transformation is introduced as a means of implementing this required operational behavior. Its effect on data flow graph operation is subsequently explored as it relates to correctness and performance.
</description>
<dc:date>1980-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149520">
<title>Artwork Analysis Tool for VLSI Circuits</title>
<link>https://hdl.handle.net/1721.1/149520</link>
<description>Artwork Analysis Tool for VLSI Circuits
Baker, Clark Marshall
Current methods for designing VLSI chips do not insure that the chips will perform correctly when manufactured.  Because the turn around time on chip fabrication varies from a few weeks to a few months, a scheme other than "try it and see if it works" is needed. Checking of chips by hand simulation and visual inspection of check plots will not cash all of the errors. In addition, the number of transistors per chip is likely to increase from ten thousand to over a million in the next few years.This increase in complexity precludes any manual verification methods; some better method is needed.
</description>
<dc:date>1980-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149519">
<title>The Complexity of Monotone Boolean Functions and an Algorithm for Finding Shortest Paths on a Graph</title>
<link>https://hdl.handle.net/1721.1/149519</link>
<description>The Complexity of Monotone Boolean Functions and an Algorithm for Finding Shortest Paths on a Graph
Bloniarz, Peter Anthony
The first part of this thesis considers the complexity of Boolean functions.  The main complexity measures used are the number of gates in combinational networks and the size of Boolean formulas.  The case of monotone realizations, using only the operations AND and OR, of monotone  functions is emphasized.
</description>
<dc:date>1980-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149518">
<title>Towards a Theory for Abstract Data Types</title>
<link>https://hdl.handle.net/1721.1/149518</link>
<description>Towards a Theory for Abstract Data Types
Kapur, Deepak
A rigorous framework for studying immutable data types having nondeterministic operations and operations exhibiting exceptional behavior is developed.  The framework embodies the view of a data type taken in programming languages, and supports hierarchical and modular structure among data types.
</description>
<dc:date>1980-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149517">
<title>Scheduling Task Systems with Resources</title>
<link>https://hdl.handle.net/1721.1/149517</link>
<description>Scheduling Task Systems with Resources
Lloyd, Errol Lynn
Minimum execution time scheduling of task systems with resources has been the subject of several papers over the past few years.  The model used for much of this work assumes that the resources in the system are continuous. That the, there is one unit of each resource, and a task may require any portion of that unit during its execution.
</description>
<dc:date>1980-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149516">
<title>A Concept of Independence with Applications in Various Fields of Mathematics</title>
<link>https://hdl.handle.net/1721.1/149516</link>
<description>A Concept of Independence with Applications in Various Fields of Mathematics
Levin, Leonid A.
We use Kolmogorov's algorithmic approach to information theory to define a concept of independence of sequences, or equivalently, the boundedness of their mutual information.  This concept is applied to probability theory, intuitionistic logic, and the theory of algorithms.
</description>
<dc:date>1980-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149515">
<title>Transmitting Abstract Values in Messages</title>
<link>https://hdl.handle.net/1721.1/149515</link>
<description>Transmitting Abstract Values in Messages
Herlihy, Maurice Peter
This thesis develops primitives for a programming language intended for use in a distributed computer system where individual nodes may have different hardware or software configurations.  Our primitives are presented as extensions to the CLU language.
</description>
<dc:date>1980-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149514">
<title>Automatic Extension of an Augmented Transition Network Grammar for Morse Code Conversations</title>
<link>https://hdl.handle.net/1721.1/149514</link>
<description>Automatic Extension of an Augmented Transition Network Grammar for Morse Code Conversations
Kaiser, Gail E.
This report describes a 'learning program' that acquires much of the knowledge required by a parsing system that processes conversations in a 'natural' language akin to ham-radio jargon.  The learning program derives information from example sentence taken from transcripts of actual conversations, and uses this knowledge to extend the 'core' augmented transition network (ATN) grammar.
</description>
<dc:date>1980-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149513">
<title>The Complexity of the Maximum Network Flow Problem</title>
<link>https://hdl.handle.net/1721.1/149513</link>
<description>The Complexity of the Maximum Network Flow Problem
Baratz, Alan Edward
This thesis deals with the computational complexity of the maximum network flow problem.  We first introduce the basic concepts and fundamental theorems upon which the study of "max-flow" has been built.  We then trace the development of max-flow algorithms from the original "labeling algorithm" of Ford and Fulkerson, through a recent 0   (V-E-log 2 V) algorithm due to Galil and Naamad.
</description>
<dc:date>1980-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149512">
<title>Automatic Verification of Serializers</title>
<link>https://hdl.handle.net/1721.1/149512</link>
<description>Automatic Verification of Serializers
Atkinson, Russ R.
This thesis is concerned with the problem of controlling concurrent access to shared data.  A language construct is proposed to enforce such control; a specification language is defined to describe the formal requirements of such control; and verification techniques are given to prove that instances of the construct satisfy their specifications.
</description>
<dc:date>1980-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149511">
<title>An Abstract Implementation for a Generalized Data Flow Language</title>
<link>https://hdl.handle.net/1721.1/149511</link>
<description>An Abstract Implementation for a Generalized Data Flow Language
Weng, Kung-Song
In this thesis we are concerned with issues arising from the need to achieve concurrency of operation with a computation on a large scale. Several factors contribute toward increasing interest in systems capable of exploiting the concurrency of computation.
</description>
<dc:date>1980-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149510">
<title>Incomprehensible Computer Systems: Knowledge Without Wisdom</title>
<link>https://hdl.handle.net/1721.1/149510</link>
<description>Incomprehensible Computer Systems: Knowledge Without Wisdom
Rosenberg, Ronni Lynne
An analysis of the incomprehensibility of large, complex computer systems is made.  The thesis is that there is a strong relationship between system incomprehensibility and the necessity to trust computer systems.  A cogent definition of incomprehensibility in computer system is established, with common themes drawn from interdisciplinary literature dealing with computers and society.
</description>
<dc:date>1980-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149509">
<title>CLU Reference Manual</title>
<link>https://hdl.handle.net/1721.1/149509</link>
<description>CLU Reference Manual
Liskov, Barbara; Atkinson, Russ R.; Bloom, Toby; Moss, J. Eliot B.; Schaffert, Craig; Scheifler, Bob; Snyder, Alan
This document serves both as an introduction to CLU and as a language reference manual.  Sections 1 through 4 present an overview of the language.  These sections highlight the essential features of CLU, and discuss how CLU differs from other, more conventional, languages.
</description>
<dc:date>1979-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149508">
<title>Toward a Computational Theory of Indirect Speech Acts</title>
<link>https://hdl.handle.net/1721.1/149508</link>
<description>Toward a Computational Theory of Indirect Speech Acts
Brown, Gretchen P.
The variety of surface forms that may be used to convey a given speech act pose a major problem in modeling task-oriented (and other) dialogues.  Many such forms are so-called indirect speech acts, that is, surface form does not correspond to the (or one) intended speech act.
</description>
<dc:date>1979-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149507">
<title>Abstract Model Specifications for Data Abstractions</title>
<link>https://hdl.handle.net/1721.1/149507</link>
<description>Abstract Model Specifications for Data Abstractions
B_rzin_, Valdis Andris
A data abstraction introduces a data type with a hidden representation.  Specifications of data abstractions are required to allow the data to be described and used without reference to the underlying representation.  There are two main approaches to specifying data abstractions, the abstract model approach and the axiomatic approach.
</description>
<dc:date>1979-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149506">
<title>Denotational Semantics of Determinate and Non-Determinate Data Flow Programs</title>
<link>https://hdl.handle.net/1721.1/149506</link>
<description>Denotational Semantics of Determinate and Non-Determinate Data Flow Programs
Kosinski, Paul Roman
Among its other characteristics, a programming language should be conducive to writing modular program's, be able to express parallelism and non-determinate behavior, and it should have a cleanly formalizable semantics.  Data flow programming languages have all these characteristics and are especially amenable to mathematization of their semantics in the denotational style of Scott and Strachey.
</description>
<dc:date>1979-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149505">
<title>Copying Complex Structures in a Distributed System</title>
<link>https://hdl.handle.net/1721.1/149505</link>
<description>Copying Complex Structures in a Distributed System
Sollins, Karen Rosin
This thesis presents a model of a distributed system.  The universe of objects in the distributed system is divided into mutually exclusive sets, each set corresponding to a context.  This model allows naming beyond the context boundaries, but limits communication across such boundaries to message passing only.
</description>
<dc:date>1979-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149504">
<title>VAL- A Value-oriented Algorithmic Language: Preliminary Reference Manual</title>
<link>https://hdl.handle.net/1721.1/149504</link>
<description>VAL- A Value-oriented Algorithmic Language: Preliminary Reference Manual
Ackerman, William B.; Dennis, Jack B.
The programming language VAL (Value-Oriented Algorithmic Language) is designed for expressing algorithms for execution on computers capable of highly concurrent operation.  More specifically, the application area to be supported is numerical computation which strains the limits of high performance machines, and primary targets for translation of VAL programs are data driven machines of the form under development by the Computation Structures Group of the MIT Laboratory for Computer Science for high performance numerical computation.
</description>
<dc:date>1979-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149503">
<title>Storage and Access Costs for Implementations of Variable - Length lists</title>
<link>https://hdl.handle.net/1721.1/149503</link>
<description>Storage and Access Costs for Implementations of Variable - Length lists
Brown, Donna Jean
Consider a machine with a cellular memory used to store a list X , where X is a finite alphabet and i  N.  We investigate the machine representation of such a list and the implementation of common list operations such as determining the i th  element and adding or deleting an element.
</description>
<dc:date>1979-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149502">
<title>Analysis of the Simple Code for Dataflow Computation</title>
<link>https://hdl.handle.net/1721.1/149502</link>
<description>Analysis of the Simple Code for Dataflow Computation
Myers, John M.
We analyze a problem in hydrodynamics from the standpoint of computation on a data flow compute that is not yet fully specified, with the objectives of helping to further specify the computer and helping to develop VAL as its source language.  Lawrence Liver,ore Laboratory supplied the algorithm for hydrodynamics, including heat flow, as a 1749-line FORTRAN code called SIMPLE.
</description>
<dc:date>1979-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149501">
<title>Distributed Computer Systems: Structure and Semantics</title>
<link>https://hdl.handle.net/1721.1/149501</link>
<description>Distributed Computer Systems: Structure and Semantics
Svobodova, Liba; Liskov, Barbara; Clark, David D
This report describes an ongoing project in the area of design of distributed systems.  The goal is to develop an effective programming system that will support well-structured design implementation, maintenance and control of distributed processing applications.
</description>
<dc:date>1979-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149500">
<title>Probabilistic Algorithm in Finite Fields</title>
<link>https://hdl.handle.net/1721.1/149500</link>
<description>Probabilistic Algorithm in Finite Fields
Rabin, Michael O.
We present probabilistic algorithms for the problems of finding an irreducible polynomial of degree n  over a finite field, finding roots of a polynomial and factoring the polynomial into its irreducible factors over a finite field.  All of these problems are of importance in algebraic coding theory, algebraic symbol manipulation, and number theory.
</description>
<dc:date>1979-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149499">
<title>Digitalized Signatures and Public-key Functions as Intractable as Factorization</title>
<link>https://hdl.handle.net/1721.1/149499</link>
<description>Digitalized Signatures and Public-key Functions as Intractable as Factorization
Rabin, Michael O.
We introduce a new class of public-key functions involving a number n = p.q having two large prime factors.  As usual, the key n is public, while p and q are the private key used by the issuer for production of signatures and function inversion.  These functions can be used for all the applications involving public-key functions proposed by Diffie and Hellman  [ 2 ], including digitalized signatures.
</description>
<dc:date>1979-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149498">
<title>Synchronization Mechanism for Modular Programming Language</title>
<link>https://hdl.handle.net/1721.1/149498</link>
<description>Synchronization Mechanism for Modular Programming Language
Bloom, Toby
Any programming language that supports concurrency needs a synchronization construct with which to express access control for shared resources.  This thesis examines synchronization constructs from the standpoint of language design for reliable software. The criteria a synchronization mechanism must satisfy to support construction of reliable, easily maintainable concurrent software are defined.
</description>
<dc:date>1979-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149497">
<title>Serializability of Concurrent Data Base Updates</title>
<link>https://hdl.handle.net/1721.1/149497</link>
<description>Serializability of Concurrent Data Base Updates
Papadimitriou, Christos H.
A sequence of interleaved user transactions in a data base system may not be serializable, i.e., equivalent to some sequential execution of the individual transactions.  Using a simple transaction model we show that recognizing the transaction histories which are serializable is an NP-complete problem.
</description>
<dc:date>1979-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149496">
<title>A Machine Architecture to Support an Object-Oriented Language</title>
<link>https://hdl.handle.net/1721.1/149496</link>
<description>A Machine Architecture to Support an Object-Oriented Language
Snyder, Alan
In object-oriented languages (e.g., LISP, Simula, and CLU), all (or most) data objects used by a program are implicitly allocated from a free-storage area and are accessed via fixed-size references.  The storage for an object is automatically reclaimed (garbage collected) when the object is no longer accessible to the program.
</description>
<dc:date>1979-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149495">
<title>A Microcomputer Network Simulation System</title>
<link>https://hdl.handle.net/1721.1/149495</link>
<description>A Microcomputer Network Simulation System
Krizan, Brock Collins
The design, development and use of cost-effective computer networks require information about system behavior given a variety of network structures and operational policies.  Because computer networks are complex systems whose behavior is generally not intuitively understood, there is a need for system analysis tools to provide a wide range of performance information.
</description>
<dc:date>1979-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149494">
<title>Robust Concurrency Control for a Distriuted Information System</title>
<link>https://hdl.handle.net/1721.1/149494</link>
<description>Robust Concurrency Control for a Distriuted Information System
Montgomery, Warren A.
</description>
<dc:date>1978-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149493">
<title>Naming and Synchornization in a Decentralized Computer System</title>
<link>https://hdl.handle.net/1721.1/149493</link>
<description>Naming and Synchornization in a Decentralized Computer System
Reed, David Patrick
In this dissertation a new approach to the synchronization of accesses to shared data objects is developed.  Traditional approaches to the synchronization problems of shared data accessed by concurrently running computations have relied on mutual exclusion--the ability of one computation to stop the execution of other computations that might access or change shared data accessed by that computation.
</description>
<dc:date>1978-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149492">
<title>Real-time Control Structures for Block Diagram Schemata</title>
<link>https://hdl.handle.net/1721.1/149492</link>
<description>Real-time Control Structures for Block Diagram Schemata
Teixeira, Thomas Joseph
Block diagram schemata model computation systems in the context of an external environment.  The environment imposes various constraints on the real-time performance of any implementation of a block diagram schema.  The model is used to provide precise definitions of real-time performance. The portion of the implementation that affects the real-time performance is called the control structure.
</description>
<dc:date>1978-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149491">
<title>Synthesis of Synchronization Code for Data Abstractions</title>
<link>https://hdl.handle.net/1721.1/149491</link>
<description>Synthesis of Synchronization Code for Data Abstractions
Laventhal, Mark Steven
Synchronization code is necessary to control shared access of an abstract data object in a parallel-processing environment.  This thesis explores an approach in which a synchronization property can be specified in a high-level nonprocedural language, and an implementation for the specified property can be synthesized algorithmically.
</description>
<dc:date>1978-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149490">
<title>A Formalization of the State Machine Specification Technique</title>
<link>https://hdl.handle.net/1721.1/149490</link>
<description>A Formalization of the State Machine Specification Technique
Principato, Robert N., Jr.
This thesis develops the state machine specification technique, a formal specification technique for data abstractions based on Parnas' work on specifying software modules.
</description>
<dc:date>1978-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149489">
<title>A Denotational Semantics of CLU</title>
<link>https://hdl.handle.net/1721.1/149489</link>
<description>A Denotational Semantics of CLU
Scheifler, Robert W.
A denotational semantics of CLU, an object-oriented language supporting data abstractions, is presented.  The definition is based on Scott's lattice-theoretic approach to the theory of computation.  Modules, the basic unit of compilation, are represented in terms of a set of recursively defined domains called the abstract syntax.
</description>
<dc:date>1978-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149488">
<title>Logics of Programs: Axiomatics and Descriptive Power</title>
<link>https://hdl.handle.net/1721.1/149488</link>
<description>Logics of Programs: Axiomatics and Descriptive Power
Harel, David
This thesis is concerned with the development of mathematical tools for reasoning about computer programs.  The approach is to design and investigate the properties of various dynamic logics  with an emphasis on useful expressive power and adequate proof theory.
</description>
<dc:date>1978-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149487">
<title>The Specification of Code Generation Algorithms</title>
<link>https://hdl.handle.net/1721.1/149487</link>
<description>The Specification of Code Generation Algorithms
Terman, Christopher J.
This thesis addresses the problem of automatically constructing the code generation phrase of a compiler from a specification of the source language and target machine.  A framework for such a specification is presented in which information about language and machine dependent semantics in incorporated as a set of transformation on an internal representation of the source language program.
</description>
<dc:date>1978-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149486">
<title>Actor Systems for Real-time Computation</title>
<link>https://hdl.handle.net/1721.1/149486</link>
<description>Actor Systems for Real-time Computation
Baker, Henry Givens, Jr.
Actor theory was invented by Hewitt and collaborators as a synthesis of many of the ideas from the high-level languages LISP, GEDANKEN, SMALLTALK, SIMULA-67, and others.  Actor theory consists of a group of active objects called Actors, which communicate by passing messages to one another.
</description>
<dc:date>1978-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149485">
<title>Final Report of the Multics Kernal Design Project</title>
<link>https://hdl.handle.net/1721.1/149485</link>
<description>Final Report of the Multics Kernal Design Project
Schroeder, Michael D.; Clark, David D; Saltzer, Jerome H.; Wells, D.H.
We describe a plan to create an auditable version of Multics.  The engineering experiments of that plan are now complete.  Type extension as a design discipline has been demonstrated feasible, even for the internal workings of an operating system, where many subtle intermodule dependencies were discovered and controlled.
</description>
<dc:date>1978-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149484">
<title>On Time-space Classes and Their Relation to the Theory of Real Addition</title>
<link>https://hdl.handle.net/1721.1/149484</link>
<description>On Time-space Classes and Their Relation to the Theory of Real Addition
Bruss, Anna R.
A new lower bound on the computational complexity of the theory of real addition and several related theories is established: any decision procedure for these theories requires either space n2 or nondeterministic time 2en2 for some constant E&gt; 0 and infinitely many n.
</description>
<dc:date>1978-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149483">
<title>Actors and Continuous Functionals</title>
<link>https://hdl.handle.net/1721.1/149483</link>
<description>Actors and Continuous Functionals
Hewitt, Carl; Baker, Henry Givens, Jr.
This paper presents precise versions of some "laws" that must be satisfied by computations involving communicating parallel processes.  The laws take the form of stating plausible restrictions on the histories of computations that are physically realizable .
</description>
<dc:date>1978-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149482">
<title>Attribute Partitioning in a Self-adaptive Relational Data Base Systems</title>
<link>https://hdl.handle.net/1721.1/149482</link>
<description>Attribute Partitioning in a Self-adaptive Relational Data Base Systems
Niamir, Bahram
One technique that is sometimes employed to enhance the performance of a data base management system is known as attribute partitioning.  This is the process of dividing the attributes of a file into subfiles that are stored separately.  By storing together those attributes that are frequently requested together by transactions, and by separating those that are not, attribute partitioning can reduce the number of pages that must be transferred from secondary  storage to primary memory in order to process a transaction.
</description>
<dc:date>1978-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149481">
<title>Specifications and Verification Techniques for Parallel Programs Based on Message Passing Semantics</title>
<link>https://hdl.handle.net/1721.1/149481</link>
<description>Specifications and Verification Techniques for Parallel Programs Based on Message Passing Semantics
Yonezawa, Akinori
This thesis presents formal specification and verification techniques for both serial and parallel programs written in SIMULA-like object oriented languages.  These techniques are based on the notion of states of individual objects which are defined uniformly in serial and parallel computations. They can specify and verify the behavior of data and procedural objects in multi-process environments, thus overcoming some of the difficulties in dealing with parallelism which characterized previous work on formal specifications for abstract data types.
</description>
<dc:date>1978-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149480">
<title>Abstract Data Types in Stack Based Languages</title>
<link>https://hdl.handle.net/1721.1/149480</link>
<description>Abstract Data Types in Stack Based Languages
Moss, J. Eliot B.
Abstract data types are the basis of an emerging methodology of computer programming.  The only existing languages supporting abstract data types directly, CLU and Simula, both require compacting garbage collection, and thus they are not suitable for many applications. This thesis presents the design of a new language incorporating abstract data types; the language requires only a run-time stack, and not garbage collection.
</description>
<dc:date>1978-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149479">
<title>Formal Specifications for Packet Communication Systems</title>
<link>https://hdl.handle.net/1721.1/149479</link>
<description>Formal Specifications for Packet Communication Systems
Ellis, David J.
One of the most difficult tasks facing computer scientists is that of designing systems and making sure that they perform their intended functions correctly.  As computer systems have grown in size and complexity, the problems of system design and verification have become increasingly acute.
</description>
<dc:date>1977-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149478">
<title>Simulation of Packet Communication Architecture Computer Systems</title>
<link>https://hdl.handle.net/1721.1/149478</link>
<description>Simulation of Packet Communication Architecture Computer Systems
Bryant, Randal R.
Simulations of computer systems have traditionally been performed on a single sequential computer, even if the system to be simulated contains a number of components which operate concurrently.
</description>
<dc:date>1977-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149477">
<title>A Structure Memory for Data Flow Computers</title>
<link>https://hdl.handle.net/1721.1/149477</link>
<description>A Structure Memory for Data Flow Computers
Ackerman, William B.
A data flow computer is one which achieves enormous concurrency of instruction execution through a machine architecture that acts directly on a data dependency graph of the program.
</description>
<dc:date>1977-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149476">
<title>Deadlock Detection in Computer Networks</title>
<link>https://hdl.handle.net/1721.1/149476</link>
<description>Deadlock Detection in Computer Networks
Goldman, Barry
The problem of detecting process deadlocks is common to transaction oriented computer systems which allow data sharing. Several good algorithms exist for detecting  process deadlocks in a single location facility. However, the deadlock detection problem becomes more complex in a geographically distributed  computer network due to the fact that all the information needed to detect a deadlock is not necessarily available in a single node, and communications delays may lead to synchronization problems in getting an accurate view of the network state.
</description>
<dc:date>1977-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149475">
<title>Facilitating Interprocess Communication in a Heterogeneous Network Environment</title>
<link>https://hdl.handle.net/1721.1/149475</link>
<description>Facilitating Interprocess Communication in a Heterogeneous Network Environment
Levine, Paul H.
Passing information among processors with different internal data formatting schemes has proven to be a major complication to computer networking efforts.  Data format translation is necessary to support information exchange in a heterogeneous network environment. Three strategies for performing this translation for communications between a message sender translation by an intermediate translator, and the use of a standard intermediate format.
</description>
<dc:date>1977-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149474">
<title>A Framework for Processing Dialogue</title>
<link>https://hdl.handle.net/1721.1/149474</link>
<description>A Framework for Processing Dialogue
Brown, Gretchen P.
This report describes a framework for handling mixed-initiative English dialogue in a console session environment, with emphasis on recognition.  Within this framework, both linguistic and non-linguistic activities are modelled by structures called methods, which are a declarative form of procedural knowledge. Our design focus on units of linguistic activity larger than the speech act, so that the pragmatic and semantic context of an utterance can be used to guide its interpretation. also important is the treatment of indirect speech acts,e.g., the different ways to ask a question, give a command, etc.
</description>
<dc:date>1977-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149473">
<title>The Complexity of the Finite Containment Problem for Petri Nets</title>
<link>https://hdl.handle.net/1721.1/149473</link>
<description>The Complexity of the Finite Containment Problem for Petri Nets
Mayr, Ernst Wilhelm
If the reachability set of a Petri net (or, equivalently, vector addition system) is finite it can be effectively constructed.  Furthermore, the finiteness is decidable.  Thus, the containment and equality problem for finite reachability sets become solvable. We investigate the complexity of decision procedures for these problems and show by reducing a bounded version of Hilbert's Tenth Problem to the finite containment problem that these two problems are extremely hard, that, in fact, the complexity of each decision procedure exceeds any primitive recursive function infinitely often.
</description>
<dc:date>1977-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149472">
<title>A Simple and Flexible System Initialization Mechanism</title>
<link>https://hdl.handle.net/1721.1/149472</link>
<description>A Simple and Flexible System Initialization Mechanism
Luniewski, Allen W.
This thesis presents an approach to system initialization which is simple and easy to understand and, at the same time, is versatile in the face of configuration changes.  This thesis considers initialization of a layered system.  The initialization mechanism is built upon three key concepts: existence of a minimal configuration, a core image of the system and dynamic reconfiguration.
</description>
<dc:date>1977-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149471">
<title>Non-discretionary Access Control for Decentralized Computing Systems</title>
<link>https://hdl.handle.net/1721.1/149471</link>
<description>Non-discretionary Access Control for Decentralized Computing Systems
Karger, Paul A.
This thesis examines the issues relating to non-discretionary access controls for decentralized computing systems.  Decentralization changes the basic character of a computing system from a set of processes referencing a data base to a set of processes sending and receiving messages. Because massages must be acknowledge, operations that were read-only in a centralized system become read-write operations.
</description>
<dc:date>1977-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149470">
<title>A Layered Virtual Memory Manager</title>
<link>https://hdl.handle.net/1721.1/149470</link>
<description>A Layered Virtual Memory Manager
Mason, Andrew Halstead
This thesis presents a specification for the Multics virtual memory manager.  The virtual memory manager is that part of the operating system which coordinates the usage of physical memory and which manages the bindings between logical memory and physical memory. In the case of Multics, physical memory is composed of fixed-length blocks called frames and logical memory consists of segments, representing sets of frames.
</description>
<dc:date>1977-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149469">
<title>A Digitalis Therapy Advisor with Explanations</title>
<link>https://hdl.handle.net/1721.1/149469</link>
<description>A Digitalis Therapy Advisor with Explanations
Swartout, William R.
This thesis describes the English explanation facility of the OWL Digitalis Advisor, a program designed to advise physicians regarding digitalis therapy.  The program is written in OWL, an English-based computer language being developed at MIT.  The system can explain, in English, both the methods it uses and how those methods were applied during a particular session. In addition, the program can explain how it acquires information and tell the user how it deals with that information either in general or during a particular session.
</description>
<dc:date>1977-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149468">
<title>A Robust Environment for Program Development</title>
<link>https://hdl.handle.net/1721.1/149468</link>
<description>A Robust Environment for Program Development
Goldberg, Harold J.
This thesis examines the problems of debugging and preservation of the user programming environment and proposes a scheme by which the program development environment can be protected.  Typically, designers of timeshared or multiprogrammed computer systems only consider inter-user interference as a source of problems and do not worry about what users do in their own environments. Thus, users can, by writing incorrect programs, cause destruction of the programming environment and personal data bases.
</description>
<dc:date>1977-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149467">
<title>A Case Study of Intermodule Dependencies in a Virtual Memory Subsystem</title>
<link>https://hdl.handle.net/1721.1/149467</link>
<description>A Case Study of Intermodule Dependencies in a Virtual Memory Subsystem
Hunt, Douglas H.
A problem currently confronting computer scientists is to develop a method for the production of large software systems that are easy to understand and certify.  The most promising methods involve decomposing a system into small modules in such a way that there are few intermodule dependencies.
</description>
<dc:date>1976-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149466">
<title>Coordination of Parallel Processes in the Actor Model of Computation</title>
<link>https://hdl.handle.net/1721.1/149466</link>
<description>Coordination of Parallel Processes in the Actor Model of Computation
Goodman, Nathan
Two algorithms for the mutual exclusion problem are described and proven to operate correctly.  The algorithms are unique in that they use very simple synchronization primitives yet are fair and retain their fairness even if the number of parallel processes in the computer system increases unboundedly over time. One of the algorithms uses simple cells of read/write storage as the primitive; the algorithm is similar to the classic algorithms for this problem proposed by Dijkstra and Knuth, but is generalized to handle an arbitrary number of processes.
</description>
<dc:date>1976-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149465">
<title>A Multi-process Design of Paging System</title>
<link>https://hdl.handle.net/1721.1/149465</link>
<description>A Multi-process Design of Paging System
Huber, Andrew R.
This thesis presents a design for a paging system that may be used to implement a virtual memory on a large scale, demand paged computer utility.  A model for such a computer system with a multi-level, hierarchical memory system is presented.  The functional requirements of a paging system for such a model are discussed, with emphasis on the parallelism inherent in the algorithms used to implement the memory management functions.
</description>
<dc:date>1976-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149464">
<title>The Logic of Systems</title>
<link>https://hdl.handle.net/1721.1/149464</link>
<description>The Logic of Systems
Furtek, Frederick Curtis
We present a theory about the logical relationships associated with system behavior.  The rules governing the behavior of a system are expressed by a Petri net.  A set of assumptions about the modeling of a system permit us to separate system behavior into two components, what we refer to as information and control.
</description>
<dc:date>1976-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149463">
<title>Diagnostic Planning and Cancer Management</title>
<link>https://hdl.handle.net/1721.1/149463</link>
<description>Diagnostic Planning and Cancer Management
Safran, Charles; Desforges, Jane F.; Tsichlis, Philip N.
This report describes a computer system for evaluating patients with Hodgkin's disease which has been developed by Clinical Decision Making Group (CDMG) at MIT Laboratory for Computer Science in conjunction with the Blood Research Laboratory of the New England Medical Center Hospitals and Department of Hematology, Tufts University School of Medicine (T-NEMC.H.). This system uses decision theoretic techniques to aid in the formulation of a diagnostic plan for cancer patient.
</description>
<dc:date>1976-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149462">
<title>Semantical Considerations on Floyd-Hoare Logic</title>
<link>https://hdl.handle.net/1721.1/149462</link>
<description>Semantical Considerations on Floyd-Hoare Logic
Pratt, Vaughan R.
This paper deals with logics of programs.  The objective is to formalize a notion of program description and to give both plausible (semantic) and effective (syntactic) criteria for the notion of truth of a description.  A novel feature of this treatment is the development of the mathematics underlying Floyed-Hoare axiom systems independently of such systems. Our directions that such research might take are also considered.
</description>
<dc:date>1976-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149461">
<title>Using Type Extension to Organize Virtual Memory Mechanisms</title>
<link>https://hdl.handle.net/1721.1/149461</link>
<description>Using Type Extension to Organize Virtual Memory Mechanisms
Janson, Philippe Arnaud
Much effort is currently being devoted to producing systems that are easy to understand, to verify and to develop.  The general methodology for designing such a system consists of decomposing it into a structured set of modules so that the modules can be understood, verified and developed individually, and so that the understanding/ verification of the system can be derived from the understanding/ verification of its modules. while many of the mechanisms in a computer system have been decomposed successfully into a structured set of modules, no technique has been proposed to organize the virtual memory mechanism of a system in such a way.
</description>
<dc:date>1976-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149460">
<title>Index Selection in a Self-Adaptive Relational Data Base Management System</title>
<link>https://hdl.handle.net/1721.1/149460</link>
<description>Index Selection in a Self-Adaptive Relational Data Base Management System
Chan, Arvola Y.
The development of large integrated data bases that support a variety of applications in an enterprise promises to be one of the most important data processing activities of the next decade.  The effective utilization o such data bases depends on the ability of data base management systems to cope with the evolution of data base applications.
</description>
<dc:date>1976-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149459">
<title>High Level Expression of Semantic Integrity Specifications in a Relational Data Base System</title>
<link>https://hdl.handle.net/1721.1/149459</link>
<description>High Level Expression of Semantic Integrity Specifications in a Relational Data Base System
McLeod, Dennis J.
The "semantic integrity" of a data base is said to be violated when the data base ceases to represent a legitimate configuration of the application environment it is intended to model.  In the context of the relational data model, it is possible to identify multiple levels of semantic integrity information: (1) the description of the domains of the data base, as abstract sets of atomic data values (domain definition), (2) the specification of the fundamental structure of the data (relation structure specification), (3) the definition of the abstract operations which are meaningful in terms of the application environment (structured operations), and (4) the expression of additional semantic information not contained in the structure of the relations nor in the identities of their underlying domains  (relation constraints).
</description>
<dc:date>1976-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149458">
<title>Processor Multiplexing in a Layered Operating Systems</title>
<link>https://hdl.handle.net/1721.1/149458</link>
<description>Processor Multiplexing in a Layered Operating Systems
Reed, David Patrick
This thesis presents a simply structured design for the implementation of process in a kernel-structured operating system.  The design provides a minimal mechanism for the support of two distinct classes of processes found in the computer  system -- those which are part of kernel operating system itself, and those used to execute user-specified computations.
</description>
<dc:date>1976-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149457">
<title>A Secure and Flexible Model of Process Initiation for a Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149457</link>
<description>A Secure and Flexible Model of Process Initiation for a Computer Utility
Montgomery, Warren Alan
This thesis demonstrates that the amount of protected, privileged code related to process initiation in a computer utility can be greatly reduced by making process creation unprivileged.  The creation of processes can be controlled by the standard mechanism for controlling entry to a domain, which forces a new process to begin execution at a controlled location.
</description>
<dc:date>1976-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149456">
<title>Encryption-based Protection Protocols for Interactive User-computer Communication</title>
<link>https://hdl.handle.net/1721.1/149456</link>
<description>Encryption-based Protection Protocols for Interactive User-computer Communication
Kent, Stephen T.
This thesis develops a complete set of protocols, which utilize a block cipher, e.g., the NBS data encryption standard, for protection interactive user-computer communication over physically unsecured channels.  The use of the block cipher protects against disclosure of message contents to an intruder, and the protocols provide for the detection of message stream modification and dental of message service by an intruder.
</description>
<dc:date>1976-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149455">
<title>Decidability Questions for Petri Nets</title>
<link>https://hdl.handle.net/1721.1/149455</link>
<description>Decidability Questions for Petri Nets
Hack, Michel Henri Théodore
An understanding of the mathematical properties of Petri Nets is essential when one wishes to use Petri Nets as an abstract model for concurrent systems.  The decidability of various problems which arise in this context is an important aspect of this question. The fact that these problems also arise in the context of other mathematical theories, such as commutative, closure under linear relations,  Matrix Context-Free grammars, or Weak Counter Automata, provides further motivation.
</description>
<dc:date>1976-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149454">
<title>A Program for the Design of Procurement Systems</title>
<link>https://hdl.handle.net/1721.1/149454</link>
<description>A Program for the Design of Procurement Systems
Bosyj, Michael
Computer technology has had a limited success in producing useful business applications.  Management systems seldom meet users' requirements, are often inappropriate to an application, and are frequently abandoned.  But why?  Business lacks expertise in the application of computers .
</description>
<dc:date>1976-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149453">
<title>Petri Net Language</title>
<link>https://hdl.handle.net/1721.1/149453</link>
<description>Petri Net Language
Hack, Michel Henri Théodore
In a labeled Petri Net we assign symbols from an alphabet to some or all the transitions of a Petri Net.  To each firing sequence of such a Labeled Petri Net corresponds to a string over the alphabet.  We study the languages obtained in this way by all firing sequences of a Petri Net, or by all firing sequences which reach a given final marking.
</description>
<dc:date>1976-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149452">
<title>Some Data Base Applications of Constraint Expressions</title>
<link>https://hdl.handle.net/1721.1/149452</link>
<description>Some Data Base Applications of Constraint Expressions
Grossman, Richard Weaver
This report presents a novel network-like representation for information, called "constraint expressions" (CE).  CE makes use of some of the knowledge-representation techniques developed by Artificial Intelligence research.
</description>
<dc:date>1976-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149451">
<title>A Preliminary Study in Computer-aided Legal Analysis</title>
<link>https://hdl.handle.net/1721.1/149451</link>
<description>A Preliminary Study in Computer-aided Legal Analysis
Meldman, Jeffrey A.
This paper describes the prototype for a computer system that can perform a simple kind of legal analysis.  The system user, who is presumed to be a lawyer, describes to the system a hypothetical set of facts.  The system determines the extent to which these facts fall within certain legal doctrines (by syllogism), or near to these doctrines  (by analogy).
</description>
<dc:date>1975-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149450">
<title>Minimizing the Naming Facilities Requiring Protection in a Computing Utility</title>
<link>https://hdl.handle.net/1721.1/149450</link>
<description>Minimizing the Naming Facilities Requiring Protection in a Computing Utility
Bratt, Richard Glenn
This thesis examines the various mechanisms for naming the information objects stored in a general-purpose computing utility, and isolates a basic set of naming facilities that must be protected to assure complete control over user interaction and that allow desired interactions among users to occur in a natural way. Minimizing the protected naming facilities consistent with functional objective of controlled, but natural, user interaction contribute to defining a security kernel for a general-purpose computing utility.
</description>
<dc:date>1975-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149449">
<title>Mechanization of Temporal Knowledge</title>
<link>https://hdl.handle.net/1721.1/149449</link>
<description>Mechanization of Temporal Knowledge
Kahn, Kenneth M.
The design and implementation of a collection of computer programs knowledgeable about time "in general," called the time specialist, is described.  The thesis that this time specialist can be placed in the service of larger more general problem solvers is demonstrated for two examples, medical diagnosis and the understanding of a time-travel story.
</description>
<dc:date>1975-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149448">
<title>Semantic of Communication Parallel Processes</title>
<link>https://hdl.handle.net/1721.1/149448</link>
<description>Semantic of Communication Parallel Processes
Greif, Irene Gloria
The thesis of this dissertation is that an understanding of the ordering constraints that are introduced among events of parallel process is essential to the understanding of synchronization and that therefore any language for specifying synchronization of parallel processes should be based on a theory of such orderings. While it is possible to write specifications for systems communicating parallel processes by reference to the time ordering of some global clock external to the system, such specifications cannot be as useful as ones which are in terms of orderings derivable within the system.
</description>
<dc:date>1975-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149447">
<title>Strategy Selection in Medical Diagnosis</title>
<link>https://hdl.handle.net/1721.1/149447</link>
<description>Strategy Selection in Medical Diagnosis
Miller, Peter B.
The recorded, verbal problem-solving behavior of doctors performing the diagnostic task of taking a present illness was analyzed in this research.  The goal of the analysis was to discover that data-acquisition strategies were used by the doctors to accomplish the task. A model called the strategy frame model was created to describe the strategies that were found and to provide a mechanism for the selection of a strategy.
</description>
<dc:date>1975-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149446">
<title>Equivalence Problems for Monadic Schemas</title>
<link>https://hdl.handle.net/1721.1/149446</link>
<description>Equivalence Problems for Monadic Schemas
Qualitz, Joseph E.
A class of monadic program schemas is defined.  This class, called iteration schemas, consists of schemas whose programs comprise assignment statements, conditional statements, and iteration statements.  These schemas are shown to correspond to program schemas which are structured, and are shown to be strictly less "powerful" than monadic program schemas.
</description>
<dc:date>1975-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149445">
<title>Automatic Test, Configuration and Repair of Cellular Arrays</title>
<link>https://hdl.handle.net/1721.1/149445</link>
<description>Automatic Test, Configuration and Repair of Cellular Arrays
Manning, Frank B.
A cellular array is an iterative array of identical information processing machines, cells.  The arrays discussed are rectangular arrays of programmable logic, in which information stored in a working cell tells the cell how to behave.  No signal line connects more than a few cells. A loading mechanism in each cell allows a computer directly connected to one cell to load any good cell that is not walled off by flawed cells.
</description>
<dc:date>1975-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149444">
<title>A Portable Compiler for the Language C</title>
<link>https://hdl.handle.net/1721.1/149444</link>
<description>A Portable Compiler for the Language C
Snyder, Alan
This paper describes the implementation of a compiler for the language C.  The compiler has been designed to be able to be capable of producing assembly-language code for most register-oriented machines with only minor recoding.
</description>
<dc:date>1975-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149443">
<title>Program Restructuring for Virtual Memory Systems</title>
<link>https://hdl.handle.net/1721.1/149443</link>
<description>Program Restructuring for Virtual Memory Systems
Johnson, Jerry William
The problem area addressed in this report is program restructuring, a method of reordering the relocatable sectors of a program in its address space to increase the locality of the programs reference behavior, thereby reducing the number of page fetches require for execution in a virtual memory system.
</description>
<dc:date>1975-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149442">
<title>A Formalization and Correctness Proof of the CGOL Language System</title>
<link>https://hdl.handle.net/1721.1/149442</link>
<description>A Formalization and Correctness Proof of the CGOL Language System
VanDeVanter, Michael Lee
In many important ways the design and implementation of programming languages are hindered rather than helped by BNF.  We present an alternative meta-language based on the work of Pratt which retains much of the effective power of BNF but is more convenient for designer, implementer, and user alike. Its amenability to formal treatment is demonstrated by a rigorous correctness proof of a simple implementation.
</description>
<dc:date>1975-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149441">
<title>The Computational Complexity of Some Logical Theories</title>
<link>https://hdl.handle.net/1721.1/149441</link>
<description>The Computational Complexity of Some Logical Theories
Rackoff, Charles Weill
Upper and lower bounds on the inherent computational complexity of the decision problem for a number of logical theories are established.  A general form of Ehrenfeucht game technique for deciding theories is developed which involves analyzing the expressive power of formulas with given quantifier depth. The method allows one to decide the truth of sentences by limiting quantifiers to range over finite sets.
</description>
<dc:date>1975-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149440">
<title>A Digitalis Therapy Advisory</title>
<link>https://hdl.handle.net/1721.1/149440</link>
<description>A Digitalis Therapy Advisory
Silverman, Howard
The physician administering digitalis makes use of the full richness of the clinical setting to form his/her impressions and decide on a therapeutic program.  The weakness of existing programs which formulate digitalis dosage regimens lies in their inability to use all of the clinical data available-both quantitative. and qualitative. This report describes the construction of a computer system which formulates digitalis dosage regimens and which adjusts this regimen by interpreting the patient's response to the original dosage regimen.
</description>
<dc:date>1975-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149439">
<title>Some Problems in German in English Machine Translation</title>
<link>https://hdl.handle.net/1721.1/149439</link>
<description>Some Problems in German in English Machine Translation
Brown, Gretchen P.
This paper discusses some problems in the machine translation of natural language, in particular, for translation from German into English.  An implementation of some parts of the translating process has been built.  The system consists of a German interpretive grammar, to take in German text and output a set of semantic representation, and a generator, to produce English sentences from single semantic representations.
</description>
<dc:date>1974-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149438">
<title>Naming and Protection in Extendable Operating Systems</title>
<link>https://hdl.handle.net/1721.1/149438</link>
<description>Naming and Protection in Extendable Operating Systems
Redell, David D.
The properties of capability-based extendible operating systems are described, and various aspects of such systems are discussed, with emphasis on the conflict between free distribution of access privileges and later revocation of those privileges.
</description>
<dc:date>1974-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149437">
<title>Nondeterministic Time and Space Complexity Classes</title>
<link>https://hdl.handle.net/1721.1/149437</link>
<description>Nondeterministic Time and Space Complexity Classes
Seiferas, Joel Irvin
The marginal utility of the Turing machine computational resources running time and storage space are studied.  A technique is developed which, unlike diagonalization, applies equally well to nondeterministic and deterministic automata.  For f, g time or space bounding functions with f (n+1) small compared to g(n), it is shown that, in terms of word length n, there are languages which are accepted by Turing machines operating within time or space g(n) but which are accepted by no Turing machine operating within time or space f(n). The proof involves use of the recursion theorem together with "padding" or "translational" techniques of formal language theory.
</description>
<dc:date>1974-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149436">
<title>Functional Domains of Applicative Languages</title>
<link>https://hdl.handle.net/1721.1/149436</link>
<description>Functional Domains of Applicative Languages
Ward, Stephen A.
The expressive power of a particular applicative language may be characterized by the set of abstract functions directly representable in that language. The common FUNARG and applicative order problems are scrutinized in this way, and the effects of these weaknesses are related to the inexpressibility of classes of functions.
</description>
<dc:date>1974-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149435">
<title>Semantics of Data Structures and References</title>
<link>https://hdl.handle.net/1721.1/149435</link>
<description>Semantics of Data Structures and References
Ellis, David J.
Each programming language that handles data structures has its own set of rules for working with them.  Notions such as assignment and construction of structures values appear in a huge number of different and complicated versions.  This thesis presents a methodology which provides a common basis for describing ways in which programming languages deal with  data structures and reference to them.
</description>
<dc:date>1974-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149434">
<title>Removing the Dynamic Linker from the Security Kernel of a Computing Utility</title>
<link>https://hdl.handle.net/1721.1/149434</link>
<description>Removing the Dynamic Linker from the Security Kernel of a Computing Utility
Jason, Philippe Arnaud
In order to enforce the security of the information stored in a computing utility, it is necessary to certify that the protection mechanism is correctly implemented so that there exist no uncontrolled access path to the stored information.
</description>
<dc:date>1974-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149433">
<title>Mathematical Logic for Computer Scientists</title>
<link>https://hdl.handle.net/1721.1/149433</link>
<description>Mathematical Logic for Computer Scientists
Levin, Michael
This book is an introductory course in mathematical logic covering basic topics in quantification theory and recursive function theory, and is intended for the reader who is interested in artificial intelligence, computer linguistics, and other related areas. The text is theoretical, but organized with implementation in mind.
</description>
<dc:date>1974-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149432">
<title>Using Interactive Graphics in Simulating the Hospital Emergency Room</title>
<link>https://hdl.handle.net/1721.1/149432</link>
<description>Using Interactive Graphics in Simulating the Hospital Emergency Room
Weissberg, Richard W.
The hospital emergency room is a complex system having many interrelated factors contributing to its operation.  The emergency room administrator has limited control over certain of these factors: numbers of beds, nurses, doctors, x-ray units; for example. Other factors such as patient arrival rates and demands made upon available resources are largely uncontrollable.
</description>
<dc:date>1974-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149431">
<title>The Computer Utility as a Marketplace for Computer Service</title>
<link>https://hdl.handle.net/1721.1/149431</link>
<description>The Computer Utility as a Marketplace for Computer Service
Frankston, Robert Mm.
Computers are unique in their ability to be programmed for a wide variety of applications.  This is in contrast with hardware dedicated to specific tasks such as the telephone system.  Because of its flexibility, a computer system can support, concurrently, many diverse services that do not require dedicated hardware.
</description>
<dc:date>1974-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149430">
<title>An Experimental Analysis of Program Reference Patterns in the Multics Virtual Memory</title>
<link>https://hdl.handle.net/1721.1/149430</link>
<description>An Experimental Analysis of Program Reference Patterns in the Multics Virtual Memory
Greenberg, Bernard Stewart
This thesis reports the design, conducting, and results of an experiment intended to measure the paging rate of a virtual memory computer system as a function of paging memory size.  This experiment, conducted on the Multics computer system at MIT, a large interactive computer utility serving an academic community, sought to predict paging rates for paging memory sizes larger than existing memory at the time.
</description>
<dc:date>1974-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149429">
<title>A Model-debugging System</title>
<link>https://hdl.handle.net/1721.1/149429</link>
<description>A Model-debugging System
Mark, William S.
</description>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149428">
<title>Verification of Programs Operating on Structured Data</title>
<link>https://hdl.handle.net/1721.1/149428</link>
<description>Verification of Programs Operating on Structured Data
Laventhal, Mark Steven
The major method for verifying the correctness of computer program is the inductive assertion approach.  This approach has been limited in the past by the lack of techniques for handling data structures.  In particular, there has been a need for concepts with which to describe structured data during intermediate and final stages of a computation.
</description>
<dc:date>1974-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149427">
<title>Introduction to Multics</title>
<link>https://hdl.handle.net/1721.1/149427</link>
<description>Introduction to Multics
Saltzer, Jerome H.
The Multics project was begun in 1964 by the Computer Systems Research group of M.I.T. Project MAC.  The goal was to create a prototype of a computer utility.  In 1965, the project became a cooperative venture of M.I.T. Project MAC, the General Electric Company Computer Department (now Honeywell Information Systems Inc. ) and Bell Telephone  Laboratories. In 1969, at the end of the research phase of the project, Bell Telephone Laboratories ended its active involvement.
</description>
<dc:date>1974-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149426">
<title>On Lower Bounds for Selection Problems</title>
<link>https://hdl.handle.net/1721.1/149426</link>
<description>On Lower Bounds for Selection Problems
Yao, Foong Frances
Let V i (n) be the minimum number of binary comparisons that are required to determine the i-th largest of n elements drawn from a totally ordered set.  In this thesis we use adversary strategies to prove lower bounds on V i (n).  For i = 3, our lower bounds determine V 3(n) precisely for infinitely many values of n,and determine V 3(n) to within 2 for all n.
</description>
<dc:date>1974-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149425">
<title>Analysis of Asynchronous Concurrent Systems by Timed Petri Nets</title>
<link>https://hdl.handle.net/1721.1/149425</link>
<description>Analysis of Asynchronous Concurrent Systems by Timed Petri Nets
Ramchandani, Chander
This thesis is concerned with the modeling and performance analysis of systems which consist of concurrently acting components, an example of which is an asynchronous pipelined processor.  The work is divided into two parts.  In the first part, a suitable model is developed for describing the structure of asynchronous concurrent systems. In conventional automata theory, the finite-state machine model is used to describe the behavior of systems; the problem with this is that a large number of states results when practical systems are modelled.
</description>
<dc:date>1974-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149424">
<title>An Abstract Model of a Research Institute: Simple Automatic Programming Approach</title>
<link>https://hdl.handle.net/1721.1/149424</link>
<description>An Abstract Model of a Research Institute: Simple Automatic Programming Approach
Briabrin, Victor
A problem of knowledge representation is considered in terms of designing a model for a simple sociological structure.  A version of the access language is proposed which is based on three kind of expressions accepted by the system - constructors, specificators and requests. In addition, some topics concerned with model implementation and extension are discussed.
</description>
<dc:date>1974-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149423">
<title>An Input/Output Architecture for Virtual Memory Computer Systems</title>
<link>https://hdl.handle.net/1721.1/149423</link>
<description>An Input/Output Architecture for Virtual Memory Computer Systems
Clark, David D
In many large systems today, input/output is not performed directly by the user, but is done interpretively by the system for him, which causes additional overhead and also restricts the user to whatever algorithms the system has implemented.  Many causes contribute to this involvement of the system in user input/output, including the need to enforce protection requirements, the inability to provide adequate response to control signals from devices, and the difficulty of running devices in a virtual environment, especially a virtual memory.
</description>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149422">
<title>Backup and Recovery of On-line Information in a Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149422</link>
<description>Backup and Recovery of On-line Information in a Computer Utility
Stern, Jerry A.
This thesis describes a design for an automatic backup mechanism to be incorporated in a computer utility for the protection of on-line information against accidental or malicious destruction.  This protection is achieved by preserving on magnetic tape recent copies of all items of information known to the online system. In the event of a system failure, file system damage is automatically assessed and missing information is recovered from backup storage.
</description>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149421">
<title>Packet Communication</title>
<link>https://hdl.handle.net/1721.1/149421</link>
<description>Packet Communication
Metcalfe, Robert Melancton
This report develops a theory of packet communication; it analyzes users of computers in digital communication systems and examines structures for organizing computers in highly communicative environments.  Various examples from existing computer networks, including the ARPA Computer Network and the ALOHA System, are used to motivate and substantiate analysis of (1) store-and-forward packet communication, (2) broadcast packet communication, and (3) distributed interprocess communication.
</description>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149420">
<title>On Reducibility Among Combinatorial Problems</title>
<link>https://hdl.handle.net/1721.1/149420</link>
<description>On Reducibility Among Combinatorial Problems
Herrmann, Paul Peter
A large class of combinatorial problems have been shown by Cook and Karp to be computationally equivalent to within a polynomial.  We exhibit some new problems in this class, and provide simpler proofs for some of the known reductions.
</description>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149419">
<title>Productivity in Parallel Computational Schemata</title>
<link>https://hdl.handle.net/1721.1/149419</link>
<description>Productivity in Parallel Computational Schemata
Linderman, John P.
A general model for parallel computation is developed in three parts.  One part, the data flow graph, describes how actors which transform and test values are connected to the locations in a finite memory.  Another part, an interpretation, supplies information about the contents of memory and the detailed nature of the transformations and tests.
</description>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149418">
<title>Complexity Classes of Recursive Functions</title>
<link>https://hdl.handle.net/1721.1/149418</link>
<description>Complexity Classes of Recursive Functions
Moll, Robert
An honest function is one whose size honestly reflects its computation time.  In 1969 Meyer and McCreight proved the "honesty theorem," which says that for every t, the t-computable functions are the same as the t'computable functions for some honest honest t'.
</description>
<dc:date>1973-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149417">
<title>Storage Hierarchy Systems</title>
<link>https://hdl.handle.net/1721.1/149417</link>
<description>Storage Hierarchy Systems
Madnick, Stuart E.
The relationship between page size, program behavior, and page fetch frequency in storage hierarchy systems is formalized and analyzed.  It is proven that there exist cyclic program reference patterns that can cause page fetch frequency to increase significantly if the page used is decreased (e.g., reduced by half).
</description>
<dc:date>1973-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149416">
<title>The Emptiness and Complementation Problems for Automata on Infinite Trees</title>
<link>https://hdl.handle.net/1721.1/149416</link>
<description>The Emptiness and Complementation Problems for Automata on Infinite Trees
Rackoff, Charles Weill
In [6] Rabin defines Automata on Infinite Trees, and the body of that paper is concerned with proving two theorems about these automata.  The result we consider in the first chapter says that there exists an effective procedure to determine, given an automaton on infinite trees, whether or not it accepts anything at all. We present a new decision procedure which is much simpler than Rabin's since we do not use an induction argument as he does.
</description>
<dc:date>1973-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149415">
<title>An Analysis of Sorting Networks</title>
<link>https://hdl.handle.net/1721.1/149415</link>
<description>An Analysis of Sorting Networks
Smith, Burton J.
Comparators which sort two numbers can be interconnected to form networks which sort n numbers for any n.  The input and output characteristics of comparator networks are analyzed from several different points of view.
</description>
<dc:date>1972-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149414">
<title>Cooperation of Mutually Suspicious Subsystems in a Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149414</link>
<description>Cooperation of Mutually Suspicious Subsystems in a Computer Utility
Schroeder, Michael D.
This thesis describes practical protection mechanisms that allow mutually suspicious subsystems to cooperate in a single computation and still be protected from one another.  The mechanisms are based on the division of a computation into independent domains of access privilege, each of which may encapsulate a protected subsystem. The central component of the mechanisms is a hardware processor that automatically enforces the access constraints associated with a multidomain computation implemented as a single execution point in a segmented virtual memory.
</description>
<dc:date>1972-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149413">
<title>Finite Tree Automata and W-Automata</title>
<link>https://hdl.handle.net/1721.1/149413</link>
<description>Finite Tree Automata and W-Automata
Hossley, Robert
Chapter I is a survey of finite automata as acceptors of finite labeled trees.  Chapter II is a survey of finite automata as acceptors of infinite strings on a finite alphabet.  Among the automata models considered in Chapter II are those used by McNaughton, Buchi, and Landweber. In Chapter II we also consider several new automata models based on a notion of a run of a finite automataton on  an infinite string suggested by Professor A.R. Meyer in private communication. We show that these new models are all equivalent to various previously formulated models.
</description>
<dc:date>1972-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149412">
<title>On the Design and Specification of a Common Base Lanaguage</title>
<link>https://hdl.handle.net/1721.1/149412</link>
<description>On the Design and Specification of a Common Base Lanaguage
Dennis, Jack B.
This is the report on the work of the Computational Structures Group of Project MAC toward the design and specification of a common base language for programs and information structures.  We envision that the meanings of programs expressed in practical source languages will be defined by rules of translation into the base language.
</description>
<dc:date>1972-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149411">
<title>Further Results on Hierarchies of Canonic Systems</title>
<link>https://hdl.handle.net/1721.1/149411</link>
<description>Further Results on Hierarchies of Canonic Systems
Mandl, Robert
This thesis outlines a new way of presenting the theory of canonic systems, including a distinction (for mathodic reasons) between simple canonic systems and general canonic systems, and proves a series of results on hierarchies of canonic systems. After a brief summary of Doyle's results on a partial hierarchy of canonic systems, a new hierarchy is developed (Chapter II) which relates the general canonic systems not only to all 4 types of formal grammars defined by Chomsky but also to any class shown (Chapter III) that all attempts to define a mathematical system which exactly corresponds to the recursive sets are necessarily fruitless.
</description>
<dc:date>1972-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149410">
<title>Relativization of the Theory of Computational Complexity</title>
<link>https://hdl.handle.net/1721.1/149410</link>
<description>Relativization of the Theory of Computational Complexity
Lynch, Nancy A.
Blum's machine-independent treatment of the complexity of partial recursive functions is extended to relative algorithms (as represented by Turing machines with oracles).  We prove relativizations of several results of Blum complexity theory, such as the compression theorem. A recursive relatedness theorem is proved, showing that any two relative complexity measures are related by fixed recursive function. This theorem allows us to obtain proofs of results  for all measures from proofs for a particular measure.
</description>
<dc:date>1972-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149409">
<title>The Complexity of Finite Functions</title>
<link>https://hdl.handle.net/1721.1/149409</link>
<description>The Complexity of Finite Functions
Vilfan, Bostjan
Lower bounds on the length of formulas for finite functions are obtained from a generalization of a theorem  of Specker.  Let f: (0,1,...,d-1)    [0,1,...,d-1] be a function which can be represented by a formula of length  &lt; c.n. For any m, if n is sufficiently large, there is a restriction f': {0,1,...,d-1}m  &gt; {0,...,d-1} of f which, is representable by special class of formulas called homogeneous e-complexes.
</description>
<dc:date>1972-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149408">
<title>Autonomous, Synchronous Counters Constructed Only of J-K Flip-flops</title>
<link>https://hdl.handle.net/1721.1/149408</link>
<description>Autonomous, Synchronous Counters Constructed Only of J-K Flip-flops
Manning, Frank
This report describes research into some properties of autonomous, synchronous counters constructed with only the simplest form of J-K Flip-Flop.  The research revolved around a system with a special-purpose digital machine and a general-purpose computer. The special-purpose searched through all the possible counters constructed of five or fewer J-K Flip-Flops for all counters with a period equal to that specified by th input to the system.
</description>
<dc:date>1972-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149407">
<title>Essays in Algebraic Simplification</title>
<link>https://hdl.handle.net/1721.1/149407</link>
<description>Essays in Algebraic Simplification
Fateman, Richard J.
This thesis consists of essays on several aspects of the problem of algebraic simplification by computer.  Since simplification is at the core of most algebraic manipulations, efficient and effective simplification procedures are essential to building useful computer systems for non-numerical mathematics. Efficiency is attained through carefully designed and engineered algorithms, heuristics,and data types, while effectiveness is assured through theoretical considerations.
</description>
<dc:date>1972-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149406">
<title>Analysis of Production Schemata by Petri Nets</title>
<link>https://hdl.handle.net/1721.1/149406</link>
<description>Analysis of Production Schemata by Petri Nets
Hack, Michel Henri Théodore
Petri nets provide a powerful graphical tool for representing and analyzing complex concurrent systems.  Properties such as hang-up freeness, determinacy, conflict, concurrency and dependency, can be represented and studied.  The precise relationship between structural and behavioral properties, and between local and global properties is not well-understood for the most general class of Petri Nets.
</description>
<dc:date>1972-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149405">
<title>Induction in Proofs about Programs</title>
<link>https://hdl.handle.net/1721.1/149405</link>
<description>Induction in Proofs about Programs
Greif, Irene Gloria
Four methods for proving equivalence of programs by induction are described and compared.  They are recursion induction, structural induction, mu-rule induction, and truncation induction.  McCarthy's formalism for conditional expressions as function definitions is used and reinterpreted in view of Park's work on results on results in lattice theory as related to proofs about programs. The possible application of this work to automatic program verification is commented upon.
</description>
<dc:date>1972-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149404">
<title>Evaluation of Definite Integrals by Symbolic Manipulation</title>
<link>https://hdl.handle.net/1721.1/149404</link>
<description>Evaluation of Definite Integrals by Symbolic Manipulation
Wang, Paul S.
A heuristic computer program for the evaluation of real definite integrals of elementary functions is described.  This program, called WANDERER (WANg's DEfinite integRal EvaluatoR), evaluates many proper and improper integrals.  The improper integrals may have a finite or infinite range of integration. Evaluation by contour integration and residue theory is among the methods used. A program called DELIMITER (DEfinitive LIMITEvaluatoR) is used for the limit computations needed in evaluating some definite integrals.
</description>
<dc:date>1971-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149403">
<title>Cost Analysis of Debugging Systems</title>
<link>https://hdl.handle.net/1721.1/149403</link>
<description>Cost Analysis of Debugging Systems
Lester, Bruce P.
A general method is presented for performing cost analysis of interactive debugging systems.  The method is based on an abstract model of program execution.  This model is derived from the interpreter used in the Vienna method of semantic definition of PL/I. A brief discussion of the overall operation and significance of Vienna interpreter is included.
</description>
<dc:date>1971-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149402">
<title>Primary Access Control in Large-scale Time-shared Decision Systems</title>
<link>https://hdl.handle.net/1721.1/149402</link>
<description>Primary Access Control in Large-scale Time-shared Decision Systems
Owens, Richard C., Jr.
The computer differs from other tools in that it presently does not provide its users with a working environment transparent to their desires; in particular, current computer systems do not support adequate mechanisms for controlled sharing of sensitive information. Four primary dimensions of the access control problem are identified.  They are: 1) the physical level at which to apply control; 2) the fineness of distinction applied to the term ""access"" 3) the meaning of the term "user identification",and 4) the degree of sophistication employed in automatically assigned restrictions to new data files.
</description>
<dc:date>1971-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149401">
<title>Bounds on Information Retrieval Efficiency in Static File Structures</title>
<link>https://hdl.handle.net/1721.1/149401</link>
<description>Bounds on Information Retrieval Efficiency in Static File Structures
Welch, Terry A.
This research addresses the problem of file organization for efficient information retrieval when each file item may be accessed through any one of a large number of identification keys.  The emphasis is on library problems, namely large, low-update, directory-oriented files, but other types of files are discussed.
</description>
<dc:date>1971-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149400">
<title>Dynamic Reconfiguration in a Modular Computer System</title>
<link>https://hdl.handle.net/1721.1/149400</link>
<description>Dynamic Reconfiguration in a Modular Computer System
Schell, Roger R.
This thesis presents an orderly design approach for dynamically changing the configuration of constituent physical units in a modular computer system.  Dynamic reconfiguration contributes to high system availability by allowing preventative maintenance, development of new operating systems, and changes in system capacity on a non-interference basis.
</description>
<dc:date>1971-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149399">
<title>Automatic Creation of a Code Generator from a Machine Description</title>
<link>https://hdl.handle.net/1721.1/149399</link>
<description>Automatic Creation of a Code Generator from a Machine Description
Miller, Perry L.
This paper studies some of the problems involved in attaining machine independence for a code generator, similar to the language independence and the token independence attained by automatic parsing and automatic lexical systems.  In particular, the paper examines the logic involved in two areas of code generation: computation and data reference.
</description>
<dc:date>1971-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149398">
<title>Computer Analysis of Visual Properties of Curved Objects</title>
<link>https://hdl.handle.net/1721.1/149398</link>
<description>Computer Analysis of Visual Properties of Curved Objects
Krakauer, Lawrence J.
A  method is presented for the visual analysis of objects by computer.  It is particularly well suited for opaque objects with smoothly curved surfaces.  The method extracts information about the object's surface properties, including measures of its specularity, texture, and regularity. It also aids in determining the object's shape.
</description>
<dc:date>1971-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149397">
<title>Information Processing and Transmission in Cellular Automata</title>
<link>https://hdl.handle.net/1721.1/149397</link>
<description>Information Processing and Transmission in Cellular Automata
Banks, Edwin R.
A cellular automaton is an iterative array of very simple identical information processing machines called cells.  Each cell can communicate with neighboring cells.  At discrete moments of time the cells can change from one state to another as a function of the states of the cell and its neighbors. Thus on a global basis, the collection of cells is characterized by some type of behavior.
</description>
<dc:date>1971-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149396">
<title>Shape from Shading: A Method for Obtaining the Shape of a Smooth Opaque Object From One View</title>
<link>https://hdl.handle.net/1721.1/149396</link>
<description>Shape from Shading: A Method for Obtaining the Shape of a Smooth Opaque Object From One View
Horn, Berthold K. P.
A method will be described for finding the shape of a smooth opaque object from a monocular image, given a knowledge of the surface photometry, the position of the light-source and certain auxiliary information to resolve ambiguities.  This method is complementary to the use of stereoscopy which relies on matching up sharp detail and will fail on smooth objects. Until now the image processing of a single views has been restricted to objects which can meaningfully be considered two-dimensional or bounded by plane surfaces.
</description>
<dc:date>1970-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149395">
<title>Design Strategies for File Systems</title>
<link>https://hdl.handle.net/1721.1/149395</link>
<description>Design Strategies for File Systems
Madnick, S.E.
This thesis describes a methodology for the analysis and synthesis of modern general purpose file systems.  The two basic concepts developed are (1) establishment of a uniform representation of a file's structure in the form of virtual memory or segmentation and (2) determination of a hierarchy of logical transformations within a file system.
</description>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149394">
<title>Complexity Measures for Language Recognition by Canonic Systems</title>
<link>https://hdl.handle.net/1721.1/149394</link>
<description>Complexity Measures for Language Recognition by Canonic Systems
Haggerty, Joseph P.
A canonic system C is a specification of a recursively enumerable set, such as a set of strings over a finite alphabet.  From this description C, it is possible to generate a system C , called a proof measure function, which is an indication of the complexity of the language defined. For certain simple but important classes of canonic system, algebraic bounds on these functions can be derived from the structure of the system.
</description>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149393">
<title>Deadlock-free Sharing of Resources in Asynchornous Systems</title>
<link>https://hdl.handle.net/1721.1/149393</link>
<description>Deadlock-free Sharing of Resources in Asynchornous Systems
Hebalkar, Prakash G.
Whenever resources are shared among several activities that hoard resources, the activities can attain a state of deadlock in which, for lack of resources, none of the activities can proceed.  Deadlocks can be prevented by coordination of the sharing. efficient running of the activities under such coordination requires knowledge of the patterns of use of resources by the activities.
</description>
<dc:date>1970-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149392">
<title>Integral Convex Polyhedra and an Approach to Integralization</title>
<link>https://hdl.handle.net/1721.1/149392</link>
<description>Integral Convex Polyhedra and an Approach to Integralization
Edelberg, Murray
Many combinatorial optimization problems may be formulated as integer linear programming problems - that is, problems of the form: given a convex polyhedron P contained in the non-negative orthant of n-dimensional space, find a integer point in P which maximizes (or minimizes) a given linear objective function. Well known linear programming methods would suffice to solve such a problem if:  (i) P is an integral convex polyhedron, or  (ii) P is transformed into the integral convex polyhedron that is the convex hull of the set of integer points in P, a process which is called integralization.
</description>
<dc:date>1970-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149391">
<title>Computer Recognition of Prismatic Solids</title>
<link>https://hdl.handle.net/1721.1/149391</link>
<description>Computer Recognition of Prismatic Solids
Griffith, Arnold Koons
An investigation is made into the problem of constructing a model of the appearance to an optical input device of scenes consisting of plane-faced geometric solids.  The goal is to study algorithms which find the real straight edges in the scenes, taking into account smooth variations in intensity over faces of the solids, blurring of edges and noise.
</description>
<dc:date>1970-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149390">
<title>Coordination of Asynchronous Event</title>
<link>https://hdl.handle.net/1721.1/149390</link>
<description>Coordination of Asynchronous Event
Patil, Suhas Shrikrishna
The way activity in a system proceeds is that events occur as a result of some conditions and lead to some new conditions which make other events possible.  Often it is necessary to coordinate such events to ensure proper behavior. Coordination nets for representing such coordinations and physically realizable structures for enforcing such coordinations are presented. These structures are modular and can be mechanically derived from the coordination nets. Coordination involved in concurrent management of resources are also discussed.
</description>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149389">
<title>A Computer-controlled Graphical Display Processor</title>
<link>https://hdl.handle.net/1721.1/149389</link>
<description>A Computer-controlled Graphical Display Processor
Fiasconaro, James Gerard
A cathode-ray tube, (CRT), is frequently employed to display text and drawings generated by a digital computer.  Unfortunately, all of the commercially available CRT display systems are either very expensive or have limited dynamic capability resulting from the use of some form of storage-type CRT. A need exists to develop a low-cost, relatively sophisticated display compute-generated pictures.
</description>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149388">
<title>Generalized Organization of Large Data Bases: A Set-theoretic Approach to Relations</title>
<link>https://hdl.handle.net/1721.1/149388</link>
<description>Generalized Organization of Large Data Bases: A Set-theoretic Approach to Relations
Fillat, Andrew Irwin; Kraning, Leslie Alan
Problems inherent in representation and manipulation of large data bases are discussed.  Data management is considered as the manipulation of relationships among elements of a data base.  A detailed analogy introduces concepts embodied in a data management system. Set theory is used to describe a model for data-bases, and operations suitable for manipulation of relations are defined.
</description>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149387">
<title>Economies of Scale in Computer Use: Initial Test and Implication A for the Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149387</link>
<description>Economies of Scale in Computer Use: Initial Test and Implication A for the Computer Utility
Selwyn, Lee L.
This study is concerned with the existence of economies of scale in the production of data processing and other computing services, and the possible regulatory and public policy implications of such economies.  The rapid development of the technology of computation since the Second World War has raised many questions as to the supervision by public authorities of the use and progress of this technology.
</description>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149386">
<title>Controlled Information Sharing in a Computer Utility</title>
<link>https://hdl.handle.net/1721.1/149386</link>
<description>Controlled Information Sharing in a Computer Utility
Vanderbilt, Dean H.
A computer utility is envisioned as a large, multi-access computer system providing its users with the ability to store information and share its use with other system users.  This thesis considers the nature of information sharing and how a computer utility can provide facilities allowing such sharing to take place in a controlled manner.
</description>
<dc:date>1969-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149385">
<title>Recognition of Translators Invariants* By Iterative Arrays</title>
<link>https://hdl.handle.net/1721.1/149385</link>
<description>Recognition of Translators Invariants* By Iterative Arrays
Beyer, Wendel Terry
A study is made of the recognition and transformation of figures by iterative arrays of finite state automata. A figure is a finite rectangular two-dimensional array of symbols. The iterative arrays considered are also finite, rectangular and two-dimensional.
</description>
<dc:date>1969-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149384">
<title>Practical Translators for LR(k) Languages</title>
<link>https://hdl.handle.net/1721.1/149384</link>
<description>Practical Translators for LR(k) Languages
Deremer, Franklin Lewis
A context-free syntactical translator (CFST) is a machine which defines a translation from one context-free language to another.  A transduction grammar is a formal system based on a context-free grammar and it specifies a context-free syntactical translation. A simple suffix transduction grammar based on a context-free grammar which is LR(k) specifies a translation which can be defined by a deterministic push-down automation (DPDA).
</description>
<dc:date>1969-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149383">
<title>A Graph Model for Parallel Computations</title>
<link>https://hdl.handle.net/1721.1/149383</link>
<description>A Graph Model for Parallel Computations
Rodrigues, Jorge E.
This report presents a computational model called program  graphs  which makes possible a precise description of parallel computations of arbitrary complexity on non-structured data.  In the model, the computation steps are represented by the nodes of a directed graph whose links represent elements of storage and transmission of data and /or control information.
</description>
<dc:date>1969-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149382">
<title>Case Study in Interactive Graphics Programming: A Circuit Drawing and Editing Program for Use with A Storage-tube Display Terminal</title>
<link>https://hdl.handle.net/1721.1/149382</link>
<description>Case Study in Interactive Graphics Programming: A Circuit Drawing and Editing Program for Use with A Storage-tube Display Terminal
Brackett, J.; Hammer, M.M.; Thornhill, D.
The concepts involved in building and manipulating a data structure through graphical interaction are presented, using the drawing and editing of electrical circuits as a vehicle. The circuit drawings program was designed to operate on an ARDS storage-tube display terminal attached to the M.I.T. Project MAC IBM 7094 Compatible Time-Sharing System.
</description>
<dc:date>1969-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149381">
<title>EPS: An Interactive System for Solving Elliptic Boundary-Value Problems with Facilities for Data Manipulation</title>
<link>https://hdl.handle.net/1721.1/149381</link>
<description>EPS: An Interactive System for Solving Elliptic Boundary-Value Problems with Facilities for Data Manipulation
Tillman, Coyt C., Jr.
This appendix for the author's forthcoming thesis, "On-Line Solution of Elliptic Boundary-Value Problems," is a user's guide for EPS. EPS solves two-dimensional boundary-value problems for elliptic systems of second-order partial differential equations. It also has general-purpose capabilities which permit the on-line definition and execution  of arbitrary numerical procedures.
</description>
<dc:date>1969-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149380">
<title>Interactive Computer-mediated Animation</title>
<link>https://hdl.handle.net/1721.1/149380</link>
<description>Interactive Computer-mediated Animation
Baeker, Ronald M.
The use of interactive computer graphics in the construction of animated visual displays is investigated. The dissertation presents a process called interactive computer-mediated animation, in which dynamic displays are constructed by utilizing direct console commands, algorithms, free-hand sketches, and real-time actions. The resulting "movie" can then be immediately viewed and altered.
</description>
<dc:date>1969-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149379">
<title>A Formal System for Defining the Syntax and Semantics of Computer Languages</title>
<link>https://hdl.handle.net/1721.1/149379</link>
<description>A Formal System for Defining the Syntax and Semantics of Computer Languages
Ledgard, Henry Francis
The thesis of this dissertation is that formal definitions of the syntax and semantics of computer languages are needed.  This dissertation investigates two candidates for formally defining computer languages: (1) the formalism of canonical systems for defining the syntax of a computer language and its translation into a target language for defining the semantics of a computer language.
</description>
<dc:date>1969-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149378">
<title>Computer Recognition of Three-Dimensional Objects in a Visual Scene</title>
<link>https://hdl.handle.net/1721.1/149378</link>
<description>Computer Recognition of Three-Dimensional Objects in a Visual Scene
Guzman-Arenas, Aldolfo
Methods are presented 1) to partition or decompose a visual scene into the bodies forming it; (2) to position these bodies in three-dimensional space, by combining two scenes that make a stereoscopic pair; 3) to find the regions or zones of a visual scene that belong to its background, (4) to carry out the isolation of objects in (1) when the input has inaccuracies.
</description>
<dc:date>1968-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149377">
<title>A Simulator of Multiple Interactive Users to Drive a Time-shared Computer System</title>
<link>https://hdl.handle.net/1721.1/149377</link>
<description>A Simulator of Multiple Interactive Users to Drive a Time-shared Computer System
Greenbaum, Howard Jacques
In the construction and maintenance of a time-shared computer system the need arises for a tool which can provide a controlled, repeatable environment for the purpose of making performance measurements.  This thesis describes the use of a small second computer to simulate the actions of multiple interactive users over individual communication lines. Each simulated user exhibits responses similar to those of a "normal" interactive user.
</description>
<dc:date>1969-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149376">
<title>Lambda Calculus Models of Programming Languages</title>
<link>https://hdl.handle.net/1721.1/149376</link>
<description>Lambda Calculus Models of Programming Languages
Morris, James H.
Two aspects of programming languages, recursive definitions and type declarations are analyzed in detail.  Church's -calculus is used as a model of a programming language for purposes of the analysis.  The main result on recursion is an analogue to Kleene's first recursion theorem: If A= FA for any A-expressions A and F, then A is an extension of YF in the sense that if E[YE], any expressions containing YF, has a normal form then E[F] =E {A]. Y is Curry's paradoxical combinator. The result is shown to be invariant for many different versions of Y.
</description>
<dc:date>1968-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149375">
<title>An Integrated Hardware-software Systems for Computer Graphics in Time-sharing</title>
<link>https://hdl.handle.net/1721.1/149375</link>
<description>An Integrated Hardware-software Systems for Computer Graphics in Time-sharing
Thornhill, D.E.; Stotz, R.H.; Ross, D.T.; Ward, J.E.
This report describes the ESL Display Console and its associated user-oriented software systems developed by the M.I.T. Computer-Aided Design Project with Project MAC.  Console facilities include hardware projection of three-dimensional line drawings, automatic light pen tracking, and a flexible set of knob, switch, and push-button inputs. The console is attached to the Project MAC IBM 7094 Compatible Time-Sharing System either directly or through a PDP-7 Computer.
</description>
<dc:date>1968-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149374">
<title>Implementing Multi-process Primitives in a Multiplexed Computer System</title>
<link>https://hdl.handle.net/1721.1/149374</link>
<description>Implementing Multi-process Primitives in a Multiplexed Computer System
Rappaport, Robert Lee
In any computer system primitive functions are needed to control the actions of processes in the system.  This thesis discusses a set of six such process control primitives which are sufficient to solve many of the problems involved in parallel processing as well as in the efficient multiplexing of  system resources among the many processes in a system.
</description>
<dc:date>1968-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149373">
<title>The Graph Display as an Aid in the Monitoring of a Time-shared Computer System</title>
<link>https://hdl.handle.net/1721.1/149373</link>
<description>The Graph Display as an Aid in the Monitoring of a Time-shared Computer System
Grochow, Jerrold Marvin
The problem of dynamic observation of the state of a time-shared computer system is investigated.  The Graphical Display Monitoring System was developed as a medium for this experimental work.  It is an integrated system for creating graphic displays, dynamically retrieving data from Multics Time-Sharing Systems supervisor data bases, and on-line viewing of this data viewing of this data via the graphics displays.
</description>
<dc:date>1968-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149372">
<title>Absenetee Computations in a Multiple-access Computer System</title>
<link>https://hdl.handle.net/1721.1/149372</link>
<description>Absenetee Computations in a Multiple-access Computer System
Deital, H.M.
in multiple-access computer systems, emphasis is placed upon serving several interactive users simultaneously. However, many computations do not require user interaction, and user may therefore want to run these computations 'absentee'  (or, user not present). A mechanism is presented which provides for the handling of absentee computations in a multiple-access computer system.
</description>
<dc:date>1968-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149371">
<title>CARPS, A Program Which Solves Calculus Word Problems</title>
<link>https://hdl.handle.net/1721.1/149371</link>
<description>CARPS, A Program Which Solves Calculus Word Problems
Charniak, Eugene
A program was written to solve calculus word problems.  The program CARPS (Calculus Rate Problem Solver), is restricted to rate problems.  The overall plan of the program is similar to Bobrow's STUDENT,  the primary difference being the introduction of "structures" as the internal model in CARPS. Structures are stored internally as trees. Each structures is designed to hold the information gathered about one object.
</description>
<dc:date>1968-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149370">
<title>Resource Allocation in Multiprocess Computer Systems</title>
<link>https://hdl.handle.net/1721.1/149370</link>
<description>Resource Allocation in Multiprocess Computer Systems
Denning, Peter James
The dynamic allocation for limited processor and main memory resources among members of a user community is investigated as a supply-and-demand problem.  The work is divided into four phases.  First phase is the construction of the working set model for program behavior. This model is based on locality, the concept that, during any interval of execution, a program favors a subset of its information; a computation's working set is a dynamic measure of this set of favored information. A working set storage management policy is one that allocates processors to a computation if and only if there is enough uncommitted  space in main memory to contain its working set.
</description>
<dc:date>1968-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149369">
<title>Incremental Simulation on a Time-shared Computer</title>
<link>https://hdl.handle.net/1721.1/149369</link>
<description>Incremental Simulation on a Time-shared Computer
Jones, Malcolm Murray
This thesis describes a system which allows simulation models to be built and tested incrementally.  It is called OPS-4 and is specifically designed to operate in the environment of the Multics system.  It represents a major expansion and improvement of the OPS-3 system implemented in CTSS and also includes many features adapted from other current simulation systems.
</description>
<dc:date>1968-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149368">
<title>Symbolic Integration</title>
<link>https://hdl.handle.net/1721.1/149368</link>
<description>Symbolic Integration
Moses, Joel
SIN and SOLDIER are heuristic programs written in LISP which solve symbolic integration problems.  SIN (Symbolic INtegrator) solves indefinite integration problems at the difficulty approaching those in the larger integral tables.  SIN contains several more methods than are used in the previous symbolic integration program SAINT, and solves most of the problems attempted by SAINT in less than one second. SOLDIER (SOLution of Ordinary Differential Equations Routine) solves first order, first degree ordinary differential equations at the level of a good college sophomore and at an average of about five seconds per problem attempted.
</description>
<dc:date>1967-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149367">
<title>A Canonic Translator</title>
<link>https://hdl.handle.net/1721.1/149367</link>
<description>A Canonic Translator
Alsop, Joseph Wright
An algorithm to recognize and translate sets of character strings specified by canonic system is presented.  The ability of canonic systems to define the context sensitive features of strings and to specify their translation allows the algorithm to recognize and translate real computer languages. It is also applicable in other languages systems.
</description>
<dc:date>1967-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149366">
<title>On the Simulation of Dynamic Systems with Lumped Parameters and Time Delays</title>
<link>https://hdl.handle.net/1721.1/149366</link>
<description>On the Simulation of Dynamic Systems with Lumped Parameters and Time Delays
Leal-Cantu, Nestor
</description>
<dc:date>1967-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149365">
<title>A System for Computer-aided Diagnosis</title>
<link>https://hdl.handle.net/1721.1/149365</link>
<description>A System for Computer-aided Diagnosis
Gorry, Gregory Anthony
This thesis describes a model diagnostic problem and a computer program designed to deal with this problem.  The model diagnostic problem is an abstract problem.  A major contention of this thesis, however, is that this problem subsumes the principal feature of a number of ostensibly different real diagnostic problems including certain problems of medical diagnosis and the diagnosis of machine failures. A second major contention of this thesis is that strategies for the solution of the model diagnostic problem can be formulated in terms sufficiently explicit to permit their incorporation in a computer program.
</description>
<dc:date>1967-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149364">
<title>Program Analysis by Digital Computer</title>
<link>https://hdl.handle.net/1721.1/149364</link>
<description>Program Analysis by Digital Computer
Wilde, Daniel Underwood
A comparison of the properties of non-modifying and self-modifying programs leads to the definition of independent and dependent instructions.  Because non-modifying programs contain only independent instructions, such programs can be analyzed by a straight forward, two -step analysis procedure. First, the program control flow is detected; second, that control flow is used to determine the program data flow or data processing. However, self-modifying programs can also contain dependent instructions, and the program control flows and data flows exhibit cyclic interaction.
</description>
<dc:date>1967-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149363">
<title>Design and Implementation of a Table-Driven Compiler System</title>
<link>https://hdl.handle.net/1721.1/149363</link>
<description>Design and Implementation of a Table-Driven Compiler System
Liu, Chung L.; Change, Gabriel D.; Marks, Richard E.
Our goal is to provide users of the table-driven compiler system with an environment within which they can freely design and produce their compilers.  The primary design criterion is generality so that the users can define a large class of input languages oriented toward any kind of problem-solving purposes, and can also define a large class of object programs to be executed on different computer systems. Therefore, in our system we do not limit the users to specific ways of doing syntactic analysis, or doing storage allocation, or producing binary programs of a specific format for a particular computer system. What we provide are mechanisms that are general enough for whichever way a user desires to build his compiler.
</description>
<dc:date>1967-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149362">
<title>Surfaces for Computer-aided Design of Space Forms</title>
<link>https://hdl.handle.net/1721.1/149362</link>
<description>Surfaces for Computer-aided Design of Space Forms
Coons, Steven A.
The design of airplanes, ships, automobiles, and so-called ""sculptured parts"" involves the design, delineation, and mathematical description of bounding surfaces.  A method is described which makes possible the description of free-form doubly curved surfaces of a very general kind. An extension of these ideas to hyper-surfaces in higher dimensional spaces is also indicated.
</description>
<dc:date>1967-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149361">
<title>On-line Analysis for Social Scientists</title>
<link>https://hdl.handle.net/1721.1/149361</link>
<description>On-line Analysis for Social Scientists
Miller, James R.
A library of computer routines has been compiled to facilitate the analysis of social science research data.  Many of these routines are designed to test statistical hypotheses.  All routines are operated on-line and permit conversational interaction between the user and a time-shared computer. Input data are typed directly into the computer through a teletype console. Explicit typing directions and error diagnostics, where appropriate, are printed out by each routine to guide the input process. Analyses are executed immediately, and computed results are printed out in typical publication language.
</description>
<dc:date>1967-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149360">
<title>Syntax-based Analytic Reading of Musical Scores</title>
<link>https://hdl.handle.net/1721.1/149360</link>
<description>Syntax-based Analytic Reading of Musical Scores
Forte, Allen
As part of a larger research project in musical structure, a program has been written which ""reads"" scores encoded in an input language isomorphic to music notation.  The program is believed to be the first of its kind.  From a small number of parsing rules the program derives complex configurations, each of which is associated  with a set of reference points in a numerical representation of a time-comtinuum.  The logical structure of the program is such that all and only the defined classes of events are represented in the output.
</description>
<dc:date>1967-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149359">
<title>A Low-cost Output Terminal for Time-shared Computers</title>
<link>https://hdl.handle.net/1721.1/149359</link>
<description>A Low-cost Output Terminal for Time-shared Computers
Rosenburg, Ronald C.; Kennedy, Daniel W.; Humphrey, Roger A.
This report describes a low-cost remote terminal to provide switch-form output from a time-shared digital computer.  The terminal consists of a modified model 35 KSR teletype and a local memory unit.  The unit is independent of any particular computer, and is easy to test and maintain. The states of the memory control and memory words are observable directly by indicator lights.
</description>
<dc:date>1967-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149358">
<title>Some Aspects of Pattrn Recognition by Computer</title>
<link>https://hdl.handle.net/1721.1/149358</link>
<description>Some Aspects of Pattrn Recognition by Computer
Guzman-Arenas, Adolfo
A computer may gather a lot of information from its environment in an optical or graphical manner.  A scene, as seen for instance from a TV camera or a picture, can be transformed into a symbolic description of points and lines or surfaces.  This thesis describes several programs, written in the language CONVERT, for the analysis of such descriptions in order to recognize, differentiate and identify desired objects or classes of objects in the scene. Examples are given in each case.
</description>
<dc:date>1967-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149357">
<title>An On-line System for Algebraic Manipulation</title>
<link>https://hdl.handle.net/1721.1/149357</link>
<description>An On-line System for Algebraic Manipulation
Fenichel, Robert R.
This thesis describes an approach to the problem of programming a computer for algebraic manipulation.  The motivating threads of the work are first picked up in Chapter I.  To test the descriptive intuitions urged normatively in Chapter I, an experimental system was actually implemented. This system is described in Chapter II and in the Appendices.
</description>
<dc:date>1966-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149356">
<title>Computer Design for Asynchronously Reproducible Multiprocessing</title>
<link>https://hdl.handle.net/1721.1/149356</link>
<description>Computer Design for Asynchronously Reproducible Multiprocessing
Van Horn, Earl C.
A concept is presented for designing either a computing system, or a programming language system, so that the following problem is avoided: during a multiprocess computation in which several processes communicate, and in which the relative timing of the processes is arbitrary, the output produced by the computation might not be a function of only the initial computation state, i.e., of only the inputs and initial program of the computation.
</description>
<dc:date>1966-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149355">
<title>ADEPT: A Heuristic Program for Proving Theorems of Group Theory</title>
<link>https://hdl.handle.net/1721.1/149355</link>
<description>ADEPT: A Heuristic Program for Proving Theorems of Group Theory
Norton, Lewis Mark
A computer program, named ADEPT (A Distinctly  Empirical Prover of Theorems), has been written which proves theorems taken from the abstract theory of groups.  Its organization is basically heuristic, incorporating many of the techniques of the human mathematician in a "natural" way. This program has proved almost 100 theorems, as well as serving as a vehicle for testing and evaluating special-purpose heuristics.
</description>
<dc:date>1966-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149354">
<title>Pilot: A Step Towards Man-Computer Symbiosis</title>
<link>https://hdl.handle.net/1721.1/149354</link>
<description>Pilot: A Step Towards Man-Computer Symbiosis
Teitelman, Warren
PILOT  is a programming system constructed in LISP.  It is designed to facilitate the development of programs by easing the familiar sequence: write some code, run the program, make some changes, write some more code, run the program again, etc. As a program becomes more complex, making theses changes becomes harder and harder because the implications of changes are harder to anticipate.
</description>
<dc:date>1966-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149353">
<title>Models and Data Structures for Digital Logic Simulation</title>
<link>https://hdl.handle.net/1721.1/149353</link>
<description>Models and Data Structures for Digital Logic Simulation
Smith, Donald Leigh
A digital  logic simulation system is proposed for design verification.  Logic to be simulated is specified with a high level register transfer design language, and the simulation system operates on-line on a large time-shared computer.  The problem of selecting adequate circuit and signal models for this purpose is considered. models are proposed with sufficient timing detail to allow the simulation system to detect timing errors which currently are found by manual checking or prototype.
</description>
<dc:date>1966-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149352">
<title>Traffic Control in a Multiplexed Computer System</title>
<link>https://hdl.handle.net/1721.1/149352</link>
<description>Traffic Control in a Multiplexed Computer System
Saltzer, Jerome H.
This thesis describes a scheme for processor multiplexing in a multiple user, multiple processor computer system.  The scheme is based upon a distributed supervisor which may be different for different users.  The processor multiplexing method provides smooth inter-process communication, treatment of input/output  control as a special case of inter-process communication, and provision for a user to specify parallel processing or simultaneous input/output without interrupt logic.
</description>
<dc:date>1966-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149351">
<title>Search Procedures Based on Measures of Relatedness Between Documents</title>
<link>https://hdl.handle.net/1721.1/149351</link>
<description>Search Procedures Based on Measures of Relatedness Between Documents
Ivie, Evan Leon
In this thesis a new type of information retrieval system is suggested which utilizes data of the type generated by the users of the system instead of data generated by indexers.  The theoretical model on which the system is based consists of three basic elements. The first element is measure of the relatedness between document-pairs. It is derived from information theory.
</description>
<dc:date>1966-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149350">
<title>Input/Output in Time-shared, Segmented, Multiprocessor Systems</title>
<link>https://hdl.handle.net/1721.1/149350</link>
<description>Input/Output in Time-shared, Segmented, Multiprocessor Systems
Smith, Arthur Anshel
After introducing and defining the concepts of time-sharing, segmentation, and multiprocessing, two classes of systems incorporating these are introduced.  Both classes use associative memories, as 'look behind' devices to speed the operation of addressing the segment memory, with the distinction between classes being the location of the associative memory.
</description>
<dc:date>1966-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149349">
<title>OCAS - On-line Cryptanalytic Aid System</title>
<link>https://hdl.handle.net/1721.1/149349</link>
<description>OCAS - On-line Cryptanalytic Aid System
Edwards, Daniel James
Deficiencies of various programming languages for dealing with quantities frequently encountered  in cryptanalysis of simple cipher systems will be discussed.  A programming system is proposed which will permit a cryptanalyst to write and debug programs to aid in he solution of cryptograms or cryptographic systems.  The basic elements of the proposed programming system are discussed in detail.  They include: 1) a programming language to handle both algebraic quantities and character strings, 2) a display generator to permit quick specification of a display frame containing both alphanumeric strings and numerical data for an on-line CRT display device, and 2) an on-line program to control operation of the system and in debugging programs written in the proposed language.
</description>
<dc:date>1966-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149348">
<title>Design of a Low-cost Character Generator for Remote Computer Displays</title>
<link>https://hdl.handle.net/1721.1/149348</link>
<description>Design of a Low-cost Character Generator for Remote Computer Displays
Cheek, Thomas Burrell
A requirement exists for a low-cost remote display terminal with alphanumeric and line-drawing capabilities for use with time-shared computer systems.  This thesis, conducted as part of the overall remote display design project, was undertaken to investigate novel approaches to character generation, with the goal of drastically reducing present-day costs for such devices.      A survey of existing devices and character generation techniques was carried out, and a design approach was chosen which takes advantage of mass-fabrication techniques.  This includes using a five-by-seven dot matrix raster and a resistor array "read-only" character memory for the 96 printable symbols of the Revised Proposed ASCII Code.  Circuits designed, included a dot matrix generator and a register array memory with selection logic sense amplifiers, and a shift register output buffer.  An experimental character generator with an eight-word memory was built, largely using integrated circuits and was found to work as desired.  It is concluded that the design approach will yield a character generator that is of low enough cost to find wide use in remote computer terminals.
</description>
<dc:date>1966-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149347">
<title>Investigation of an Analog Technique to Decrease Pentracking Time in Computer Display</title>
<link>https://hdl.handle.net/1721.1/149347</link>
<description>Investigation of an Analog Technique to Decrease Pentracking Time in Computer Display
Stratton, William David
Many modern digital computer systems contain cathode-ray tube display equipment to facilitate man-machine communications.  Through the use of a display and a light-sensitive pen, graphical material can be directly inserted into the computer by using the pen to control the position of the electron beam at the face of the CRT-a process called pen tracking.  Beam position is continually sampled by the computer, permitting continuous display of the material being sketched.  In present digital pen-tracking techniques, a tracking pattern (usually a cross) with a substantial number of points is generated on the face of the CRT and the binary response of the pen to the individual points of the pattern is employed to calculate pen position.  The large number of pattern points, and the phosphor decay time associated with each, yield a typical tracking cycle of 500 to 1000 microseconds.  Since the cycle must be repeated about 100 times per second, 5 to 10 percent of display time is consumed.      To reduce the time required by the tracking operation, an analog technique employing a four-point tracking pattern is proposed in this study, in which the amplitude response of the pen to corresponding pairs of points is used to determine the position of the pen relative to the center of the pattern.  To study the method, one channel of the proposed two-channel analog tracking system was designed, constructed, and coupled to the horizontal channel of a high-speed computer display console.  To avoid the phosphor-decay limitation, an experimental "Beam" pen capable of detecting the electron beam rather than the phosphor luminescence is employed.  The system included a pattern generator, sample-and-hold gates, difference amplifier, envelope detector and noise filter, and a threshold-logic analog-to-digital converter.  The time required to generate the tracking pattern and develop the binary equivalent of the horizontal distance separating pen and pattern center is only 25 microseconds.  Tracking is generally satisfactory, but some anomalies were noted, apparently due to the characteristics of the experimental pen being used.      It is concluded that the analog technique is feasible for improving the speed of pen tracking, but recommended that further studies be made of the limitations inherent in the method.
</description>
<dc:date>1966-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149346">
<title>MAP: A System for On-line Mathematical Analysis</title>
<link>https://hdl.handle.net/1721.1/149346</link>
<description>MAP: A System for On-line Mathematical Analysis
Kaplow, Roy; Strong, Stephen; Brackett, John
This manual describes a computer suitable for use on the time-sharing facility at the M.I.T. Computation Center or at Project MAC.  Designated for direct computer access through a remote console, the system replaces the normal procedures of programming with a question and answer interchange between the user (hereinafter called U) and the computer (hereinafter called C).  The system is intended for the solution of mathematical problems.  It should be usable by a person with no knowledge of computers or programming and little knowledge of numerical analysis.  Within its range of capabilities, it should be as efficient as are the normal means of computer access for the more sophisticated user.      The system establishes a "conversation" between U and C with an electric typewriter as the means of communication.  U can give information to C and can ask it certain questions.  C can answer those questions if it is given enough information.  C can also ask questions and can therefore request any missing information.  In addition, C can explain procedures to U in order to help the latter transmit the required information in a proper form.  U, therefore, only needs to know a few basic rules, such as how to phrase his questions and how to name and tabulate his data.
</description>
<dc:date>1966-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149345">
<title>Programming Semantics for Multiprogrammed Computations</title>
<link>https://hdl.handle.net/1721.1/149345</link>
<description>Programming Semantics for Multiprogrammed Computations
Dennis, Jack B.; Van Jhorn, Earl C.
The semantics are defined for a number of meta-instructions which perform operations essential to the writing of programs in multiprogrammed computer systems.  These meta-instructions relate to parallel procession, protection of separate computations, program debugging, and the sharing among users of memory segments and other computing objects, the names of which are hierarchically structured.  The language sophistication contemplated is midway between an assembly language and an advanced algebraic language.
</description>
<dc:date>1965-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149344">
<title>The Priority Problem</title>
<link>https://hdl.handle.net/1721.1/149344</link>
<description>The Priority Problem
Greenberger, Martin
Priority decisions arise whenever limited facilities must be apportioned among competitive demands for service.  Broadly viewed, even the familiar first-come-first served discipline is a priority rule.  It favors the longest-waiting user, and guards against excessive delays.  Other priority rules, such as shortest-job-next, are keyed instead to considerations of operating efficiency.  Urgency of request is still another common consideration.  Since these considerations often conflict, the priority rule serves as mediator.  Use of a common cost measure can help effect this mediation, as results from recent job-shop simulations illustrate.      A priority operation of contemporary interest is scheduling a time-shared computer among its concurrent users.  Service requirements are not known in advance of execution.  To keep response times short for small requests, service intervals are partitioned and segments are served separately in round-robin fashion.  A mathematical analysis pinpoints the tradeoff between overhead and discrimination implicit in this procedure, and allows alternate strategies to be costed.  Extensions of the simple round-robin procedure are suggested, the objectives of time-sharing are reviewed, and implications are drawn for the design of future priority and pricing systems.
</description>
<dc:date>1965-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149343">
<title>Queueing Models for File Memory Operation</title>
<link>https://hdl.handle.net/1721.1/149343</link>
<description>Queueing Models for File Memory Operation
Denning, Peter James
A model for the auxiliary memory function of a segmented, multiprocessor, time-shared computer system is set up.  A drum system in particular is discussed, although no loss of generality is implied by limiting the discussion to drums.  Particular attention is given to the queue of requests waiting for drum use.  It is shown that a shortest access time first queue discipline is the most efficient, with the access time being defined as the time required for the drum to be positioned, and is measured from the finish of service of the last request to the beginning of the data transfer for the present request.  A detailed study of the shortest access time queue is made, giving the minimum access time probability distribution, equations for the number in the queue, and equations for the wait in the queue.  Simulations were used to verify these equations; the results are discussed.  Finally, a general Markov Model for Queues is discussed in an Appendix.
</description>
<dc:date>1965-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149342">
<title>Calculaid: An On-line System for Algebraic Computation and Analysis</title>
<link>https://hdl.handle.net/1721.1/149342</link>
<description>Calculaid: An On-line System for Algebraic Computation and Analysis
Wantman, Mayer Elihu
OPS is an on-line system developed by M. Greenberger et al. at Project MAC.  The present work provides a powerful and simple way to perform numerical manipulations and calculations within OPS.  The program package is called CALCULAID.      A method of executing algebraic assignment statements, of which MAD and FORTRAN assignments are a subset, is provided.  When this assignment-statement ability is coupled with other features of the OPS system, such as unconditional transfers, general conditionals, and array and function declarations, most of the ability of a compiler language is provided.  Because the programs written in OPS are executed interpretively, OPS-3 programs can be changed and re-run immediately, without being compiled.      The other elements of CALCULAID are a program for creating multiple linear regression models, rank-ordering and counting data, and finding roots to polynomial equations in one unknown.      The applications of CALCULAID to the analysis of a round-robin scheduling model and to a process-control problem are discussed, and conclusions regarding the suitability of running computational programs in an interpretive mode are drawn.
</description>
<dc:date>1965-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149341">
<title>A Heuristic Approach to Alternate Routing in a Job Shop</title>
<link>https://hdl.handle.net/1721.1/149341</link>
<description>A Heuristic Approach to Alternate Routing in a Job Shop
Russo, F.J.
The research reported here investigates the use of heuristics for selecting from several alternate routes resulting from partially ordered tasks in a job shop order file.  The experimental vehicle employed was digital simulation.      The concept of the "Alternate string" has been developed to generalize the existence of partially ordered operations.  That term is defined as a concatenation of operations that can be performed in any order, with the additional specification that all within the string can be attempted.  The presence of alternate strings with two or more member gives rise to the alternate routing problem, whose solution is approached by heuristic methods.      Choosing from among several alternate routes constitutes a three level decision problem.  At the lowest level, routes can be chosen when the order enters the shop.  This is equivalent to fixed routing.  At a higher level,  alternates can be selected at the time of transition from one work station to another.  The third decision level occurs at operation time, when one of the alternate operations is placed on a machine.  Heuristics were tested at the latter two levels.      There were two prior assertions that this thesis set out to prove.  The first was that alternate routing at the highest decision level would produce significant reductions in the mean tardiness of orders completed past their designated due dates, the improvement being both relative to fixed routing and to alternate routing heuristics implemented at lower decision levels.  Secondly, the contention was made that the improvement would be as such a magnitude that on-line, real-time systems become economically justifiable as a means of mitigating the attendant control problems caused by non-deterministic paths through the queuing network.      The methodology employed here was to conduct two passes of simulated shop runs.  The first, with two artificially high levels of alternate incidence, tested the efficiency of five different alternate routing heuristics in reducing mean tardiness.  The second pass consisted of runs with the best heuristic developed during the first experimental phase applied to a realistic length and frequency of alternate strings.      The results of the experiments strongly support the assertions made at the outset of the thesis.  The performance characteristics of the different heuristics are discussed at length.  In addition, some implications are drawn of the computational nature of alternate routing and the difficulties encountered in implementing alternate routing heuristics at operation time.
</description>
<dc:date>1965-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149340">
<title>An Analysis of Time-Shared Computer Systems</title>
<link>https://hdl.handle.net/1721.1/149340</link>
<description>An Analysis of Time-Shared Computer Systems
Scherr, Allan Lee
Some of the aspects of the operation of time-shared, interactive computer systems are analyzed.  The emphasis is on the reaction of hardware systems to the demands that its users make upon it.  Simply shared systems and their users in order to be able to predict the performance of the two operating together.  Portions of this problem include the specification and measurement of user characteristics, the development and verification of both simulation and mathematical models for time-shared systems, and the specification and measurement of performance metrics for such systems.  The user and some of the performance measurements were made on Project MAC's "Compatible Time-Sharing System" (CTSS).      First, simulation models are used to study the effects of changing small details in the operation of CTS-like systems.  Then, a continuous-time Markov process model is derived to predict the performance of a broad class of systems.  Throughout, the CTSS data are used as a basis for comparison with model predictions.  In order to be able to take measurements and to build models, many definitions of commonly used time-shared system terminology are made precise.
</description>
<dc:date>1965-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149339">
<title>Time Sharing on a Multiconsole Computer</title>
<link>https://hdl.handle.net/1721.1/149339</link>
<description>Time Sharing on a Multiconsole Computer
Samuel, Arthur L.
After a brief historical review and a description of the three basic types for time-sharing systems, the general purpose time-sharing system as exemplified by the M.I.T. CTSS system is described in general terms, with particular attention to the way the system looks to the user.
</description>
<dc:date>1965-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149338">
<title>CTSS Technical Notes</title>
<link>https://hdl.handle.net/1721.1/149338</link>
<description>CTSS Technical Notes
Saltzer, Jerome H.
This report is a technical description of the 7094 Compatible Time-Sharing System in use at Project MAC and the M.I.T. Computation Center.  It is designed to acquaint a system programmer with the techniques of construction which were used in this particular time-sharing system.  Separate chapters discuss the overall supervisor program flow: console message input and output: the scheduling and storage algorithms: and a thumbnail sketch is given of each of the subroutines which make up the supervisor program.      This report was prepared with the aid of the compatible time-sharing system and the TYPSET and RUNOFF  commands.
</description>
<dc:date>1965-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149337">
<title>Use of CTSS in a Teaching Environment</title>
<link>https://hdl.handle.net/1721.1/149337</link>
<description>Use of CTSS in a Teaching Environment
Roos, Daniel
Computer time-sharing offers many interesting possibilities for use in teaching computer technology.  It might be expected that with proper hardware and software, students using time-sharing as a teaching machine could acquire proficiency in the fundamentals of programming more easily than using batch-processing.  To test this hypothesis, the M.I.T. Department of Civil Engineering divided a freshman programming class so that half the students used batch-processing methods, and half used the Project MAC time-sharing system to do the same work.  This paper describes the experiment and its tentative results.
</description>
<dc:date>1964-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149336">
<title>A New Methodology for Computer Simulation</title>
<link>https://hdl.handle.net/1721.1/149336</link>
<description>A New Methodology for Computer Simulation
Greenberger, Martin
Computer simulation is a cooperative venture between researcher and information processor, but the processor's role customarily begins too late.  The researcher can benefit substantially by bringing  the computer up into the earlier, creative phases of the simulation process.  An on-line computer system that makes this possible is described.
</description>
<dc:date>1964-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149335">
<title>The MAC System: A Progress Report</title>
<link>https://hdl.handle.net/1721.1/149335</link>
<description>The MAC System: A Progress Report
Fano, Robert M.
The notion of machine-aided cognition implies an intimate collaboration between a human user and a computer in a real-time dialogue on the solution of a problem, in which the two parties contribute their best capabilities.  In order for this intimate collaboration to be possible, a computer system is needed that can serve simultaneously a large number of people, and that is easily accessible to them, both physically and intellectually.  The present MAC System is a first step toward this goal.  The purpose of this paper is to present a brief description of the current system, to report on the experience gained from its operation, and to indicate directions along which future developments are like to proceed.
</description>
<dc:date>1964-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149334">
<title>Program Structure in a Multi-access Computer</title>
<link>https://hdl.handle.net/1721.1/149334</link>
<description>Program Structure in a Multi-access Computer
Dennis, Jack B.
A multi-access computer (MAC) system consists of processing  units  and directly addressable main  memory  in which procedure information is interpreted as sequences of operations on data, a system of terminal  devices  through which users may communicate with procedures operating for them, and mass memory where procedures and data may be held when not required for immediate reference.  One fundamental attraction of the MAC concept is the increased productivity of "computer catalyzed research" that results from close man-machine interaction.  Another attraction is wealth of data and procedures that are accessible to a large user community through the file memory of a MAC system.  In this report thoughts are developed which form an adequate model of program structure.  These concepts have grown out of many discussions with colleges in Project MAC, and our experience to date in the design and operation of multi-access computer systems.
</description>
<dc:date>1964-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149333">
<title>The OPS-1 Manual</title>
<link>https://hdl.handle.net/1721.1/149333</link>
<description>The OPS-1 Manual
Greenberger, Martin
The recent attainment and continuing development of personally accessible computer facilities have opened another chapter in the use of machines by man.  A number of current research efforts, including Project MAC at M.I.T., are designing new conceptual systems to adapt the emerging technology to a wide range of human activity.  Activities relating to management are the concern of a trial system at Project MAC called OPS-1.  The OPS-1 system and the experiment that launched it are described in this manual. {AD 604-681}
</description>
<dc:date>1964-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149332">
<title>OPL-I An Open Ended Programming System Within CTSS</title>
<link>https://hdl.handle.net/1721.1/149332</link>
<description>OPL-I An Open Ended Programming System Within CTSS
Weizenbaum, Joseph
OPL-1, an incremental programming system presently operating with CTSS, permits the user to augment both his program and his data base during widely separated successive sessions at his terminal.  Facilities are provided which make it possible for the user to operate on his already established data base both by means of built-in operators and in terms of operators (functions) which the user has previously defined in the language of the system.  Underlying the system is a powerful list processing scheme embedded in FORTRAN (SLIP).  The machinery of this fundamental language drives the system and is also largely available to the user.  The data base generated by the user is therefore a set of list structures (trees), and most of the operators available to him are list processing  operators.  Data structures with considerably complex inter-relational properties may therefore be treated quite directly.
</description>
<dc:date>1964-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149331">
<title>Stress: A Problem-oriented Language for Structural Engineering</title>
<link>https://hdl.handle.net/1721.1/149331</link>
<description>Stress: A Problem-oriented Language for Structural Engineering
Biggs, John M.; Logcher, Robert D.
STRESS  is a general purpose programming system for the analysis of structures.  Compared to most other structural programs it has three distinguishing characteristics: (1)  The input language is that of the structural engineer which makes possible direct communication between the engineer and the machine; (2)  The system is capable of analyzing a wide variety of structural types and loading conditions thus permitting industrial use on a routine basis; and (3)  The design process is expedited by the fact that modifications of the original structure for alternate designs can be easily executed.  This last capability is most effective when STRESS  is used in the time-sharing mode.  These features combine to provide a system which not only reduces the effort required for structural analysis but, more significantly, enhances the designer's ability to evolve an efficient structure.
</description>
<dc:date>1966-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149330">
<title>CARPS, A Program Which Solves Calculus Word Problems</title>
<link>https://hdl.handle.net/1721.1/149330</link>
<description>CARPS, A Program Which Solves Calculus Word Problems
Charniak, Eugene
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149329">
<title>Verbal and Graphical Language for the AED System: A Progress Report</title>
<link>https://hdl.handle.net/1721.1/149329</link>
<description>Verbal and Graphical Language for the AED System: A Progress Report
Ross, Douglas T.; Feldman, Clarence G.
For Computer-Aided Design, use of time-sharing a single language which can take either verbal or graphical form is required.  This paper describes how a single language processing technique, which is in turn a special application of more general concepts concerning the step-by-step growth and processing of large structures of interrelated elements, can efficiently process both language forms in the same manner.  Illustrations of the concepts involved are also drawn from the methods used in the AED-O Compiler, an efficient ALGOL-60-based compiler used in Computer-Aided Design work, which is available as a public command in the Project MAC CTSS.
</description>
<dc:date>1964-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149328">
<title>System Requirements for Multiple  -Access, Time-shared Computers</title>
<link>https://hdl.handle.net/1721.1/149328</link>
<description>System Requirements for Multiple  -Access, Time-shared Computers
Corbató, Fernando J.
It is now clear that it is possible to create a general-purpose time-shared multiple access system on most contemporary computers.  However, it is equally clear that none of the existent computers are well designed for multiple access systems.  At present, good service to a few dozen simultaneous users is considered state-of-the-art.      Discussions include: clocks, memory protection and supervisor mode, program relocation and common subroutines which expose the reader to the difficulties encountered with contemporary machines when multiple user multiple-processor systems are considered.
</description>
<dc:date>1964-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149327">
<title>SIR: A Computer Program for Semantic Information Retrieval</title>
<link>https://hdl.handle.net/1721.1/149327</link>
<description>SIR: A Computer Program for Semantic Information Retrieval
Raphael, Bertram
SIR  is a computer system, programmed in the LISP language, which accepts information and answers questions expressed in a restricted form of English.  This system demonstrates what can reasonably be called an ability to "understand" semantic information.  SIR's  semantic and deductive ability is based on the construction of an internal model, which uses word associations and property lists, for the relational information normally conveyed in conversational statements.      A format-matching procedure extracts semantic content from English sentences.  If an input sentence is declarative, the system adds appropriate information to the model.  If an input sentence is a question, the system searches the model until it either finds the answer or determines why it cannot find the answer.  In all cases SIR  reports its conclusions.  The system has some capacity to recognize exceptions to general rules, resolve certain semantic ambiguities, and modify its model structure in order to save computer memory space.      Judging from its conversational ability, SIR  is more "intelligent" than any existing question-answering system.  The author describes how this ability was developed and how the basic features of SIR  compare with those of other systems.       The working system, SIR , is a first step toward intelligent machine communication.  The author proposes a next step by describing how to construct a more general system which is less complex and yet more powerful than SIR .  This proposed system contains a generalized version of the SIR  model, a formal logical system called SIR1 , and a computer program for testing the truth of SIR1  statements with respect to the generalized model by using partial proof procedures in the predicate calculus.  The thesis also describes the formal properties of SIR1  and how they relate to the logical structure of SIR .
</description>
<dc:date>1964-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149326">
<title>Natural Language Input for a Computer Problem Solving System</title>
<link>https://hdl.handle.net/1721.1/149326</link>
<description>Natural Language Input for a Computer Problem Solving System
Bobrow, Daniel .G
The STUDENT  problem solving system, programmed in LISP, accepts as input a comfortable but restricted subset of English which can express a wide variety of algebra story problems.  STUDENT  finds the solution to a large class of these problems.  STUDENT  can utilize a store of global information not specific to any one problem, and may make assumptions about the interpretation of ambiguities in the wording of the problem being solved.  If it uses such information, or makes any assumptions, STUDENT communicates this fact to the user.       The thesis includes a summary of other English language question-answering systems.  All these systems, and STUDENT are evaluated according to four standard criteria.      The linguistic analysis in STUDENT  is a first approximation to the analytic portion of a semantic theory of discourse outlined in the thesis.  STUDENT  finds the set of kernel sentences which are the base of the input discourse, and transforms this sequence of kernel sentences into a set of simultaneous equations which form the semantic base of the Student  system.  STUDENT  then tries to solve this set of equations for the values of requested unknowns.  If it is successful it gives the answers in English.  If not, STUDENT  asks the user for more information, and indicates the nature of the desired information.  The STUDENT  system is a first step toward natural language communication with computers.  Further work on the semantic theory proposed should result in much more sophisticated systems.
</description>
<dc:date>1964-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149325">
<title>Execution Model Enforcement Via Program Shepherding</title>
<link>https://hdl.handle.net/1721.1/149325</link>
<description>Execution Model Enforcement Via Program Shepherding
Kiriansky, Vladimir; Bruening, Derek; Amarasinghe, Saman
Nearly all security attacks have one thing in common: they coerce the target program into performing actions that it was never intended to perform.  In short, they violate the program's execution model. The execution model encompasses the Application Binary Interface (ABI), higher-level specifications from the program's source programming language, and components specific to the program --- for example, which values a particular function pointer may take.  If this execution model were enforced, and only program actions that the programmer intended were allowed, a majority of current security holes would be closed.   In this paper, we employ program shepherding[26] to enforce a program's execution model.  Program shepherding monitors control flow in order to enforce a security policy.  We use static and dynamic analyses to automatically build a custom security policy for a target program which specifies the program's execution model.  We have implemented our analyses in the DynamoRIO [5] runtime code modification system.  The resulting system imposes minimal or no performance overhead, operates on unmodified native binaries, and requires no special hardware or operating system support.  Our static analyses require source code access but not recompilation.  The analysis process requires no user interaction, but is able to build a strict enough policy to prevent all deviations from the program's control flow graph and nearly all violations of the calling convention, greatly reducing the possibility of an unintended program action.
</description>
<dc:date>2003-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149324">
<title>Scalable Packet Classification Using Bit Vector Aggregating and Folding</title>
<link>https://hdl.handle.net/1721.1/149324</link>
<description>Scalable Packet Classification Using Bit Vector Aggregating and Folding
Li, Ji; Liu, Haiyang; Sollins, Karen
Packet classification is a central function for a number of network applications, such as routing and firewalls. Most existing algorithms for packet classification scale poorly in either time or space when the database size grows. The scalable algorithm Aggregated Bit Vector (ABV) is an improvement on the Lucent bit vector scheme (BV), but has some limitations. Our algorithm, Aggregated and Folded Bit Vector (AFBV), seeks to reduce false matches while keeping the benefits of bit vector aggregation and avoiding rule rearrangement. It combines bit vector aggregation and folding to achieve this goal. Experiments showed that our algorithm outperforms both the BV and ABV schemes in synthetically generated databases.
</description>
<dc:date>2003-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149323">
<title>Stream Algorithms and Architecture</title>
<link>https://hdl.handle.net/1721.1/149323</link>
<description>Stream Algorithms and Architecture
Henry, Hoffman; Strumpen, Volker; Agarwal, Anant
Wire-exposed, programmable microarchitectures including Trips [11]], Smart Memories [8], and Raw [13] offer an opportunity to schedule instruction execution and data movement explicitly. This paper proposes stream algorithms, which, along with a decoupled systolic architecture, provide an excellent match for the physical and technological constraints of single-chip tiles architectures. Stream algorithms enable programmed systolic computations for different problem sizes, without incurring the cost of memory accesses. To that end, we decouple memory accesses from computation and move the memory accesses off the critical path. By structuring computations in systolic phases, and deferring memory accesses to dedicated memory processors, stream algorithms can solve many regular problems with varying sizes on a constant-sized tiled array. Contrary to common sense, the compute efficiency of stream algorithms increases as we increase the number of processing elements. In particular, we show that the compute efficiency of stream algorithms can approach 100% asymptotically, that is for large numbers of processors and appropriate problem size.
</description>
<dc:date>2003-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149322">
<title>A Theoretical and Practical Approach to Instruction Scheduling on Spatial Architectures</title>
<link>https://hdl.handle.net/1721.1/149322</link>
<description>A Theoretical and Practical Approach to Instruction Scheduling on Spatial Architectures
Mirrokni, Vahab S.; Lee, Walter; Karger, David; Amarasinghe, Saman
This paper studies the problem of instruction assignment and scheduling on spatial architectures. Spatial architectures are architectures whose resources are organized in clusters, with non-zero communication delays between the clusters. On these architectures, instruction scheduling include both space scheduling, where instructions are mapped to clusters, and the traditional time scheduling. This paper considers the problem from both the theoretical and practical perspectives. It presents two integer linear program formulations with known performance bounds. We also present an 8-approximation algorithm for constant m and constant communication delays. Then, we introduce three heuristic algorithms based on list scheduling. Then we study a layer partitioning method. Our final algorithm is a combination of layer partitioning and the third heuristic. Two of the better algorithms are evaluated on the Raw machine. Results show that they are competitive with previously published results; for scientfici codes, our heuristics can perform an average of 25% better.
</description>
<dc:date>2002-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149321">
<title>pStore: A Secure Peer-to-Peer Backup System</title>
<link>https://hdl.handle.net/1721.1/149321</link>
<description>pStore: A Secure Peer-to-Peer Backup System
Batten, Christopher; Barr, Kenneth; Saraf, Arvind; Trepetin, Stanley
In an effort to combine research in peer-to-peer systems with techniques for incremental backup systems, we propose pStore: a secure distributed backup system based on an adaptive peer-to-peer network. pStore exploits unused personal hard drive space attached to the Internet to provide the distributed redundancy needed for reliable and effective data backup. Experiments on a 30 node network show that 95% of the files in a 13 MB dataset can be retrieved even when 7 of the nodes have failed. On top of this reliability, pStore includes support for file encryption, versioning, and secure sharing. Its custom versioning system permits arbitrary version retrieval similar to CVS. pStore provides this functionality at less than 10% of the network bandwidth and requires 85% less storage capacity than simpler local tape backup schemes for a representative workload.
</description>
<dc:date>2002-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149320">
<title>Offline Authentication of Untrusted Storage</title>
<link>https://hdl.handle.net/1721.1/149320</link>
<description>Offline Authentication of Untrusted Storage
Clarke, Dwaine; Gassend, Blaise; Suh, G. Edward; van Dijk, Marten; Devadas, Srinivas
We extend the offline memory correctness checking scheme presented by Blum et. al [BEG+91], by using incremental cryptography, to detect attacks by an active adversary. We also introduce a hybrid o_ine-online checking scheme designed for untrusted storages in file systems and databases. Previous work [GSC+02] [FKM00] [MVS00] describe systems in which Merkle trees are used to verify the authenticity of data stored on untrusted storage. The Merkle trees [Mer79] are used to check, after each operation, whether the storage performed correctly. The offline and hybrid checkers are designed for checking sequences of operations on an untrusted storage and, in the common case, require only a constant overhead on the number of accesses to the storage, as compared to the logarithmic overhead incurred by online Merkle tree schemes
</description>
<dc:date>2002-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149319">
<title>Phased Computation Graphs in the Polyhedral Model</title>
<link>https://hdl.handle.net/1721.1/149319</link>
<description>Phased Computation Graphs in the Polyhedral Model
Thies, William; Lin, Jasper; Amarasinghe, Saman
We present a translation scheme that allows a broad class of dataflow graphs to be considered under the optimization framework of the polyhedral model. The input to our analysis is a Phased Computation Graph, which we define as a generalization of the most widely used dataflow representations, including synchronous dataflow, cyclo-static dataflow, and computation graphs. The output of our analysis is a System of Affine Recurrence Equations (SARE) that exactly captures the data dependencies between the nodes of the original graph. Using the SARE representation, one can apply many techniques from the scientific community that are new to the DSP domain. For example, we propose simple optimizations such as node splitting, decimation propagation, and stead-state invariant code motion that leverage the fine-grained dependence information of the SARE to perform novel transformations on a stream graph. We also propose ways in which the polyhedral model can offer new approaches to classic problems of the DSP community, such as minimizing buffer size, code size, and optimizing the schedule.
</description>
<dc:date>2002-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149318">
<title>A Collision Model for Randomized Routing In Fat-Tree Networks</title>
<link>https://hdl.handle.net/1721.1/149318</link>
<description>A Collision Model for Randomized Routing In Fat-Tree Networks
Strumpen, Volker; Krishnamurthy, Arvind
</description>
<dc:date>2002-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149317">
<title>How to Build Scalable On-Chip ILP Networks for a Decentralized Architecture</title>
<link>https://hdl.handle.net/1721.1/149317</link>
<description>How to Build Scalable On-Chip ILP Networks for a Decentralized Architecture
Taylor, Michael Bedford; Lee, Walter; Frank, Matthew; Amarasinghe, Saman; Agarwal, Anant
The era of billion transistors-on-a-chip is creating a completely different set of design constraints, forcing radically new microprocessor archiecture designs. This paper examines a few of the possible microarchitectures that are capable of obtaining scalable ILP performance. First, we observe that the network that interconnects the processing elements is the critical design point in the microarchitecture. Next, we characterize four fundamental properties that have to be satisfied by the interconnection network. Next, we provide case studies of two different networks that satisfy these properties. Finally, a detailed evaluation of these networks is presented to highlight the scalability and performance of these microarchitectures. We show that by using compile time information, we can build simpler networks and use them efficiently.
</description>
<dc:date>2000-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149316">
<title>A Stream Compiler for Communication-Exposed Architectures</title>
<link>https://hdl.handle.net/1721.1/149316</link>
<description>A Stream Compiler for Communication-Exposed Architectures
Gordon, Michael; Thies, William; Karczmarek, Michael; Wong, Jeremy; Hoffmann, Henry; Maze, David; Amarasinghe, Saman
With the increasing miniturization of transistors, wire delays are becoming a dominant factor in microprocessor performance. To address this issue, a number of emerging architectures contain replicated processing units with software-exposed communication between one unit and another (e.g., Raw, iWarp, SmartMemories). However, for their use to be widespread, it will be necessary to develop compiler technology that enables a portable, high-level language to execute efficiently across a range of wire-exposed architectures. In this paper, we describe our compiler for StreamIt: a high-level, architecture-independent language for streaming applications. We focus on our backend for the Raw processor. Though StreamIt exposes the parallelism and communication patterns of stream programs, much analysis is needed to adapt a stream program to a parallel stream processor. We describe fission and fusion transformations that can be used to adjust the granularity of a stream graph, a layout algorithm for mapping a stream graph to a given network topology, and a scheduling algorithm for generating a fine-grained static communication pattern for each computational element. We have implemented a fully functional compiler that parallelizes StreamIt applications for Raw, including several load-balancing optimizations. Using the cycle-accurate Raw simulator, we demonstrate that these optimizations can improve performance by up to 145%. We consider this work to be a first step towards a portable programming model for communication-exposed architectures.
</description>
<dc:date>2002-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149315">
<title>A Note on the Stability Requirements of Adaptive Virtual Queue</title>
<link>https://hdl.handle.net/1721.1/149315</link>
<description>A Note on the Stability Requirements of Adaptive Virtual Queue
Katabi, Dina; Blake, Charles
Choosing the correct value for the parameters of an Active Queue Management (AQM) scheme is a well-known hard problem. The Adaptive Virtual Queue (AVQ) attempts at solving this problem by using stability requirements to devise a rule for setting its parameter. This memo shows that the AVQ rule for setting its parameter is impractical for many real-life situations.
</description>
<dc:date>2002-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149314">
<title>Secure Execution Via Program Shepherding</title>
<link>https://hdl.handle.net/1721.1/149314</link>
<description>Secure Execution Via Program Shepherding
Kiriansky, Vladimir; Bruening, Derek; Amarasinghe, Saman
We introduce program shepherding, a method for monitoring control flow transfers during program execution to enforce a security policy. Shepherding ensures that malicious code masquerading as data is never executed, thwarting a large class of security attacks. Shepherding can also enforce entry points as the only way to execute shared library code. Furthermore, shepherding guarantees that sandboxing checks around any type of program operation will never be bypassed. We have implemented these capabilities efficiently in a runtime system with minimal or no performance penalties. This system operates on unmodified native binaries, requires no special hardware or operating system support, and runs on existing IA-32 machines.
</description>
<dc:date>2002-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149313">
<title>Efficient View-Dependent Sampling of Visual Hulls</title>
<link>https://hdl.handle.net/1721.1/149313</link>
<description>Efficient View-Dependent Sampling of Visual Hulls
Matusik, Wojciech; Buehler, Chris; McMillan, Leonard
In this paper we present an efficient algorithm for sampling visual hulls. Our algorithm computers exact points and normals on the surface of visual hull instead of a more traditional volumetric representation. The main feature that distinguishes our algorithm from previous ones is that it allows for sampling along arbitrary viewing rays with no loss of efficiency. Using this property, we adaptively sample visual hulls to minimize the number of samples needed to attain a given fidelity. In our experiments, the number of samples can typically be reduced by an order of magnitude, resulting in a corresponding performance increase over previous algorithms.
</description>
<dc:date>2002-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149312">
<title>An Efficient Visual Hull Computation Algorithm</title>
<link>https://hdl.handle.net/1721.1/149312</link>
<description>An Efficient Visual Hull Computation Algorithm
Matusik, Wojciech; Buehler, Chris; McMillan, Leonard; Gortler, Steven J.
In this paper we describe an efficient algorithm for computing the visual hull of an object. This problem is equivalent to computing the intersection of generalized cones. The naïve visual hull computation algorithm requires intersecting 3D polyhedra. We exploit the special structure of generalized cone polyhedra and show how to reduce this computation to a set of intersections in 2D. Moreover, we describe how the 2D intersections can be carried out efficiently.
</description>
<dc:date>2002-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149311">
<title>StreamIT: A Complier for Streaming Applications</title>
<link>https://hdl.handle.net/1721.1/149311</link>
<description>StreamIT: A Complier for Streaming Applications
Thies, William F.; Karczmarek, Michael; Gordon, Michael; Maze, David; Wong, Jeremy; Hoffmann, Henry; Brown, Matthew; Amarasinghe, Saman
Streaming programs represent an increasingly important and widespread class of applications that holds unprecedented opportunitie sfor high-impact compiler technology. Unlike sequential programs with obscured dependence information and complex communication patterns, a stream program is naturally written as a set of concurrent filters with regular steady-state communication. The StreamIt language aims to provide a natural, high-level syntax that improves programmer productivity in the streaming domain. At the same time, the language imposes a hierarchical structure on the stream graph that enables novel representations and optimizations within the StreamIt compiler. We define the "stream dependence function," a fundamental relationship between the input channels of two filters in a stream graph. We also describe a suite of stream optimizations, a denotational semantics for validating these optimizations, and a novel phased scheduling algorithm for stream graphs. In addition, we have implemented a prototype of the StreamIt optimizing compiler that is showing promising results.
</description>
<dc:date>2002-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149310">
<title>Techniques for Increasing and Detecting Memory Alignment</title>
<link>https://hdl.handle.net/1721.1/149310</link>
<description>Techniques for Increasing and Detecting Memory Alignment
Larsen, Samuel; Witchel, Emmett; Amarasinghe, Saman
Memory alignment is an important property in memory system performance. Extraction of alignment information at compile-time enables the possibility for new classes of program optimization. In this paper, we present methods for increasing and detecting the alignment of memory references in a program. Our transformations and analyses do not require interprocedural analysis and introduce almost no overhead. As a result, they can be incorporated into real compilation systems. On average, our techniques are able to achieve a five-fold increase in the number of dynamically aligned memory references. We are then able to detect 94% of these operations. This success is invaluable in providing performance gains in a range of different areas. When alignment information is incorporated into a vectorizing compiler, we can increase the performance of a G4 AltiVec processor by more than a factor of two. Using the same methods, we are able to reduce energy consumption in a data cache by as much as 35%.
</description>
<dc:date>2001-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149309">
<title>StreaMIT: A Language for Streaming Applications</title>
<link>https://hdl.handle.net/1721.1/149309</link>
<description>StreaMIT: A Language for Streaming Applications
Thies, William F.; Karczmarek, Michael; Amarasinghe, Saman
We characterize high-performance streaming applications as a new and distinct domain of programs that is becoming increasingly important. The StreaMIT language provides novel high-level representations to improve programmer productivity and program robustness within the streaming domain. At the same time, the StreaMIT compiler aims to improve the performance of streaming applications via stream-specific analyses and optimizations. In this paper, we motivate, describe and justify the language features of StreaMIT, which include: a structured model of streams, a messaging system for control, a re-initialization mechanism, and a natural textual syntax. We also present a means of reasoning about time in terms of "information flow": a concept that we believe is fundamental to the streaming domain. Using this concept, we give a formal semantics for StreaMIT's messaging system, as well as a simple algorithm for detecting deadlock and buffer overlow.
</description>
<dc:date>2001-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149308">
<title>A Software Framework for Supporting General Purpose Applications on RAW Computation Fabrics</title>
<link>https://hdl.handle.net/1721.1/149308</link>
<description>A Software Framework for Supporting General Purpose Applications on RAW Computation Fabrics
Frank, Matthew; Lee, Walter; Amarasinghe, Saman
This paper presents SUDS (Software Un-Do Systems), a data speculation system for Raw processors. SUDS manages specultation in software. Thekey to managing speculation in software is to use the compiler to minimize the number of data items that need to be managed in runtime. Managing speculation in software enables Raw processors to achieve good performance on integer applications without sacrificing chip area for speculation hardware. This additional area can instead be devoted to additional computer resources, improving the performance of dense matrix and media applications.
</description>
<dc:date>2001-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149307">
<title>Persona: A Contextualized and Personalized Web Search</title>
<link>https://hdl.handle.net/1721.1/149307</link>
<description>Persona: A Contextualized and Personalized Web Search
Tanudjaja, Francisco; Mui, Lik
Recent advances in graph-based search techniques derived from Kleinberg's work [1] have been impressive. This paper further improves the graph-based search algorithm in two dimensions. Firstly, variants of Kleinberg's techniques do not take into account the semantics of the query string nor of the nodes being searched. As a result, polysemy of query words cannot be resolved. This paper presents an interactive query scheme utilizing the simple web ontology provided by the Open Directory Project to resolve meanings of a user query. Secondly, we extend a recently proposed personalized version of the Kleinberg algorithm [3]. Simulation results are presented to illustrate the sensitivity of our technique. We outline the implementation of our algorithm in the Persona personalized web search system.
</description>
<dc:date>2001-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149306">
<title>Ratings in Distributed Systems: A Bayesian Approach</title>
<link>https://hdl.handle.net/1721.1/149306</link>
<description>Ratings in Distributed Systems: A Bayesian Approach
Mui, Lik; Mohtashemi, Mojdeh; Ang, Cheewee; Szolovits, Peter; Halberstadt, Ari
For distributed systems at large and e-commerce systems in particular, ratings play an increasingly important role. Rating confer reputation measures about sources. This paper reports our formalization of the rating process. This paper argues that rating shuold be context- and individual- dependent quantities. In contrast to existing rating systems in many e-commerce or developer sites, our approach makes use of personalized and contextualized ratings for assessing source reputation. Our approach is based on a Bayesian probabilistic framework.
</description>
<dc:date>2001-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149305">
<title>Three Round Zero-Knowledge Using a Proof of Knowledge Assumption</title>
<link>https://hdl.handle.net/1721.1/149305</link>
<description>Three Round Zero-Knowledge Using a Proof of Knowledge Assumption
Lepinski, Matthew; Micali, Silvio
We provide a proof of knowledge assumption that allows us to construct a three round zero-knowledge proof system for any language in NP.
</description>
<dc:date>2001-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149304">
<title>Mutually Independent Commitment</title>
<link>https://hdl.handle.net/1721.1/149304</link>
<description>Mutually Independent Commitment
Liskov, Moses; Lysyanskeya, Anna; Micali, Silvio; Reyzin, Leonid; Smith, Adam
We describe a new kind of commitment scheme in which two parties commit to values in a commitment stage, at the end of which we are assured that the values they have committed to cannot be correlated to one another. We call this new primitive mutually independent commitments. We present three mutually independent commitment schemes which handle single bit commitments, and which are computationally hiding and perfecting binding.
</description>
<dc:date>2001-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149303">
<title>Forward-Secure Signatures with Optimal Signing and Verifying</title>
<link>https://hdl.handle.net/1721.1/149303</link>
<description>Forward-Secure Signatures with Optimal Signing and Verifying
Itkis, Gene; Reyzin, Leonid
Ordinary digital signatures have an inherent weakness: if the secret key is leaked, then all signatures, even the ones generated before the leak, are no longer trustworthy. Forward-secure digital signatures were recently proposed to address this weakness: they ensure that past signatures remain secure even if the current secret key is leaked. We propose the first forward-secure signature scheme for which both signing and verifying are as efficient as for one of the most efficient ordinary signature schemes (Guillou-Quisquater): each requiring just two modular exponentiations with a short exponent. All previously proposed forward-secure signature schemes took significantly longer to sign and verify than ordinary signature schemees. Our scheme requires only fractional increases to the sizes of keys and signatures, and no additional public storage. Like the underlying Guillou-Quisquater scheme, our scheme is provably secure in the random oracle model.
</description>
<dc:date>2001-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149302">
<title>A Unified Framework for Schedule and Storage Optimization</title>
<link>https://hdl.handle.net/1721.1/149302</link>
<description>A Unified Framework for Schedule and Storage Optimization
Thies, William F.; Viven, Frederic; Sheldon, Jeffery W.; Amarasinghe, Saman
We present a unified mathematical framework for analyzing the tradeoffs between parallelism and storage allocation within a parallelizing compiler. Using this framework, we show how to find the best storage mapping for a given schedule, the best schedule for a given storage mapping, and the best storage mapping that is valid for all legal schedules. Our techniques combines affine scheduling techniques with occupancy vector analysis, and incorporates general affine dependencies across statements and loop nests. We formulate the constraints imposed by the data dependencies and the storage mapping as a set of linear inequalities, and apply numerical programming techniques to efficiently solve for the best occupancy vector. We consider out method to be a first step towards automating a procedure that finds the optimal tradeoff between parallelism and storage space.
</description>
<dc:date>2000-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149301">
<title>Availability Study of Dynamic Voting Algorithms</title>
<link>https://hdl.handle.net/1721.1/149301</link>
<description>Availability Study of Dynamic Voting Algorithms
Ingols, Kyle; Keidar, Idit
Fault tolerant distributed systems often select a primary component to allow a subset of the processes to function when failures occur. The dynamic voting paradigm defines rules for selecting the primary component adaptively: when a partition occurs, if a majority of the previous primary component is connected, a new and possibly smaller primary is chosen. Several studies have shown that dynamic voting leads to more available solutions than other paradigms for maintaining a primary component. However, these studies have assumed that every attempt made by the algorithm to form a new primary component terminates successfully. Unfortunately, in real systems, this is not always the case: a change in connectivity can interrupt the algorithm whiel it is still attempting to form a new primary component; in such cases, algorithms typically block until processes can resolve the outcome of the interrupted attempt. This paper uses simulations to evaluate the effect of interruptions on the availability of dynamic voting algorithms. We study four dynamic voting algorithms, and identify two important characteristics that impact an algorithm's availability in runs with frequent connectivity changes. First, we show that the number of communication rounds exchanged in an algorithm plays a significant role in the availability achieved, especially in the degradation of availability as connectivity changes become more frequent. Second, we show that the number of processes that need to be present in order to resolve past attempts impacts the availability, especially during long runs with numerous connectivity changes.
</description>
<dc:date>2000-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149300">
<title>A General Framework for Highly Available Services based on Group Communication</title>
<link>https://hdl.handle.net/1721.1/149300</link>
<description>A General Framework for Highly Available Services based on Group Communication
Fekete, Alan; Keidar, Idit
We present a general framework for building highly available services. The framework uses group communication to coordinate a collection of servers. Our framework is configurable, in that one can adjust parameters such as the number of servers and the extent to which they are synchronized. We analyze the scenarios that can lead to the service availability being temporarily comprised, and we discuss the tradeoffs that govern the choice of parameters.
</description>
<dc:date>2000-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149299">
<title>Concurrent/Resettable Zero-Knowledge Protocols for NP in the Public Key Model</title>
<link>https://hdl.handle.net/1721.1/149299</link>
<description>Concurrent/Resettable Zero-Knowledge Protocols for NP in the Public Key Model
Micali, Silvio; Reyzin, Leonid
We propose a four-round protocol for concurrent and resettable zero-knowledge arguments for any langauge in NP, assuming the verifier has a pre-registered public-key. We also propose a three-round protocol with an additional timing assumption.
</description>
<dc:date>2000-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149298">
<title>A New Self-Play Experiment in Computer Chess</title>
<link>https://hdl.handle.net/1721.1/149298</link>
<description>A New Self-Play Experiment in Computer Chess
Heinz, Ernst
This paper presents the results of a new self-play experiment in computer chess. It is the _x000C_rst such experiment ever to feature search depths beyond 9 plies and thousands of games for every single match. Overall, we executed 17,150 self-play games (1,050{3,000 per match) in one \\calibration" match and seven \\depth X+1 , X" handicap matches at _x000C_xed iteration depths ranging from 5{12 plies. For the experiment to be realistic and independently repeatable, we relied on a state-of-the-art commercial contestant: Fritz 6 , one of the strongest modern chess pro- grams available. The main result of our new experimentis thatit shows the existence of diminishing returns for additional search in computer chess self-play by Fritz 6 with 95% statistical con_x000C_dence. The dimin- ishing returns manifest themselves by declining rates of won games and reversely increasing rates of drawn games for the deeper searching pro- gram versions. The rate of lost games, however, remains quite steady for the whole depth range of 5{12 plies.
</description>
<dc:date>2000-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149297">
<title>Systematic Testing of Multithreaded Programs</title>
<link>https://hdl.handle.net/1721.1/149297</link>
<description>Systematic Testing of Multithreaded Programs
Bruening, Derek; Chapin, John
We present a practical testing algorithm called ExitBlock that systematically and deterministically finds program errors resulting from unintended timing dependencies.  ExitBlock executes a program or a portion of a program on a given input multiple times, enumerating meaningful schedules in order to cover all program behaviors.
</description>
<dc:date>2000-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149296">
<title>Softspec:  Software-based Speculative Parallelism</title>
<link>https://hdl.handle.net/1721.1/149296</link>
<description>Softspec:  Software-based Speculative Parallelism
Bruering, Derek; Devabhaktuni, Srikrishna; Amarasinghe, Saman
We present Softspec, a technique for parallelizing sequential applications using only simple software mechanisms, requiring no complex program analysis or hardware support.  Softspec parallelizes loops whose memory references are stride-predictable.
</description>
<dc:date>2000-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149295">
<title>An Information Theoretic Approach for Shared Bottleneck Inference Based on End-to-end Measurements</title>
<link>https://hdl.handle.net/1721.1/149295</link>
<description>An Information Theoretic Approach for Shared Bottleneck Inference Based on End-to-end Measurements
Katabi, Dina; Bazzi, Issam; Yang, Xiaowei
Recent years have marked a growing interest in studying Internet path characteristics. However, most of the currently available tools to an end system to perform such measurements are slow inaccurate and generate an excessive amount of probing traffic. This paper introduces entropy as a novel and efficient metric for discovering Internet path characteristics based on data collected by an end system. In particular, the paper presents an entropy-based technique that enables an end system to cluster flows it receives according to their shared bottleneck. Our mechanism relies solely on information extracted from the packets' inter-arrivals at the receiver. It does not generate any probing traffic and can use data extracted from both TCP and UDP flows. Moreover, it requires only a small number of packets from each flow, which makes it useful for short-lived flows. We report the result of running the algorithm on simulated data and Internet traffic.
</description>
<dc:date>2000-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149294">
<title>Proving Correctness of a Distributed Shared Memory Implementation</title>
<link>https://hdl.handle.net/1721.1/149294</link>
<description>Proving Correctness of a Distributed Shared Memory Implementation
Castro, Miquel
DiSOM [3,4,2] is a distributed shared memory system that offers users an atomic collection of memory cells provided they satisfy certain well-formedness conditions. This report proves the correctness of DiSOM.  The system partitions memory into a set of objects and implicitly associates a read-write lock with each object. Users synchronize accesses to these objects-write implementation guarantees progress and the usual read-write lock exclusions conditions.
</description>
<dc:date>1999-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149293">
<title>Bitwidth Analysis with Application to Silicon Compilation</title>
<link>https://hdl.handle.net/1721.1/149293</link>
<description>Bitwidth Analysis with Application to Silicon Compilation
Stephenson, Mark; Babb, Jonathan; Amarasinghe, Saman
In this paper introduces Bitwise, a compiler that minimizes the bitwidth - the number of bits used to represent each operand - for both integers and pointers in a program. By propagating static information both forward and backward in the program dataflow graph, Bitwise frees in cases where the compiler can determine bitwidths automatically. We find a rich opportunity for bitwidth reductionin modern multimedia and streaming application workloads. For new architectures that support sub-word quantities, we expect that our bitwidth reductions will save power and increase processor performance.
</description>
<dc:date>1999-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149292">
<title>Exploiting Superword Level Parallelism with Multimedia Instruction Sets</title>
<link>https://hdl.handle.net/1721.1/149292</link>
<description>Exploiting Superword Level Parallelism with Multimedia Instruction Sets
Larsen, Samuel; Amarasinghe, Saman
Increasing focus on multimedia applications has prompted the addition of multimedia extensions to most existing general-purpose microprocessors. This added functionality comes primarily in the addition of short SIMD instructions. Unfortunately, access to these instructions is limited to in-line assembly and library calls. Some researchers have proposed using vector compilers as a means of exploiting multimedia instructions. Although vectorization technology is well understood, it is inherently complex and fragile. In addition, it is incapable of locating SIMD-style parallelism within a basic block. In this paper we introduce the concept of Superword Level Parallelism (SLP), a novel way of viewing parallelism in multimedia applications. We believe SLP is fundamentally different from the loop-level parallelism exploited by traditional vector processing, and therefore warrants a different method for extracting it. We have developed a simple and robust compiler technique for detecting SLP that targets basic blocks rather than loop nests. As with techniques designed to extract ILP, ours is able to exploit parallelism both across loop iterations and within badic blocks. The result is an algorithm that provides excellent performance in several application domains. Experiments on scientific and multimedia benchmarks have yielded average performance improvements of 84%, and range as high as 253%.
</description>
<dc:date>1999-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149291">
<title>Strength Reduction of Integer Division and Modulo Operations</title>
<link>https://hdl.handle.net/1721.1/149291</link>
<description>Strength Reduction of Integer Division and Modulo Operations
Amarasinghe, Saman; Lee, Walter; Greenwald, Ben
Integer division, modulo, and remainder operations are expressive and useful operations.  They are logical candidates to express complex data accesses such as the wrap-around behavior in queues using ring buffers, array address calculations in data distribution, and cache locality compiler-optimizations. Experienced application programmers, however, avoid them because they are slow. Furthermore, while advances in both hardware in both hardware and software have improved the performance of many parts of a program, few are applicable to division and modulo operations. This trend makes these operations increasingly detrimental to program performance.
</description>
<dc:date>1999-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149290">
<title>A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm</title>
<link>https://hdl.handle.net/1721.1/149290</link>
<description>A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm
Castro, Miguel
We have developed a practical algorithm for state-machine replication [7,11] that tolerates Byzantine faults. The algorithm is described in [4]. It offers a strong safety property - it implements a linearizable [5] object such that all operations invoked on the object execute atomically despite Byzantine failures and concurrency. Unlike previous algorithms [11, 10, 6], ours works correctly in asynchronous systems like the Internet, and it incorporates important optimizations that enable it to outperform previous systems by more than on order of magnitude [4].
</description>
<dc:date>1999-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149289">
<title>The MASC Composable Computing Infrastructure for Intelligent Environments</title>
<link>https://hdl.handle.net/1721.1/149289</link>
<description>The MASC Composable Computing Infrastructure for Intelligent Environments
Shatterjee, Sandeep; Devadas, Srinivas
We present a system architecture and framework for creating rapidly deployable intelligent environments. The rapid pace of innovation of computer hardware and intelligent systems software leads to uncertainty that deters manufacturers from adopting a single processor, network, or software environment for placement into their products. The MASC Composable Computing infrastructure addresses these issues by providing an upgradable hardware and software infrastructure that supports rapid development and deployment, as well as simple and economical maintenance of intelligent environmental systems.
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149288">
<title>Authenticated Byzantine Fault Tolerance Without Public-Key Cryptography</title>
<link>https://hdl.handle.net/1721.1/149288</link>
<description>Authenticated Byzantine Fault Tolerance Without Public-Key Cryptography
Castro, Miguel; Liskov, Barbara
We have developed a practical state-machine replication algorithm that tolerates Byzantine faults: it works correctly in asynchronous systems like the Internet and it incorporates several optimizations that improve the response time of previous algorithms by more than an order of magnitude.
</description>
<dc:date>1999-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149287">
<title>Can Statistical Zero Knowledge be made Non-interactive? or On the Relationship of SZK and NISZK</title>
<link>https://hdl.handle.net/1721.1/149287</link>
<description>Can Statistical Zero Knowledge be made Non-interactive? or On the Relationship of SZK and NISZK
Goldreich, Oded; Sahai, Amit; Vadhan, Salil
We extend the study of non-interactive statistical zero-knowledge proofs. Our main focus is to compare the class NISZK of problems possessing such non-interactive proofs to the class SZK of problems possessing interactive statistical zero-knowledge proofs. Along these lines, we first show that if statistical zero knowledge is non-trivial then so is non-interactive statistical zero knowledge, where by non-trivial we mean that the class includes problems which are not solvable in probabilistic polynommial-time. (The hypothesis holds under various assumptions, such as the intractability of the Discrete Logarithm Problem.) Furthermore, we show that if NISZK is closed under complement, then in fact SZK = NISZk, i.e. all statistical zero-knowledge proofs can be made non-interactive. The main tools in our analysis are two promise problems that are natural restrictions of promise problems known to be complete for SZK. We show that these restricted problems are in fact completer for NISZK and use this relationship to derive our results comparing the two classes. The two problems refer to the statistical difference, and difference in entropy, respectively, of a given distribution from the uniform one. We also consider a weak form of NISZK, in which only requires that for every inverse polynomial 1/p(n), there exists a simulator which achieves simulator deviation 1/p(n), and show that this weak form of NISZK actually equals NISZK.
</description>
<dc:date>1999-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149286">
<title>A Client-Server Oriented Algorithm for Virtually Synchronous Group Membership in WANs</title>
<link>https://hdl.handle.net/1721.1/149286</link>
<description>A Client-Server Oriented Algorithm for Virtually Synchronous Group Membership in WANs
Keidar, Idit; Sussman, Jeremy; Marzullo, Keith; Dolev, Danny
We describe a novel scalable group membership algorithm designed for wide area networks(WANs.) Our membership service does not evolve from existing LAN-oriented membership services; it was designed explicitly for WANs.
</description>
<dc:date>1999-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149285">
<title>NAIVE - Network Aware Internet Video Encoding</title>
<link>https://hdl.handle.net/1721.1/149285</link>
<description>NAIVE - Network Aware Internet Video Encoding
Briceno, Hector; Gortler, Steven J.; McMillan, Leonard
The distribution of digital video content over computer networks has become commonplace. Unfortunately, most digital video encoding standards do not degrade gracefully in the face of packet losses, which often occur in a  bursty fashion. We propose an new video encoding system that scales well with respect to the network's performance and degrades gracefully under packet loss.
</description>
<dc:date>1999-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149284">
<title>Dynamic Load Balancing with Group Communication</title>
<link>https://hdl.handle.net/1721.1/149284</link>
<description>Dynamic Load Balancing with Group Communication
Dolev, Shlomi; Segala, Roberto; Shvartsman, Alexander A.
This work considers the problem of efficiently performing a set of tasks using a network of processors in the setting where the network is subject to dynamic reconfigurations, including partitions and merges. A key challenge for this setting is the implementation of dynamic load balancing that reduces the number of tasks that are performed redundantly because of the reconfigurations. We explore new approaches for load balancing in dynamic networks that can be employed by applications using a group communication service. The group communication services that we consider include a membership service (establishing new groups to reflect dynamic changes) but does not include maintenance of a primary component. For the n-processor, n-task load balancing problem defined in this work, the following specific results are obtained. For the case of fully dynamic changes including fragmentation and merges we show that the termination time of any on-line task assignment algorithm is greater than the termination time of an off-line task assignment algorithm by a factor greater than n/12. We present a load balancing algorithmthat guarantees completion of all tasks in all fragments caused by partitions with work O(n + f ÔøΩ n) in the presence of f fragmentation failures. We develop an effective scheduling strategy for minimizing the task execution redundancy and we prove that our strategy provides each of the n processors with a schedule of ?(n1/3) tasks such that at most one task is performed redundantly by any two processors.
</description>
<dc:date>1999-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149283">
<title>Complexity Results for Single Machine Distance Constrained Scheduling Problems</title>
<link>https://hdl.handle.net/1721.1/149283</link>
<description>Complexity Results for Single Machine Distance Constrained Scheduling Problems
Engels, Daniel W.; Karger, David; Devadas, Srinivas
Scheduling problems that involve timing constraints between tasks occur often in machine shop scheduling (e.g., job shop scheduling problems) and code scheduling during software compilation for pipelined processors (e.g., multiprocessor sequencing and scheduling problems).
</description>
<dc:date>1998-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149282">
<title>Extracting all the Randomness from a Weakly Random Source</title>
<link>https://hdl.handle.net/1721.1/149282</link>
<description>Extracting all the Randomness from a Weakly Random Source
Vadhan, Salil
In this paper, we give two explicit constructions of extractors, both of which work for a source of any min-entropy on strings of length n.  The first extracts any constant fraction of the min-entropy using O(log^2 n) additional random bits.  The second extracts all the min-entropy using O(log 3 n) additional random bits. Both constructions use fewer truly random bits than any previous. construction which works for all min-entropies ans extracts a constant fraction of the min-entropy.
</description>
<dc:date>1998-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149281">
<title>Local Rules Modeling of Nucleation-Limited Virus Capsid Assembly</title>
<link>https://hdl.handle.net/1721.1/149281</link>
<description>Local Rules Modeling of Nucleation-Limited Virus Capsid Assembly
Schwartz, Russell; Prevelige, Peter E.; Berger, Bonnie
We describe an application of computer modeling to the study of the kinetics of virus capsid (protein shell) assembly.  We examine two proposed models of the source of nucleation-limited growth, an observed growth pattern in which initiation of new capsids occurs significantly more slowly than subunit addition onto initiated capsids.
</description>
<dc:date>1998-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149280">
<title>Maps: a Compiler-Managed Memory System for RAW Machines</title>
<link>https://hdl.handle.net/1721.1/149280</link>
<description>Maps: a Compiler-Managed Memory System for RAW Machines
Barua, Rajeev; Lee, Walter; Amarasinghe, Saman; Agarwal, Anant
Microprocessors of the next decade and beyond will be built using VLSI chips employing billions of transistors.  In this generation of microprocessors, achieving a high level of parallelism at a reasonable clock speed will require full distribution of mac.
</description>
<dc:date>1998-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149279">
<title>Indolent Closure Creation</title>
<link>https://hdl.handle.net/1721.1/149279</link>
<description>Indolent Closure Creation
Strumpen, Volker
A closure is a representation of a thread in memory, ready to be executed. The goal of this work is to create portable closures that can be transferred across binary incompatible architectures. Consequently, indolent closures are software-implemented, and rely on a copy mechanism which allows for potential data representation conversion on-the-fly.
</description>
<dc:date>1998-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149278">
<title>More on Proofs of Knowledge</title>
<link>https://hdl.handle.net/1721.1/149278</link>
<description>More on Proofs of Knowledge
Halevi, Shai; Micali, Silvio
The notion of proofs of knowledge is central to cryptographhic protocols, and many definitions for it have been proposed. In this work we explore a different facet of this notion, not addressed by prior definitions. Specifically, prior definitions concentrate on capturing the properties of the verifier, and do not pay much attention to the properties of the prover. Our new definition is strictly stronger than previous ones, and captures new and desirable properies. In particular, it guarantees prover feasibility, that is, it guarantees that the time spent by the prover in a proof of knowledge is comparable to that it spends in an "extraction" of this knowledge. Our definition also enables one to consider meaningfully the case of a single, specific prover.
</description>
<dc:date>1998-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149277">
<title>Copmutationally Sound Proofs</title>
<link>https://hdl.handle.net/1721.1/149277</link>
<description>Copmutationally Sound Proofs
Micali, Silvio
This paper puts forward a new notion of a proof based on computational complexity and explores its implications for computation at large. Computationally sound proofs provide, in a novel and meaningful framework, answer to old and new questions in complexity theory. In particular, given a random oracle or a new complexity assumption, they enable us to 1. prove that verifying is easier than deciding for all theorems; 2. provides a quite effective way to prove membership in computationally hard languages (such as C-NP-complete ones); and 3. show that every computation possesses a short certificate vouching its correctness. FInally, if a special type of computationally sound proof exists, we show that Blum's notion of program checking can be meaningfully broadened so as to prove that NP-complete languages are checkable.
</description>
<dc:date>2000-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149276">
<title>Proving Correctness of a Controller Algorithm for the RAID Level 5 System</title>
<link>https://hdl.handle.net/1721.1/149276</link>
<description>Proving Correctness of a Controller Algorithm for the RAID Level 5 System
Vazirir, Mandana; Lynch, Nancy A.; Wing, Jeannette
Mos RAID controllers implemented in industry are complicated and difficult to reason about. This complexity has led to software and hardware systems that are difficult to debug and hard to modify. To overcome this problem Courtright and Gibson have developed a rapidf prototyping framework for RAID architectures which relies on a generic controller algorithm [1]. The designer of a new architecture needs to specify parts of the generic controller algorithm and must justify the validity of the controller algorithm obtained. However the latter task may be difficult due to the concurrency of operations on the disks. This is the reason why it would be useful to provide designers with an automated verification tool tailored specificially for the RAID prototyping system. As a first step towards building such a tool, our approach consists of studying several controller algorithms manually, to determine the key properties that need to be verified. This paper presents the modeling and verification of a controller algorithm for the RAID Level 5 System [5]. We model the system using I/O automata [6], give an external requirements specification, and prove that the model implements its specification. We use a key invariant to find an error in a controller algorithm for the RAID Level 6 System [5].
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149275">
<title>Signing with Partially Adversarial Hashing</title>
<link>https://hdl.handle.net/1721.1/149275</link>
<description>Signing with Partially Adversarial Hashing
Micali, Silvio; Reyzin, Leonid
Digital signatures usually utilize one-way hash functions designed by other parties. It is thus possible that such hash functions are adverserially designed so as to enable forging signatures in otherwise secure schemes.  We initiate the study of signing
</description>
<dc:date>1998-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149274">
<title>On the Inapproximability of the Shortest Vector in a Lattice Within Some Constant Factor</title>
<link>https://hdl.handle.net/1721.1/149274</link>
<description>On the Inapproximability of the Shortest Vector in a Lattice Within Some Constant Factor
Micciancio, Danielle
We show that computing the approximate length of the shortest vector in a lattice within a factor c is NP-hard for randomized reductions for any constant c &lt; ? (2).
</description>
<dc:date>1998-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149273">
<title>Space - Time Scheduling of Instruction-Level Parallelism on a Raw Machine</title>
<link>https://hdl.handle.net/1721.1/149273</link>
<description>Space - Time Scheduling of Instruction-Level Parallelism on a Raw Machine
Lee, Walter; Barua, R.; Srikrishna, D.; Babb, Jonathan; Sarkar, V.; Amarasinghe, Saman; Agarwal, Anant
Advances in VLSI technology will enable chips with over a billion transistors within the next decade. Unfortunately, the centralized-resource architectures of modern microprocessors are ill-suited to exploit such advances. Achieving a high level of parallelism at a reasonable clock speed requires distributing the processor resources - a trend already visible in the dual-register-file architecture of the Alpha 21264.
</description>
<dc:date>1997-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149272">
<title>Specifying and Using a Partitionable Group Communication Service*</title>
<link>https://hdl.handle.net/1721.1/149272</link>
<description>Specifying and Using a Partitionable Group Communication Service*
Fekete, Alan; Lynch, Nancy A.; Shvartsman, Alexander A.
A new, simple formal specification is presented for a partitionable view-oriented group communication service. The specification consists of a state machine to express safety requirements and a timed trace property to express performance and fault-toleran.
</description>
<dc:date>1997-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149271">
<title>Acquisition of a Large Pose-Mosaic Dataset</title>
<link>https://hdl.handle.net/1721.1/149271</link>
<description>Acquisition of a Large Pose-Mosaic Dataset
Coorg, Satyan; Master, Neel; Teller, Seth
We describe the generation of a large pose-mosaic dataset: a collection of several thousand digital images, grouped by spatial position into spherical mosaics, each annotated with estimates of the acquiring camera's 6 DOF pose (3 DOF position and 3 DOF orientation) in an absolute coordinate system. The pose-mosaic dataset was generated by acquiring images, grouped by spatial position into nodes (essentially, spherical mosaics). A prototype mechanical pan-tilt head was manually deployed to acquire the data. Manual surverying provided initial position estimates for each node. A back-projecting scheme provided initial rotational estimates. Relative rotations within each node, along with internal camera parameters, were refined automatically by an optimization-correlation scheme. Relative translations and rotations among nodes were refined according to point correspondences, generated automatically and by a human operator. The resulting pose-imagery is self-consistent under a variety of evaluation metrics. Pose-mosaics are useful "first-class" data objects, for example in automatic reconstruction of textured 3D CAD models which represent urban exteriors.
</description>
<dc:date>1998-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149270">
<title>Lazy Reference Counting for Transactional Storage Systems</title>
<link>https://hdl.handle.net/1721.1/149270</link>
<description>Lazy Reference Counting for Transactional Storage Systems
Castro, Miguel; Adya, Atul; Liskov, Barbara
HAC is a novel technique for managing the direct the client cache in a distributed, persistent object storage system. In a companion paper, we showed that it outperforms other techniques across a wide range of cache sizes and workloads. This report describes HAC's solution to a specific problem: how to discard indirection table entries in an indirect pointer swizzling scheme.
</description>
<dc:date>1997-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149269">
<title>The Sensitivity of Communication Mechanisms to Bandwidth and Latency</title>
<link>https://hdl.handle.net/1721.1/149269</link>
<description>The Sensitivity of Communication Mechanisms to Bandwidth and Latency
Chong, Frederic T.; Barua, Rajeev; Dahlgren, Fredrik; Kubiatowicz, John D.; Agarwal, Anant
The goal of this paper is to gain insight into the relative performance of communication mechanisms as bisection bandwidth and network latency vary. We compare shared memory with and without prefetching, message passing with interrupts and with polling, and bulk transfer via DMA. We present two sets of experiments involing four irregular applications on the MIT Alewife multiprocessor. First, we introduce I/O cross-traffic to vary bisection bandwidth. Second, we change processor clock speeds to vary relative network latency. We establish a framework from which to understand a range of results. On Alewife, shared memory provides good performance, even on producer-consumer applications with little data-reuse. On machines with lower bisection bandwidth and higher network latency, however, message-passing mechanisms become important. In particular, the high communication volume of shared memory threatens to become difficult to support on future machines without expensive, high-dimensional networks. Furthermore, the round-trip nature of shared memory may not be able to tolerate the latencies of future networks.
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149268">
<title>Matching and Pose Refinement with Camera Pose Estimates</title>
<link>https://hdl.handle.net/1721.1/149268</link>
<description>Matching and Pose Refinement with Camera Pose Estimates
Coorg, Satyan; Teller, Seth
This paper describes novel algorithms that use absolute camera pose information to identify correspondence among point features in hundreds or thousands of images. Our incidence counting algorithm is a geometric approach to matching: it makes features by extruding them into an absolute 3-D coordinate system, then searching 3-D space for regions into which many features project.
</description>
<dc:date>1996-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149267">
<title>Light Traps</title>
<link>https://hdl.handle.net/1721.1/149267</link>
<description>Light Traps
Dawson, R.J. Macg.; McDonald, B.E.; Mycielski, J.; Pachter, L.
In the February 1992 issue of the American Mathematical Monthly, J. E. Connett  [1] asked whether it is possible to construct a 'light trap': a reflective-sided container with the property that a beam of light, shone into it from an appropriate direction, would be reflected inside it over and over again and never escape. Connett suggests that such a trap might be of value as a device to store light rays; however, the market for escape-proof golf holes might be even more lucrative!
</description>
<dc:date>1996-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149266">
<title>Protein Folding in the Generalized Hydrophobic-Polar Model on the Triangular Lattice</title>
<link>https://hdl.handle.net/1721.1/149266</link>
<description>Protein Folding in the Generalized Hydrophobic-Polar Model on the Triangular Lattice
Decatur, Scott E.
We consider the problem of determining the three-dimensional folding of a protein given its one-dimensional amino sequence. The model we use is based on the Hydrophobic-Polar (HP) model [2] on cubic lattices in which the goal is to find the fold with the maximum number of contacts between non-covalently linked hydrophobic amino acids.
</description>
<dc:date>1996-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149265">
<title>A Survey of Active Network Research</title>
<link>https://hdl.handle.net/1721.1/149265</link>
<description>A Survey of Active Network Research
Tennenhouse, David L.; Smith, Jonathan M.; Sincoskie, W. David; Wetherall, David J.; Minden, Gary J.
Active networks are a novel approach to network architecture in which the switches of the network perform customized computations on the messages flowing through them. This approach is motivated by both lead user applications, which perform user-driven computation at nodes within the network today, and the emergence of mobile code technologies that make dynamic network service innovation attainable. In this paper, we discuss two approaches to the realization of active networks and provide a snapshot of the current research issues and activities.
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149264">
<title>UDM: User Direct Messaging for General-Purpose Multiprocessing</title>
<link>https://hdl.handle.net/1721.1/149264</link>
<description>UDM: User Direct Messaging for General-Purpose Multiprocessing
Mackenzie, Kenneth; Kubiatowicz, John; Frank, Matthew; Lee, Walter; Victor, Lee; Agarwal, Anant; Kaashoek, M. Frans
User Direct Messaging (UDM) allows user-level, processor-to- processor messaging to coexist with general multiprogramming and virtual memory. Direct messaging, where processors launch and receive messages in tens of cycles directly via network interface FIFO's as opposed to indirectly via memory, offers high message bandwidth and low delivery latency by avoiding memory delay and buffer management overhead.
</description>
<dc:date>1996-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149263">
<title>Verification of the Randomized Consensus Algorithm of Aspnes and Herlihy: a Case Study*</title>
<link>https://hdl.handle.net/1721.1/149263</link>
<description>Verification of the Randomized Consensus Algorithm of Aspnes and Herlihy: a Case Study*
Pogosyants, Anna; Segala, Roberto; Lynch, Nancy A.
The Probabilistic I/O Automaton model of [20] is used as the basis for a formal presentation and proof of the randomized consensus algorithm of Aspnes and Herlihy. The algorithm guarantees termination within expected polynomial time.   The Aspnes-Herlihy algorithm is a rather complex algorithm. Processes move through a succesion of asynchronous rounds, attempting to agree at each round. At each round, the agreement attempt involves a distributed random walk.
</description>
<dc:date>1997-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149262">
<title>An Oblivious Data Structure and its Applications to Cryptography</title>
<link>https://hdl.handle.net/1721.1/149262</link>
<description>An Oblivious Data Structure and its Applications to Cryptography
Micciancio, Danielle
</description>
<dc:date>1996-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149261">
<title>Parameterized Types and Java</title>
<link>https://hdl.handle.net/1721.1/149261</link>
<description>Parameterized Types and Java
Bank, Joseph A.; Liskov, Barbara; Myers, Albert C.
Java offers the real possibility that most programs can be written in a type-safe language However, for Java to be broadly useful, it needs additional expressive power. This paper extends Java in one area where more power is needed: support for parametric polymorphism, which allows the definition and implementation of generic abstractions.
</description>
<dc:date>1996-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149260">
<title>Conservative Radiance Interpolants for Ray Tracing</title>
<link>https://hdl.handle.net/1721.1/149260</link>
<description>Conservative Radiance Interpolants for Ray Tracing
Teller, Seth; Bala, Kavita; Dorsey, Julie
Classical ray-tracing algorithms compute radiance returning to the eye along one or more sample rays through each pixel of an image. The output of a ray-tracing algorithm, although potentially photorealistic, is a two-dimensional quality an image array of radiance values and is not directly useful from any viewpoint other than the one for which it was computed.
</description>
<dc:date>1996-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149259">
<title>Cilk: An Efficient Multithreaded Runtime System</title>
<link>https://hdl.handle.net/1721.1/149259</link>
<description>Cilk: An Efficient Multithreaded Runtime System
Blumofe, Robert D.; Joerg, Christopher F.; Kuszmaul, Bradley C.; Leiserson, Charles E.; Randall, Keith H.; Yuli, Zhou
Cilk (pronounced "silk") is a C-based runtime system for multithreaded parallel programming. In this paper, we document the efficiency of the Cilk work-stealing scheduler, both empirically and analytically. We show that on real and synthetic applications, the "work" and  "critical-path length" of a Cilk computation can be used to model performance accurately.
</description>
<dc:date>1996-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149258">
<title>A Brief Overview of the GSM Radio Interface</title>
<link>https://hdl.handle.net/1721.1/149258</link>
<description>A Brief Overview of the GSM Radio Interface
Turletti, Thierry
This technical memorandum contains a compilation of several papers, reports and books relative to the GSM-900 radio interface. It is not exhaustive and it is restricted to the Traffic Channel/Full-Rate Speech (TCH/FS).
</description>
<dc:date>1996-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149257">
<title>A Spacially and Temporally Coherent Object Space Visibility Algorithm</title>
<link>https://hdl.handle.net/1721.1/149257</link>
<description>A Spacially and Temporally Coherent Object Space Visibility Algorithm
Coorg, Satyan; Teller, Seth
Efficiently identifying polygons that are visible from a changing synthetic viewpoint is an important problem in computer graphics. In many complex geometric models, most parts of the model are invisible from the instantaneous viewpoint. Despite this, hidden-surface algorithms like the z-buffer or BSP tree often expend significant computation processing invisible portions of the model.
</description>
<dc:date>1996-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149256">
<title>Modelling and Verification of Automated Transit Systems, Using Timed Automata, Invariants and Simulations</title>
<link>https://hdl.handle.net/1721.1/149256</link>
<description>Modelling and Verification of Automated Transit Systems, Using Timed Automata, Invariants and Simulations
Lynch, Nancy A.
This paper contains an overview of recent and current work in the M.I.T. Theory of Distributed Systems research group on modelling, verifying and analyzing problems arising in automated transit systems. The problems we consider are inspired by design work in Personal Rapid Transit (PRT) project at Raytheon (as described to us by Toy Johnson, Steve Spielman and Norm Delisle), and in the California PATH project (as described to us by Shankar  Sastry, Datta Godbole and John Lygeros)  [7, 6,13, 3].
</description>
<dc:date>1995-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149255">
<title>Hybrid I/O Automata</title>
<link>https://hdl.handle.net/1721.1/149255</link>
<description>Hybrid I/O Automata
Lynch, Nancy A.; Segala, Roberto; Vaandrager, Frits; Weinberg, H. B.
We propose a new hybrid I/O automaton model that is capable of describing both continuous and discrete behavior. The model, which extends the timed I/O automaton model of [12, 7] and the phase transition system models of [15, 2], allows communication among components using both shared variables and shared actions.
</description>
<dc:date>1995-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149254">
<title>Enhanced Certificate Revocation System</title>
<link>https://hdl.handle.net/1721.1/149254</link>
<description>Enhanced Certificate Revocation System
Micali, Silvio
We apply off-linne digital signatures to provide a novel approach to certificate revocation. Our approach dismisses with traditional CRLs and yields pubilc-key infrastructures that are several-hundred times cheaper to run than traditional ones. More generally, our technology also yields effective methods to lengthen the validity of a digital signature.
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149253">
<title>Symmetric Alternation Captures BPP</title>
<link>https://hdl.handle.net/1721.1/149253</link>
<description>Symmetric Alternation Captures BPP
Russell, Alexander; Sundaram, Ravi
We introduce the natural class Sp2 containing those languages which may be expressed in terms of two symmetric quantifiers. This class lies between ? and ? and naturally generates a "symmetric" hierarchy corresponding to the polynomial-time hierarchy. We demonstrate, using the  probabilistic method, new containment theorems for BPP.
</description>
<dc:date>1995-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149252">
<title>Temporally Coherent Conservative Visibility</title>
<link>https://hdl.handle.net/1721.1/149252</link>
<description>Temporally Coherent Conservative Visibility
Coorg, Satvan; Teller, Seth
Efficiently identifying polygons that are visible from a changing synthetic viewpoint is an important problem in computer graphics. even with hardware support, simple algorithms like depth-buffering cannot achieve interactive frame rates when applied to geometric models with many polygons. However, a visibility algorithm that exploits the occlusion properties of the scene to identify a superset of visible polygons, without touching most invisible polygons, could achieve fast rates while viewing such models.
</description>
<dc:date>1995-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149251">
<title>Automatic Partitioning of Parallel Loops and Data Arrays for Distributed Shared-memory Multiprocessors</title>
<link>https://hdl.handle.net/1721.1/149251</link>
<description>Automatic Partitioning of Parallel Loops and Data Arrays for Distributed Shared-memory Multiprocessors
Agarwal, Anant; Kranz, David A.; Natarajan, Venkat
This paper presents a theoretical framework for automatically partitioning parallel loops to minimize cache coherency traffic on shared-memory multiprocessors.  While several previous papers have looked at hyperplane partitioning of iteration spaces to reduce communication traffic, the problem of deriving the optimal tiling parameters for minimal communication in loops with general affine index expressions had remained open. Our paper solves this open problem by presenting a method for deriving an optimal hyperparallelepiped tiling of iteration spaces for minimal communication in multiprocessors with caches. We show that the same theoretical framework can also be used to determine optimal tiling parameters for both data and loop partitioning in distributed memory multicomputers. Our framework uses matrices to represent iteration and data space mappings and the notion of uniformly intersecting references to capture temporal locality in array references. We introduce the notion of data footprints to estimate the communication traffic between processors and use linear algebraic methods and lattice theory to compute precisely the size of data footprints. We have implemented this framework in a compiler for Alewife, a distributed shared-memory multiprocessor.
</description>
<dc:date>1995-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149250">
<title>Guaranteeds Partial Key-escrow</title>
<link>https://hdl.handle.net/1721.1/149250</link>
<description>Guaranteeds Partial Key-escrow
Micali, Silvio
</description>
<dc:date>1995-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149249">
<title>On the Redundancy Achieved by Huffman Codes</title>
<link>https://hdl.handle.net/1721.1/149249</link>
<description>On the Redundancy Achieved by Huffman Codes
De Prisco, Roberto; De Santis, Alfredo
It has been recently proved that the redundancy r of any discrete memoryless source satisfies r &lt; 1 -H(pn), where pn is the least likely source letter probability. This bound is achieved only by sources consisting of two letters. We prove a sharper bound if the number of source letters is greater than two. Also provided is a new upper bound on r, as function of the two least likely source letter probabilities which improve on previous results.
</description>
<dc:date>1995-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149248">
<title>The Power of Team Exploration: Two Robots Can Learn Unlabeled Directed Graphs</title>
<link>https://hdl.handle.net/1721.1/149248</link>
<description>The Power of Team Exploration: Two Robots Can Learn Unlabeled Directed Graphs
Bender, Michael A.; Slonim, Donna K.
We show that two cooperating robots can learn exactly any strongly-connected directed graph with n indistinguishable nodes in expected time polynomial in n. We introduce a new type of homing sequence for robots, which helps the robots recognize certain previously-seen nodes. We represent an algorithm in which the robots learn the graph and the homing sequence simultaneously by actively wandering through the graph.
</description>
<dc:date>1995-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149247">
<title>What are principal typings and what are they good for?</title>
<link>https://hdl.handle.net/1721.1/149247</link>
<description>What are principal typings and what are they good for?
Jim, Trevor
We demonstrate the pragmatic value of the principal typing property, a property more general than ML's principal type property, by studying a type system with principal typings. The type system is based on rank 2 intersection types and is closely related to ML. Its principal typing property provides elegant support for separate compilation, including "smartest recompilation" and incremental type inference, and for accurate type error messages. Moreover, it motivates a novel rule for typing recursive definitions that can type many examples of polymorphic recursion. Type inference remains decidable; this is surprising, since type inference for ML plus polymorphic recursion is undecidable.
</description>
<dc:date>1995-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149246">
<title>Rank 2 Type Systems and Recursive Definitions</title>
<link>https://hdl.handle.net/1721.1/149246</link>
<description>Rank 2 Type Systems and Recursive Definitions
Jim, Trevor
We demonstrate an equivalence between the rank 2 fragments of the polymorphic lambda calculus (System F) and the intersection type discipline: exactly the same terms are typable in each system. An immediate consequence is that typability in the rank 2 intersection system is DEXPTIME-complete. We introduce a rank 2 system combining intersections and polymorphism and prove that it types exactly the same terms as the other rank 2 systems. The combined system suggests a new rule for typing recursive definitions. The result is a rank 2 type system with decidable type inference that can type some interesting examples of polymorphic recursion. Finally, we discuss some applications of the type system in data representation optimizations such as unboxing and overloading.
</description>
<dc:date>1995-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149245">
<title>Charge-Based Proportional Scheduling</title>
<link>https://hdl.handle.net/1721.1/149245</link>
<description>Charge-Based Proportional Scheduling
Maheshwari, Umesh
Most priority-based schedulers lack the ability to control the relative execution rates of applications. A recent scheme, called lottery scheduling [WW94], uses randomization to control the execution rates of threads in proportion to the tickets allocated to them.
</description>
<dc:date>1996-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149244">
<title>Stride Scheduling: Deterministic Proportional- Share Resource Management</title>
<link>https://hdl.handle.net/1721.1/149244</link>
<description>Stride Scheduling: Deterministic Proportional- Share Resource Management
Waldspurger, Carl A.; Weihl, William E.
This paper presents stride scheduling, a deterministic scheduling technique that efficiently supports the same flexible resource management abstractions introduced by lottery scheduling. Compared to lottery scheduling, stride scheduling archives significantly improved accuracy over relative throughput rates, with significantly lower response time variability.
</description>
<dc:date>1995-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149243">
<title>Local Rule Switching Mechanism for Viral Shell Geometry</title>
<link>https://hdl.handle.net/1721.1/149243</link>
<description>Local Rule Switching Mechanism for Viral Shell Geometry
Berger, Bonnie; Shor, Peter W.
In a previous paper [Berger et al., PNAS 91 7732,1994] a theory of virus shell formation was proposed in which shell assembly is directed by local interactions of the coat ans scaffolding subunits. This theory requires that the same chemical subunits assume different, stable conformations depending on their position in the shell.
</description>
<dc:date>1995-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149242">
<title>'C: A Language for High-Level, Efficient, and Machine-independant Dynamic Code Generation</title>
<link>https://hdl.handle.net/1721.1/149242</link>
<description>'C: A Language for High-Level, Efficient, and Machine-independant Dynamic Code Generation
Engler, Dawson R.; Hsieh, Wilson C.; Kaashoek, M. Frans
Dynamic code generation allows specialized code sequences to be crafted using runtime information. Since this information is by definition not available statically, the use of dynamic code generation can achieve performance inherently beyond that of static code generation. Previous attempts to support dynamic code generation have been low-leveled, expensive, or machine-dependent.
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149241">
<title>Algorithms for Modeling and Measuring Proteins</title>
<link>https://hdl.handle.net/1721.1/149241</link>
<description>Algorithms for Modeling and Measuring Proteins
Slonim, Donna K.
In this paper we investigate efficient algorithms for computing the volume and surface area of protein molecules are modeled by sets of overlapping spheres in R 3. We summarize and critique three papers in the field, and we add several new contributions of our own.
</description>
<dc:date>1995-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149240">
<title>A Case Study of Shared Memory and Message Passing: The Triangle Puzzle</title>
<link>https://hdl.handle.net/1721.1/149240</link>
<description>A Case Study of Shared Memory and Message Passing: The Triangle Puzzle
Lew, Kevin
This thesis is the first controlled case study that compares shared-memory and message-passing implementations of an application that solves the triangle puzzle and runs on actual hardware: only the communication interfaces used by the implementations vary; all other system components remained fixed. The implementations run on the MIT Alewife machine, a cache-coherent, distributed-shared-memory multiprocessor that efficiently supports both the shared-memory and message-passing programming models.
</description>
<dc:date>1995-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149239">
<title>Communication-Minimal Partitioning of Parallel Loops and Data Arrays for Cache-Coherent Distributed -Memory Multiprocess</title>
<link>https://hdl.handle.net/1721.1/149239</link>
<description>Communication-Minimal Partitioning of Parallel Loops and Data Arrays for Cache-Coherent Distributed -Memory Multiprocess
Barua, Rajeev; Kranz, David; Agarwal, Anant
Harnessing the full performance potential of cache-coherent distributed shared memory multiprocessors without inordinate user effort requires a compilation technology that can automatically manage multiple levels of memory hierarchy. This paper describes a working compiler for such machines that automatically partitions loops and data arrays to optimize locality of access.
</description>
<dc:date>1995-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149238">
<title>Addressing Partitioned Arrays in Distributed Memory Multiprocessors - the Software Virtual Memory Approach</title>
<link>https://hdl.handle.net/1721.1/149238</link>
<description>Addressing Partitioned Arrays in Distributed Memory Multiprocessors - the Software Virtual Memory Approach
Barua, Rajeev; Kranz, David; Agarwal, Anant
Harnessing the full performance potential of cache-coherent distributed shared memory multiprocessors without inordinate user effort requires a compilation technology that can automatically manage multiple levels of memory hierarchy. This paper describes a working compiler for such machines that automatically partitions loops and data arrays to optimize locality of access.
</description>
<dc:date>1994-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149237">
<title>Symmetric Alteration Captures BPP</title>
<link>https://hdl.handle.net/1721.1/149237</link>
<description>Symmetric Alteration Captures BPP
Russell, Alexander; Sundaram, Ravi
We introduce the natural class Sp2 containing those languages which may be expressed terms of two symmetric quantifiers. This class lies between ?p2 and ? and naturally generates a "symmetric"  hierarchy corresponding to the polynomial-time hierarchy.  We demonstrate, using the probabilistic method, new containment theorems for BPP.
</description>
<dc:date>1995-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149236">
<title>On the Mathematics of Virus Shell Assembly</title>
<link>https://hdl.handle.net/1721.1/149236</link>
<description>On the Mathematics of Virus Shell Assembly
Berger, Bonnie; Shor, Peter W.
A local rule theory is developed which shows that the self-assembly of icosahedral virus shells may depend on only the lower-level interactions of a protein subunit with its neighbors, i.e. local rules, rather than on larger structural building blocks. The local rule theory provides a framework for understanding the assembly of icosahedral viruses.
</description>
<dc:date>1994-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149235">
<title>Implementing Sequentially Consistant Shared Objects using Broadcast and Point-To-Point Communications</title>
<link>https://hdl.handle.net/1721.1/149235</link>
<description>Implementing Sequentially Consistant Shared Objects using Broadcast and Point-To-Point Communications
Fekete, Alan; Kaashoek, M. Frans; Lynch, Nancy A.
A distributed algorithm that implements a sequentially consistent collection of shared read/update objects using a combination of broadcast and point-to-point communication is presented and proved correct. This algorithm is a generalization of one used in the Orca shared object system. The algorithm caches objects in the local memory of processors according to application needs; each read operation accesses a single copy of the object, while each update accesses all copies. Copies of all the objects are kept consistent using a strategy based on sequence numbers for broadcasts.
</description>
<dc:date>1995-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149234">
<title>CRL: High - Performance All-Software Distributed Shared Memory*</title>
<link>https://hdl.handle.net/1721.1/149234</link>
<description>CRL: High - Performance All-Software Distributed Shared Memory*
Johnson, Kirk L.; Kaashoek, M. Frans; Wallach, Deborah A.
This paper introduces the C Region Library (CRL), a new all-software distributed shared memory (DSM) system. CRL requires no special compiler, hardware , or operating system support beyond the ability to send and receive messages. It provides a simple, portable shared address space programming model that it capable of delivering good performance on a wide range of multiprocessor and distributed system architectures.
</description>
<dc:date>1995-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149233">
<title>Piecemeal Graph Exploration by a Mobile Robot*</title>
<link>https://hdl.handle.net/1721.1/149233</link>
<description>Piecemeal Graph Exploration by a Mobile Robot*
Awerbuch, Baruch; Betke, Margrit; Rivest, Ronald; Singh, Mona
We study how a mobile robot can piecemeal learn an unknown environment. The robot's goal is to learn a complete map of its environment, while satisfying the constraint that it must return every so often to its starting position (for refueling, say). The environment is modelled as an arbitrary, undirected graph, which is initially unknown to the robot.
</description>
<dc:date>1995-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149232">
<title>Using Non-interactive Proofs to Achieve Independence Efficiently and Securely</title>
<link>https://hdl.handle.net/1721.1/149232</link>
<description>Using Non-interactive Proofs to Achieve Independence Efficiently and Securely
Gennaro, Rosario
Independence or simultaneous broadcast is a fundamental tool to achieve security in fault tolerant distributed computing. It allows n players to commit to independently chosen values. In this paper we present a constant round protocol to perform this task. Previous solutions were 0(log n) rounds. In the process we develop a new and stronger formal definition from this problem.
</description>
<dc:date>1994-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149231">
<title>The Use of the Domain Name System for Dynamic References in an Online Library</title>
<link>https://hdl.handle.net/1721.1/149231</link>
<description>The Use of the Domain Name System for Dynamic References in an Online Library
Alavi, Ali
Persistent, dynamic references (or links) to remove documents are an essential part of an online library. This thesis examines two distributed database systems, X.500 and the Domain Name System(DNS), upon which to build dynamic references. DNS was chosen and was used to design a model and build a sample dynamic reference system. This system seems to exhibit the scalability, robustness, usuability, and efficiency necessary for building global distributed online libraries.
</description>
<dc:date>1994-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149230">
<title>How Can We Compute with Arrays of Nanstructures?</title>
<link>https://hdl.handle.net/1721.1/149230</link>
<description>How Can We Compute with Arrays of Nanstructures?
Biafore, Michael
In part the goal of the Ultra Program is to extract useful computation from nanometer scale effects. To accomplish this goal those of us who are computer scientists must communicate clearly to those of you who are chemists and device physicists precisely what kinds of "computational primitives" you need to obtain from a nanoscale structure  before we can contemplate using it as a building block for ultra-dense ultra-fast computation.
</description>
<dc:date>1994-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149229">
<title>The Generalized Railroad Crossing: A Case Study in Formali Verification of Real-time Systems</title>
<link>https://hdl.handle.net/1721.1/149229</link>
<description>The Generalized Railroad Crossing: A Case Study in Formali Verification of Real-time Systems
Heitmeyer, Constance; Lynch, Nancy A.
A new solution to the Generalized Railroad Crossing problem, based on timed automata, invariants and simulation mappings, is presented and evaluated. The solution shows formally the correspondence between four system descriptions: an axiomatic specification, an operational specification, a discrete system implementation, and a system implementation that works with a continuous gate model.
</description>
<dc:date>1994-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149228">
<title>An Efficient Implementation of A Hierarchical Weighted Fair Queue Packet Scheduler</title>
<link>https://hdl.handle.net/1721.1/149228</link>
<description>An Efficient Implementation of A Hierarchical Weighted Fair Queue Packet Scheduler
Ndiaye, Oumar
The technical developments in computer networks in recent years have spawned the possibility of merging different services into a single Integrated Service Packet Network (ISPN). The types of service quality required by each of the individual services in an ISPN often differ greatly. Thus, the packet scheduling algorithms used in such networks  must be flexible enough to allocate the available link shares according to the service quality requirements of the different services.
</description>
<dc:date>1994-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149227">
<title>Application of Minimal Perfect Hashing in Main Memory Indexing</title>
<link>https://hdl.handle.net/1721.1/149227</link>
<description>Application of Minimal Perfect Hashing in Main Memory Indexing
Ho, Yuk
With the rapid decrease in the cost of random access memory (RAM), it will soon become economically feasible to place full-text indexes of a library in main memory.  One essential component of  the indexing system is a hashing algorithm, which maps a keyword into the memory address of the index information corresponding to that keyword.  This thesis studies the application of the minimal perfect hashing algorithm in main memory indexing.  This algorithm is integrated into the index search engine of the Library 2000 system, a digital on-line library system. The performance if this algorithm is compared with that of the open-address hashing scheme.  We find that although the minimal perfect hashing algorithm needs fewer keyword comparisons per keyword search on average, its hashing performance is slower than the open-addressing scheme.
</description>
<dc:date>1994-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149226">
<title>Hybrid Caching for Scalable Oject Systems (Think Globally, Act Locally)</title>
<link>https://hdl.handle.net/1721.1/149226</link>
<description>Hybrid Caching for Scalable Oject Systems (Think Globally, Act Locally)
O'Toole, James; Shrira, Liuba
Object-based client caching allows clients to keep more frequently accessed objects while discarding colder objects that reside on the same page. However, when these objects are modified and sent to the server, it may need to read the corresponding page from disk to install the update. These installation reads are not required with a page-based cache because whole pages are sent to the server.
</description>
<dc:date>1994-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149225">
<title>Opportunistic Log: Efficient Installation Reads in a Reliable Object Server</title>
<link>https://hdl.handle.net/1721.1/149225</link>
<description>Opportunistic Log: Efficient Installation Reads in a Reliable Object Server
O'Toole, James; Shrira, Liuba
In a distributed storage system, client caches managed on the basis of small granularity objects can provide better memory utilization then page-based caches. However, object servers, unlike page servers, must perform additional disk reads. These installation reads are required to install modified objects onto their corresponding disk pages.
</description>
<dc:date>1994-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149224">
<title>Coordinated Resource Management in a Replicated Objected Server</title>
<link>https://hdl.handle.net/1721.1/149224</link>
<description>Coordinated Resource Management in a Replicated Objected Server
Ghemawat, Sanjay; Gruber, Robert; O'Toole, James, Jr.; Shrira, Liuba
We propose several new  techniques for resource management in a replicated object server.  By coordinating cache and disk usage among the replicas, these techniques increase throughput and reduce fetch latency.  Cache splitting speeds up fetches by avoiding redundant cache entries, effectively increasing the cache size.  Coordinated writing coordinates disk writes to ensure that one replica is always available to service fetches. We investigate the performance of a replicated server using these techniques, and we present simulation results showing that these techniques provide substantial performance improvements across a variety of workloads.
</description>
<dc:date>1994-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149223">
<title>Optimal Clock Synchronization Under Different Delay Assumptions</title>
<link>https://hdl.handle.net/1721.1/149223</link>
<description>Optimal Clock Synchronization Under Different Delay Assumptions
Attiya, Hagit; Herzberg, Amir; Rajsbaum, Sergio
The problem of achieving optimal clock synchronization in a communication network with arbitrary topology and perfect clocks (that do not drift) is studied. Clock synchronization algorithms are presented for a large family of delay assumptions. Our algorithms are modular and consist of three major components. The first component holds for any type of delay assumptions; the second component holds for a large, natural family of local delay assumptions; the third component has to be tailored for each specific delay assumption. Optimal clock synchronization algorithms are derived for several types of delay assumptions by appropriately tuning the third component. The delay assumptions include lower and upper delay bounds, no bounds at all, and bounds on the difference of the delay in opposite directions. In addition, our model handles systems where some processors are connected by broadcast networks in which every message arrives to all processors at approximately the same time. A composition theorem allows combinations of different assumptions for different lins or even for the same link; such mixtures are common in practice. Our results acheive the best possible precision in each execution. This notion of optimality is stronger than the more common notion of worst case optimality. The new notion of optimality applied to systems where the worst case behavior of any clock synchronization algorithm is inherently unbounded.
</description>
<dc:date>1994-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149222">
<title>FUGU: Implementing Translation and Protection in a Multiuser, Multimodel Multiprocessor</title>
<link>https://hdl.handle.net/1721.1/149222</link>
<description>FUGU: Implementing Translation and Protection in a Multiuser, Multimodel Multiprocessor
Mackenzie, Kenneth; Kubiatowicz, John; Agarwal, Anant; Kaashoek, M. Frans
Multimodel multiprocessors provide both shared memory and message passing primitives to the user for efficient communication. In a multiuser machine, translation permits machine resource to be virtualized and protection permits users to be isolated. The challenge in a multiuser multiprocessor is to provide translation and protection sufficient for general-purpose computing without compromising communication performance, particularly the performance of communication between parallel threads belong to the same computation.
</description>
<dc:date>1994-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149221">
<title>Verifiable Secret Sharing as Secure Computation</title>
<link>https://hdl.handle.net/1721.1/149221</link>
<description>Verifiable Secret Sharing as Secure Computation
Gennaro, Rosario; Micali, Silvio
We present a stronger notion of verifiable secret sharing and exhibit a protocol implementing it.  We show that our new notion is preferable to the old ones whenever verifiable secret sharing is used as a tool within larger protocols, rather than being a goal in itself.
</description>
<dc:date>1994-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149220">
<title>A Secure and Efficient Digital Signature Algorithm</title>
<link>https://hdl.handle.net/1721.1/149220</link>
<description>A Secure and Efficient Digital Signature Algorithm
Micali, Silvio
</description>
<dc:date>1994-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149219">
<title>PAC-Learning Prolog Clauses With or Without Errors</title>
<link>https://hdl.handle.net/1721.1/149219</link>
<description>PAC-Learning Prolog Clauses With or Without Errors
Gennaro, Rosario
Recently researchers have been interested in trying to expand the  domain of learnability to subsets of first-order logic,  in particular Prolog programs. This new research area has been named  Inductive Logic Programming (ILP).   In a nutshell we can describe a generic ILP problem as following: given  a set E of (positive and negative) examples of a target predicate,  and some background knowledge B about the world (usually a logic  program including facts and auxiliary predicates), the task is to  find a logic program H (our hypothesis) such that all positive  examples can be deduced from B and H, while no negative  example can.   In this paper we review some of the results achieved in this area  and discuss the techniques used. Moreover we prove the following new results:   (1)  Predicates described by non-recursive, local clauses of at        most k literals are PAC-learnable under any distribution.       This generalizes a previous result that was valid only        for constrained clauses.   (2)  Predicates that are described by k non-recursive local        clauses are PAC-learnable under any distribution.        This generalizes a previous result that was non constructive        and valid only under some class of distributions.   Finally we introduce what we believe is the first theoretical framework  for learning Prolog clauses in the presence of errors.  To this purpose we introduce a new noise model, that we call  the fixed attribute noise model, for learning propositional  concepts over the Boolean domain. This new noise model  can be of its own interest.
</description>
<dc:date>1994-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149218">
<title>A Comparison of Simulation Techniques and Algebraic Techniques for Verifying Concurrent Systems</title>
<link>https://hdl.handle.net/1721.1/149218</link>
<description>A Comparison of Simulation Techniques and Algebraic Techniques for Verifying Concurrent Systems
Lynch, Nancy A.; Segala, Roberto
Simulation-based assertional techniques and process algebraic techniques are two of the major methods that have been proposed for the verification of concurrent and distributed systems. It is shown how each of these techniques can be applied to the task of verifying systems described as input/output automata; both of these ways, first using forward simulations, an execution correspondence lemma, and a simple fairness argument, and second using deductions within the process algebra DIOA for I/O automata. An extended evaluation and comparison of the two methods is given.
</description>
<dc:date>1993-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149217">
<title>Anatomy of a Message in the Alewife Multiprocessor</title>
<link>https://hdl.handle.net/1721.1/149217</link>
<description>Anatomy of a Message in the Alewife Multiprocessor
Kubiatowicz, John; Agarwal, Anant
</description>
<dc:date>1993-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149216">
<title>Analyzing Multiprocessor Cache Behavior Through Data Reference Modeling</title>
<link>https://hdl.handle.net/1721.1/149216</link>
<description>Analyzing Multiprocessor Cache Behavior Through Data Reference Modeling
Tsai, Jory; Agarwal, Anant
This paper develops a data reference modeling technique to estimate with high accuracy the cache miss ratio in cache-coherent multiprocessors. The technique involves analyzing the dynamic data referencing behavior of parallel algorithms. Data reference modeling first identifies of different types of shared data blocks accessed during the execution of a parallel algorithm, then captures in a few parameters the cache behavior of each shared block as a function of the problem size, number of processors, and cache size, and finally constructs an analytical expression for each algorithm to estimate the cache miss ratio.
</description>
<dc:date>1993-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149215">
<title>Simulation Techniques for Proving Properties of Real-time Systems</title>
<link>https://hdl.handle.net/1721.1/149215</link>
<description>Simulation Techniques for Proving Properties of Real-time Systems
Lynch, Nancy A.
The method of simulations is an important technique for reasoning about real-time and other timing-based systems. It is adapted from an analogous method for untimed systems. This paper presents the simulation method in the context  of a very general automaton (i.e., labelled transition system) model for timing-based systems. Sketches are presented of several typical examples for which the method has been used successfully. other complementary tools are also described, in particular invariants for safety proofs, progress functions for timing proofs, and execution correspondences for liveness proofs.
</description>
<dc:date>1993-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149214">
<title>Software-Extended Coherent Shared Memory: Performance and Cost</title>
<link>https://hdl.handle.net/1721.1/149214</link>
<description>Software-Extended Coherent Shared Memory: Performance and Cost
Chaiken, David; Agarwal, Anant
This paper evaluates the tradeoffs involved when designing a directory-based protocol that implements coherent shared memory through a combination of hardware and software mechanisms. The fundamental design decisions involve balancing the size and cost of the hardware directory and control, the complexity of the software interface, and the overall performance of the system. In order to study these design problems, we experiment with a spectrum of cache-coherence schemes, raging from a full-map directory that supports all sharing patterns in hardware to an implementation that performs all memory-side actions in software.
</description>
<dc:date>1993-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149213">
<title>The Revitalized Relationship Between Probabilistically Checkable Debate Systems, IP, and PSpace</title>
<link>https://hdl.handle.net/1721.1/149213</link>
<description>The Revitalized Relationship Between Probabilistically Checkable Debate Systems, IP, and PSpace
Russell, Alexander; Sundaram, Ravi
In 1990, PSPACE was shown to be identical to IP, the class of languages with interactive proofs  [11, 2]. Recently, PSPACE was again recharacterized, this time in terms of (Random) Probabilistically Checkable Debate Systems [4, 5]. In particular, it was shown that SPACE = PCDS[log n, 1] = RPCDS [log n, 1]. We study the relativized behaviour of the classes defined by these debates systems in comparison with the classes IP and PSPACE.
</description>
<dc:date>1993-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149212">
<title>Virtual Wires: Overcoming Pin Limitations in FPGA-based Logic Emulators</title>
<link>https://hdl.handle.net/1721.1/149212</link>
<description>Virtual Wires: Overcoming Pin Limitations in FPGA-based Logic Emulators
Babb, Jonathan; Tessier, Russell; Agarwal, Anant
Existing FPGA-based logic emulators suffer from limited inter-chip communication bandwidth, resulting in low gate utilization (10 20 percent). This resource imbalance increases the number of chips needed to emulate a particular logic design and thereby decreases emulation speed, since signals must cross more chip boundaries. Current emulators only use a fraction of potential communication bandwidth because they dedicate each FPGA pin (physical wire) to a single emulated signal (logical wire). These logical wires are not active simultaneously are only switched at emulation clock speeds.
</description>
<dc:date>1992-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149211">
<title>Compile-time Loop Splitting for Distributed Memory Multiprocessors</title>
<link>https://hdl.handle.net/1721.1/149211</link>
<description>Compile-time Loop Splitting for Distributed Memory Multiprocessors
Tanguay, Donald O., Jr.
In a distributed memory multiprocessor, a program's task is partitioned among the processors to exploit parallelism, and the data are partitioned to increase referential locality. Though the purpose of partitioning is to shorten the execution time of an algorithm, each data reference can become a complex expression based upon the data partitions. As an attempt to minimize the computation needed for array references, loop splitting can further divide a partitioned loop into segments that allow the code hoisting and strength reduction optimizations. This thesis introduces two methods of loop splitting, rational and interval. While rational splitting divides the loop into equal-length GCD segments, interval splitting specifies segments as an explicit list of intervals. These two methods have been implemented and studied. Under our execution model, the loop in the algorithms analyzed executes an average of 2 to 3 times faster after loop splitting.
</description>
<dc:date>1993-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149210">
<title>Column-associative Caches: A Technique for Reducing the Miss Rate of Direct-mapped Caches</title>
<link>https://hdl.handle.net/1721.1/149210</link>
<description>Column-associative Caches: A Technique for Reducing the Miss Rate of Direct-mapped Caches
Agarwal, Anant; Pudar, Steven D.
Direct-mapped caches are a popular design choice for high-performance processors; unfortunately, direct-mapped caches suffer systematic interference misses when more than one address map into the same cache set. This paper describes the design of column-associative caches, which minimize the conflicts that arise in direct-mapped accesses by allowing conflicting addresses to dynamically choose alternate hashing functions, so that most of the conflicting data can reside in the cache. At the same time, however, the critical hit access path is unchanged. The key to implementing this scheme efficiently is the addition to each cache set of a rehash bit, which indicates whether that set stores data that is referenced by an alternate hashing function. When multiple addresses map into the same location, these rehashed locations are preferentially replaced. We demonstrate using trace-driven simulations and an analytical model that a column-associative cache removed virtually all interference misses for large caches, without altering the critical hit access time.
</description>
<dc:date>1993-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149209">
<title>Modeling Multiprogrammed Caches</title>
<link>https://hdl.handle.net/1721.1/149209</link>
<description>Modeling Multiprogrammed Caches
Agarwal, Anant
This paper presents a simple, yet accurate, model for multiprogrammed caches and validates it against trace-driven simulation. The model takes into account nonstationary behavior of processes and process sharing. By making judicious approximations, the paper shows that a very simple expression of the form u^2(p - 1)/tS accurately models the multiprogramming component of the miss rate of large direct-mapped caches. In the above expression, t is the context-switching interval, S is the cache size in blocks, p is the number of processes, and u is the number of unique blocks accesses by a process during the interval t.
</description>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149208">
<title>Forward and Backward Simulations Part II: Timing-based Systems</title>
<link>https://hdl.handle.net/1721.1/149208</link>
<description>Forward and Backward Simulations Part II: Timing-based Systems
Lynch, Nancy A.; Vaandrager, Frits
A general automaton model for timing-based systems is presented and is used as the context for developing a variety of simulation proof techniques for such systems. These techniques include  (1) refinments, (2) forward and backward simulations,  (3)  hybrid forward-backward and backward-forward simulations, and (4) history and prophecy relations. Relationships between the different types of simulations, as well as soundness and completeness results, are stated and proved.
</description>
<dc:date>1993-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149207">
<title>Forward and Backward Simulations Part I: Untimed Systems (Replaces TM-486)</title>
<link>https://hdl.handle.net/1721.1/149207</link>
<description>Forward and Backward Simulations Part I: Untimed Systems (Replaces TM-486)
Lynch, Nancy A.; Vaandrager, Frits
A unified, comprehensive presentation of simulation techniques for verification of concurrent systems is given, in terms of a simple untimed automaton model. In particular, (1) refinements, (2) forward and backward simulations, (3) hybrid forward-backward and backward-forward simulations, and (4) history and prophecy relations are defined.
</description>
<dc:date>1993-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149206">
<title>Failsafe Key Escrow Systems (Extended Abstract)</title>
<link>https://hdl.handle.net/1721.1/149206</link>
<description>Failsafe Key Escrow Systems (Extended Abstract)
Leighton, Tom
This paper describes a method for escrowing cryptographic keys, which we call Failsafe Key Escrow (FKE). The method is substantially more secure than alternative such as the Fair Public Key Cryptosystem approach advocated by Micali, and it is particular well suited for use in escrowing DSS keys.
</description>
<dc:date>1994-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149205">
<title>Automatic Partitioning of Parallel Loops for Cache-coherent Multiprocessors</title>
<link>https://hdl.handle.net/1721.1/149205</link>
<description>Automatic Partitioning of Parallel Loops for Cache-coherent Multiprocessors
Agarwal, Anant; Kranz, David; Natarajan, Venkat
This paper presents a theoretical framework for automatically partitioning parallel loops to minimize cache coherency traffic on shared-memory multiprocessors.  The framework introduces the notion of uniformly intersecting references to capture temporal locality in array references, and the idea of data footprints to estimate the communication traffic between processors.  The framework uses lattice theory to compute the size of data footprints.  We demonstrate that algorithms based on our framework discover optimal partitions in many cases, such as non-communication-free parallelogram partitions of affine loop index functions, which were not handled by previous algorithms.  We also show that our framework correctly reproduces results from previous loop partitioning algorithms proposed by Abraham and Hudak and by Sadayappan and Ramanujam.  Because they deal only with index expressions, the algorithms are computationally efficient as well.  We have implemented a subset of this framework for rectangular partitioning in a compiler for the cache-coherent Alewife machine.
</description>
<dc:date>1992-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149204">
<title>Action Transducers and Timed Automata</title>
<link>https://hdl.handle.net/1721.1/149204</link>
<description>Action Transducers and Timed Automata
Lynch, Nancy A.; Vaandrager, Frits
The timed automaton model of [29, 30] is a general model for timing-based systems. A notion of timed action transducer is here defined as an automata-theoretic way of representing operations on timed automata. It is shown that two timed trace inclusion relations are substitutive with respect to operations that can be described by timed action transducers. Examples are given of operations that can be describe in this way, and a preliminary proposal is given for an appropriate language of operators for describing timing-based systems.
</description>
<dc:date>1992-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149203">
<title>Experience with Fine-grain Synchronization in MIMD Machines for Preconditioned Conjugate Gradient</title>
<link>https://hdl.handle.net/1721.1/149203</link>
<description>Experience with Fine-grain Synchronization in MIMD Machines for Preconditioned Conjugate Gradient
Yeung, Donald; Agarwal, Anant
This paper discusses our experience with fine-grain synchronization for the preconditioned conjugate gradient method using the modified incomplete Cholesky factorization of the coefficient matrix as a preconditioner.  This algorithm represents a large class of algorithms that have been widely used but traditionally difficult to implement efficiently on vector and parallel machines.  Through a series of experiments conducted using a simulator of a distributed shared-memory multiprocessor, this paper addresses two major questions related to fine-grain synchronization in the context of this application.  First, what is the overall impact of fine-grain synchronization on performance?  Second, what are the individual contributions of the following three mechanisms typically provided to support fine-grain synchronization:  language-level support, full-empty bits for compact storage and communication of synchronization state, and efficient processor operations on the state bits?      The experiments indicate that fine-grain synchronization improves overall performance by a factor of 3.7 on 16 processors using the largest problem size we could simulate; the paper also projects that a significant performance advantage will be sustained for larger problem sizes.   Preliminary experience shows that the bulk of the performance advantage for this application can be attributed to exposing increased parallelism through language-level expression of fine-grain synchronization.  A smaller fraction relies on a compact-implementation of synchronization state, while an even smaller fraction results from efficient full-empty bit operations.  The paper also shows that the last two components are likely to have a greater impact on performance as mechanisms for latency tolerance are employed.
</description>
<dc:date>1992-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149202">
<title>Integrating Message-passing and Shared-memory: Early Experience</title>
<link>https://hdl.handle.net/1721.1/149202</link>
<description>Integrating Message-passing and Shared-memory: Early Experience
Kranz, David; Johnson, Kirk; Agarwal, Anant; Kubiatowicz, John; Lim, Beng-Hong
This paper discusses some of the issues involved in implementing a shared-address space programming model on large-scale, distributed-memory multiprocessors.  Because message-passing mechanisms are much more efficient than shared-memory loads and stores for certain types of interprocessor communication and synchronization operations, we argue for building multiprocessors that efficiently support both shared-memory and message-passing mechanisms.  We describe an architecture, Alewife, that integrates support for shared-memory and message-passing through a simple interface.  We expect the compiler and runtime system to cooperate in using appropriate hardware mechanisms that are most efficient for specific operations.  We report on both integrated and exclusively shared-memory implementations of our runtime system and one complete application; the final paper will contain results for other applications as well.  The integrated runtime system drastically cuts down the cost of communication incurred by the scheduling, load balancing, and certain synchronization operations.  We also present some preliminary performance results comparing the two systems.
</description>
<dc:date>1992-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149201">
<title>Hybrid Atomicity for Nested Transactions</title>
<link>https://hdl.handle.net/1721.1/149201</link>
<description>Hybrid Atomicity for Nested Transactions
Fekete, Alan; Lynch, Nancy A.; Weihl, William E.
This paper defines the notion of hybrid atomicity for nested transaction systems, and presents and verifies an algorithm providing this property. Hybrid atomicity is a modular property; it allows the correctness of a system to be deduced from the fact each object is implemented to have the property. It allows more concurrency than dynamic atomicity, by assigning timestamps to transaction at commit. The Avalon system provides exactly this facility.
</description>
<dc:date>1992-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149200">
<title>More Choices Allow More Faults: Set Consensus Problems in Totally Asynchronous Systems</title>
<link>https://hdl.handle.net/1721.1/149200</link>
<description>More Choices Allow More Faults: Set Consensus Problems in Totally Asynchronous Systems
Chaudhuri, Soma
We define k-set consensus problem as an extension of the consensus problem, where each processors decides on a single value such that the set of decided values in any run is of size at most k. We require the agreement condition that all values decided upon are initial values of some processor. We show that the problem has a simple ( k - 1 )-resilient protocol in a totally asynchronous system.
</description>
<dc:date>1992-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149199">
<title>Dribble-Back Registers: A Technique for Latency Tolerance in Multiprocessors</title>
<link>https://hdl.handle.net/1721.1/149199</link>
<description>Dribble-Back Registers: A Technique for Latency Tolerance in Multiprocessors
Soundararajan, Vijayaraghavan
As parallel machines grow in scale and complexity, latency tolerance of synchronization faults and remote memory accesses becomes increasingly important. One method for tolerating this by multithreading the processor and rapidly context switching between these threads. Fast context switching is most effective when the latencies being tolerated are short compared to the total run lengths of all the resident threads.
</description>
<dc:date>1992-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149198">
<title>The Integration of the Organization Engine and Library 2000</title>
<link>https://hdl.handle.net/1721.1/149198</link>
<description>The Integration of the Organization Engine and Library 2000
Weiss, Ron
In the contemporary research environment, users access and manipulate information gathered from diverse data sources. The organization Engine is a prototype being developed at the Cambridge Research Lab of Digital Equipment Corporation for the incorporation of data from disparate sources into a local homogeneous framework. It relies on information management based on the notion of retrieval and manipulation through the organization of the data in a non strict hierarchical structure.
</description>
<dc:date>1992-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149197">
<title>Approximating the Minimum-cost Maximum Flow is P-Complete</title>
<link>https://hdl.handle.net/1721.1/149197</link>
<description>Approximating the Minimum-cost Maximum Flow is P-Complete
Stein, Clifford; Wein, Joel
We show that it is impossible, in NC, to approximate the value of the minimum-cost maximum flow unless P = NC.
</description>
<dc:date>1992-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149196">
<title>Closing the Window of Vulnerability in Multiphase Memory Transcations</title>
<link>https://hdl.handle.net/1721.1/149196</link>
<description>Closing the Window of Vulnerability in Multiphase Memory Transcations
Kubiatowicz, John; Chaiken, David; Agarwal, Anant
Multiprocessor architects have begun to explore several mechanisms such as prefetching, context-switching and software-assisted dynamic cache-coherence, which transform single-phase memory transactions in conventional memory systems into multiphase operations. Multiphase operations introduce a window of vulnerability in which data can be lost before it is used either through protocol invalidation or cache conflicts. Losing data introduces damaging livelock situations. This paper discusses the origins of the window of vulnerability and proposes an architectural framework that closes it.  The framework in implemented in Alwife, a large-scale multiprocessor being built at MIT.
</description>
<dc:date>1992-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149195">
<title>Low-cost Support for Fine-grain Synchronization in Multiprocessors</title>
<link>https://hdl.handle.net/1721.1/149195</link>
<description>Low-cost Support for Fine-grain Synchronization in Multiprocessors
Kranz, David; Lim, Beng-Hong; Agarwal, Anant
As multiprocessors scale beyond the limits of a few tens of processors, they must look beyond traditional methods of synchronization to minimize serialization and achieve the high degrees of parallelism required to utilize large machines. By allowing synchronization at the level of the smallest unit of memory, fine-grain synchronization achieves these goals. Unfortunately, supporting efficient fine-grain synchronization without inordinate amounts of hardware has remained a challenge.
</description>
<dc:date>1992-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149194">
<title>Compile-time Techniques for Processor Allocation in Macro Dataflow Graphs for Multiprocessors</title>
<link>https://hdl.handle.net/1721.1/149194</link>
<description>Compile-time Techniques for Processor Allocation in Macro Dataflow Graphs for Multiprocessors
Prasanna, G.N. Srinivasa; Agarwal, Anant
When compiling a progam consisting of multiple nested loops for execution on a multiprocessor, processor allocation is the problem of determining the number of processors over which to partition each nested loop. This paper presents processor allocation techniques for compiling such programs for multiprocessors with local memory. Programs consisting of multiple loops, where the precedence constraints between the loops is known, can be viewed as macro dataflow graphs. Macro dataflow graphs comprise several macro nodes (or macro operations) that must be executed subject to prespecified precedence constraints. Optimal processor allocation specifies the number of processors computing each macro node and their sequencing to optimize run time. This paper presents computing each macro node and their sequencing to optimize run time. This paper presents computationally efficient techniques for determining the optimal processor allocation using estimated speedup functions of the macro nodes. These ideas have been implemented in a structure-driven compiler, SDC, for expressions of matrix operations. The paper presents the performance of the compiler for several matrix expressions on a simulator of the Alewife multiprocessor.
</description>
<dc:date>1992-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149193">
<title>The Impact of Communication Locality on Large-scale Multiprocessor Performance</title>
<link>https://hdl.handle.net/1721.1/149193</link>
<description>The Impact of Communication Locality on Large-scale Multiprocessor Performance
Johnson, Kirk L.
As multiprocessor sizes scale and computer architects turn to interconnection networks with non-uniform communication latencies, the lure of exploiting communication locality to increase performance becomes inevitable. Models that accurately quantify locality effects provide invaluable insight into the importance of exploiting locality as machine sizes and features change. This paper presents a framework for modeling the impact of communication locality on system performance. The framework provides a means for combining simple models of application, processor, and network behavior to obtain a combined model that accurately reflects feedback effects between processors and networks. We introduce a model that characterizes application behavior with three parameters that capture computation grain, sensitivity to communication latency, and amount of locality present at execution time. The combined model is validated with measurements taken from a detailed simulator for a complete multiprocessor system. Using the combined model, we show that exploiting communication locality provides gains which are at most linear in the factor by which average communication distance is reduced when the number of outstanding communication transactions per processor is bounded. The combined model is also used to obtain rough upper bounds on the performance improvement from exploiting locality to minimize communication distance.
</description>
<dc:date>1992-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149192">
<title>Hierarchical Compilation of Macro Dataflow Graphs for Multiprocessors with Local Memory</title>
<link>https://hdl.handle.net/1721.1/149192</link>
<description>Hierarchical Compilation of Macro Dataflow Graphs for Multiprocessors with Local Memory
Prasanna, G.N. Srinivasa; Agarwal, Anant; Musicus, Bruce R.
This paper presents a hierarchical approach for compiling macro dataflow graphs for multiprocessors with local memory. Macro dataflow graphs comprise several nodes (or macros operations) that must be executed subject to prespecified precedence constraints. Programs consisting of multiple nested loops, where the precedence constraints between the loops are known, can be viewed as macro dataflow graphs. The hierarchical compilation approach comprises a processor allocation phase followed by a partitioning phase. In the processor allocation phase, using estimated speedup functions for the macro nodes, computationally efficient techniques establish the sequencing and parallelism of macro operations for close-to-optimal run times. The second phase partitions the computations in each macro node to maximize communication locality for the level of parallelism determined by the processor allocation phase. The same approach can also be used for programs consisting of multiple loop nests, when each of the nested loops can be characterized by a speedup function. These ideas have been implemented in a prototype structure-driven compiler, SDC, for expressions of matrix operations. The paper presents the performance of the compiler for several matrix expressions on a simulator of the Alewife multiprocessor.
</description>
<dc:date>1992-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149191">
<title>Memory Assignment for Multiprocessor Caches Through Graph Coloring</title>
<link>https://hdl.handle.net/1721.1/149191</link>
<description>Memory Assignment for Multiprocessor Caches Through Graph Coloring
Agarwal, Anant; Guttag, John; Papaefthymiou, Marios
It has become apparent that the achieved performance of multiprocessors is heavily dependent upon the quality of the availabel compilers. In this paper we are concerned with compile-time techniques that can be used to achieve better performance by improving cache utilization. Specifically, we investigate the problem of assigning data chunks to memory in a way that will minimize collisions in direct-mapped multiprocessor caches. We show that while this problem is computationally intractable, there are interesting special cases that can be solved in polynomial time. We also present several techniques that can be used when conflict-free assignment is not possible, or when finding a conflict-free assignment is computationally infeasible. These techniques include uniform decaching, which involves not caching specific data blocks, and data replication, which involves making multiple copies of read-only data. Finally, we present a memory assigment technique, grey coloring, that reduces latency in the presence of collisions by distributing cache misses among processors in a way that minimized the total number of cache misses in any specific cache.
</description>
<dc:date>1992-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149190">
<title>Hierarchical Compilation of Macro Dataflow Graphs for Multiprocessors with Local Memory</title>
<link>https://hdl.handle.net/1721.1/149190</link>
<description>Hierarchical Compilation of Macro Dataflow Graphs for Multiprocessors with Local Memory
Prasanna, G.N. Srinivasa; Agarwal, Anant; Musicus, Bruce R.
This paper presents a hierarchical approach for compiling macro dataflow graphs for multiprocessors with local memory. Macro dataflow graphs comprise several nodes (or macros operations) that must be executed subject to prespecified precedence constraints. Programs consisting of multiple nested loops, where the precedence constraints between the loops are known, can be viewed as macro dataflow graphs. The hierarchical compilation approach comprises a processor allocation phase followed by a partitioning phase. In the processor allocation phase, using estimated speedup functions for the macro nodes, computationally efficient techniques establish the sequencing and parallelism of macro operations for close-to-optimal run times. The second phase partitions the computations in each macro node to maximize communication locality for the level of parallelism determined by the processor allocation phase. The same approach can also be used for programs consisting of multiple loop nests, when each of the nested loops can be characterized by a speedup function. These ideas have been implemented in a prototype structure-driven compiler, SDC, for expressions of matrix operations. The paper presents the performance of the compiler for several matrix expressions on a simulator of the Alewife multiprocessor.
</description>
<dc:date>1992-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149189">
<title>The Impact of Communication Locality on Large-scale Multiprocessor Performance</title>
<link>https://hdl.handle.net/1721.1/149189</link>
<description>The Impact of Communication Locality on Large-scale Multiprocessor Performance
Johnson, Kirk L.
As multiprocessor sizes scale and computer architects turn to interconnection networks with non-uniform communication latencies, the lure of exploiting communication locality to increase performance becomes inevitable. Models that accurately quantify locality effects provide invaluable insight into the importance of exploiting locality as machine sizes and features change. This paper presents a framework for modeling the impact of communication locality on system performance.
</description>
<dc:date>1992-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149188">
<title>An Analysis of Rabin's Randomized Mutual Exclusion Algorithm: Preliminary Report</title>
<link>https://hdl.handle.net/1721.1/149188</link>
<description>An Analysis of Rabin's Randomized Mutual Exclusion Algorithm: Preliminary Report
Lynch, Nancy A.; Saias, Isaac
In 1982, Michael Rabin published a randomized distributed algorithm implementing mutual exclusion for n processes using a read-modify-write primitive on a shared variable with O(log n) values. He claimed that this algorithm satisfied the following informally-stated strong probabilistic no-lockout property. Define the adversary to be the entity controlling the order in which processes take steps; then, for every adversary, any process competing for entrance to the critical section succeeds with probability Ω(1/m), where m is the number of competing processes. In this paper we consider several different ways in which this property can be expressed formally. We express explicitly the dependency of the probability on the adversary and show that this dependency is so strong that the algorithm does not satisfy any of these conditions. In fact, the algorithm does not even satisfya much weaker Ω(1/n) property.
</description>
<dc:date>1991-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149187">
<title>Fast Deterministic Constructions of Low-Diameter Network Decompositions</title>
<link>https://hdl.handle.net/1721.1/149187</link>
<description>Fast Deterministic Constructions of Low-Diameter Network Decompositions
Berger, Bonnie; Cowen, Lenore
</description>
<dc:date>1991-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149186">
<title>Linearizable Counting Networks</title>
<link>https://hdl.handle.net/1721.1/149186</link>
<description>Linearizable Counting Networks
Merlihy, Maurice; Shavit, Nir; Waarts, Orli
The counting problem requires n asynchronous processors to assign themselves successive values. A solution is linearizable if the order of the values assigned reflects the real-time order in which they were requested. Linearizable counting lies at the heart of concurrent timestamp generation, as well as concurrent implementations of shared counters, FIFO buffers, and similar data structures. We consider solutions to the linearizable counting problem in a multiprocessor architecture in which processors communicate by applying read-modify-write operations to a shared memory. Linearizable counting algorithms can be judged by three criteria: the memory contention produced, whether processors are required to wait for one another, and how long it takes a processor to choose a value (the latency). A solution is ideal if it has low contention, low latency, and it eschews waiting. The conventional software solution, where processors synchornize at a single variable, avoids waiting and has low latency, but has high contention. In this paper we give two new counting network constructions, one with low latency and low contention, but that requires processors to wait for one another, and one with low contention and no waiting, but that has high latency. Finally, we prove that these trade-offs are inescapable: an ideal linearizable counting algorithm is impossible. Since ideal non-linearizable counting algorithms exist, these results establish a substantial complexity gap between linearizable and non-linearizable counting.
</description>
<dc:date>1991-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149185">
<title>Forward and Backward Simulations for Timing-based Systems</title>
<link>https://hdl.handle.net/1721.1/149185</link>
<description>Forward and Backward Simulations for Timing-based Systems
Lynch, Nancy A.; Vaandrager, Frits
A general automaton model for timing-based systems is presented and is used as the context for developing a variety of simulation proof techniques for such systems. As a first step, a comprehensive overview of simulation techniques for simple untimed automata is given. In particular, soundness and completeness results for (1) refinements, (2) forward and backward simulations, (3) forward-backward and backward-forward simulations, and (4) history and prophecy relations are given.
</description>
<dc:date>1991-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149184">
<title>An Algorithm for the Tramp Steamer Problem Based on Mean-weight Cycles</title>
<link>https://hdl.handle.net/1721.1/149184</link>
<description>An Algorithm for the Tramp Steamer Problem Based on Mean-weight Cycles
Ishii, Alexander T.; Leiserson, Charles E.; Papaefthymiou, Marios C.
</description>
<dc:date>1991-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149183">
<title>Replication in the Harp File System</title>
<link>https://hdl.handle.net/1721.1/149183</link>
<description>Replication in the Harp File System
Liskov, B.; Ghemawat, S.; Gruber, R.; Johnson, P.; Shrira, L.; Williams, M.
This paper describes the design and implementation of the Harp file system. Harp is a replicated Unix file system accessible via the VFS interface. It provides highly available and reliable storage for files and guarantees that file operations are executed atomically in spite of concurrency and failures. It uses a novel variation of the primary copy replication technique that provides good performance because it allows us to trade disk accesses for network communication. Harp is intended to be used within a file service in a distributed network; in our current implementation, it is accessed via NFS. Preliminary performance results indicate that Harp provides equal or better response time and system capacity than an unreplicated implementation of NFS that uses Unix files directly.
</description>
<dc:date>1991-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149182">
<title>A Fast Multiport Memory Based on Single-port Memory Cells</title>
<link>https://hdl.handle.net/1721.1/149182</link>
<description>A Fast Multiport Memory Based on Single-port Memory Cells
Rivest, Ronald L.; Glasser, L.
We present a new design for dual-port memories that uses single-port memory cells but guarantees fast deterministic read/write access. The basic unit of storage is the word, rather than the bit, and addresses conflicts result in bit errors that are removed by correction circuitry. The addressing scheme uses Galois field arithmetic to guarantee that the maximum number of bit errors in any word accessed is one. These errors can be corrected every time with a simple correction scheme. The scheme can be generalized to an arbitrary number of ports.
</description>
<dc:date>1991-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149181">
<title>The MIT Alewife Machine: A Large-scale Distributed-memory Multiprocessor</title>
<link>https://hdl.handle.net/1721.1/149181</link>
<description>The MIT Alewife Machine: A Large-scale Distributed-memory Multiprocessor
Agarwal, Anant; Chaiken, David; Johnson, Kirk; Kranz, David; Kubiatowicz, John; Kurihara, Kiyoshi; Lim, Beng-Hong; Maa, Gino; Nussbaum, Dan
The Alewife multiprocessor project focuses on the architecture and design of a large-scale parallel machine. The machine uses a low dimension direct interconnection network to provide scalable communication band-width, while allowing the exploitation of locality. Despite its distributed memory architecture, Alewife allows efficient shared memory programming through a multilayered approach to locality management. A new scalable cache coherence scheme called LimitLess directories allows the use of caches for reducing communication latency and network bandwidth requirements.
</description>
<dc:date>1991-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149180">
<title>Cost-sensitive Analysis of Communication Protocols</title>
<link>https://hdl.handle.net/1721.1/149180</link>
<description>Cost-sensitive Analysis of Communication Protocols
Awerbuch, Baruch; Baratz, Alan; Peleg, David
This paper introduces the notion of cost-sensitive communication complexity and exemplifies it on the following basic communication problems: computing a global function, network synchornization, clock synchronization, controlling protocols' worst-case execution, connected components, spanning tree, etc., contructing a minimymn spanning tree, constructing a shortest path tree.
</description>
<dc:date>1991-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149179">
<title>The Complexity of Continuous Optimization</title>
<link>https://hdl.handle.net/1721.1/149179</link>
<description>The Complexity of Continuous Optimization
Rogaway, Phillip
Given a polynomial objective function f(x1,…,xn), we consider the problem of finding the maximum of this polynomial inside some convex set D = {x : Ax &lt;= B}. We show that, under a complexity assumption, this extremum cannot be approximated by any polynomial-time algorithm, even exceedingly poorly. This represents an unusual interplay of discrete and continuous mathematics: using a combinatorial argument to get a hardness result for a continuous optimization problem.
</description>
<dc:date>1991-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149178">
<title>Counting Networks</title>
<link>https://hdl.handle.net/1721.1/149178</link>
<description>Counting Networks
Aspnes, James; Herlihy, Maurice; Shavit, Nir
Many fundamental multi-processor coordination problems can be expressed as counting problems: processes must cooperate to assign successive values from a given range, such as addresses in memory of destinations on an interconnection network. Conventional solutions to these problems perform poorly because of synchronization bottlenecks and high memory contention. Motivated by observations on the behavior of sorting networks, we offer a completely new approach to solving such problems. We introduce a new class of networks called counting networks, i.e., networks that can be used to count. We give two counting network constructions of depth log^2 n, using n log^2 n "gates," avoiding the sequential bottlenecks inherent to former solutions, and substantially lowering the memory contention. Finally, to show that counting networks are not merely mathematical creatueres, we provide experimental evidence that they outperform conventional synchronization techniques under a variety of circumstances.
</description>
<dc:date>1991-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149177">
<title>APRIL: A Processor Architecture for Multiprocessing</title>
<link>https://hdl.handle.net/1721.1/149177</link>
<description>APRIL: A Processor Architecture for Multiprocessing
Agarwal, Anant; Lim, Beng-Hong; Kranz, David; Kubiatowicz, John
Processors in large-scale multiprocessors must be able to tolerate large communication latencies and synchronization delays. This paper describes the architecture of a rapid-context-switching processor called APRIL with support for fine-grain threads and synchronization. APRIL achieves high single-thread performance and supports virtual dynamic threads. A commercial RISC-based implementation of APRIL and a run-time software system that can switch contexts in about 10 cycles is described. Measurements taken for several parallel applications on an APRIL simulator show that the overhead for supporting parallel tasks based on futures is reduced by a factor of two over a corresponding implementation on the Encore Multimax. The scalability of a multiprocessor based on APRIL is explored using a performance model. We show that the SPARC-based implementation of APRIL can achieve close to 80% processor utilization with as few as three resident threads per processor in a large-scale cache-based machine with an average base network latency of 55 cycles.
</description>
<dc:date>1991-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149176">
<title>Lazy Task Creation: A Technique for Increasing the Granularity of Parallel Programs</title>
<link>https://hdl.handle.net/1721.1/149176</link>
<description>Lazy Task Creation: A Technique for Increasing the Granularity of Parallel Programs
Mohr, Eric; Kranz, David; Halstead; Robert H., Jr.
Many parallel algorithms are naturally expressed at a fine level of granularity, often finer than MIMD parallel system can exploit efficiently. Most builders of parallel systems have looked to either the programmer or a parallelizing compiler to increase the granularity of such algorithms. In this paper we explore a third approach to the granularity problem by analyzing two strategies for combining parallel tasks dynamically at run-time.
</description>
<dc:date>1991-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149175">
<title>Limitless Directories: A Scalable Cache Coherence Scheme</title>
<link>https://hdl.handle.net/1721.1/149175</link>
<description>Limitless Directories: A Scalable Cache Coherence Scheme
Chaiken, David; Kubiatowicz, John; Agarwal, Anant
Caches enhance the performance of multiprocessors by reducing network traffic and average memory access latency. However, cache-based systems must address the problem of cache coherence. We propose the LimitLESS directory protocol to solve this problem. The LimitLESS scheme uses a combination of hardware and software techniques to realize the performance of full-map directory with the memory overhead of limited directory. This protocol is supported by Alewife, a large-scale multiprocessor. We describe the architectural interfaces needed to implement the LimitLESS directory, and evaluate its performance though simulations of the Alewife machine.
</description>
<dc:date>1991-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149174">
<title>Reliable Communication Over Unreliable Channels</title>
<link>https://hdl.handle.net/1721.1/149174</link>
<description>Reliable Communication Over Unreliable Channels
Afek, Yehuda; Attiya, Hagit; Fekete, Alan; Fischer, Michael; Lynch, Nancy A.; Mansour, Yishay; Wang, Da-Wei; Zuck, Lenore
Layered communication protocols frequently implement a FIFO message facility on top of an unreliable non-FIFO service such as that provided by a packet-switching network. This paper investigates the possibility of implementing a reliable message layer on top of an underlying layer that can lose packets and deliver them out of order, with the additional restriction that the implementation uses only a fixed finite number of different packets. A new formalism is presented to specify communication layers and their properties, the notion of their implementation by I/O automata, and the properties of such implementations. An I/O automaton that implements a reliable layer over an unreliable layer is presented. In this implementation, the number of packets needed to deliver each succeeding message increases permanently as additional packet-loss and reordering faults occur. A proof is given that no protocol can avoid such performance degradation.
</description>
<dc:date>1992-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149173">
<title>An Autoimmune Mechanism for AIDS' T4 Lymphopenia</title>
<link>https://hdl.handle.net/1721.1/149173</link>
<description>An Autoimmune Mechanism for AIDS' T4 Lymphopenia
Micali, Silvio
We put forward a new model for the T4 lymphopenia occuring in AIDS by suggesting a mechanism whose net effect is blocking the generation of T4 cells during HIV infection. Supporting evidence for this mechanism is derived from the experiments in the recent literature.
</description>
<dc:date>1991-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149172">
<title>The Complexity of Decision Versus Search</title>
<link>https://hdl.handle.net/1721.1/149172</link>
<description>The Complexity of Decision Versus Search
Bellare, Mihir; Goldwasser, Shafi
A basic question  about NP is whether or not search (the problem of finding a witness)  reduces in polynomial time to decision ( the problem deciding whether there exists a witness). The fact that search does reduce to decision for SAT and other NP-complete problems (self-reducibility) is among the most well known facts in the theory of computation. But the general question of whether search reduces to decision for every language in NP remains open.   We indicate that the answer is negative: under a  natural complexity assumption (that deterministic and non deterministic double exponential time are unequal) we construct a language in NP for which search does not reduce to decision.
</description>
<dc:date>1991-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149171">
<title>An Autoimmune Mechanism for AIDS' T4 Lymphopenia</title>
<link>https://hdl.handle.net/1721.1/149171</link>
<description>An Autoimmune Mechanism for AIDS' T4 Lymphopenia
Micali, Silvio
We put forward a new model for the T4 lymphopenia occuring in AIDS by suggesting a mechanism whose net effect is blocking the generation of T4 cells during HIV infection.
</description>
<dc:date>1991-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149170">
<title>Are Wait-free Algorithms Fast?</title>
<link>https://hdl.handle.net/1721.1/149170</link>
<description>Are Wait-free Algorithms Fast?
Attiya, Hagit; Lynch, Nancy A.; Shavit, Nir
The time complexity of wait-free algorithms in "normal" executions, where no failures occure and processes operate at approximately the same speed, is considered. A lower bound of log n on the time complexity of any wait-free algorithm that achieves approximate agreements among n processes is proved. In contrast, there exists a non-wait-free algorithm that solves this problem in constant time. This implies an Ω(log n) time separation between the wait-free and non-wait-free computation models. On the positive side, we present an O(log n) time wait-free approximate agreement algorithm; the complexity of this algorithm is within a small constant of the lower bound.
</description>
<dc:date>1991-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149169">
<title>On-line Algorithms for 2-coloring Hypergraphs via Chip Games</title>
<link>https://hdl.handle.net/1721.1/149169</link>
<description>On-line Algorithms for 2-coloring Hypergraphs via Chip Games
Aslam, Javed A.; Dhagat, Aditi
</description>
<dc:date>1990-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149168">
<title>On the Massively Parallel Solution of The Assignment Problem</title>
<link>https://hdl.handle.net/1721.1/149168</link>
<description>On the Massively Parallel Solution of The Assignment Problem
Wein, Joel; Zenios, Stavros
In this paper we discuss the design, implementation and effectiveness of massively parallel algorithms for the solution of large-scale assignment problems. In particular, we study the auction algorithm of Bertsekas, an algorithm based on the method of multipliers of Hestenes and Powell, and an algorithm based on the alternating direction method of multipliers of Eckstein. We discuss alternative approaches to the massively parallel implementation of the auction algorithm, including Jacobi, Gauss-Seidel and a hybrid scheme. The hybrid scheme, in particular, exploits two different levels of parallelism and an efficient way of communicating the data between them without the need to perform general router operations across the hypercube network. We then study the performance of massively parallel implementations of the two methods of multipliers. Implementations are carried out on the Connection Machine CM-2, and the algorithms are evaluated empirically with the solution of large scale problems. The hybrid scheme significantly outperforms all of the other methods and gives the best computational results to date for a massively parallel solution to this problem.
</description>
<dc:date>1990-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149167">
<title>On-line Scheduling of Parallel Machines</title>
<link>https://hdl.handle.net/1721.1/149167</link>
<description>On-line Scheduling of Parallel Machines
Wein, Joel; Williamson, David P.
We study the problem of scheduling jobs on parallel machines in an on-line fashion, where the processing requirement of a job is not known until the job is completed. Despite this lack of knowledge of the future, we wish to schedule so as to minimize the completion time of the entire set of jobs. In general, the performance of an on-line algorithm is measured by its competitive ratio: the worst case ratio of its performance of an optimal algorithm with total prior knowledge. We study two fundamental models for this problem, that of identical machines, where all the machines run at the same speed, and uniformaly related machines, where the machines run at different speeds. Our results include: 1) Matching upper and lower bounds on the competitive ratio for the case of identical machines. 2) Upper and lower bounds that differ by a constant factor for uniformly related machines. 3) A lower bound for randomized algorithms for identical machines that nearly matches the deterministic upper bound. 4) Several upper and lower bounds for variations on these models.
</description>
<dc:date>1990-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149166">
<title>Bounds on the Time to Reach Agreement in the Presence of Timing Uncertainty</title>
<link>https://hdl.handle.net/1721.1/149166</link>
<description>Bounds on the Time to Reach Agreement in the Presence of Timing Uncertainty
Attiya, Hagit; Dwork, Cynthia; Lynch, Nancy A.; Stockmeyer, Larry
</description>
<dc:date>1990-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149165">
<title>The MD4 Message Digest Algorithm</title>
<link>https://hdl.handle.net/1721.1/149165</link>
<description>The MD4 Message Digest Algorithm
Rivest, Ronald L.
The MD4 message digest algorithm takes an input message of arbitrary length and produces an output 128-bit "fingerprint" or "message digest," in such a way that it is (hopefully) computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest. The MD4 algorithm is thus ideal for digital signature applications: a large file can be securely "compressed" with MD4 before being signed with (say) the RSA public-key cyrptosystem. The MD4 algorithm is designed to be quite fast on 32-bit machines. For example, on a SUN Sparc station, MD4 runs at 1,450,000 bytes/second (11.6 Mbit/sec). In addition, the MD4 algorithm does not require any large substitution tables; the algorithm can be coded quite compactly. The MD4 algorithm is being place in the public domain for review and possible adoption as a standard.
</description>
<dc:date>1990-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149164">
<title>Randomness-efficient Sampling of Arbitrary Functions</title>
<link>https://hdl.handle.net/1721.1/149164</link>
<description>Randomness-efficient Sampling of Arbitrary Functions
Bellare, Mihir; Rompel, John
</description>
<dc:date>1990-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149163">
<title>How to Sign Given Any Trapdoor Permutation</title>
<link>https://hdl.handle.net/1721.1/149163</link>
<description>How to Sign Given Any Trapdoor Permutation
Bellare, Mihir; Micali, Silvio
We present a digital signature scheme which is based on the existence of any trapdoor permutation.  Our scheme is secure in the strongest possible natural sense: namely, it is secure against existential forgery under adaptive chosen message attack.
</description>
<dc:date>1990-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149162">
<title>Atomic Snapshots of Shared Memory</title>
<link>https://hdl.handle.net/1721.1/149162</link>
<description>Atomic Snapshots of Shared Memory
Afek, Yehuda; Attiya, Hagit; Dolev, Danny; Gafni, Eli; Merritt, Michael; Shavit, Nir
</description>
<dc:date>1990-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149161">
<title>Modelling Shared State in a Shared Action Model</title>
<link>https://hdl.handle.net/1721.1/149161</link>
<description>Modelling Shared State in a Shared Action Model
Goldman, Kenneth; Lynch, Nancy A.
</description>
<dc:date>1990-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149160">
<title>Non-ontrusive Synchonizers</title>
<link>https://hdl.handle.net/1721.1/149160</link>
<description>Non-ontrusive Synchonizers
Awerbuch, Baruch; Peleg, David
</description>
<dc:date>1990-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149159">
<title>Workstation Services and Kerberos Authentication at Project Athena</title>
<link>https://hdl.handle.net/1721.1/149159</link>
<description>Workstation Services and Kerberos Authentication at Project Athena
Davis, Don; Swick, Ralph
This document proposes solutions for two problems obstructing Project Athena's implementation of workstation services.      The principal problem is that workstation services demand a more flexible mutual-authentication protocol than Kerberos currently provides.  The egregious X access-control hack, xhost, for example, has lack of authentication as its root cause. The protocol weakness is also the reason that public workstations can't accept authenticated connections from rlogin, rcp, rsh, etc. We propose an extension to the Kerberos Ticket Granting Service protocol, that cleanly supports user-to-user mutual authentication.    Our second proposal addresses the problem of ticket propagation. Currently, if a user wants tickets that are valid on a remote host, he has to run kinit an encrypted login session, unless he's willing to send his password in cleartext. As an example of the use of our protocol extension, we describe a Kerberos application that would support a limited facility for secure ticket-propagation.
</description>
<dc:date>1989-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149158">
<title>Sharing Memory Robustly in Message-passing Systems</title>
<link>https://hdl.handle.net/1721.1/149158</link>
<description>Sharing Memory Robustly in Message-passing Systems
Attiya, Hagit; Bar-Noy, Amotz; Dolev, Danny
</description>
<dc:date>1990-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149157">
<title>Multivalued Possibilities Mappings</title>
<link>https://hdl.handle.net/1721.1/149157</link>
<description>Multivalued Possibilities Mappings
Lynch, Nancy A.
Abrastraction mappings are one of the major tools used to construct correctness proofs for concurrent algorithms. Several examples are given of situations in which it is useful to allow the abstraction mappings to be multivalued. The examples involve algorithm optimization, algorithm distribution, and proofs of time bounds.
</description>
<dc:date>1990-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149156">
<title>Stochastic Analysis of Qualitative Dynamics</title>
<link>https://hdl.handle.net/1721.1/149156</link>
<description>Stochastic Analysis of Qualitative Dynamics
Doyle, Jon; Sacks, Elisha P.
</description>
<dc:date>1989-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149155">
<title>Synthesis of Efficient Drinking Philosphers Algorithms</title>
<link>https://hdl.handle.net/1721.1/149155</link>
<description>Synthesis of Efficient Drinking Philosphers Algorithms
Welch, Jennifer Lundelius; Lynch, Nancy A.
A variant of the drinking philosphers algorithm of Chandy and Misra is described and proved correct in a module way, using the I/O automaton model of Lynch and Tuttle. The algorithm of Chandy and Misra is based on an particular dining philosophers algorithm, and relies on certain properties of its implementation. The drinking philosophers algorithm presented in this paper is able to use an arbitrary dining philosophers algorithm as a true subroutine; nothing about the implementation needs to be known, only that is solves the dining philosophers problem. An important advantage of this modularity is that by substituting a more time-efficient dining philosophers algorithm with O(1) worst-case waiting time is obtained, whereas the drinking philosophers algorithm of Chandy and Misra has O(n) worst-case waiting time (for n philosophers). Formal definitions are given to distinguish the drinking and dining philosophers problems and to specify precisely varying degrees of concurrency.
</description>
<dc:date>1989-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149154">
<title>Impediments to Universal Preference-based Default Theories</title>
<link>https://hdl.handle.net/1721.1/149154</link>
<description>Impediments to Universal Preference-based Default Theories
Doyle, Jon; Wellman, Michael
Research on nonmonotonic and default reasoning has identified several important criteria for preferring alternative default inferences.  The theories of reasoning based on each of these criteria may uniformly be viewed as theories of rational inference, in which the reasoner selects maximally preferred states of belief.  Though researchers have noted some cases of apparent conflict between the preferences supported by different theories, it has been hoped that these special theories of reasoning may be combined into a universal logic of nonmonotonic reasoning.  We show that the different categories of preferences conflict more than has been realized, and adapt formal results from social choice theory to prove that every universal theory of default reasoning will violate at least one reasonable principle of rational reasoning.  Our results can be interpreted as demonstrating that, within the preferential framework, we cannot expect much improvement on the rigid lexicographic priority mechanisms that have been proposed for conflict resolution.
</description>
<dc:date>1989-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149153">
<title>Routing with Polynomial Communication-space Tradeoff</title>
<link>https://hdl.handle.net/1721.1/149153</link>
<description>Routing with Polynomial Communication-space Tradeoff
Awercuch, Baruch; Peleg, David
</description>
<dc:date>1989-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149152">
<title>Online Tracking of Mobile Users</title>
<link>https://hdl.handle.net/1721.1/149152</link>
<description>Online Tracking of Mobile Users
Awercuch, Baruch; Peleg, David
This paper deals with the problem of maintaining a distributed directory server, that enables us to keep track of mobile users in a distributed network. The paper introduces the graph-theoretic concept of regional matching, and demonstrates how fining a regional matching with certain parameters enables efficient tracking. A polynomial-time algorithm that constructs such a regional matching is presented. The communication overhead of our tracking mechanism is within a polylogarithmic factor of the lower bound.
</description>
<dc:date>1989-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149151">
<title>Nnuclear Fusion Through Dimensional Confinement</title>
<link>https://hdl.handle.net/1721.1/149151</link>
<description>Nnuclear Fusion Through Dimensional Confinement
Smith, Mark A.
A formal mechanism for enhancing nnuclear fusion rates is proposed. The enhancement results whenever the reacting nuclei preferentially migrate in a restricted subspace of phase space - in particular, a fractal subspace. An extended Lawsom criterion is derived, and the prospects for this mechanism in condensed matter are discussed.
</description>
<dc:date>1989-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149150">
<title>Theory of Computation Group Research Summary June 1988 - July 1989</title>
<link>https://hdl.handle.net/1721.1/149150</link>
<description>Theory of Computation Group Research Summary June 1988 - July 1989
Theory of Computation Group
</description>
<dc:date>1989-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149149">
<title>Time Bounds for Real-time Process Control in the Presence of Time Uncertainty</title>
<link>https://hdl.handle.net/1721.1/149149</link>
<description>Time Bounds for Real-time Process Control in the Presence of Time Uncertainty
Attiya, Hagit; Lynch, Nancy A.
</description>
<dc:date>1989-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149148">
<title>A Hundred Impossibility Proofs for Distributed Computing</title>
<link>https://hdl.handle.net/1721.1/149148</link>
<description>A Hundred Impossibility Proofs for Distributed Computing
Lynch, Nancy A.
</description>
<dc:date>1989-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149147">
<title>Type Abstraction Rules for References: A Comparison of Four Which have Achieved Notoriety</title>
<link>https://hdl.handle.net/1721.1/149147</link>
<description>Type Abstraction Rules for References: A Comparison of Four Which have Achieved Notoriety
O'Toole Jr., James William
I present four type abstraction rules which have been introduced by various authors to permit polymorphic type safety in the presence of mutable data. each of the type abstraction rules is discussed in the context of the language in which is was introduced, and the various abstraction rules are compared.
</description>
<dc:date>1989-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149146">
<title>Three Methods for Range Queries in Computational Geometry</title>
<link>https://hdl.handle.net/1721.1/149146</link>
<description>Three Methods for Range Queries in Computational Geometry
Kipnis, Shlomo
This paper surveys a variety of recent results addressing the problem of range queries in computational geometry. The major contribution of this paper is in identifying three general methods for range queries in computational geometry and in classifying many of the recent results into one or more of these approaches. The three methods discussed in this paper are random sampling, search-tree tables, and space-partition trees. This survey assumes some familiarity with basic computational geometry concepts and techniques.
</description>
<dc:date>1989-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149145">
<title>Communication Effects for Message-based Concurrency</title>
<link>https://hdl.handle.net/1721.1/149145</link>
<description>Communication Effects for Message-based Concurrency
Jouvelot, Pierre; Gifford, David K.
We describe a new framework for explicity concurrency that uses an effect system to describe the communication behavior of expressions in a typed polymorphic programming language. Concurrency occurs between processes connected by channels on which messages are transmitted. Communication operations are characterized by two communication effect constructors, out and in, depending on whether a message has been sent or received. Synchronization is only allowed by message passing along shared channels; communication via mutation of global variables is staticially prohibited by our communication effect system, thus restricting the amount of non-determinancy in user programs. Unobservable communication effects can be masked by the effect system. We show that this system is powerful enough to express many other parallel paradigms, like systolic arrays or pipes, in a typed framework. The programmer can thus express concurrency in a rather flexible way while preserving the correctness of implicit detection of parallelism and optimization by the compiler. This new concurrency framework has been implemented in the FX-87 programming language.
</description>
<dc:date>1989-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149144">
<title>Natural Random Numbers</title>
<link>https://hdl.handle.net/1721.1/149144</link>
<description>Natural Random Numbers
Gofford, David K.
We present a method for generaing random numbers from natural noise sources that is able to produce random numbers to any desired level of perfection. The method works by transducing a physical noise source to generate a stream of biased natural bits, and then applying an unbiasing algorithm. The Wiener-Kinchine relation is used to derive the autocorrelation present in the stream of biased bits and to define safe sampling rate. Experimental results from an implementation of our method support our analysis. One consequence of our analysis is that a broad class of natural random number generators, including ours, can not generate absolutely perfect random numbers.
</description>
<dc:date>1988-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149143">
<title>A Lattice-structured Proof Technique Applied to a Minimum Spanning Tree Algorithm</title>
<link>https://hdl.handle.net/1721.1/149143</link>
<description>A Lattice-structured Proof Technique Applied to a Minimum Spanning Tree Algorithm
Welch, Jennifer Lundelius; Lamport, Leslie; Lynch, Nancy A.
Higly-optimized concurrent algorithms are often hard to prove correct because they have no natural decomposition into separately provable parts. This paper presents a proof technique for the modular verification of such non-modular algorithms. It generalizes existing verification techniques based on a totally-ordered hierarchy of refinements to allow a partially-ordered hierarchy - that is, a lattice of different views of the algorithm. The technique is applied to the well-known distributed minimum spanning tree algorithm of Gallager, Humblet, and Spira, which has until recently lacked a rigorous proof.
</description>
<dc:date>1988-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149142">
<title>Combinatorial Algorithms for the Generalized Circulation Problem</title>
<link>https://hdl.handle.net/1721.1/149142</link>
<description>Combinatorial Algorithms for the Generalized Circulation Problem
Goldberg, Andrew V.; Plotkin, Serge A.; Tardos, Eva
We consider a generalization of the maximum flow problem in which the amounts of flow entering and leaving an arc are linearly related. More precisely, if x(e) units of flow enter an arc e, x(e) ?(e) units arrive at the other end. For instance, nodes of the graph can correspond to different currencies, with the multipliers being the exchange rates. We require conservation of flow at every node except a given source node. The goal is to maximize the amount of flow excess at the source. This problem is a special case of linear programming, and therefore can be solved in polynomial time. In this paper we present the first polynomial time combinatorial algorithms for this problem. The algorithms are simple and intuitive.
</description>
<dc:date>1988-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149141">
<title>Sublinear-time Parallel Algorithms for Matching and Related Problems</title>
<link>https://hdl.handle.net/1721.1/149141</link>
<description>Sublinear-time Parallel Algorithms for Matching and Related Problems
Goldberg, Andrew V.; Plotkin, Serge A.; Vaidya, Pravin
This paper presents the first sublinear-time deterministic parallel algorithms for bipartite matching and several related problems, including maximal node-disjoint paths, depth-first search, and flows in zero-one networks. Our results are based on a better understanding of the combinatorial structure of the above problems, which leads to new algorithmic techniques. In particular, we show how to use maximal matching to extend, in parallel, a current set of node-disjoint paths and how to take advantage of the parallelism that aries when a large number of nodes are "active" during an execution of a push/relabel network flow algorithm. We also show how to apply our techniques to design parallel algorithms for the weighted versions of the above problems. In particular, we present sublinear-time deterministic parallel algorithms for finding a minimum-weight bipartite matching and for finding a minimum-cost flow in a network with zero-one capacities, if the weights are polynomially bounded integers.
</description>
<dc:date>1988-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149140">
<title>Semantical Paradigms: Notes for an Invited Lecture</title>
<link>https://hdl.handle.net/1721.1/149140</link>
<description>Semantical Paradigms: Notes for an Invited Lecture
Meyer, Albert R.; Cosmadakis, Stavros S.
It tooke me quite a few years to understand the point of the continuity in denotational semantics. I'm happy to report below on some recent results which justify my muddle-headedness and help to explain the point too. What follows are some global comments on denotational semantics of teh kinds invited lecturers sometimes indulge themselves in, highlighting "goodness of fit" criteria between semantic domains and symbolic evaluators. For readers impatient with sketchy overviews, two appendices mostly by Cosmadakis provide the key parts of a long proof that Scott domains give a computationally adequate and fully abstract semantics for lambda calculus with simple recursive types.
</description>
<dc:date>1988-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149139">
<title>I/O Automata: A Model for Discrete Event Systems</title>
<link>https://hdl.handle.net/1721.1/149139</link>
<description>I/O Automata: A Model for Discrete Event Systems
Lynch, Nancy A.
</description>
<dc:date>1988-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149138">
<title>A Modular Proof of Correctness for a Network Synchronizer</title>
<link>https://hdl.handle.net/1721.1/149138</link>
<description>A Modular Proof of Correctness for a Network Synchronizer
Fekete, A.; Lynch, N.; Shrira, L.
In this paper we offer a formal, rigorous proof of the correctness of Awerbuch's algorithm for network synchronization. We specify both the algorithm and the correctness condition using the I/O automaton model, which has previously been used to describe and verify algorithms for concurrency control and resource allocation. We show that the model is also a powerful tool for reasoning about distributed graph algorithmss. Our prood of correctness follows closely the intuitive arguments made by the designer of the algorithm by exploiting the model's natural support for such important design techniques as stepwise refinement and modularity. In particular, since the algorithm uses simpler algorithms for synchronization within and between "clusters" of nodes, our prood can import as lemmas the correctness of these simpler algorithms.
</description>
<dc:date>1987-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149137">
<title>Inferring Decision Trees Using the Minimum Description Length Principle</title>
<link>https://hdl.handle.net/1721.1/149137</link>
<description>Inferring Decision Trees Using the Minimum Description Length Principle
Quinlan, L. Ross; Rivest, Ronald L.
We explore the use of Rissanen's Minimum Description Length Principle for the construction of decision trees. Empirical results comparing this approach to other methods are given.
</description>
<dc:date>1987-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149136">
<title>Lower Bounds for Recognizing Small Cliques on CRCW PRAM's</title>
<link>https://hdl.handle.net/1721.1/149136</link>
<description>Lower Bounds for Recognizing Small Cliques on CRCW PRAM's
Beame, Paul
</description>
<dc:date>1987-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149135">
<title>The Semantics of Miranda's Algebraic Types</title>
<link>https://hdl.handle.net/1721.1/149135</link>
<description>The Semantics of Miranda's Algebraic Types
Bruce, Kim B.; Riecker, Jon G.
Miranda has two interesting features in its typing system: implicit polymorphism (also known as ML-style polymorphism) and algebraic types. Algebraic types create new types from old and can operate on arbitrary types. This paper argues that functions of types, or type constructors, best represent the meaning of algebraic types. Building upon this idea, we develop a denotational semantics for algebraic types. We first define a typed lambda calculus that specifies type constructors. A semantic model of type constructors is them built, using the ideal model as a basis. (The ideal model gives the most natural semantics for Miranda's implicit polymorphism.) The model is shown to be sound with respect to this lambda calculus. FInally, we demonstrate how to use the model to interpret algebraic types, and prove that the translation produces elements in the model.
</description>
<dc:date>1987-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149134">
<title>Finding Minimum-cost Circulations by Canceling Negative Cycles</title>
<link>https://hdl.handle.net/1721.1/149134</link>
<description>Finding Minimum-cost Circulations by Canceling Negative Cycles
Goldberg, Andrew V.; Tarjan, Robert E.
A classical algorithm for finding a minimum-cost circultaion consists of repeatedly finding a residual cycle of negative cost and canceling it by pushing enough flow around the cycle to saturate an arc. We show that a judicious choice of cycles for canceling leads to a polynomial bound on the number of iterations in this algorithm. This gives a very simple strongly polynomial algorithm that uses no scaling. A variant of the algorithm that uses dynamic trees runs in O(nm(log n)min{log(nC),mlogn}) time on a network of n verticies, m arcs, and arc costs of maximum absolute value C. This bound is comparable to those of the fastest previously known algorithms.
</description>
<dc:date>1987-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149133">
<title>Finding Minimum-cost Circulations by Successive Approximation</title>
<link>https://hdl.handle.net/1721.1/149133</link>
<description>Finding Minimum-cost Circulations by Successive Approximation
Goldberg, Andrew V.; Tarjan, Robert E.
</description>
<dc:date>1987-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149132">
<title>Formulation of Tradeoffs in Planning Under Uncertainty</title>
<link>https://hdl.handle.net/1721.1/149132</link>
<description>Formulation of Tradeoffs in Planning Under Uncertainty
Wellman, Michael P.
Planning under uncertainty with multiple, competing objectives is impossible when goals are represented as predicates and the effects of actions are modeled as deterministic functions of situations. Decision-theoretic models, on the other hand, do not address the problem of constructing strategies from more primitive representations of actions. In this proposal, I describe a method for formulating plans from large knowledge bases that can accomodate uncertain and partial satisifaction of goals. At the core of the planner is a dominance prover that derives admissibility properties of plan classes. The representation for the effects of actions is based on a qualitative formalism for asserting influences among variables. The planner makes decisions "up to tradeoffs," an intuitive description that seems to characterize the power of a dominance prover based on the qualitative influence formalism.
</description>
<dc:date>1987-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149131">
<title>Controlling Worst-case Performance of a Communication Protocol and Dynamic Resource Management</title>
<link>https://hdl.handle.net/1721.1/149131</link>
<description>Controlling Worst-case Performance of a Communication Protocol and Dynamic Resource Management
Awerbuch, Baruch
This paper raises a fundamental questions, neglected so far in the literature: how to make a distributed algorithm robust against input errors and wrong probabilistic assumptions about the distribution of the inputs or of the link delays. We introduce a notion of complexity-preserving protocol controller: this is an automatic procedure that controls worst-case execution of any distributed algorithm. We then suggest a controlled with poly-logarithmic overhead. We show that the problem of designing controllers is a special case of another problem, referred to as dynamic resource management. We generalize our solution to solve the latter problem. We believe that the techniques used are basic ones, and will be used to solve a variety of unrelated network problems. Our solution seems to be very practical, since the formal code of the protocol is very simple and thus easy to implement. The technique used in the solution appears to be interesting because a global resource is manipulated locally. This somewhat resembles the "parallel prefix" technique used extensively in parallel computing.
</description>
<dc:date>1987-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149130">
<title>A Space-efficient Algorithm for Finding the Connected Components of Rectangles in the Plane</title>
<link>https://hdl.handle.net/1721.1/149130</link>
<description>A Space-efficient Algorithm for Finding the Connected Components of Rectangles in the Plane
Leiserson, Charles E.; Phillips, Cynthia A.
We present an algorithm for determining the connectivity of a set of N rectangles in the plane, a problem central to avoiding aliasing in VLSI design rule checkers. Previous algorithms for this problem either worked slowly with a small amount of primary memory space, or worked quickly but used more space. Our algorithm uses O(W) primary memory space, where W, the scan width, is the maximum number of rectangles to cross any vertical cut. The algorithm runs in O(N lg N) time and requires no more than O(N) transfers between primary and secondary memory.
</description>
<dc:date>1987-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149129">
<title>Efficient Multichip Partial Concentrator Switches</title>
<link>https://hdl.handle.net/1721.1/149129</link>
<description>Efficient Multichip Partial Concentrator Switches
Cormen, Thomas H.
</description>
<dc:date>1987-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149128">
<title>Efficient Parallel Algorithms for (_+1)-coloring and Maximal Indepdendent Set Problems</title>
<link>https://hdl.handle.net/1721.1/149128</link>
<description>Efficient Parallel Algorithms for (_+1)-coloring and Maximal Indepdendent Set Problems
Goldberg, Andrew V.; Plotkin, Serge A.
We describe an efficient technique for breaking symmetry in paralle. The technique works especially well on rooted trees and on graphs with a small maximum degree. In particular, we can find a maximal independent set on a constant-degree graph in O(lg*n) time on an EREW PRAM using a linear number of processors. We show how to apply this technique to construct more efficient paralle algorithms for several problems, including coloring of planar graphs and (Δ+1)-coloring of constant-degree graphs. We also prove lower bounds for two related problems.
</description>
<dc:date>1987-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149127">
<title>Murmur Clinic: An Auscultation Expert System</title>
<link>https://hdl.handle.net/1721.1/149127</link>
<description>Murmur Clinic: An Auscultation Expert System
Leong, Tze-Yun
Auscultation is a technique used in cardiac physical examination to detect irregularities by analyzing heart sounds. This paper reports on the development of Murmur Clinic, a cardiac auscultation expert system which is able to interpret and analyze auscultatory findings, and performs a tentative diagnosis based on a formalized diagnostic reasoning process. Descriptions of the scope addressed, the design, the diagnostic algorithm used and implementation of the system, as well as a sample session, and a discussion of limitations and possible improvements are presented.
</description>
<dc:date>1987-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149126">
<title>Communication-efficient Parallel Graph Algorithms</title>
<link>https://hdl.handle.net/1721.1/149126</link>
<description>Communication-efficient Parallel Graph Algorithms
Leiserson, Charles E.; Maggs, Bruce M.
Communication bandwidth is a resource ignored by most parallel random-access machine (PRAM) models. This paper shows that many graph problems can be solved in parallel, not only with polylogarithmic performance, but with efficient communication at each step of the computation. We measure the communication requirements of an algorithm in a model called the distributed random-access machine (DRAM), in whcih communication cost is measured in terms of the congestion of memory access across cuts of an underlying network. The algorithms are based on a communication-efficient variant of the tree contraction technique due to Miller and Reif.
</description>
<dc:date>1986-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149125">
<title>Cellular Automata '86 Conference</title>
<link>https://hdl.handle.net/1721.1/149125</link>
<description>Cellular Automata '86 Conference
Bennett, Charles H.; Toffoli, Tommaso; Wolfram, Stephen
</description>
<dc:date>1986-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149124">
<title>Data Sharing in Group Work</title>
<link>https://hdl.handle.net/1721.1/149124</link>
<description>Data Sharing in Group Work
Greif Irene; Sarin, Sunil
Data sharing is fundamental to computer-supported cooperative work: people share information through explicit communication channels and through their coordinated use of shared databases. Database support tools are therefore critical to the effective implementation of software for group work. This paper survey data sharing requirements for grouop work, highlight new database technologies that are especially likely to affect our ability to build computer systems supporting group work.
</description>
<dc:date>1986-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149123">
<title>Atomic Shared Register Access by Asynchronous Harward</title>
<link>https://hdl.handle.net/1721.1/149123</link>
<description>Atomic Shared Register Access by Asynchronous Harward
Vitányi, Paul M.B.; Awerbuch, Baruch
The contribution of this paper is two-fold. First, we describe two ways to construct multivalued atomic n-writer n-reader registers. The first solution uses atomic 1-write 1-reader registers and unbounded tags. The other solution uses atomic 1-write n-reader registers and bounded tags. The second part of the paper develops a general methodology to porve atomicity, by identifying a set of criteria which guaranty an effective construction  for the required atomic mapping. We apply the method to prove atomicity of the two implementations for atomic multiwriter multireader registers.
</description>
<dc:date>1986-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149122">
<title>Theory of Computation Group Research Summary June 1985 - July 1986</title>
<link>https://hdl.handle.net/1721.1/149122</link>
<description>Theory of Computation Group Research Summary June 1985 - July 1986
Theory of Computation Group
</description>
<dc:date>1986-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149121">
<title>Hierarchical Inequality Reasoning</title>
<link>https://hdl.handle.net/1721.1/149121</link>
<description>Hierarchical Inequality Reasoning
Sacks, Elisha P.
This paper describes a program called BOUNDER that proves inequalities between elementary functions over finite sets of constraints. Previous inequality algorithms perform well on some subset of the elementary functions, but poorly elsewhere. Although complex algorithms perform better than simple ones for most functions, exceptions exist. To overcome these problems, BOUNDER maintains a hierarchy of increasingly complex algorithms. When on fails to resolve an inequality, it tries the next. This strategy resolves more inequalities than any single algorithm. It also performs well on hard problems without wasting time on easier ones. The current hierarchy consists of four algorithms: bounds propogation, substitution, derivative inspection, and iterative approximation. Propogation is an extension of interval arithmetic that takes linear time, but ignores constraints between variables and multiple occurences of variables. The remaining algorithms consider these factors, but require exponential time. Substitution is a new, provably correct, algorithm for utilizing constraints between variables. An earlier attempt by Brooks does not terminate on all inputs and exploits fewer constraints. The final two algorithms analyze constraints between variables. Inspection examines the signs of partial derivatives. Iteration is based on several earlier algorithms from interval arithmetic.
</description>
<dc:date>1987-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149120">
<title>Game Tree Searching by Min/Max Approximation</title>
<link>https://hdl.handle.net/1721.1/149120</link>
<description>Game Tree Searching by Min/Max Approximation
Rivest, Ronald L.
</description>
<dc:date>1986-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149119">
<title>An Artificial Intelligence Approach to Clinical Decision Making</title>
<link>https://hdl.handle.net/1721.1/149119</link>
<description>An Artificial Intelligence Approach to Clinical Decision Making
Szolovits, Peter; Kassirer, Jerome P.; Long, William J.; Moskowitz, Alan J.; Pauker, Stephen G.; Patil, Ramesh S.; Wellman, Michael P.
This memo is the text of a proposal from the MIT Laboratory for Computer Science Clinical Decision Making group to the National Library of Medicine, requesting support for a five-year program of research.
</description>
<dc:date>1986-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149118">
<title>Retiming Synchronous Circuitry</title>
<link>https://hdl.handle.net/1721.1/149118</link>
<description>Retiming Synchronous Circuitry
Leiserson, Charles E.; Saxe, James B.
This paper shows how the technique of retiming can be used to transform a given sycnhronous circuit into a more efficient circuit under a variety of different cost criteria. We model a circuit as a graph, and we give an O(|V||E|log|V|) algorithm for determining an equivalent circuit with the smallest possible clock period. We show that the problem of determining an equivalent retimed circuit with minimum state (total number of registers) is polynomial-time solvable. This result yields a polynomimal-time optimal solution to the problem of pipelining combinatorial circuitry with minimum register cost. We also give a characterization of optimal retiming based on an efficiently solvable mixed-integer linear programming problem.
</description>
<dc:date>1986-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149117">
<title>Floyd-Hoare Logic Defines Semantics</title>
<link>https://hdl.handle.net/1721.1/149117</link>
<description>Floyd-Hoare Logic Defines Semantics
Meyer, Albert R.
The first-order patrial correctness assertions provable in Floyd-Hoare logic about an uninterpreted while-program scheme determine the scheme up to equivalence. This settles an open problem of Meyer and Halpern. The simple proof of this fact carries over to other partial correctness axiomatizations given in the literature for wider classes of ALGOL-like program schemes.
</description>
<dc:date>1986-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149116">
<title>Randomized Routing on Fat-trees</title>
<link>https://hdl.handle.net/1721.1/149116</link>
<description>Randomized Routing on Fat-trees
Greenberg, Ronald I.; Leiserson, Charles E.
Fat-trees are a class of routing networks for hardware-efficient paralle computation. This paper presents a randomized algorithm for routing messages on a fat-tree. The quality of the algorithm is measured in terms of the load factor of a set of messages to be routed, which is a lower bound on the time required to deliver the messages. We show that if a set of messages has load factor lambda on a fat-tree with n processors, the number of delivery cyles (routing attempts) that the algorithm requires is O(lambda + lg n lg lg n) with probability 1-O(1/n). The best previous bound was )(lambda lg n) for the off-line problem where switch settings can be determined in advance. In a VLSI-like model where hardware cost is equated with physical volume, the routing algorithm demonstrates that fat-trees are universal routing networks in the sense that any routing network can be efficiently simulated by a fat-tree of comparable hardward cost.
</description>
<dc:date>1986-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149115">
<title>Nonsequential Computation and Laws of Nature</title>
<link>https://hdl.handle.net/1721.1/149115</link>
<description>Nonsequential Computation and Laws of Nature
Vitányi, Paul M.B.
Traditionally, computational complexity theory deals with sequential computations. In the computational models the underlying physics is hardly accounted for. This attitude has persisted in common models for parallel computations. Wrongly, we shall argue, since the laws of physic intrude forcefully when we want to obtain realistic estimates of the performance of paralle or distributed algorithms. First, we shall explain why it is reasonable to abstract away from the physical details in sequential computations. Second, we show why certain common approaches in the theory of paralle complexity do not give useful information about the actual complexity of the parallel computation. Third, we give some examples of the interplay between physical considerations and actual complexity of distributed computations.
</description>
<dc:date>1986-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149114">
<title>Representing Change</title>
<link>https://hdl.handle.net/1721.1/149114</link>
<description>Representing Change
Sacks, Elisha
This paper evaluates knowledge representations for time-dependent information. It compares recent work by Moore, McDermott, and Allen with an ealier proposal by McCarthy and Hayes. Moore's formalism is faulted for its needless and unmotivated complexity and a simpler alternative is outlined. McDermott's formalism is proved inconsistent and unintuitive. Allen achieves the most by attempting the least. He proposes a simple plausible formalism, which makes few ontological or computational commitments. The paper concludes with a high-level discussion of the merits formal logic as a representation for empirical knowledge.
</description>
<dc:date>1986-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149113">
<title>Distributed Control in Computer Networks and Cross-sections of Colored Multidimensional Bodies</title>
<link>https://hdl.handle.net/1721.1/149113</link>
<description>Distributed Control in Computer Networks and Cross-sections of Colored Multidimensional Bodies
Kranakis, Evangelos; Vitanti, Paul M.B.
The number of messages to match a pair of processes in a multiprocessor network with mobile processes is a measure for the cost of setting up temporary communication between processes. We establish lower bounds on the average number of point-to-point transmissions between any pair of nodes in this context. The present analysis allows for the possibility of multiple transmissions (as opposed to a single one) between any two nodes, and also for the possibility of multiple queries (as opposed to the two, i.e. post and a single query considered  before). Applications of the results include lower bounds on the number of messages for distributed s-matching, that is, matching a group of s processes, and distributed s-mutual exclusion, that is, s-1 processes may enter a critical section simultaneously, but s process may not, for &gt;=2. The idea of the proof of the combinatorial result needed for this analysis is further extended to obtain a lower bound on the average number of colors occuring in random cross-sections of colored, multidimensional bodies in terms of the total (multidimensional) volume of each color in the whole body.
</description>
<dc:date>1986-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149112">
<title>The Power of the Queue</title>
<link>https://hdl.handle.net/1721.1/149112</link>
<description>The Power of the Queue
Li, Ming; Longpre, Luc; Vitányi, Paul M.B.
Queues, stacks (pushdown stores), and tapes are storage models which have direct applications in compiler design and the general desig of algorithms. Whereas stacks (pushdown store or last-in-first-out storage) have been thoroughly investigated and are well understood, this is much less the case for queues (first-in-first-out storage). This paper contains a comprehensive study comparing queues to stacks and tapes. We address off-line machines with a one-way input, both deterministic and nondeterministic. The techniques relly on algorithmic information theory (Kolmogorov Complexity).
</description>
<dc:date>1986-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149111">
<title>A Survey of Algorithms for Integrating Wafer-scale Systolic Arrays</title>
<link>https://hdl.handle.net/1721.1/149111</link>
<description>A Survey of Algorithms for Integrating Wafer-scale Systolic Arrays
Leighton, Tom; Leiserson, Charles
VLSI technologists are fast developing wafer-scale integration. Rather than partitioning a silicon wafer into chips as is usually done, the idea behind wafer-scale integration is to assemble an entire system (or network of chips) on a single wafer, thus avoiding the costs and performance loss associated with individual packaging of chips. A major problem with assembling a large system of microprocessors on a single wafer, however, is that some of the processor, or cells, on the wafer are likely to be defective. In the paper, we describe practical procedures for integrating wafer-scale systems "around" such faults. The procedures are designed to minimize the length of the longest wire in the system, thus minimizing the communication time between cells. Although the underlying network problems are NP-complete, we prove that the procedures are reliable by assuming a probabilistic model of cell failure.
</description>
<dc:date>1986-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149110">
<title>Interval and Recency-rank Source Coding: Two On-line Adaptive Variable-length Schemes</title>
<link>https://hdl.handle.net/1721.1/149110</link>
<description>Interval and Recency-rank Source Coding: Two On-line Adaptive Variable-length Schemes
Elias, Peter
In these schemes the encoder maps each message into a codeword in a prefix-free codeword set. In interval encoding the codeword is indexed by the interval since the last previous occurrence of that message, and the codeword set must be countably infinite. In recency rank encoding the codeword is indexed by the number of distinct messages in that interval, and there must be no fewer codewords than messages. The decoder decodes each codewords on receipt. Users need not know message probabilities but must agree on indexings, of the codeword set in an order of increasing length and of the message set in some arbitrary order. The average codeword length over a communications bout is never much larger than the value for an off-line scheme which maps the jth most frequent message in the bout into the jth shortest codeword in the give set, and is never too much larger than the value for off-line Huffman encoding of messages into the codeword set best for the bout message frequencies. Both schemes can do much better than Huffman coding when successive selections of each message type cluster much more than in the independent case.
</description>
<dc:date>1986-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149109">
<title>Knowledge and Common Knowledge in a Byzantine Environment: Crash failures</title>
<link>https://hdl.handle.net/1721.1/149109</link>
<description>Knowledge and Common Knowledge in a Byzantine Environment: Crash failures
Dwork, Cynthia; Moses, Yoram
By analyzing the states of knowledge that the processors attain in an unreliable system of a simple type, we capture some of the basic underlying structure of such systems. In particular, we study what facts become common knowledge at various points in the execution of protocols in an unreliable system. This characterizes the simultaneous actions that can be carried out in such systems. For example, we obtain a complete characterization of the number of rounds required to reach Simultaneous Byzantine Agreement, given the pattern in which failures occur. From this we derive a new protocol for this problem that is optimal in all runs, rather than just always matching the worst-case lower bound. In some cases this protocol attains Simultaneous Byzantine Agreement in as few as 2 rounds. We also present a non-trivial simultaneous agreement problem called bivalent agreement for which there is a protocol that always halts in two rounds. Our analysis applies to simultaneous actions in general, and not just to Byzantine agreement. The lower bound proofs presented here generalize and simplify the previously known proofs.
</description>
<dc:date>1986-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149108">
<title>An Application of Digital Broadcast Communication to Large Scale Information Systems</title>
<link>https://hdl.handle.net/1721.1/149108</link>
<description>An Application of Digital Broadcast Communication to Large Scale Information Systems
Gifford, David K.; Lucassen, John M.; Berline, Stephen T.
A new type of information system is described that combines personal computers, broadcast data communication, and bidirectional communication. The system is designed to use broadcast communciation whenever possible to deliever information to personal computers, which are used for data storage, indexing, and retrieval. This paper starts with an overview of the system, and then discuss the problem of reliable digital broadcast communication in some detail. A parameterized broadcast protocol is described, and we show how to choose protocol parameters based on observed channel error characteristics. A flexible encryption-based protection system is included in the protocol. We discuss the implementation of the system on contemporary personal computers. A broadcast system based on these ideas is now operating in Boston area homes.
</description>
<dc:date>1986-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149107">
<title>Tight Bounds for Minimax Grid Matching, with Applications to the Average Case Analysis of Algorithms</title>
<link>https://hdl.handle.net/1721.1/149107</link>
<description>Tight Bounds for Minimax Grid Matching, with Applications to the Average Case Analysis of Algorithms
Leighton, Tom; Shor, Peter
The minimax grid matching problem is a fundamental combinatorial problem associated with the average case analysis of algorithms. The problem has arisen in a number of interesting and seemingly unrelated areas, including wafer-scale integration of systolic arrays, two-dimentsional discrepancy problems, and testing pseudorandom number generators. However, the minimax grid matching problem is best known for its application to the maximum up-right matching problem. The maximum up-right matching problem was originally defined by Karp, Luby and Marchetti-Spaccamela in association with algorithms for 2-dimensional bin packing. More recently, the up-right matching problem has arisen in the average case analysis of on-line algorithms for 1-dimensional bin packing and dynamic allocation. In this paper, we solve both the minimax grid matching problem and the maximum up-right matching problem. As a direct result, we obtain tight upper bounds on the average case behavior of the best algorithms known for 2-dimensional bin packing, 1-dimensional on-line packing and on-line dynamic allocation. The results also solve a long-open question in mathematical statistics.
</description>
<dc:date>1986-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149106">
<title>A Randomized Data Structure for Ordered Sets</title>
<link>https://hdl.handle.net/1721.1/149106</link>
<description>A Randomized Data Structure for Ordered Sets
Bentley, Jon L.; Leighton Frank Thomson; Lepley, Margaret; Stanat, Donald F.; Steele, J. Michael
In this paper, we consider a simple randomized data structure for representing ordered sets, and give a precise combinatorial analysis of the time required to perform various operations. In addition to a practical data structure, this work provides new and nontrivial proabilistic lower bounds and an instance of a practical problem whose randomized complexity is provably less than its deterministic complexity.
</description>
<dc:date>1986-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149105">
<title>Cellular Automata Supercomputers for Fluid Dynamics Modeling</title>
<link>https://hdl.handle.net/1721.1/149105</link>
<description>Cellular Automata Supercomputers for Fluid Dynamics Modeling
Margolis, Norman; Toffoli, Tommaso; Vichniac, Gerard
We report recent developments in the modeling of fluid dynamics, and give experimental results (including dynamical exponents) obtained using cellular automata machines. Because of their locality and uniformity, cellular automata lend themselves to an extremely efficient physical realization; with a suitable architecture, an amount of hardware resources comparable to that of a home computer can achieve (in the simulation of cellular automata) the performance of a conventional supercomputer.
</description>
<dc:date>1985-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149104">
<title>Atomic Data Abstractions in a Distributed Collaborative Editing System (Extended Abstract)</title>
<link>https://hdl.handle.net/1721.1/149104</link>
<description>Atomic Data Abstractions in a Distributed Collaborative Editing System (Extended Abstract)
Greif, Irene; Selinger, Robert; Weihl, William
This paper describes our experience implementing CES, a distributed Collaborative Editing System written in Argus, a language that includes facilities for managing long-lived distributed data. Argus provides atomic actions, which simplify the handling of concurrency and failures, and t the mechanisms for implementing atomic data types, which ensure serializability and recoverability of actions that use them. This paper focuses on the support for atomicity in Argus, especially the support for building new atomic types. Overall the mechanisms in Argus made it relatively easy to build CES; however, we encountered interesting problems in several areas. For example, much of the processing of an atomic action in Argus is handled automatically by the run-time system; several examples are presented that illustrate areas where more explicit control in the implementations of atomic types would be useful.
</description>
<dc:date>1985-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149103">
<title>Dataflow Architectures</title>
<link>https://hdl.handle.net/1721.1/149103</link>
<description>Dataflow Architectures
Arvind; Culler, David E.
Dataflow graphs are described as a machine language for parallel machines. Static and dynamic dataflow architectures are presented as two implementations of the abstract dataflow model. Static dataflow allows at most one token per arc in dataflow graphs and thus only approximates the abstract model where unbounded token storage per arc is assumed. Dynamic architectures tag each token and keep then in a common pool storage, thus permitting a better approximation of the abstract model. The relative merits of the two approaches are discussed. Functional data structures and I-structures are presented as two views of data structures which are both compatible with the dataflow model. These views are contrasted and compared in regard to efficiency and exploitation of potential parallelism in programs. A discussion of major dataflow projects and a prognosis for dataflow architectures are also presented.
</description>
<dc:date>0002-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149102">
<title>Width-3 Permutation Branching Programs</title>
<link>https://hdl.handle.net/1721.1/149102</link>
<description>Width-3 Permutation Branching Programs
Barrington, David A.
We consider a restricted class of width-3 branching programs where each column of nodes depends on a single variable, and the 0-edges and the 1-edges out of each column form a permutation. In this model, parity and the mod-3 function are easy to calculate, but the and-function is hard. We show that any function of n inputs can be calculated in length O(2^n), and that the and-function in particular requires length O(2^n) if the branching program has one accept node and one reject node.
</description>
<dc:date>1985-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149101">
<title>Packet Trains: Measurements and a New Model for Computer Network Traffic</title>
<link>https://hdl.handle.net/1721.1/149101</link>
<description>Packet Trains: Measurements and a New Model for Computer Network Traffic
Jain, Raj; Routhier, Shawn
Traffic measurements on a ring local area computer network at Massachusetts Institute of Technology are presented. The analysis of the arrival pattern shows that the arrival processes are neither Poisson nor Compound Poisson. An alternative model called "packet train" is proposed. In the train model, the traffic on the network consists of a number of packet streams between various pairs of nodes on the network. Each node-pair stream (or node-pair process, as we call them) consists of a number of trains. Each train consists of a number of packets (or cars) going in either direction (from node A to B or from node B to A). The inter-car gap is large (compared to packet transmission time) and random. The inter-train time is even larger. The Poisson and the Compound Poisson arrivals are shown to be special cases of the train arrival model. Another important observation is that the packet arrivals exhibit a "source locality." If a packet is seen on the network going from A to B, the probability of the next packet going from A to B or from B to A is very high. Implications of the train arrivals, and source locality on the design of bridges, gateways and reservation protocols are discussed. A number of open problems requiring development of analysis techniques for systems with train arrival processes are also described.
</description>
<dc:date>1985-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149100">
<title>A New Max-flow Algorithm</title>
<link>https://hdl.handle.net/1721.1/149100</link>
<description>A New Max-flow Algorithm
Goldberg, Andrew V.
All previously known max-flow algorithms worked by finding augmenting paths, either one path at a time (Ford and Fulkerson algorithm), or all shortest augmenting paths at once (by using the level network technique of Dinic). We introduce an alternative way of dealing with the problem. Our method is to push flow through the original network. The algorithm and its analysis are simple and intuitive, yet the algorithm does as well as any other network flow algorithm on dense graphs, achieving O(n^3) running time. The algorithm admits distributed and parallel implementations as well as a sequential implementation. The algorithm requires less storage then the only other parallel max-flow algorithm known (due to Shiloach and Vishkin), and its parallel running time is the same, O(n^2 logn). In fact, our algorithm uses constant amount of storage for every edge or vertex of the network, allowing an implementation under and more realistic distributed model.
</description>
<dc:date>1985-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149099">
<title>Distributed FIFO Allocation of Identical Resources Using Small Shared Space</title>
<link>https://hdl.handle.net/1721.1/149099</link>
<description>Distributed FIFO Allocation of Identical Resources Using Small Shared Space
Fischer, Michael J.; Lynch, Nancy A.; Burns, James; Borodin, Allan
We present a simple and efficient algorithm for the FIFO allocation of k identical resources among asynchronous processes which communicate via shared memory. The algorithm simulates a shared queue but uses exponentially fewer shared memory values, resulting in practical savings of time and space as well as program complexity. The algorithm is robust against processes failure through unannounced stopping, making it attractive also for use in an environment of processes of widely differing speeds. In addition to its practical advantages, we show the algorithm is optimal (to within a constant factor) with respect to shared space complexity.
</description>
<dc:date>1985-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149098">
<title>The CAM-7 Multiprocessor: A Cellular Automata Machine</title>
<link>https://hdl.handle.net/1721.1/149098</link>
<description>The CAM-7 Multiprocessor: A Cellular Automata Machine
Toffoli, Tommaso; Margolis, Norman
</description>
<dc:date>1985-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149097">
<title>Dscribe: A Scribe Server</title>
<link>https://hdl.handle.net/1721.1/149097</link>
<description>Dscribe: A Scribe Server
Chung, Janice C.
This document gives a complete description of the design and implementation of Dscribe, the Scribe server. Dscribe is a program which allows users on a variety of hosts to have files processed remotely by the Scribe document preparation system. The first part of the document describes the functionality of Dscribe and the motivation for writing the program. It also gives an overview of how the program works. Later sections discuss important design issues and describe the implementation in detail.
</description>
<dc:date>1985-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149096">
<title>Network Control by Bayesian Broadcast</title>
<link>https://hdl.handle.net/1721.1/149096</link>
<description>Network Control by Bayesian Broadcast
Rivest, Ronald L.
</description>
<dc:date>1985-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149095">
<title>Improvements of Yao's Results on Parity Circuits</title>
<link>https://hdl.handle.net/1721.1/149095</link>
<description>Improvements of Yao's Results on Parity Circuits
Hastad, Johan
</description>
<dc:date>1985-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149094">
<title>Two Undecidability Results in Probabilistic Automata Theory</title>
<link>https://hdl.handle.net/1721.1/149094</link>
<description>Two Undecidability Results in Probabilistic Automata Theory
Kilian, Joseph J.
The language accepted by a probabilistic finite state acceptor with an isolated cutpoint is known to be regular. We show that determining if a cutpoint is isolated is undecideable.
</description>
<dc:date>1985-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149093">
<title>A Mixed Integer Linear Programming Problem Which is Efficiently Solvable</title>
<link>https://hdl.handle.net/1721.1/149093</link>
<description>A Mixed Integer Linear Programming Problem Which is Efficiently Solvable
Leiserson, Charles E.; Saxe, James B.
Efficient algorithms are known for the simple linear programming problem where each inequality is of the form xj-xi&lt;=aij. Furthermore, these techniques extend to the integer linear programming variant of the problem. This paper gives an efficient solution to the mixed-integer linear programming variant where some, but not necessarily all, of the unknowns are required to be integers. The algorithm we develop is based on a graph representation of the constraint system and runs in O(|V||E|+|V|62lh|V|) time. It has several applications including optimal retiming of synchronous circuitry, VLSI layout compaction in the presence of power and ground buses, and PERT scheduling with periodic constraints.
</description>
<dc:date>1985-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149092">
<title>Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity</title>
<link>https://hdl.handle.net/1721.1/149092</link>
<description>Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
Chor, Benny; Goldreich, Oded
A new model for weak random physical sources is presented. The new model strictly generalizes previous models (e.g. the Santha and Vazirani model [26]). The sources considered output strings according to probability distributions in which no single string is too probable. The new model provides a fruitful viewpoint on problems studied previously as: 1) Extracting almost perfect bits from sources of weak randomness: the question of possibility as well as the question of efficiency of such extraction schemes are addressed. 2) Probabilistic Communication Complexity: it is shown that most functions have linear communication complexity in a very strong probabilistic sense. 3) Robustness of BPP with respect to sources of weak randomness (generalizing a result of Vazirani and Vazirani [29]).
</description>
<dc:date>1986-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149091">
<title>Computer-based Real-time Conferences</title>
<link>https://hdl.handle.net/1721.1/149091</link>
<description>Computer-based Real-time Conferences
Sarin, Sunil K.; Greif, Irene
A real-time conferencing system allows a group of users to conduct a problem-solving meeting from their workstations. Participants in such a conference use the computer to jointly view, edit, and process relevant information, and use voice communication to discuss the information they are sharing. General principles are presented in this paper for selecting a set of user functions in a real-time conferencing system. The available implementation strategies are reviewed and compared, with emphasis on the tradeoffs between reusing existing single-user interactive programs and writing new distributed multi-user programs. Network communication requirements for real-time conferences, and their potential impact on communication protocol standards, are discussed. Real-time conferencing is contrasted with aynchronous communication support such as electronic message systems and shared databases, and the need for the two to work together within the total system environment is emphasized.
</description>
<dc:date>1985-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149090">
<title>What Price for Eliminating Expression Side-effects?</title>
<link>https://hdl.handle.net/1721.1/149090</link>
<description>What Price for Eliminating Expression Side-effects?
Hailperin, Max
Separating a programming language into side-effect-free expressions and effect-only statements should make the language more amenable to axiomatization, as well as providing benefits for style, pedagogy, and implementation efficiency (particularly in parallel-computing environments). This paper shows that such a division does not come at an unreasonable cost in programming convenience. First a dialect of Lisp is defined, in which a distinction is made between statements, which may have side-effects, and expressions, which may not. Next, a representative collection of examples from Abelson and Sussman's Structure and Interpretation of Computer Programs is coded in this dialect of Lisp. Most of the examples divide neatly into functional and imperative portions, and a few relatively clean transformations prove sufficient for the more stubborn cases.
</description>
<dc:date>1985-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149089">
<title>Qualitative Simulation in Medical Physiology: A Progress Report</title>
<link>https://hdl.handle.net/1721.1/149089</link>
<description>Qualitative Simulation in Medical Physiology: A Progress Report
Kuipers, Benjamin
This progress report describes the current status of the application of the QSIM qualitative simulation representation and algorithm to mechanisms drawn from medical physiology. QSIM takes a qualitative description of the structure of a mechanism and produces and qualitative description of its behavior. Here we apply it to a set of different, medically realistic examples, to represent the following kinds of knowledge: 1) Physiology: qualitative simulation handles the response of normally-functioning mechanisms for salt and water balance to a variety of different environmental perturbations. 2) Pathophysiology: local changes to the structure describing a normal mechanism produces a structure that accurately describes the pathophysiology of a set of diseases. 3) Abstraction: the knowledge of the complexity of human physiology can only be handled by organizing it hierarchically. A hierarchy according to the temporal scale of equilibrium processes appears to be promising. 4) Cardiology: a complex structure describing maintenance of heart rate and blood pressure was adequately constructed during a short meeting with a set of computationally sophisticated physicians. 5) Future Directions: we can outline some of the representation barriers in the way of capturing a broader range of medical knowledge.
</description>
<dc:date>1985-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149088">
<title>Probabilistic Analysis of a Network Resource Allocation Algorithm</title>
<link>https://hdl.handle.net/1721.1/149088</link>
<description>Probabilistic Analysis of a Network Resource Allocation Algorithm
Fischer, Michael J.; Griffeth, Nancy; Guibas, Leonidas J.; Lynch, Nancy A.
A distributed algorithm is presented, for allocating a large number of identical resources (such as airline tickets) to requests which can arrive anywhere in a distributed network. Resources, one allocated, are never returned. The algorithm searches sequentially, exhausting certain neighborhoods of the request origin before proceeding to search at great distances. Choice of search direction is made nondeterministically. Analysis of expected response time is simplified by assuming that the search direction is chosen probabilistically, that messages require constant time, that the network is a tree with all leaves at the same distance from the root, and that requests and resources occur only at leaves. It is shown that the response time is approximated by the number of messages of one that are sent during the execution of the algorithm, and that this number of messages is a nondecreasing function of the interarrival time for requests. Therefor, the worst case occurs when requests come in so far apart that they are processed sequentially. The expected time for the sequential case of the algorithm is analyzed by standard techniques. This time is shown to be bounded by a constant, independent of the size of the network. It follows that the expected response time for the algorithm is bounded in the same way.
</description>
<dc:date>1985-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149087">
<title>Electing a Leader in a Synchronous Ring</title>
<link>https://hdl.handle.net/1721.1/149087</link>
<description>Electing a Leader in a Synchronous Ring
Frederickson, Greg N.; Lynch, Nancy A.
We consider the problem of electing a leader in a synchronous ring of n processors. We obtain both positive and negative results. One the one hand, we show that if processor ID's are chosen from some countable set, then there is an alorithm which uses only O(n) messages in the worst case. On the other hand, we obtain two lower bound results. If the algorithm is restructed to use only comparisons of ID's, then we obtain an Ω(n log n) lower bound for the number of messages required in the worst case. Alternatively, there is a (very fast-growing) function f with the following property. If the number of rounds is required to be bounded by some t in the worst case, and ID's are chosen from any set having at leas f(n,t) elements, then any algorithm requires Ω(n log n) messages in the worst case.
</description>
<dc:date>1985-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149086">
<title>Reaching Approximate Agreement in the Presence of Faults</title>
<link>https://hdl.handle.net/1721.1/149086</link>
<description>Reaching Approximate Agreement in the Presence of Faults
Dolev, Danny; Lynch, Nancy A.; Pinter, Shlomit S.; Stark, Eugene W.; Weihl, William E.
This paper considers a variant of the Byzantine Generals problem, in which processes start with arbitrary real values rather than Booleann values or values from some bounded range, and in which approximate, rather than exact, agreement is the desired goal. Algorithms are presented to reach approximate agreement in aynchronous, as well as synchornous systems. The asynchronous agreement algorithm is an interesting contrast to a result of Fischer, Lynch, and Paterson, who show that exact agreement is not attainable in an asychronous system with as few as one fault process. The algorithms work by successive approximation, with a provable convergence rate that depends on the ratio between the number of faulty processes and the total number of processes. Lower bounds on the convergence rate for algorithms of this form are proven, and the algorithms presented are shown to be optimal.
</description>
<dc:date>1985-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149085">
<title>The Byzantine Firing Squad Problem</title>
<link>https://hdl.handle.net/1721.1/149085</link>
<description>The Byzantine Firing Squad Problem
Burns, James E.; Lynch, Nancy A.
A new problem, the Byzanntine Firing Squad problem, is defined and solved in two versions, Permissive and Strict. Both problems provide for synchronization of initially unsychronized processors in a synchronous network, in the absense of a common clock and in the presence of a limited number of faulty processors. Solutions are given which take the same number of rounds as Byzantine Agreement but might transmit r times as many bits, where r is the number of rounds used. Additional solutions are provided which use at most one (Permissive) or two (Strict) additional rounds and send at most n^2 bits plus four times the number of bits sent by a chosen Byzantine Agreement algorithm.
</description>
<dc:date>1985-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149084">
<title>Qualitative Simulation of Mechanisms</title>
<link>https://hdl.handle.net/1721.1/149084</link>
<description>Qualitative Simulation of Mechanisms
Kuipers, Benjamin
Qualitative simulation is a key inference process in qualitative causal reasoning. However, the precise meaning of the different proposals and their relation with differential equations is often unclear. In this paper, we present a precise definition of qualitative structure and behavior descriptions as abstractions of differential equations and continuously differentiable functions. We present a new algorithm for qualitative simulation that generalizes the best features of existing algorithms, and allows direct comparisons among alternate approaches. Starting with a structural description abstracted from a differential equation, we prove that the QSIM algorithm is guaranteed to produce a qualitative behavior corresponding to any solution to the original equation. We also show that any qualitative simulation algorithm, because of its local point of view, will sometimes produce spurious qualitative behaviors: ones which do not correspond to any mechanism satisfying the structureal description. These observations suggest specific types of care that must be taken in designing applications of qualitative causal reasoning systems, and in constructing and validating a knowledge base of mechanism descriptions.
</description>
<dc:date>1985-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149083">
<title>Generalized Planar Matching</title>
<link>https://hdl.handle.net/1721.1/149083</link>
<description>Generalized Planar Matching
Berman, Fran; Leighton, Tom; Shor, Peter; Snyder, Larry
In this paper, we prove that maximum planar H-matching (the problem of determining the maximum number of node-disjointed copies of the fixed graph H contained in a variable planar graph G) is NP-complete for any connected planar graph H with three or more nodes. We also show that perfect planar H-matching is NP-complete for any connected outerplanar graph H with three or more nodes, and is, somewhat surprisingly, solvable in linear time for triangulated H with four or more nodes. The results generalize and unify several special-case results proved in the literature. The techniques can also be applied to solve a variety of problems, including the optimal tile salvage problem from wafer-scale integration. Although we prove that the optimal tile salvage problem and other like it are NP-complete, we also describe provably good approximation algorithms that are suitable for practical applications.
</description>
<dc:date>1985-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149082">
<title>Tight Bounds on the Complexity of Parallel Sorting</title>
<link>https://hdl.handle.net/1721.1/149082</link>
<description>Tight Bounds on the Complexity of Parallel Sorting
Leighton, Tom
</description>
<dc:date>1985-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149081">
<title>Patterns in Trees</title>
<link>https://hdl.handle.net/1721.1/149081</link>
<description>Patterns in Trees
Dershowitz, Nachum; Zaks, Shmuel
A very general enumeration formula for occurences of a pattern, or set of patterns, in the class of ordered trees with a given number of edges is presented, and its wide usefulness is demonstrated.
</description>
<dc:date>1985-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149080">
<title>Consensus in the Presence of Partial Synchrony</title>
<link>https://hdl.handle.net/1721.1/149080</link>
<description>Consensus in the Presence of Partial Synchrony
Dwork, Cynthia; Lynch, Nancy A.; Stockmeyer, Larry
The concept of partial synchrony in a distributed system is introduced. Partial synchrony lies between the cases of a synchronous system and an asynchronous system. In a synchronous system, there is a known fixed upper bound Δ on the time required for a message to be sent from one processor to another and a known fixed upper bound Φ on the relative speeds of different processors. In an asynchronous system, no fixed uppper bounds Δ and Φ exist. In one version of partial synchrony, fixed bounds Δ and Φ exist but they are not know a priori. The problem is to design protocols which work correctly in the partially synchronous system regardless of the actual values of the bounds Δ and Φ. In another version of partial synchrony, the bounds are known but they are only guaranteed to hold starting at some unknown time T, and protocols must be designed to work correctly regardless of when the time T occurs. Fault tolerant consensus protocols are given for various cases of parial synchrony and various fault models. Lower bounds are also given which show in many cases that out protocols are optimal with respect to the number of faults tolerated. Our consensus protocols for partially synchronous processors use new protocols for fault-tolerant "distributed clocks" which allow partially synchronous processors to reach some approximately common notion of time.
</description>
<dc:date>1985-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149079">
<title>The Colored Ticket Algorithm</title>
<link>https://hdl.handle.net/1721.1/149079</link>
<description>The Colored Ticket Algorithm
Fischer, Michael J.; Lynch, Nancy A.; Burns, James; Borodin, Allan
Upper and lower bounds are proved for shared space requirements for solution of a problem involving resource allocation among asynchronous processes. The problem is to allocate some number, k≥1, of resources, in an environment in which processes can fail by stopping without warning. Allocation is to be as FIFO as possible, subject to variations imposed by the possibility of failures.
</description>
<dc:date>1983-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149078">
<title>Complexity of Network Synchronization</title>
<link>https://hdl.handle.net/1721.1/149078</link>
<description>Complexity of Network Synchronization
Awerbuch, Baruch
In this paper we investigate the problem of simulation of the synchronous network by the asynchronous one. We propose a new simulation technique, referred to as "Synchronizer" which is a new, simple methodology for desiging efficient distributed algorithms in asynchronous networks. Our Synchronizer exhibits a trade-off between its communication and time complexities, which is proved to be within a constant factor of the lower bound.
</description>
<dc:date>1985-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149077">
<title>Proposal for a Small Scheme Implementation</title>
<link>https://hdl.handle.net/1721.1/149077</link>
<description>Proposal for a Small Scheme Implementation
Schooler, Richard; Stamos, James W.
Scheme is a lexically scoped dialect of LISP developed at MIT. In this report we determine the feasibility of implementing a Scheme-based programming/application environment on a contemporary personal computer such as the Apple Macintosh. The absense of virtual memmory, coupled with a limitation on the maximum amount of physical memory, means that space is at a premium. We suggest the use of bytecodes and sketch a possible instruction set. Because of space constraints, tail-recursion optimization and an efficient mechanism for the reclamation of inaccessible contexts are also examined. Using the built-in operating system and user interface of the Macintosh realizes speed, functionality, and friendliness but raises a number of interesting issues. For example, the Pascal and assembler routines make many assumptions about data representation, type checking, and parameter passing. Since an implementation of Scheme is likely to have radically different conventions, the two environments must be interfaced smoothly and efficiently. In addition to the bytecode instruction set, we specify the virtual machine informally, discuss the implementation of basic and advanced features, and estimate the performance of such an implementation, and finally evaluate the proposed design.
</description>
<dc:date>1984-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149076">
<title>A Simple and Efficient Randomized Byzantine Agreement Algorithm</title>
<link>https://hdl.handle.net/1721.1/149076</link>
<description>A Simple and Efficient Randomized Byzantine Agreement Algorithm
Chor, Benny; Coan, Brian A.
A new randomized Byantine agreement algorithm is presented. This algorithm operates in a synchronous systems of n processors, at most t of which can fail. The algorithm reaches agreement in O(t/log n) expected rounds and O(n^2 t/log n) expected message bits independent of the distribution of processor failures. This performance is further improved to a constant expected number of rounds and O(n^2) message bits if the distribution of processor failures is assumed to be uniform. In either event, the algorithm improves on the known lower bound on rounds for deterministic algorithms. Some other advantages of the algorithm are that it requires no cryptographic techniques, that the amount of local computation is small, and that the expected number of random bits used per processor is only one. It is argued that in many practical applications of Byzantine agreement, the randomized algorithm of this paper achieves superior performance.
</description>
<dc:date>1984-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149075">
<title>A New Fault-tolerant Algorithm for Clock Sychronization</title>
<link>https://hdl.handle.net/1721.1/149075</link>
<description>A New Fault-tolerant Algorithm for Clock Sychronization
Lundelius, Jennifer; Lynch, Nancy A.
We describe a new fault-tolerant algorithm for solving a variant of Lamport's clock synchronization problem. The algorithm is designed for a system of distributed processes that communicate by sending messages. Each process has its own read only physical clock whose drift rate from real time is very small. By adding a value to its physical clock time, the process obtains its local time. The algorithm solves the problem of maintaining closely synchornized local times, assuming that processes' local times are closely synchronized initially. The algorithm is able to tolerate the failure of just under a third of the participating processes. It maintains synchornization to within a small constant, whose magnitude depends upon the rate of clock drift, the message delivery time, and the initial closeness of synchronization. We also give a characterization of how far the clocks drift from real time. Reintegration of a repaired process can be accomlished using a slight modification of the basic algorithm. A similiar style algorithm can also be used to achieve synchronization initially.
</description>
<dc:date>1984-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149074">
<title>Software for Interactive On-line Conferences</title>
<link>https://hdl.handle.net/1721.1/149074</link>
<description>Software for Interactive On-line Conferences
Sarin, Sunil K.; Greif, Irene
A layered architecture for the implementation of real-time conferences is presented. In a real-time conference a group of users, each at his or her own workstation, share identical views of on-line application information. The users cooperate in a problem solving task by interactively modifying or editing the shared view or the underlying information, and can use a voice communication channel for discussion and negotiation. The lower layer in this architecture, named Ensemble, supports the sharing of arbitrary application-defined objects among the participants of a conference, and the manipulation of these objects via one or more application-defined groups of commands called activities. Ensemble provides generic facilities for sharing objects and activities, and for dynamically adding and removing participants in a conference; these can be used in constructing real-time conferencing systems for many different applications. An example is presented of how the Ensemble functions can be used to implement a shared bitmap with independent participant cursors. The relation between this layered architecture and the ISO Open Systems Interconnection reference model is discussed. In particular, it is argued that Ensemble represents a plausible first step toward a Session-layer protocol for "multi-endpoint connections," a neglected area of communication protocol development.
</description>
<dc:date>1984-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149073">
<title>Naming and Directory Issues in Message Transfer Systems</title>
<link>https://hdl.handle.net/1721.1/149073</link>
<description>Naming and Directory Issues in Message Transfer Systems
Sirbu, Marvin A., Jr.; Sutherland, Juliet B.
A message transfer system requires some means for users to determine the addresses of their correspondents. A Directory Service aids users in identifying a particular correspondent and the correspondent's address. In this paper we discuss the technical, economic, organizational and political requirements which must be satisified by a directory service. We develop a language for describing alternative architectures for directory service borrowed from notions of hierarchical computer file system design. We propose a system of naming and directory services which meets the stated requirements based on names which specify a path through a sequence of directories. Finally, we compare our proposal to several alternative designs for directory service which have appeared in the literature.
</description>
<dc:date>1984-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149072">
<title>Three-dimensional Circuit Layouts</title>
<link>https://hdl.handle.net/1721.1/149072</link>
<description>Three-dimensional Circuit Layouts
Leighton, Tom; Rosenberg, Arnold
</description>
<dc:date>1984-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149071">
<title>Optimal Distributed Algorithms for Sorting and Ranking</title>
<link>https://hdl.handle.net/1721.1/149071</link>
<description>Optimal Distributed Algorithms for Sorting and Ranking
Zaks, Shmuel
We study the problems of sorting and ranking n processors that have initial values - not necessarily distinct - in a distrubuted system. Sorting means that the initial values have to move around in the network and be assigned to the processors according to their distinct identities, while ranking means that the numbers 1,2,...,n have to be assigned to the processors according to their initial values; ties between initial values can be broken in any chosen way. Assuming a tree network, and assuming that a message can contain an initial value, an identity or a rank, we present an algorithm for the ranking problem that uses, in the worst case, at most 1/2n^2 + O(n) such messages. The algorithm is them extended to perform sorting, using in the worst case at most 3/4n^2 + O(n) messages. Both algorithms are using a total of O(n) space. The algorithms are extended to general networks. The expected behavior of these algorithms for three classes of trees are discussed. Assuming that the initial values, identities and ranks can only be compared within themselves, lower bounds of 1/2n^2 and 3/4n^2 messages are proved for a worst case execution of any algorithm to solve the ranking and sorting problems, correspondingly.
</description>
<dc:date>1984-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149070">
<title>RSA/RABIN Least Significent Bits Are 1/2 + 1/poly(logN) Secure</title>
<link>https://hdl.handle.net/1721.1/149070</link>
<description>RSA/RABIN Least Significent Bits Are 1/2 + 1/poly(logN) Secure
Chor, Benny; Goldreich, Oded
</description>
<dc:date>1984-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149069">
<title>The Impact of Synchronous Communication on. The Problem of Electing a Leader in a Ring</title>
<link>https://hdl.handle.net/1721.1/149069</link>
<description>The Impact of Synchronous Communication on. The Problem of Electing a Leader in a Ring
Lynch, Nancy A.; Frederickson, Greg N.
We consider the problem of electing a leader in a synchronous ring of n processors. We obtain both positive and negative results. One the one hand, we show that if processor ID's are chosen from some countable set, then there is an alorithm which uses only O(n) messages in the worst case. On the other hand, we obtain two lower bound results. If the algorithm is restructed to use only comparisons of ID's, then we obtain an Ω(n log n) lower bound for the number of messages required in the worst case. Alternatively, there is a (very fast-growing) function f with the following property. If the number of rounds is required to be bounded by some t in the worst case, and ID's are chosen from any set having at leas f(n,t) elements, then any algorithm requires Ω(n log n) messages in the worst case.
</description>
<dc:date>1984-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149068">
<title>The Semantics of Local Storage of What Makes The Free-list Free?</title>
<link>https://hdl.handle.net/1721.1/149068</link>
<description>The Semantics of Local Storage of What Makes The Free-list Free?
Halpern, Joseph Y.; Meyer, Albert R.; Trakhtenbrot, B.A.
Denotational semantics for an ALGOL-like language with finite-mode procedures, blocks with local storage, and sharing (aliasing) is given by translating programs into an appropriately typed lambda-calculus. Procedures are entirely explained at a purely functional level - independent of the interpretation of program constructs - by continuous models for lambda-calculus. However, the usual (cpo) models are not adequate to model local storage allocation for blocks because storage overflow presents an apparent discontinuity. New domains of store models are offered to solve this problem.
</description>
<dc:date>1984-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149067">
<title>On the Sequential Nature of Unification</title>
<link>https://hdl.handle.net/1721.1/149067</link>
<description>On the Sequential Nature of Unification
Dwork, Cynthia; Kanellakis, Paris C.; Mitchell, John C.
The problem of unification of terms is log-space complete for P. In deriving this lower bound no use is made of the potentially concise representation of terms by directed acyclic graphs. In addition, the problem remains complete even if infinite substitutions are allowed. A consequence of this result is that parallelism cannot significantly improve on the best sequential solutions for unification. The "dual" problem of computing the congruence closure of an equivalence relation is also log-space complete for P. However, we show that for the problem of term matching, an important subcase of unification, there is a good parallel algorithm using O(log^2 n) time and n^O(1) processors on a PRAM. For the O(log^2 n) parallel time upper bound we assume that the terms are presented by directed acyclic graphs; if the longer string representation is used we obtain an O(log n) parallel time bound.
</description>
<dc:date>1984-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149066">
<title>On the Numbers of Close-and-equal Pairs of Bits in a String (with Implications on the Security of RSA'S L.S.B.)</title>
<link>https://hdl.handle.net/1721.1/149066</link>
<description>On the Numbers of Close-and-equal Pairs of Bits in a String (with Implications on the Security of RSA'S L.S.B.)
Goldreich, Oded
We consider the following problem: Let s be a n-bit string with m ones and n-m zeros. Denote by CEt(s) the number of pairs, of equal bits which are within distance t apart, in the string s. What is the minimum value of Cet(*), when the minimum is taken over all n-bit strings which consists of m ones and n-m zeros? We prove a (reasonably) tight lower bound for this combinatorial problem. Implications, on the cryptographic secruity of the least significant bit of a message encrypted by the RSA scheme, follow. E.g. under the assumption that the RSA is unbreakable; there exist no probabilistic polynomial-time algorithm which guesses the least significant bit of a message (correctly) with probability at least 0.725, when given the encryption of the message using the RSA. This is the best result known concerning the security of RSA's least significant bit.
</description>
<dc:date>1984-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149065">
<title>How to Assemble Tree Machines</title>
<link>https://hdl.handle.net/1721.1/149065</link>
<description>How to Assemble Tree Machines
Bhatt, Sandeep Nautam; Leiserson, Charles E.
Many researchers have proposed that ensembles of processing elements be organized as trees. This paper explores how large tree machines can be assembled efficiently from smaller components. A principal constraint considered is the limited number of external connections from an integrated circuit chip. We also explore the emerging capabilities of restructurable VLSI which allows a chip to be customized after fabrication. We give a linear-area chip of m processors and only four off-chip connections which can be used as the sole building block to construct an arbirtarily large complete binary tree. We also present a restructurable linear-areas layout of m processors with O(lg m) pins that can realize an arbitrary binary tree of any size. This layout is based on a solution to the graph-theoretic problem: Given a tree in which each vertex is either black or white, determine how many edges need to be cut in order to bisect the tree into equal-size components, each containing exactly half the black and half the white vertices. These ideas extend to more general graphs using separator theoerems and bifurcators.
</description>
<dc:date>1984-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149064">
<title>Empirical Analysis of a Token Ring Network</title>
<link>https://hdl.handle.net/1721.1/149064</link>
<description>Empirical Analysis of a Token Ring Network
Feldmeier, David C.
The MIT Laboratory for Computer Science 10 Megabit token ring local area network was monitored. Over a one-week period 7 million packets and 1.3 billion bytes passes by the monitor. This thesis compares the MIT ring traffic with that observed on the Xerox Palo Alto Research Center experimental Ethernet by Shoch and Hupp.
</description>
<dc:date>1984-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149063">
<title>An Application of Number Theory to the Organization of Raster Graphics Memory</title>
<link>https://hdl.handle.net/1721.1/149063</link>
<description>An Application of Number Theory to the Organization of Raster Graphics Memory
Chor, Benny; Leiserson, Charles E.; Rivest, Ronald L.; Shearer, James B.
A high-resolution raster-graphics display is usually combined with processing power and a memory organization that facilitates basic graphics operations. For many applications, including interactive text processing, the ability to quickly move or copy small rectangles of pixels is essential. This paper proposes a novel organization of raster-graphics memory that permits all small rectangles to be moved efficiently. The memory organization is based on a doubly periodic assignment of pixels to M memory chips according to a "Fibonacci" lattice. The memory organization guarantees that if a rectilinearly oriented rectangle contains fewer than M/√5 pixels, then all pixels will reside in different memory chips, and thus can be accesses simultaneously. We also define a continuous analogue of the problem which can be posed as, "What is the maximum density of a set of points in the plane such that no two points are contained in the interior of a rectilinearly oriented rectangle of unit area." We show the existence of such a set with density 1/√5, and prove this is optimal by giving a matching upper bound.
</description>
<dc:date>1984-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149062">
<title>On BPP</title>
<link>https://hdl.handle.net/1721.1/149062</link>
<description>On BPP
Zachos, Stathis K.; Heller, Hans
</description>
<dc:date>1983-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149061">
<title>Reaching Approximate Agreement in the Presence of Faults</title>
<link>https://hdl.handle.net/1721.1/149061</link>
<description>Reaching Approximate Agreement in the Presence of Faults
Dolev, Danny; Lynch, Nancy A.; Pinter, Shlomit S.; Stark, Eugene W.; Weihl, William E.
This paper considers a variant of the Byzantine Generals problem, in which processes start with arbitrary real values rather than Booleann values or values from some bounded range, and in which approximate, rather than exact, agreement is the desired goal. Algorithms are presented to reach approximate agreement in aynchronous, as well as synchornous systems. The asynchronous agreement algorithm is an interesting contrast to a result of Fischer, Lynch, and Paterson, who show that exact agreement is not attainable in an asychronous system with as few as one fault process. The algorithms work by successive approximation, with a provable convergence rate that depends on the ratio between the number of faulty processes and the total number of processes. Lower bounds on the convergence rate for algorithms of this form are proven, and the algorithms presented are shown to be optimal.
</description>
<dc:date>1985-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149060">
<title>On Concurrent Identification Protocols</title>
<link>https://hdl.handle.net/1721.1/149060</link>
<description>On Concurrent Identification Protocols
Goldreich, Oded
We consider communication networks in which it is not possible to identify the source of a message which is broadcastes through the network. A natural question is whether it is possible for two users to identify each other concurrently, through a secure two-party protocol. We show that more than the existence of a secure Public Key Cryptosystem should be assumed in order to present a secure protocol for concurrent identification. We present two concurrent identification protocols: The first one relies on the existence of a center who has distributed "identification tags" two the users; while the second protocol relies on the distribution of "experimental sequences" by instances of a pre-protocol which have taken place between every two users.
</description>
<dc:date>1983-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149059">
<title>The Markov Chain Tree Theorem</title>
<link>https://hdl.handle.net/1721.1/149059</link>
<description>The Markov Chain Tree Theorem
Leighton, Frank Thomson; Rivest, Ronald L.
Let M be a finite first-order stationary Markov chain. We define an arborescence to be a set of edges in the directed graph for M having at most one edge out of every vertex, no cyles, and maximum cardinality. The weight of an arborescence is defined to be the product over each edge in the arborescence of the probability of the transition associated with the edge. We prove that if M starts in state i, its limiting average probability of being in state j is proportional to the sum of the weights of all arborescences having a path from i to j and no edge out of j. We present two proofs. The first is derived from simple graph theoretic identities. The second is derived from the closely-related Matrix Tree Theorem.
</description>
<dc:date>1983-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149058">
<title>Estimateing a Probability using Finite Memory</title>
<link>https://hdl.handle.net/1721.1/149058</link>
<description>Estimateing a Probability using Finite Memory
Leighton, Frank Thomson; Rivest, Ronald L.
</description>
<dc:date>1983-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149057">
<title>Probabilistic Searching in Sorted Linked Lists</title>
<link>https://hdl.handle.net/1721.1/149057</link>
<description>Probabilistic Searching in Sorted Linked Lists
Leighton, Frank Thomson; Lepley, Margaret
Janko [2] and Bentley, Stanat, and Steele [1] have described probabilistic procedures for data manipulation in sorted linnked lists. Their procedures are based on an algorithm which performs a Member search operation using 2N^1/2 + O(1) expected steps where N is the number of elements in the list. In addition, Bentley, Stanat and Steele have shown that every Member search algorithm requires (2N)^1/2 + Ω(!) expected steps. In this paper, we improve the lower bound result in order to prove that the known algorithm for Member search is optimal.
</description>
<dc:date>1983-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149056">
<title>From Denotational to Operational and Axiomatic Semantics for ALGOL-like Languages: An Overview</title>
<link>https://hdl.handle.net/1721.1/149056</link>
<description>From Denotational to Operational and Axiomatic Semantics for ALGOL-like Languages: An Overview
Trakhtenbrot, B.A.; Halpern, Joseph Y.; Meyer, Albert R.
The advantages of denotational over operational semantics are argued. A denotational semantics is provided for an ALGOL-like language with finite-model procedures, blocks with local storage, and sharing (aliasing). Procedure declarations are completely explained in the ususal framework of complete partial orders, but cpo's are inadequate for the semantics of blocks, and a new class of store models is developed. Partial correctness theory over store models is developed for commands which may contain calls to global procedures, but do not contain function procedures returning storable values.
</description>
<dc:date>1983-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149055">
<title>Understanding ALGOL: A View of a Recent Convert to Denotational Semantics</title>
<link>https://hdl.handle.net/1721.1/149055</link>
<description>Understanding ALGOL: A View of a Recent Convert to Denotational Semantics
Meyer, Albert R.
The advantages of denotational over copy-rule semantics are argued. A denotational semantics is indicated for an ALGOL-like language with finite-mode procedures, blocks with local storage, and sharing (aliasing). Procedure declarations are completely explained in the usual framework of complete partial orders, but cpo's are inadequate for the semantics of blocks, and a new class of store models is described. The semantics justifies a proof system for partial correctness of commands containing global procedures.
</description>
<dc:date>1983-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149054">
<title>How to Construct Random Functions</title>
<link>https://hdl.handle.net/1721.1/149054</link>
<description>How to Construct Random Functions
Goldreich, Oded; Goldwasser, Shafi; Micali, Silvio
We assume that functions that are one-way in a very weak sense exist. We prove that in probabilitic polynomial time it is possible to construct deterministic polynomial time computable functions g:{1,…,2^k} -&gt; {1,…,2^k} that cannot be distinguished by an probabilistic polynomial time algorithm from a random function. Loosely speaking, g provides random access to a K2^k -bit long pad whose entries record the outcome of independent coin flips. This complexity theoretic result has many important applications in Cryptography, Protocols, and Hashing.
</description>
<dc:date>1982-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149053">
<title>Efficient Demand-Driven Evaluation (II)</title>
<link>https://hdl.handle.net/1721.1/149053</link>
<description>Efficient Demand-Driven Evaluation (II)
Pingali, Keshav; Arvind
In Part I of this paper, we presented a scheme whereby a compiler could propogate demands through programs in a powerful stream language L. A data-driven evaluation of the transformed program performed exactly the same computation as a demand-driven evaluation of the original program. In this paper, we explore a different transformation which trades the complexity of demand propogation for a bounded amount of extra computation on some data lines.
</description>
<dc:date>1983-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149052">
<title>Efficient Demand-Driven Evaluation (I)</title>
<link>https://hdl.handle.net/1721.1/149052</link>
<description>Efficient Demand-Driven Evaluation (I)
Pingali, Keshav; Arvind
We describe a program transformation technique for programs in a general stream language L whereby a data-driven evaluation of the transformed program performs exactly the same computation as a demand-driven evaluation of the original program. The transformational technique suggests a simple denotational characterization of demand-driven evaluation.
</description>
<dc:date>1983-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149051">
<title>Two Fundamental Issues in Multiprocessing: The Dataflow Solution</title>
<link>https://hdl.handle.net/1721.1/149051</link>
<description>Two Fundamental Issues in Multiprocessing: The Dataflow Solution
Arvind; Iannucci, Robert A.
To exploit the parallelism inherent in algorithms, any multiprocessor system must address two very basic issues - long memory latencies and waits for synchronization events. It is argued on the basis of the evolution of high performance computers that the processor idle time induced by memory latency and synchronization waits cannot be reduced simultaneously in von Neumann style multiprocessors. Dataflow architectures are offered as an alternative because, given enough parallelism in the program, they can reduce both latency and sychronization costs.
</description>
<dc:date>1985-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149050">
<title>A Program for Therapy of Acid-base and Electrolyte Disorders</title>
<link>https://hdl.handle.net/1721.1/149050</link>
<description>A Program for Therapy of Acid-base and Electrolyte Disorders
Bromley, Hank
This thesis describes work done on the therapy component of an on-going project for the diagnosis and management of acid-base and electrolyte disoders. Therapeutic interventions can be classified as symptomatic or etiologic, and as acute or chronic. We have focused on the problem of acute symptomatic therapy. Based on observation of clinical practice, we have developed a formalization of the domain-independent aspects of the task of acute symptomatic therapy, then applied the formalization to the particular field of acid-base and electrolyte disorders. A rule-based program named ABET (the Acide-Base ad Electrolye Therapy Advisor) has been designed and written to test this formalization. The thesis presents the methods used by ABET, the program's implementation, a sample session, and a discussion of limitations and possible improvements.
</description>
<dc:date>1983-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149049">
<title>Evaluation of an Office Analysis Methodology</title>
<link>https://hdl.handle.net/1721.1/149049</link>
<description>Evaluation of an Office Analysis Methodology
Sutherland, Juliet; Sirbu, Marvin
We have developed a model of the office that describes semi-structured office work. This model underlies an office analysis methodology and an office-specification language. An evaluation of the usefulness and practicality of the model, the specification language, and the methodology has dhown that the model is clearly a useful approach to understanding offices, the specification language is interesting but not as useful in practice as we had hoped, and the methodology is useful but could be improved. We have developed a new methodology that addresses the issue of diagnosis as well as description. This new methodology is still being evaluated, but early results show that it is as useful for training new analysts as the old methodology.
</description>
<dc:date>1983-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149048">
<title>An Approximation Algorithm for Manhattan Routing</title>
<link>https://hdl.handle.net/1721.1/149048</link>
<description>An Approximation Algorithm for Manhattan Routing
Baker, Brenda S.; Bhatt, Sandeep N.; Leighton, Frank Thomson
Density has long been known to be an important measure of difficulty for Manhattan routing. In this paper, we identify a second important measure of difficulty, which we call flux. We show that flux, like density, is a lower bound on channel width. In addition, we present a linear-time algorithm which routes any multipoint net Manhattan routing problem with density d and flux f in a channel of width 2d+O(f). (For 2-point net, the bound is d+O(f).) Thus we show that Manhattan routing is one of the NP-complete problems for which there is a provably good approximation algorithm.
</description>
<dc:date>1983-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149047">
<title>Planar Embedding of Planar Graphs</title>
<link>https://hdl.handle.net/1721.1/149047</link>
<description>Planar Embedding of Planar Graphs
Dolev, Danny; Leighton, Frank Thomson; Trickey, Howard
Planar embedding with minimal area of graphs on an integer grid is an interesting problem in VLSI theory. Valiant [V] gave an algorithm to construct a planar embedding for trees in linear area; he also proved that there are planar graphs that require quadratic area. We fill in a spectrum between Valiant's results by showing that a N-node planar graph has a planar embedding with area O(NF), where F is a bound on the path length from any node to the exterior face. In particular, an outerplanar graph can be embedded without crossovers in linear area. This bound is tight, up to constant factors: for any N and F, there exist graphs requiring Ω(NF) area for planar embedding. Also, finding a minimal embedding area is shown to be NP-complete for forests, and hence for more general types of graphs.
</description>
<dc:date>1983-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149046">
<title>Wafer-scale Integration of Systolic Arrays</title>
<link>https://hdl.handle.net/1721.1/149046</link>
<description>Wafer-scale Integration of Systolic Arrays
Leighton, Frank Thomson; Leiserson, Charles E.
VLSI technologists are fast developing wafer-scale integration. Rather than partitioning a silicon wafer into chips as is usually done, the idea behind wafer-scale integration is to assemble an entire system (or network of chips) on a single wafer, thus avoiding the costs and performance loss associated with individual packaging of chips. A major problem with assembling a large system of microprocessors on a single wafer, however, is that some of the processor, or cells, on the wafer are likely to be defective. In the paper, we describe practical procedures for integrating wafer-scale systems "around" such faults. The procedures are designed to minimize the length of the longest wire in the system, thus minimizing the communication time between cells. Although the underlying network problems are NP-complete, we prove that the procedures are reliable by assuming a probabilistic model of cell failure. We also discuss applications of this work to problems in VLSI layout theory, graphy theory, fault-tolerant systems and planar geometry.
</description>
<dc:date>1983-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149045">
<title>The Implication Problem for Functional and Inclusion Dependencies</title>
<link>https://hdl.handle.net/1721.1/149045</link>
<description>The Implication Problem for Functional and Inclusion Dependencies
Mitchell, John C.
There are two implication problems for functional dependencies and inclusion dependencies: general implication and finite implication. Given a set of dependencies ∑∪{σ}, the problems are to determine whether σ holds in all databases satisfying ∑ or all finite databases satisfying ∑. Contrary to the possibility suggested in [5], there is a natural, complete axiom system for general implication. However, a simple observation shows that both implication problems are recursively unsolvable. It follows that there is no recursively enumerable set of axioms for finite implication.
</description>
<dc:date>1983-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149044">
<title>Randomized Encryption Techniques</title>
<link>https://hdl.handle.net/1721.1/149044</link>
<description>Randomized Encryption Techniques
Rivest, Ronald L.; Sherman, Alan T.
A randomized encryption procedure enciphers a message by randomly choosing a ciphertext from a set of ciphertexts corresponding to the message under the current encryption key. At the cost of increasing the required bandwidth, such procedures may achieve greater cryptographic security than their deterministic counterparts by increasing the apparent size of the message space, eliminating the threat of chosen plaintext attacks, and improving the a priori statistics for the inputs to the encryption algorithms. In this paper we explore various ways of using randomization in encryption.
</description>
<dc:date>1983-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149043">
<title>Implementing Internet Remost Logic on a Personal Computer</title>
<link>https://hdl.handle.net/1721.1/149043</link>
<description>Implementing Internet Remost Logic on a Personal Computer
Konopelski, Louis J.
This thesis demonstrates that a desktop personal computer can support an efficient internet remote login implementation with the same protocols used by large mainframes. It describes a project in which the Telnet remote login protocol, along with the supporting Transmission Control Protocol and Internet Protocol were implemented on an IBM Personal Computer. The utility of the implementation depended heavily on the software speed. Strategies discusses to insure quick performance included tailoring protocols to their clients needs, sharing the overhead of asynchronous actions, and sharing data. A natural order in which to process the protocol data was identified, and two control structures were presented that allowed the protocol modules to run in this order. One of the control structures used procedures and processes, while the other used procedures alone. A full scale protocol was successfully placed in the personal computer. With some foreign hosts, the implementation echoed characters in less than a quarter of a second, and processed a screenful of data in less than three seconds. The protocol software overhead was never the dominating performance bottleneck. The serial line interface limited the character echoing performance while the speed with which the processor could operate its display limited the processing speed of large amounts of data. Memory size was not a significant constraint.
</description>
<dc:date>1982-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149042">
<title>PLY: A System of Plausibility Inference with a Probabilistic Basis</title>
<link>https://hdl.handle.net/1721.1/149042</link>
<description>PLY: A System of Plausibility Inference with a Probabilistic Basis
Yeh, Alexander
An overview is given of a system of plausibility inference that will be developed for use in planning. This system, to be called PLY, will be specifically designed to work with propositions of the form "when A is true (occurs), B is likely to be true (to occur)." Previous systems performing similiar functions have been designed as aids for such tasks as medical diagnosis (MYCIN and others) and mineral prospecting (PROSPECTOR). PLY will have a probabilistics basis. Intuitive assumptions to deal with knowledge not explicitly given to the system will be made with the aid of an information-theoretic measure on the amount of information in a probability distribution. Unlike many other systems, PLY will not use these assumptions when the given knowledge indicates they are not tenable. In addition to standard probabilities, PLY will be able to make use of knowledge (information) in the form of correlations and increased/decreased likelihoods, which most people find easier to estimate than probabilities. PLY's knowledge will be in an organized and structures form, which will help in knowledge acquisition and revisino, faciliate system explanations, and lower the storage requirements of the system.
</description>
<dc:date>1982-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149041">
<title>An Asymptotically Optimal Layout for the Shuffle-exchange Graph</title>
<link>https://hdl.handle.net/1721.1/149041</link>
<description>An Asymptotically Optimal Layout for the Shuffle-exchange Graph
Kleitman, Daniel; Leighton, Frank Thomson; Lepley, Margaret; Miller, Gary L.
The shuffle-exchange graph is one of the best structures known for parallel computation. Among other things, a shuffle-exchange computer can be used to compute discrete Fourier transforms, multiply matrices, evaluate polynomials, perform permutations and sort lists. The algorithms needed for these operations are quite simple and many require no more than logarithmic time and constant space per processor. In this paper, we describe an O(n^2/log^2N)-area layout for the shuffle-exchange graph on a two-dimentional grid. The layout is the first which is known to achieve Thompson's asymptotic lower bound.
</description>
<dc:date>1982-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149040">
<title>Embedding Cryptographic Trapdoors in Arbirtrary Knapsack Systems</title>
<link>https://hdl.handle.net/1721.1/149040</link>
<description>Embedding Cryptographic Trapdoors in Arbirtrary Knapsack Systems
Shamir, Adi
In this paper we show that after sufficiently many modular multiplications, any knapsack system becomes a trapdoor system that can be used in pubic-key cryptography.
</description>
<dc:date>1982-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149039">
<title>The Complexity of Evaluation Relational Queries</title>
<link>https://hdl.handle.net/1721.1/149039</link>
<description>The Complexity of Evaluation Relational Queries
Cosmadakis, Stavros S.
We show that, given a relation R, a relational query ? Involving only projection and join, and a conjectured result r, resting with ?(R)=r is D^p complete. Bounding the size of ?(R) from below (above) is NP-hard (co-NP-hard), and bounding it both ways is D^p hard. Computing the size of ?(R) is #P-hard. We also show that, given two relations R1 and R2 and two queries ?1 and ?2 as above, testing whether ?1)R1)⊆?2(R2) and testing whether ?1(R1)=?2(R2) and both ∏p2-complete, even when R1-R2 or when ?1=?2.
</description>
<dc:date>1982-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149038">
<title>Two Remarks on the Power of Counting</title>
<link>https://hdl.handle.net/1721.1/149038</link>
<description>Two Remarks on the Power of Counting
Papadimitriou, Christos H.; Zachos, Stathis K.
The relationship between the polynomial hierarchy and Valiant's class #P is at present unknown. We show that some low portions of the polynomial hierarchy, namely deterministic polynomial algorithms using an NP oracle at most a logarithmic number of times, can be simulated by one #P computation. We also show that the class of problems solvable by polynomial-time nondeterministic Turing machines which accept whenever there is an odd number of accepting computations is idempotent, that is closed under usage of oracles from the same class.
</description>
<dc:date>1982-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149037">
<title>New Lower Bound Techniques For VLSI</title>
<link>https://hdl.handle.net/1721.1/149037</link>
<description>New Lower Bound Techniques For VLSI
Leighton, Frank Thomson
In this paper, we use crossing number and wire area arguments to find lower bounds on the layout area and maximum edge length of a variety of new and computationally useful networks. In particular, we describe 1) an N-node planar graph which has layout area ⊖ (NlogN) and maximum edge length ⊖(N^1/2/log^1/2N), 2) an N-node graph with an O(x^1/2)-separator which has layout area ⊖ (Nlog^2N) and maximum edge length ⊖ (N^1/2logN/loglogN), and 3) an N-node graph with an O(x^1-1/r)-separator which has maximum edge length ⊖(N1-1/4) for an r≥3.
</description>
<dc:date>1982-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149036">
<title>Hoare's Logic Is Not Complete When It Could Be</title>
<link>https://hdl.handle.net/1721.1/149036</link>
<description>Hoare's Logic Is Not Complete When It Could Be
Bergstra, J.; Chielinksa, A.; Tiuryn, J.
It is known (cf.[2]) that is the Hoare rules are complete for a first-order structure A, then the set of partial correctness assertions true over A is recursive in the first-order theory of A. We show that the converse is not true. Namely, there is a first-order structure C such that the set of partial correctness assertions true over C is recursive in the theory of C, but the Hoare rules are not complete for C.
</description>
<dc:date>1982-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149035">
<title>Foundations for Office Semantics</title>
<link>https://hdl.handle.net/1721.1/149035</link>
<description>Foundations for Office Semantics
Barber, Gerald R.; Hewitt, Carl
In this paper we develop the semantics of work in the office in terms of the concepts of application structure and organizational structure of the office. Application structure is concerned with the rules and constraints of the domain of the office work such as accounting, law, or social security regulations. Organizational structure is concerned with the informal and formal social relationships within the organization. Detailed knowledge of office application structures and organizational structures is necessary in order to understand how they interact and evolve. Problem solving is a pervasive activity within offices which is performed when office workers apply general knowledge about office procedures to the specific cases encountered in their daily work. We discuss how a description system (named OMEGA) can aid in the construction of interactive systems whose intent is to describe the application and organization structures. Using the knowledge embedded within itself about the office OMEGA can help support office workers in their problems solving processes.
</description>
<dc:date>1982-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149034">
<title>Supporting Organizational Problem Solving with a Workstation</title>
<link>https://hdl.handle.net/1721.1/149034</link>
<description>Supporting Organizational Problem Solving with a Workstation
Barber, Gerald R.
This paper describes an approach to supporting work in the office. Using and extending ideas from the field of Artificial Intelligence (AI) we describe office work as a problem solving activity. A knowledge embedding language called Omega is used to embed knowledge of the organization into an office worker's workstation in order to support the office worker in his or her problem solving. A particular approach to reasoning about change and contradiction is discussed. This approach uses Omega's viewpoint mechanism. Omega's viewpoint mechanism is a general contradiction handling facility. Unlike other Knowledge Representation systems, when a contradiction is reached the reasons for the contradiction can be analyzed by the deduction mechanisms without having to resort to a backtracking mechanism. The Viewpoint mechanism is the heart of the Problem Solving Support Paradigm. This paradigm supplements the classical AI view of problem solving. Office workers are supported using the Problem Solving Support Paradigm. An example is presented where Omega's facilities are used to support an office worker's problem solving activities. The example illustrates the use of viewpoints and of Omega's capabilities to reason about it's own reasoning process.
</description>
<dc:date>1982-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149033">
<title>A Principled Design for an Integrate Computational Environment</title>
<link>https://hdl.handle.net/1721.1/149033</link>
<description>A Principled Design for an Integrate Computational Environment
diSessa, Andrea A.
Boxer is a computer language designed to be the base of an integrated computational environment providing a broad array of functionality -- from text editing to programming -- for naïve and novice users. It stands in the line of Lisp inspired languages (Lisp, Logo, Scheme), but differs from these in achieveing much of its understandability from pervasive use of a spatial metaphor reinforced through suitable graphics. This paper describes a set of learnability and understandability issues first and then uses them to motivate design decisions made concerning Boxer and the environment in which it is embedded.
</description>
<dc:date>1982-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149032">
<title>A Telex Gateway for the Internet</title>
<link>https://hdl.handle.net/1721.1/149032</link>
<description>A Telex Gateway for the Internet
Meier zu Sieker, Friedrich
The design of a gateway connecting one of the networks of the MIT Laboratory for Computer Science to the telex network is discussed. A description of the telex network is given. The relationship of the gateway to other resources of the network environment is considered to obtain directions for the implementation of new resources. The implementation of the gateway on the UNIX operating system outlined.
</description>
<dc:date>1982-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149031">
<title>Layouts for the Suffle-Exchange Graph Based on the Complex Plane Diagram</title>
<link>https://hdl.handle.net/1721.1/149031</link>
<description>Layouts for the Suffle-Exchange Graph Based on the Complex Plane Diagram
Leighton, Frank Thomson; Lepley, Margaret; Miller, Gary L.
The shuffule-exchange graph is one of the best structures known for parallel computation. Among other things, a shuffle-exchange computer can be used to compute discrete. Fourier transforms, multiply matrices, evaluate polynomials, performa permutations and sort lists. The algorithms needed for these operations are extremely simple and many require no more than logarithmic time and constant space per processor. In this paper, we analyze the algebraic structure of the shuffle-exchange graph in order to find area-efficient embeddings of the graph in a two-dimensinoal grid. The results are applicable to the design of Very Large Scale Integration (VLSI) circuit layouts for a shuffle-exchange computer.
</description>
<dc:date>1982-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149030">
<title>Circuit Analysis of Self-timed Elements for NMOS VLSI Systems</title>
<link>https://hdl.handle.net/1721.1/149030</link>
<description>Circuit Analysis of Self-timed Elements for NMOS VLSI Systems
Chu, Tam-Anh
Scalingof VLSI digital systems introduces new problems to the design of synchronous systems, due to the disproportional increase in wire delays with the decrease in transistor sizes. One the other hand, the asynchronous self-timed design approach, which has been traditionally less attractive, offer a number of advantages for VLSI. Also, this approach can be directly incorporated into a structured design methodology for Packet Communication Architectures. This paper considers a practical self-timed design methodology and studies its implementation in nMOS. The C-element and the arbiter circuit, two main circuit components of self-timed systems, are analyzed to allow the evaluation of the design approach.
</description>
<dc:date>1982-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149029">
<title>Recursive Decomposition Ordering and Multiset Orderings</title>
<link>https://hdl.handle.net/1721.1/149029</link>
<description>Recursive Decomposition Ordering and Multiset Orderings
Jouannaud, Jean-Pierre; Lescanne, Pierre; Reinig, Fernand
The Recursive Decomposition Ordering, a simplification ordering on terms, is useful to prove termination of term rewriting systems. In this paper we give the definition of the decomposition ordering and prove that it is a well-founded simplication ordering containing Dershowitz's Recursive Path Ordering. We also show that the Recursive Decomposition Ordering has a very interesting incremental property. In the second paper, we propose two well-founded orderings on multisets that extend the Dershowitz-Manna ordering. Unlike the Dershowitz-Manna ordering, ours do not have a natural monotonicity property. This lack of monotonicity suggests using monotonicity to provide a new characterization of the Dershowitz -Manna ordering. Section 5 proposes an efficient and correct implementation of that ordering.
</description>
<dc:date>1982-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149028">
<title>Cooperative Office Work, Teleconferencing and Calendar Management: A Collection of Papers</title>
<link>https://hdl.handle.net/1721.1/149028</link>
<description>Cooperative Office Work, Teleconferencing and Calendar Management: A Collection of Papers
Greif, Irene
This technical memo consists of a collection of papers that have been presented at conferences. They all present results of research in the "Multi-person Informational Work" project in the Office Automation Group.
</description>
<dc:date>1982-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149027">
<title>A File Transfer Program for a Personal Computer</title>
<link>https://hdl.handle.net/1721.1/149027</link>
<description>A File Transfer Program for a Personal Computer
Wright, Karl D.
This thesis explores engineering decisions involved in implementing a network file transfer program on a personal computer in response to criteria of low cost and reasonable efficiency. The issues include choice of hardware, design of the network, choice of implementation language, choice of communication protocols, and choice of software structure. A machine level protocol is designed. A project incorporating these and other ideas is undertaken and the ideas thus evaluated. Insight is gleaned into the performance expected under varying operating system and interrupt enviroments. A notion of an "ideal" operating system interface for applications similiar to file transfer (which can exploit concurrency) is developed. Finally, possible improvements on the actual project are suggested based in part on the efficiency data obtained.
</description>
<dc:date>1982-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149026">
<title>Coping with Syntactic Ambiguity or How to Put the Block in the Box on the Table</title>
<link>https://hdl.handle.net/1721.1/149026</link>
<description>Coping with Syntactic Ambiguity or How to Put the Block in the Box on the Table
Church, Kenneth; Patil, Ramesh
Sentences are far more ambiguous than one might have thought. There may be hundreds, perhaps thousands of syntatic parse trees for certain very natural sentences of English. This fact has been a major problem confronting natural language processing because it indicates that it may require a long time to construct a list of all the parse trees, and furthermore, it isn't clear what to do with the list once it has ben constructed. This list may be so numerous that it is probably not the most convenient representation for communication with the semantic and pragmatic processing modules. In this paper we propose some methods for dealing with syntactic ambiguity in ways that take advantage of certain regularities among the alternative parse trees. These regularities will be expressed as linear combinations of ATN networks, and also as sums and products of formal power series. We will suggest some ways that practical processor can take advantage of this modularity in order to deal more efficiently with combinatoric ambiguity. In particular, we will show how a processor can efficiently compute the ambiguity of an input sentence (or any portion thereof). Furthermore, we will show how to compile certain grammars into a form that can be processed more efficiently. In some cases, including the "every way ambiguous" grammar (e.g., conjunction, prepositional phrases, noun-noun modification), processing time will be reduced from O9n^3) to O(n). Finally, we will show how to uncompile certain highly optimized grammars into a form suitable for linguistic analysis.
</description>
<dc:date>1982-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149025">
<title>Optimizing Synchronous Systems</title>
<link>https://hdl.handle.net/1721.1/149025</link>
<description>Optimizing Synchronous Systems
Leiserson, Charles E.; Saxe, James B.
The complexity of integrated-circuit chips produced today makes it feasible to build inexpensive, special-purpose subsystems that rapidly solve sophisticated problems on behalf of a general-purpose host computer. This paper contributes to the design methodology of efficient VLSI algorithms. We present a transformation that converts synchronous systems into more time-efficient, systolic implementations by removing combinatorial rippling. The problem of determining the optimized system can be reduced to the graph-theoretic single-destination-shortest-paths problem. More importantly from an engineering standpoint, however, the kinds of rippling that can be removed from a circuit at essentially no cost can be easily characterized. For example, if the only global communication in a system is broadcasting from the host computer, the broadcast can always be replaced by local communication.
</description>
<dc:date>1982-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149024">
<title>Termination Assertions for Recursive Programs: Completeness and Axiomatic Definability</title>
<link>https://hdl.handle.net/1721.1/149024</link>
<description>Termination Assertions for Recursive Programs: Completeness and Axiomatic Definability
Meyer, Albert R.; Mitchell, John C.
The termination assertion p&lt;S&gt;q means that whenever the formular p is true, there is an execution of the possibly nondeterministic program S which terminates in a state in qhich q is true. A recursive program S may declare and use local variables and nondeterministic recursive procedures with call-by-address and call-by--value parameters, in addition to accessing undeclared variables and global procedures. Assertions p and q about calls to global procedures are first order formulas extended to express hypotheses about the termination of calls to undeclared global procedures. A complete, effective axiom system with axioms corresponding to the syntax of the programming language is given for the termination assertinos valid over all interpretations. Termination assertions define the semantics of recursive programs in the following sense: if two programs have different input-output semantics, then there is a termination assertion that is valid for one program but not for the other. Thus the complete axiomatization of termination assertions constitutes an axiomatic definition of the semantics of recursive programs.
</description>
<dc:date>1982-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149023">
<title>Minimax Optimal Universal Codeword Sets</title>
<link>https://hdl.handle.net/1721.1/149023</link>
<description>Minimax Optimal Universal Codeword Sets
Elias, Peter
In an interactive multi-user data-processing system a user knows the probabilities of his messages and must encode them into a fixed system-wide variable-length codeword set. He needs to receive the answer to his last message before selecting the next, so his encoding is one-shot. To minimize average codeword length he encodes his messages in order of decreasing probability into codewords in order of increasing length. I give an algorithm which, for each of several measures of performance, finds the codeword set best by that measure for the worst user, and some of the minimax optimal codeword sets the algorithm has found. Some of the results hold for all user distributions: others require e.g. that all users send exactly or at most m distinct messages, and/or that there is an integer k such that no user has a message of probability greater than 1/k.
</description>
<dc:date>1982-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149022">
<title>A Note on Equivalences Among Logics of Programs</title>
<link>https://hdl.handle.net/1721.1/149022</link>
<description>A Note on Equivalences Among Logics of Programs
Meyer, Albert R.; Tiuryn, Jersey
Several different first order formal logics of programs -- Algoritmic Logic, Dynamic Logic, and Logic of Effective Definitions -- are compared and shown to be equivalent to a fragment of constructive L ω1ω. When programs are modelled as effective flowcharts, the logics of deterministic and nondeterministic programs are equivalent.
</description>
<dc:date>1981-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149021">
<title>Software for the "Roles" People Play</title>
<link>https://hdl.handle.net/1721.1/149021</link>
<description>Software for the "Roles" People Play
Greif, Irene
Office work consists largely of cooperative efforts by numbers of people. To support such work, applications programs can be designed as "multi-person" systems organized around notions of "roles" and "working relationships." A group of co-workers can then describe to the system their agreed upon roles in a project as well as the working relationships among those roles. Based on this description, application software can provide support for communications protocols and access control that is tailored to the working situation. As working relationships evolve, these descriptions can be modified so that the software will continue to meet the needs of the users. The paper presents an approach to office systems research emphasizing the development of software modules that can be used to build end-user application programs. The requirements that "multi-person" applications place on this software architecture are discussed in the context of a series of examples of multi-person activities, including joint document writing and calendar management.
</description>
<dc:date>1983-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149020">
<title>Computational Complexity and the Traveling Salesman Problem</title>
<link>https://hdl.handle.net/1721.1/149020</link>
<description>Computational Complexity and the Traveling Salesman Problem
Johnson, David; Papadimitriou, Christos
</description>
<dc:date>1981-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149019">
<title>The Traveling Saleman Problem with Many Visits to Few Cities</title>
<link>https://hdl.handle.net/1721.1/149019</link>
<description>The Traveling Saleman Problem with Many Visits to Few Cities
Cosmadakis, Stavros S.; Papadimitriou, Christos H.
We study the version of the traveling salesman problem in which a relatively small number of cities -- say, six -- must be visited a huge number of times -- e.g., several hundred times each. )It costs to go from one city to itself). We develop an algorithm for this problem whose running time is exponential in the number of cities, but logarithmic in the number of visits. Our algorithm is a practical approach to the problem for instances of size in the range indicated above. The implementation and analysis of our algorithm give rise to a number of interesting graph-theoretic and counting problems.
</description>
<dc:date>1981-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149018">
<title>Power Set Models of Lambda-Calculus: Theories, Expansions, Isomorphisms</title>
<link>https://hdl.handle.net/1721.1/149018</link>
<description>Power Set Models of Lambda-Calculus: Theories, Expansions, Isomorphisms
Longo, Guiseppe
</description>
<dc:date>1981-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149017">
<title>Optimal Placement for River Routing</title>
<link>https://hdl.handle.net/1721.1/149017</link>
<description>Optimal Placement for River Routing
Leiseron, Charles E.; Pinter, Ron Y.
Programs for integrated circuit layout typically have two phases: placement and routing. The router should produce as efficient a layout as possible, but of course the quality of the routhing depends heavily on the quality of the placement. On the other hand, the placement procedure ideally should know the quality of a routing before it routes the wires. In this talk we present an optimal solution for a practical, common version of this placement and routing problem. River routing is the problem of connecting in order a set of terminals a1,...,an on a line to another set b1,...,bn across a rectangular channel. Since the terminals are located on modules, the modules must be placed relative to one another before routing. This placement problem arises frequently in design systems like bristle-blocks where stretch lines through a module can effectively break it into several chunks, each of which must be placed separately. In this talk, we shall present concise necessary and sufficient conditions for wirability which are applied to reduce the optimal placement problem to the graph-theoretic single-source-longest-paths problems. By exploiting the special structure of graphs that arise from the placement problem for rectilinear wiring, an optimal solution may be determined in linear time.
</description>
<dc:date>1981-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149016">
<title>Circuit-size Lower Bounds and Non-reducibility to Sparse Sets</title>
<link>https://hdl.handle.net/1721.1/149016</link>
<description>Circuit-size Lower Bounds and Non-reducibility to Sparse Sets
Kannan, Ravindran
As remarked in Cook (1980), we do not know any nonlinear lower bound on the circuit-size of a language in P or even in NP. The best known lower bound seems to be due to Paul (1975). In this paper we show that first for each nonnegative integer k, there is a language Lk in Σ2∩π2 (of Meyer and Stockmeyer (1972) hierarchy) which does not have 0(n^k)-size circuits. Using the same techniques, one is able to prove several similar results. For example, we show that for each nonnegative integer k, there is a language Lk in NP that does not have 0(n^k)-size uniform circuits. This follows as a corollary of a stronger result shown in the paper. Finally, we note that existence of "small circuits" is in suitable contexts equivalent to being reducible to sparse sets. Using this, we are able to prove for example that for any time-constructible super-polynomial function f(n), NTIME(f(n)) contains a language which is not many-to-one p-time reducible to any sparse set.
</description>
<dc:date>1981-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149015">
<title>On the Expressive Power of Dynamic Logic, II</title>
<link>https://hdl.handle.net/1721.1/149015</link>
<description>On the Expressive Power of Dynamic Logic, II
Halpern, Joseph Y.
</description>
<dc:date>1981-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149014">
<title>Maclisp Extensions</title>
<link>https://hdl.handle.net/1721.1/149014</link>
<description>Maclisp Extensions
Bawden, Alan; Burke, Glenn S.; Hoffman, Carl W.
This document describes a common subset of selected facilities available in Maclisp and its derivatives: PDP-10 and Multics Maclisp., List Machine Lisp (Zetalisp), and NIL. The object of this document is to aid people in writing code which can run compatibly in more than one of these environments.
</description>
<dc:date>1981-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149013">
<title>Communication Ring Initialization Without Central Control</title>
<link>https://hdl.handle.net/1721.1/149013</link>
<description>Communication Ring Initialization Without Central Control
Saltzer, Jerome H.
This short memorandum describes a novel combination of three well-known techniques; the combination provides a systematic way of initializing a local-area ring network without previous, static designation of a distinguished station. The result is a distributed algorithm that dynamically designates a distinguished station from among a group of stations whose ability to communicate is hampered by the fact that the ring is not yet initialized. An appendix describes how this approach could be implemented as part of the 10 Megabit/second (version 2) ring network currently being installed at the MIT Laboratory for Computer Science.
</description>
<dc:date>1981-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149012">
<title>What is a Model of the Lamda Calculus? Expanded Version</title>
<link>https://hdl.handle.net/1721.1/149012</link>
<description>What is a Model of the Lamda Calculus? Expanded Version
Meyer, Albert R.
An elementary, purely algebraic definition of model for the untypes lambda calculus is given. This definition is shown to be equivalent to the natural semantic definition based on environments. These definitions of model are consistent with, and yield a completeness theorem for, the standard axioms for lambda convertibility. A simple construction of models for lambda calculus is reviewed. The algebraic formulation clarifies the relation between combinators and lambda terms.
</description>
<dc:date>1981-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149011">
<title>LSB Manual</title>
<link>https://hdl.handle.net/1721.1/149011</link>
<description>LSB Manual
Burke, Glenn
LSB (for Layered System Building) is an integrated set of facilities for aiding in the construction of highly-modular, multi-layered, implementation-independent Lisp systems. It provides for conditional inclusion of source text, documentation production, automated declarations, and "high-level" definitions. Lisp code compiled with LSB in general does not require LSB in its run-time environment. LSB has been in use for some time in PDP-10 Maclisp, is operation in Multics Maclisp and Lisp Machine Lisp, and is being developed for NIL.
</description>
<dc:date>1981-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149010">
<title>The Complexity of the Word Problems for Commutative Semigroups and Polynomial Ideals</title>
<link>https://hdl.handle.net/1721.1/149010</link>
<description>The Complexity of the Word Problems for Commutative Semigroups and Polynomial Ideals
Mayr, Ernst W.; Meyer, Albert R.
Any decision procedure for the word problems for commutative semigroups and polynomial ideals inherently requires computational storage space growing exponentially with the size of the problem instrance to which the procedure is applied. This bound is achieved by a simple procedure for the semigroup problem.
</description>
<dc:date>1981-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149009">
<title>The Propositional Dynamic Logic of Deterministic, Well-Structured Programs</title>
<link>https://hdl.handle.net/1721.1/149009</link>
<description>The Propositional Dynamic Logic of Deterministic, Well-Structured Programs
Halpern, Joseph Y.; Reif, John H.
We consider a restricted propositional dynamic logic, Strict Deterministic Propositional Dynamic Logic (SDPDL), which is appropriate for reasoning about deterministic well-structured programs. In contrast to PDL, for which the validity problem is known to be complete in deterministic exponential time, the validity problem for SDPDL is shown to be polynomial space complete. We also show that SDPDL is less expensive than PDL. The results rely on structure theorems for models of satifiable SDPDL formulas, and the proods give insight into the effects of nondeterminism on intractability and expressiveness in program logics.
</description>
<dc:date>1981-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149008">
<title>Conservative Logic</title>
<link>https://hdl.handle.net/1721.1/149008</link>
<description>Conservative Logic
Fredkin, Edward; Toffoli, Tommaso
Conservative logic is a comprehensive model of computation which explicitly reflects a number of fundamental principles of physics, such as the reversibility of the dynamical laws and the conservation of certain additive quantities (amond which energy plays a distinguished role). Because it more closely mirrors physics than traditional models of computation, conservative logic is in a better position to provide indications concerning the realization of high-performance computing systems, i.e., of systems that make very efficient use of the "computing resources" actually offered by nature. In particular, conservative logic shows that it is ideally possible to build sequential circuits with zero internal power dissipation. After establishing a general framework, we discuss two specific models of computation. The first uses binary variables and is the conservative-logic counterpart of switching theory; this model proves that universal computing capabilities are compatible with the reversibility and conservation constraints. The second model, which is a refinement of the first, constitutes a substantial breakthrough in establishing a correspondence between computation and physics. In fact, this model is based on elastic collisions of identical "balls," and thus is formally identical with the atomic model that underlies the (classical) kinetic theory of perfect gases. Quite literally, the functional behavior of a general-purpose digital computer can be reproduced by a perfect gas placed in a suitably shaped container and given appropriate initial conditions.
</description>
<dc:date>1981-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149007">
<title>On Concentration and Connection Networks</title>
<link>https://hdl.handle.net/1721.1/149007</link>
<description>On Concentration and Connection Networks
Bhatt, Sandeep Nautam
This thesis deals with the structural complexity of swicthing networks which realize concentration and connection requests when operated in a rearrangeable or incremental manner. Some of the important results and constructions are briefly reviewed. On the basis of non-constructive proof techniques used to obtain linear upper bounds on the complexity of rearrangeable concentrators, it is shown that not only are certain random graphs very likely to be rearrangeably non-blocking concentrators, but that is a randomly constructed graph is not non-blocking, then, on the average, only a constant number of edges need by added to the graph to make it non-blocking. Although the problem of recognizing non-blocking networks appears to be a computationally hard problem, the extra edges may be added to the graph efficiently, during operation of the network. Finally, we obtain a constructive as well as an improved non-constructive upper bound on the complexity of incrementally non-blocking connection networks.
</description>
<dc:date>1981-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149006">
<title>Record of the Workshop on Research in Office Semantics</title>
<link>https://hdl.handle.net/1721.1/149006</link>
<description>Record of the Workshop on Research in Office Semantics
Barber, Gerald R.
This paper is a compendium of the ideas and issues presented at the Chatham Bars Workshop of Office Semantics. The intent of the workshop was to examine the state of the art in office systems and to elucidate the issues system designers were concerned with in developing next generation office systems. The workshop involved a cross-section of people from government, industry and academia. Presentations in the form of talks and video tapes were made of prototypical systems.
</description>
<dc:date>1981-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149005">
<title>Recursion Theoretic Operators and Morphisms on Numbered Sets</title>
<link>https://hdl.handle.net/1721.1/149005</link>
<description>Recursion Theoretic Operators and Morphisms on Numbered Sets
Barendregt, Henk; Longo, Giuseppe
An operator is a map ?: Pω-&gt;Pω. By embedding Pω in two natural ways into the λ-calculus model Pω^2 (and T^ω) the computable maps on this latter structure induce several classes of recursion theoretic operators.
</description>
<dc:date>1981-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149004">
<title>Algebraic Dependencies</title>
<link>https://hdl.handle.net/1721.1/149004</link>
<description>Algebraic Dependencies
Yannakakis, Mihalis; Papadimitrou, Christos H.
We propose a new kind of data dependencies called algebraic dependencies, which generalize all previous known kinds. We give a complete axiomatization of algebraic dependencies in terms of simple algebraic rewriting rules. In the process we characterize exactly the expressive power of tableaux, thus solving an open problem of Aho, Sagiv and Ullman; we show that it is NP-complete to tell whether a tableau is realizable by an expression; and we give an interesting dual interpretation of the chase procedure. We also show that algebraic dependencies over a language augmented to contain union and set difference can express arbitrary domain-independent predicates of finite index over finite relations. The class of embedded implicational dependencies recently - and independently - introduced by Fagin is shown to coincide with our algebraic dependencies. Based on this, we give a simple proof of Fagin's Armstrong relation theorem.
</description>
<dc:date>1981-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149003">
<title>The Deducibility Problem in Propositional Dynamic Logic</title>
<link>https://hdl.handle.net/1721.1/149003</link>
<description>The Deducibility Problem in Propositional Dynamic Logic
Meyer, Albert R.; Streett, Robert S.; Mirkowska, Grazina
The problem of whether an arbitrary formula of Propositional Dynamic Logic (PDL) is deducible from a fixed axiom scheme of PDL is _ ]1-complete. Ths contrasts with the decidability of the problem when the axiom scheme is replaced by any single PDL formula.
</description>
<dc:date>1981-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149002">
<title>Propositional Dynamic Logics of Programs: A Survey</title>
<link>https://hdl.handle.net/1721.1/149002</link>
<description>Propositional Dynamic Logics of Programs: A Survey
Parikh, Rohit
</description>
<dc:date>1981-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149001">
<title>Deterministic Propositional Dynamic Logic: Finite Models, Complexity, and Completeness</title>
<link>https://hdl.handle.net/1721.1/149001</link>
<description>Deterministic Propositional Dynamic Logic: Finite Models, Complexity, and Completeness
Ben-Ari, Mordechai; Halpern, Joseph Y.; Pnueli, Amir
Let p be a formular in deterministic propositional dynamic logic. A decision procedure for the satisfiability of p is given along with a construction of a finite model for every satisifiable p. The decision procedure runs in deterministic time 2^cn and the size of the model is bounded by n^2 * 4^n, where n is the lenth of p. Finally, a complete axiomatization for deterministic propositional dynamic logic is given, based on the Segerberg axioms for propositional dynamic logic.
</description>
<dc:date>1981-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/149000">
<title>Persistence of Vector Replacement Systems is Decidable</title>
<link>https://hdl.handle.net/1721.1/149000</link>
<description>Persistence of Vector Replacement Systems is Decidable
Mayr, Ernst
In a persistent vector replacement system (VRS) or Petri net, an enabled transition can become disabled only by firing itself. Here, an algorithm is presented which allows to decide whether an arbitrary VRS is persistent of not, and if so, to construct a semilinera representation of the set of states reachable in the system.
</description>
<dc:date>1981-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148999">
<title>An Effective Representation of the Reachability Set of Persistent Petri Nets</title>
<link>https://hdl.handle.net/1721.1/148999</link>
<description>An Effective Representation of the Reachability Set of Persistent Petri Nets
Mayr, Ernst
In a persistent Petri net, an enabled transition can become disabled only by firing itself. Here, an algorithm is presented which constructs a semilinear representation of the set of states reachable in an arbitrary persistent Petri net.
</description>
<dc:date>1981-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148998">
<title>Ω(n log n) Lower Bounds on Length of Boolean Formulas</title>
<link>https://hdl.handle.net/1721.1/148998</link>
<description>Ω(n log n) Lower Bounds on Length of Boolean Formulas
Fischer, Michael J.; Meyer, Albert R.; Paterson, Michael S.
A property of Boolean functions of n variables is described and shown to imply lower bounds as large as Ω(n log n) on the number of literals in any Boolean formula for any function with the property. Formulas over the full basis of binary operations (∧, ⊕, etc.) are considered. The lower bounds apply to all but the vanishing fraction of symmetric functions, in particular to all threshold functions with sufficiently large threshold and to the "congruent to zero modulo k" function for k&gt;2. In the case k = 4 the bound is optimal.
</description>
<dc:date>1980-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148997">
<title>BRAND X Manual</title>
<link>https://hdl.handle.net/1721.1/148997</link>
<description>BRAND X Manual
Szolovits, Peter; Martin, William A.
BRAND X is a simple representation language implemented as a pure extension of LISP. BRAND X provides the following additional facilities over LISP: Unique and canonical structures, property lists for all objects, labels for all objects, and a syntax to express each of these, supported by a reader and printer. BRAND X is intended as an "assembly language" for representation languages, attempting to provide facilities generally found useful in the simplest manner, without any strong commitment to specific representational conventions.
</description>
<dc:date>1980-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148996">
<title>An Optimality Theory of Concurrency Control for Databases</title>
<link>https://hdl.handle.net/1721.1/148996</link>
<description>An Optimality Theory of Concurrency Control for Databases
Kung, Hsing-Tsung; Papadimitrou, Christos H.
A concurrency control mechanism (or a scheduler) is the component of a database system that safeguards the consistency of the database in the presence of interleaved accesses and update requests. We formally show that the performance of a scheduler, i.e. the amount of parallelism that it supports, depends explicitly upon the amount of information that is available to the scheduler. We point out that most previous work on concurrency control is simply concerned with specific points of this basic trade-off between performance and information. In fact, several of these approaches are shown to be optimal for the amount of information that they use.
</description>
<dc:date>1980-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148995">
<title>Some New Methods of Music Synthesis</title>
<link>https://hdl.handle.net/1721.1/148995</link>
<description>Some New Methods of Music Synthesis
Paseman, William Gerhard
There are two distinct sections to this thesis. The first section discusses music composition, shows why it is a useful domain for Artificial Intelligence research and presents a set of "Design Rules" that facilitate research in the field of tonal music composition. It begins with a short chapter presenting a subset of music theory. This chapter assumes no prior knowledge of the subject, it completely defines all terms used in the thesis, and is geared particiularly toward those unfamiliar with music, those unwilling to learn standard music notation and those interested in Artificial Intelligence research. Next, (using the terms defined in the thesis), a context sensitive generative grammar for producing pitch progressions in the major mode is introduced. It is seen that the grammar can be made context free by switching between two interpretations of the input string. A mechanism for switching from one interpretation to another when parsing sentences generated from this grammar is described. It is shown that a model of music composition, perception, and improvisation fits within the framework of the grammar. This multiple view model and switching mechanism can be interpreted as a primitive "frame." The section section describes some of the problems and issues encountered while designing the initial hardware for the Music Aided Cognition Project at MIT. All of the developed hardware permits computer control, performance and recording of music in real time. The first chapter in this section discusses a machine called the Inexpensive Synthesizer/Recorder. It capable of synthesizing 14 square wave voices, each voice having a range of 7 octaves, with each octave having 12 bits of frequency control. Its purpose it to allow the user to record key depression times, key release times and key impact velocities when playing a keyboard piece. Its primary constraint was low cost, allowing many copies to be made. Its microprocessor interface allows it to be easily controlled by many different means, including home computers. The complete schematics for the synthesizer and the controller are provided as an appendix. The next chapter discusses an oscillator which synthesizes sound using 32 sine or 8 FM waveforms. The machine can be easily expanded to produce 256 sine voices and 64 (or more) FM voices. All since waveforms in both types of synthesis are weighted with two independent coefficients. Micropogrammable firmware allows one to produce sound by a limited number of methods other than sine summation or FM synthesis.
</description>
<dc:date>1980-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148994">
<title>Computer Programs for Research in Gravitation and Differential Geometry</title>
<link>https://hdl.handle.net/1721.1/148994</link>
<description>Computer Programs for Research in Gravitation and Differential Geometry
Pavelle, Richard; Wester, Michael
This report contains a description of all current functions and features (with many examples) of the programs CTENSR and ITENSR which are available with MACSYMA. CTENSR is a standard Component TENSoR manipulation system which means that geometrical tensor objects are represented as arrays or matrices. Tensor operations such as contraction or covariant differentiation are carried out by actually summing over repeated (dummy) indices with DO statements. ITENSR, is a unique Indicial TENSoR manipulation system which is implemented by representing rensors as functions of their covariant, contravariant and derivative indicies. Tensor operations such as contraction or covariant differentiation are performed by manipulating the indices themselves rather than the components to which they correspond. The programs are connected in the sense that one can obtain an expression in ITENSR and have the corresponding expression generated in the CTENSR format automatically.
</description>
<dc:date>1980-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148993">
<title>Report on the Workshop on Self-timed Systems</title>
<link>https://hdl.handle.net/1721.1/148993</link>
<description>Report on the Workshop on Self-timed Systems
Bryant, Randal E.
</description>
<dc:date>1980-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148992">
<title>Theory and Practice of Text Editors or A Cookbook for an Emacs</title>
<link>https://hdl.handle.net/1721.1/148992</link>
<description>Theory and Practice of Text Editors or A Cookbook for an Emacs
Finseth, Craig A.
A comprehensive summary of the available technology for implementing text editors. It is written to be a guide for the implementor of a text editor. It does not provide a finished, polished algorithm for any part of a text editor. Rather, it provides a breakdown of the problems involved and discusses the pitfalls and the available tradeoffs to be considered when designing a text editor. Specific reference is made to the relevant tradeoffs for an Emacs-type editor, a character-oriented, extensible display editor.
</description>
<dc:date>1980-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148991">
<title>The Cryptographic Security of Compact Knapsacks (Preliminary Report)</title>
<link>https://hdl.handle.net/1721.1/148991</link>
<description>The Cryptographic Security of Compact Knapsacks (Preliminary Report)
Shamir, Adi
In 1978, Merkle and Hellman introduced a knapsack-based public-key cryptosystem, which received widespread attention. The two major open problems concerning this cryptosystem are: (i) Security: How difficult are the Merkle-Hellman knapsacks? (ii) Efficiency: Can the huge key size be reduced? In this paper we analyze the cryptographic security of knapsack problems with small keys, develop a new (non-enumerative) type of algorithm for solving them, and use the algorithm to show that under certain assumptions it is as difficult to find the hidden trapdoors in Merkle-Hellman knapsacks as it is to solve general knapsack problems.
</description>
<dc:date>1980-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148990">
<title>Axiomatic Definitions of Programming Languages: A Theoretical Assessment</title>
<link>https://hdl.handle.net/1721.1/148990</link>
<description>Axiomatic Definitions of Programming Languages: A Theoretical Assessment
Meyer, Albert R.; Halpern, Joseph Y.
A precise definition is given of how partial correctness or termination assertions serve to define the semantics of classees of program schemes. Assertions involving only formulas of first order predicate calculus are proved capable of defining program scheme semantics, and effective axiom systems for deriving such assertions are described. Such axiomatic definitions are possible despite the limited expressive power of predicate calculus.
</description>
<dc:date>1980-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148989">
<title>A Manager for Named, Permanent Objects</title>
<link>https://hdl.handle.net/1721.1/148989</link>
<description>A Manager for Named, Permanent Objects
Marcus, Alan Michael
Storing data in a computing system for a long time has been of interest ever since it was possible to do so. Classically, on stores bit- or byte- strings, or perhaps arrays of "records." Yet, current programming philosophy stresses data abstraction techniques and concepts. This report describes an object-oriented filing system which stores abstract objects, and allows the user to view the system as though one were storing abstract objects, rather than storing some external representation of the abstractions. Names may be attached to the (permanent) objects, and objects may be contained in (and may contain) other objects. Furthermore, an object may be contained in more than one object, thereby allowing the naming structure to be a network.
</description>
<dc:date>1980-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148988">
<title>Critical Path Scheduling of Task Systems with Resource and Processor Constraints</title>
<link>https://hdl.handle.net/1721.1/148988</link>
<description>Critical Path Scheduling of Task Systems with Resource and Processor Constraints
Lloyd, Error Lynn
Several papers over the past few years have investigated minimum execution time scheduling of unit execution time (UET) task systems with resources. Because such scheduling problems are, in general, NP-hard, a variety of heuristic methods for producing schedules have been studied, among them, critical path scheduling. The strongest results to date have been for systems where there is no processor constraint. These results may be utilized for systems with a processor constraint by treating the processors as an additional resource. Unfortunately, in those cases where the number of processors is close to the number of resources, this results in an upper bound which is somewhat misleading. In this paper we investigate the performance of critical path scheduling for UET task systems with resources and a fixed number of processors. An upper bound for the worst case performance of critical path scheduling is given. This bound depends both on the number of processors and on the number of different resources. Moreover, we show that this is the best possible (asymptotic) upper bound).
</description>
<dc:date>1980-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148987">
<title>On the Computational Complexity of Cardinality Constraints in Relational Databases</title>
<link>https://hdl.handle.net/1721.1/148987</link>
<description>On the Computational Complexity of Cardinality Constraints in Relational Databases
Kanellakis, Paris C.
We show that the problem of determining whether of not a lossless join property holds for a database, in the presence of key dependencies and cardinality constraints on the domains of the attributes is NP-complete.
</description>
<dc:date>1980-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148986">
<title>Dynamic Algebras and the Nature of Induction</title>
<link>https://hdl.handle.net/1721.1/148986</link>
<description>Dynamic Algebras and the Nature of Induction
Pratt, Vaughan R.
Dynamic algebras constitute the variety (equationally defined class) of models of the Segerberg axioms for propositional dynamic logic. We obtrain the following results (to within inseparability). (i) In any dynamic algebra * is reflexive transitive closure. (ii) Every free dynamic algebra can be factored into finite dynamic algebras. (iii) Every finite dynamic algebra is isomorphic to a Kripke structure. (ii) and (iii) imply Parikh's completeness theorem for the Segerberg axioms. We also present an approach to treating the inductive aspect of recursion within dynamic algebras.
</description>
<dc:date>1980-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148985">
<title>Semaphore Primitives and Starvation-free Mutual Exclusion</title>
<link>https://hdl.handle.net/1721.1/148985</link>
<description>Semaphore Primitives and Starvation-free Mutual Exclusion
Stark, Eugene William
Most discussions of semaphore primitives in the literature provide only an informal description of their behavior, rather than a more precissde definition. These informal descriptions may be incorrect, incomplete, or subject to misinterpretation. As a result, the literature actually contains several different definitions of the semaphore primitives. The differences are important, since the particular choice of definition can affect whether a solution to the mutal exclusion problem using semaphore primitives allows the possibility of process starvation. This thesis attempts to alleviate some of the confusion by giving precise definitions of two varieties of semaphore primitives; here called weak and blocked-set primitives. It is then shown that under certain natural conditions, although it is possible to implement starvation-free mutual exclusion with blocked-set semaphores, it is not possible to do so with weak semaphores. Thus weak semaphores are strictly less "powerful" than block-set semaphores.
</description>
<dc:date>1980-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148984">
<title>On the Expressive Power of Dynamic Logic</title>
<link>https://hdl.handle.net/1721.1/148984</link>
<description>On the Expressive Power of Dynamic Logic
Meyer, Albert R.; Winklmann, Karl
We show that "looping" of while-programs can be expressed in Regular First Order Dynamic Logic, disproving a conjecture made by Harel and Pratt. In addition we show that the expressive power of quantifier-free Dynamic Logic increases when nondeterminism is introduced in the programs that are part of formulae of Dynamic Logic. Allowing Assignments of random values to variables also increases expressive power.
</description>
<dc:date>1980-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148983">
<title>Definability in Dynamic Logic</title>
<link>https://hdl.handle.net/1721.1/148983</link>
<description>Definability in Dynamic Logic
Meyer, Albert R.; Parikh, Rohit
We study the expressive power of various versions of Dynamic Logic and compare them with each other as well as with standard languages in the logical literature. One version of Dynamic Logic is equivalent to the infinitary logic L CK ω1,ω, but regular Dynamic Logic is strictly less expressive. In particular, the ordinals ω^ω and ω^ω*2 are indistinguishable by formulas of regular Dynamic Logic.
</description>
<dc:date>1980-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148982">
<title>Covering Graphs by Simple Circuits</title>
<link>https://hdl.handle.net/1721.1/148982</link>
<description>Covering Graphs by Simple Circuits
Atai, Alon; Lipton, Richard J.; Papadimitriou, Christos H.; Rodeh, M.
</description>
<dc:date>1980-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148981">
<title>On Linear Characterizations of Combinatorial Optimization Problems</title>
<link>https://hdl.handle.net/1721.1/148981</link>
<description>On Linear Characterizations of Combinatorial Optimization Problems
Karp, Richard M. Papadimitriou, Christos H.
We show that there can be no computationally tractable description by linear inequalities of the polyhedron associated with any NP-complete combinatorial optimization problem unless NP=co-NP -- a very unlikely event. We also use the recent result by Khacian to present even stronger evidence that NP-complete combinatorial optimization problems cannot have efficient generators of violated inequalities.
</description>
<dc:date>1980-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148980">
<title>Worst-case and Probabilistic Analysis of a Geometric Location Problem</title>
<link>https://hdl.handle.net/1721.1/148980</link>
<description>Worst-case and Probabilistic Analysis of a Geometric Location Problem
Papadimitriou, Christos H.
We consider the problem of choosing K "medians" among n points on the Euclidean plane such that the sum of the distances from each of the n points to its closest median is minimized. We show that this problem is NP-complete. We also present two heuristics that produce arbitrarily good solutions with probability going to 1. One is a partition heuristic, and works when K grows lineraly -- or almost so -- with n. The other is the "honeycomb" heuristic, and is applicable to rates of grother of K of the form K ~ n^Є, 0&lt;Є&lt;1.
</description>
<dc:date>1980-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148979">
<title>On the Complexity of Integer Programming</title>
<link>https://hdl.handle.net/1721.1/148979</link>
<description>On the Complexity of Integer Programming
Papadimitriou, Christos H.
We give a simple proof that integer programming is in NP. Our proof also establishes that there is a pseudopolynomial time algorithm for integer programming with any (fixed) number of constraints.
</description>
<dc:date>1980-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148978">
<title>Reversible Computing</title>
<link>https://hdl.handle.net/1721.1/148978</link>
<description>Reversible Computing
Toffoli, Tommaso
The theory of reversible computing is based on invertible primitives and composition rules that preserve invertibility. With these constraints, one can still satisfactorily deal with both functional and structural aspects of computing processes; at the same time, one attains a closer correspondence between the behavior of abstract computing systems and the microscopic physical laws (which are presumed to be strictly reversible) that underly any concrete implementation of such systems. Here, we integrate into a comprehensive picture a variety of concepts and results. According to a physical interpretation,  the central result of this paper is that it is ideally possible to build sequential circuits with zero internal power dissipation. Even when these circuits are interfaced with conventional ones, power dissipation at the interface would be at most proportional to the number of input/output lines, rather than to the number of logic gates as in conventional computers.
</description>
<dc:date>1980-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148977">
<title>Ten Thousand and One Logics of Programming</title>
<link>https://hdl.handle.net/1721.1/148977</link>
<description>Ten Thousand and One Logics of Programming
Meyer, Albert R.
</description>
<dc:date>1980-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148976">
<title>An Efficient Algorithm for Determine the Length of the Longest Dead Path in an "LIFO" Branch-and-bound Exploration Schema</title>
<link>https://hdl.handle.net/1721.1/148976</link>
<description>An Efficient Algorithm for Determine the Length of the Longest Dead Path in an "LIFO" Branch-and-bound Exploration Schema
Pallottino, Stefano; Toffoli, Tommaso
The length of the longest dead path (LLDP) is a widely used parameter in estimating the efficiency of branch-and-bound optimization algorithms that employ the LIFO exploration schema. Thanks to two original theorems, we are able to present a particularly attractive procedure for determining of the LLDP. In fact, this procedure requires a number of storage variables which is independent of problem size and very small; moreover, the procedure is self-contained in the sense that it can be externally attached to any LIFO branch-and-bound program without interfering with its algorithms and data structures.
</description>
<dc:date>1980-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148975">
<title>Space-Bounded Simulation of Multitape Turing Machines</title>
<link>https://hdl.handle.net/1721.1/148975</link>
<description>Space-Bounded Simulation of Multitape Turing Machines
Adleman, Leonard M.; Loui, Michael C.
A new proof of a theorem of Hopcroft, Paul, and Valiant is presented: every deterministic multitape Turing machine of time complexity T(n) can be simulated by a deterministic Turing machine of space complexity T(n)/log T(n). The proof includes an overlap argument.
</description>
<dc:date>1980-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148974">
<title>A T=0(2^n/2), S=0(2^n/4) Algorithm for Certain NP-Complete Problems</title>
<link>https://hdl.handle.net/1721.1/148974</link>
<description>A T=0(2^n/2), S=0(2^n/4) Algorithm for Certain NP-Complete Problems
Schroeppel, Richard; Shamir, Adi
In this paper we develop a general prupose algorithm that can solve a number of NP-complete problems in time T=0(2^n/2) and space S=0(2^n/4). The algorithm can be generalized to a family of algorithms whose time and space complexities are related by T*S^2=0(2^n). The problems it can handle are characterized by a few decomposition axioms, and they include knapsack problems, exact satisfiability problems, set covering problems, etc. The new algorithm has a considerable cryptanalytic significance, since it can break knapsack-based cryptosystems with up to n=100 generators.
</description>
<dc:date>1980-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148973">
<title>A Machine Language Instruction Set for a Data Flow Processor</title>
<link>https://hdl.handle.net/1721.1/148973</link>
<description>A Machine Language Instruction Set for a Data Flow Processor
Aoki, Donald J.
A data flow processor is a computer in which instructions are data driven and enabled for execution by the arrival of their operands. Data flow processors execute data flow programs, normally represented as program graphs, which represent the data dependencies between operations. This thesis presents a machine language instruction set for a Form 1 data flow machine based on the Dennis-Misunas design.
</description>
<dc:date>1979-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148972">
<title>A Space Bound for One-tape Multidimensional Turing Machines</title>
<link>https://hdl.handle.net/1721.1/148972</link>
<description>A Space Bound for One-tape Multidimensional Turing Machines
Loui, Michael C.
Let L be a language recognized by a nondeterministic Turing machine with one d-dimensional worktape of time complexity T(n). Then L can be recognized by a deterministic Turing machine of space complexity (T(n)logT(n))^d/d+1. The prood employs a generalized crossing sequence argument.
</description>
<dc:date>1979-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148971">
<title>Concurrent and Reliable Updates of Distributed Databases</title>
<link>https://hdl.handle.net/1721.1/148971</link>
<description>Concurrent and Reliable Updates of Distributed Databases
Takagi, Akihiro
A concurrent execution of transactions and various failures occuring during transaction processing in a distributed database system can lead to an inconsistent database state. In order to prevent such inconsistency from occuring , 1) the schedule of transactions must be equivalent to some serial schedule and 2) each transaction must be either completed or backed out. This paper develops a set of schemes that satisfy these requirements and still realize highly concurrent execution of transactions. This paper also shows how to incorporate these schemes into a multi-level distributed database system where there exists a hierarchy of transactions. Detailed algorithms for concurrent and reliable updates of distrubuted databases based on the proposed schemes are included in the appendix.
</description>
<dc:date>1979-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148970">
<title>An Intermediate Form for Data Flow Programs</title>
<link>https://hdl.handle.net/1721.1/148970</link>
<description>An Intermediate Form for Data Flow Programs
Leth, James William
A data flow program, often represented as a data flow graph, is a program that expresses a computation by indicating the data dependencies among operators. A data flow computer is a machine designed to take advantage of concurrency in data flow graphs by executing data-independent operations in parallel (that is, a sequential ordering existing only between operations for which the result of one operation is an operand of the other). This thesis presents a form of computer representation of data flow programs (based on data flow graphs) that can serve as an intermediate form in the translation of source language code into machine code for a data flow computer. The proposed intermediate representation is implemented in the structured programming language CLU, and is designed to allow analysis and transformation of programs (for optimization purposes) to be performd either automatically or with programmer interaction.
</description>
<dc:date>1979-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148969">
<title>On Data Bases with Incomplete Information</title>
<link>https://hdl.handle.net/1721.1/148969</link>
<description>On Data Bases with Incomplete Information
Lipski, Witold, Jr.
Semantic and logical problems arising in an incomplete information data base are investigated. A simple query language is described and its semantics is defined, which refers the queries to the information about reality contained in a data base, rather than to reality itself. This approach, called the internal interpretation, is shown to lead in a natural way to the notions of a topological Booleans algebra and a model logic related to S4, in teh same way as referring queries directly to reality (external interpretation) leads to Boolean algebras and classical logic. An axiom system is given for equivalent (with respect to the internal interpretation) transformation of queries, which is then exploited as a basic tool in a method for computing the internal intepretation for a broad class of queries. An interesting special case of the problem of determining the internal intepretation amounts to deciding whether an assertion about reality (a "yes-no" query) is consistent with the incomplete information about reality contained in a data base. We give a solution to this problem, which relies on the classical combinatorial problem of distinct representatives of subsets.
</description>
<dc:date>1979-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148968">
<title>On Database Management System Architecture</title>
<link>https://hdl.handle.net/1721.1/148968</link>
<description>On Database Management System Architecture
Hammer, Michael; McLeod, Dennis
Despite the many advances that have been made in the field of database management in the last two decades, in many respects the paradigm of database management has not changed much since its inception. Several long-standing assumptions pervade the field and exert a great influence on the architecture of database management systems, their functions, and. the kinds of databases that they manage. This paper reconsiders some of these assumptions and suggests certain alternatives to them. In particular, it is argued that the concept of an integrated database ought to be supplanted by that of a federated database, a loose assembly of semi-independent components; the position of the database management system in the context of a total information system is reexamined, and arguments are made for extending its functional capabilities; and controlled logical redundancy in the schema is introduced as a means of improving the usability of a database and of enhancing its life-cycle performance. An underlying theme throughout is that of the importance of a semantic schema of the database, which specifies enough of the meaning of the application domain to enable enhanced functionality to be achieved. A number of characteristics of a conceptual data model (in which this scheme would be expressed) are described.
</description>
<dc:date>1979-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148967">
<title>Artificial Intelligence and Clinical Problem Solving</title>
<link>https://hdl.handle.net/1721.1/148967</link>
<description>Artificial Intelligence and Clinical Problem Solving
Szolovits, Peter
An ambitious, but intriguing, possibility for radically increasing the availability and adequacy of health case, while containing cost, is to use the computer as a consultant to augment and extend the skills of all health care providers. We propose to pursue a program of fundamental research in representation of knowledge, decision-making, problem-solving, program explanation and clinical cognition, to understand how to construct computer programs that, as an integral part of the health care system, can amplify the knowledge and reasoning powers of medical decision makers. We plan to apply the techniques so developed to problems in the diagnosis and therapy of acid/base and electrolyte disturbances, diagnosis of birth defects using an existing date-base of diseases and associated manifestations, the development of multi-modal cancer therapy protocols, and the application of the methods of decision analysis to produce general tools for physicians to use in analysing difficult clinical cases.
</description>
<dc:date>1979-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148966">
<title>Roles, Co-descriptors, and the Formal Representation of Quantified English Expressions</title>
<link>https://hdl.handle.net/1721.1/148966</link>
<description>Roles, Co-descriptors, and the Formal Representation of Quantified English Expressions
Martin, William A.
</description>
<dc:date>1979-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148965">
<title>Dynamic Algebras: Examples, Constructions, Application</title>
<link>https://hdl.handle.net/1721.1/148965</link>
<description>Dynamic Algebras: Examples, Constructions, Application
Pratt, Vaughan R.
Dynamic algebras combine the classes of Boolean (B V ' 0) and regular (R U ; *) algebras into a single finitely axiomatized variety (B R ♦) resembling an R-module with "scalar" multiplication ♦. The basis result is that * is reflexive transitive closure, contrary to the intuition that this concept should require quantifiers for its definition. Using this result we give several examples of dynamic algebras arising naturally in connection with additive functions, binary relations, state trajectories, languages, and flowcharts. The main result is that free separable dynamic algebras are residually separable-and-finite, important because finite separable dynamic algebras are isomorphic to Kripke structures. Applications include a new completeness proof for the Segerberg axiomatization of propositional dynamic logic, and yet another notion of regular algebra.
</description>
<dc:date>1979-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148964">
<title>Algorithms for Scheduling Tasks on Unrelated Processors</title>
<link>https://hdl.handle.net/1721.1/148964</link>
<description>Algorithms for Scheduling Tasks on Unrelated Processors
Davis, Ernest; Jaffe, Jeffrey M.
Several algorithms are presented for the nonpreemptive assignment of n independent tasks to m unrelated processors. One algorithm requires polynomial time in n and m, and is at most 2√m times worse than optimal in the worst case. This is the best polynomial time algorithm known for scheduling such sets of tasks. An algorithm with slightly better worst case performance requires polynomial time in n but exponential time in m. This is the best algorithm known that requires time O(nlog(n)) for every fixed value of m.
</description>
<dc:date>1979-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148963">
<title>Report on the Second Workshop on Data Flow Computer and Program Organization</title>
<link>https://hdl.handle.net/1721.1/148963</link>
<description>Report on the Second Workshop on Data Flow Computer and Program Organization
Misunas, David P.
The following report comprises an edited transcript of presentations made at the Workshop of Data Flow Computer and Program Organization, held at MIT on July 9-13, 1978, and co-sponsored by the Lawrence Livermore Laboratory (LLL) and the Department of Energy, Mathematical Sciences Branch. These informal transcriptions are only intended to provide a general picture of ongoing work in the area and to that end, have been heavily edited and summarized.
</description>
<dc:date>1979-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148962">
<title>Timestamps and Capability-based Protection in a Distributed Computer Facility</title>
<link>https://hdl.handle.net/1721.1/148962</link>
<description>Timestamps and Capability-based Protection in a Distributed Computer Facility
Wyleczuk, Rosanne H.
This thesis investigates the problems of supporting security requirements and providing protection mechanisms in a distributed computer facility. The nature of the environment necessitates examination of operating systems, data base systems, and computer networks. The capability approach to providing protection in a centralized system is chosen as the foundation for the protection mechanism of the distributed system. The thesis also relies on an interesting approach to the representation of objects in a computer system. An object is represented by a sequence of immutable versions that represent the state of the object over time; each version is the result of an update on the object. This approach to describing objects provides the basis for a flexible definition of the world in which timestamps are naturally associated with every object in the system. The development of a DCF capability mechanism resulted in the following discoveries: Capabilities need not become immediately effective upon their generation. It is not necessary that the object to which access is being authorized exist at the time the capability is generated. And, the revocation of access privileges and the control of capability propagation are not insurmountable problems even in a distributed environment.
</description>
<dc:date>1979-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148961">
<title>How to Share a Secret</title>
<link>https://hdl.handle.net/1721.1/148961</link>
<description>How to Share a Secret
Shamir, Adi
In this paper we show how to divide data D into n pieces in such a way that D is easily reconstructable from any k pieces, but even complete knowledge of k-1 pieces reveals absolutely no information about D. This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
</description>
<dc:date>1979-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148960">
<title>The Space Complexity of Two Pebbles Games on Trees</title>
<link>https://hdl.handle.net/1721.1/148960</link>
<description>The Space Complexity of Two Pebbles Games on Trees
Loui, Michael C.
In the standard pebble game the number of pebbles required to pebble the root of a tree can be computed in time linearly proportional to the number of nodes. For the black/white pebble game the number of pebbles necessary to pebble the root of a complete tree is derived.
</description>
<dc:date>1979-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148959">
<title>Design of a Program for Expert Diagnosis of Acid Base and Electrolyte Disturbances</title>
<link>https://hdl.handle.net/1721.1/148959</link>
<description>Design of a Program for Expert Diagnosis of Acid Base and Electrolyte Disturbances
Patil, Ramesh S.
This research develops the diagnostic component of an interactive system for providing expert advice for the diagnosis, therapy and ongoing management of patients with acid-base and electrolyte disturbances. We have developed a hierarchic representation of a patient's illness which unifies the known facts about the patient, their suspected interrelationships, the hyptheses and how hypotheses account for various known and hypothesized facts. An expectation driven problem solver based on the hypothesize and reformulate paradigm performsn the diagnosis.
</description>
<dc:date>1979-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148958">
<title>Time, Space and Randomness</title>
<link>https://hdl.handle.net/1721.1/148958</link>
<description>Time, Space and Randomness
Adleman, Leonard M.
Space and time are the fundamental parameters of complexity theory. The thesis of this paper is that randomness is of equal importance. We introduce a notion of randomness (based on Kologorov-Chaitin-Randomness), which we suspect will contribute to the understanding of some of the central problems in complexity theory. The purpose of this paper is primarily conceptual, though several easy theorems are given with clarify the relationship of this notion of randomness to the NP=P question, the complexity of integer factoring, and the sets computable in random polynomial time. Finally, using factoring as an example, we raise the possibility of performing experiments on functions of unknown complexity to indicate the extent of their tractability.
</description>
<dc:date>1979-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148957">
<title>On the Cryptocomplexity of Knapsack Systems</title>
<link>https://hdl.handle.net/1721.1/148957</link>
<description>On the Cryptocomplexity of Knapsack Systems
Shamir, Adi
A recent trend in cryptographic systems is to base their encryption/decryption functions on NP-complete problems, and in particular on the knapsack problem. To analyze the security of these systems, we need a complexity theory which is less worst-case oriented and which takes into account the extra conditions imposed on the problems to make them cryptographically useful. In this paper we consider the two classes of one-to-one and onto knapsack systems, analyze the complexity of recognizing them and of solving their instances, introduce a new complexity measure (median complexity), and show that this complexity is inversely proportional to the density of the knapsack system. The tradeoff result is based on a fast probabilistic knapsack solving algorithm which is applicable only to one-to-one systems, and it indicates that knapsack-based cryptographic systems in which one can both encrypt and sign messages are relatively insecure.
</description>
<dc:date>1979-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148956">
<title>Minimum Register Allocation is Complete in Polynomial Space</title>
<link>https://hdl.handle.net/1721.1/148956</link>
<description>Minimum Register Allocation is Complete in Polynomial Space
Loui, Michael C.
The Minimum Register Allocation Problem is to determine the minimum number of registers required to evaluate an arithmetic expression. A pebble game on directed acyclic graphs is used to prove that this is complete is complete in polynomial space.
</description>
<dc:date>1979-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148955">
<title>A Network Traffic Generator for Decent</title>
<link>https://hdl.handle.net/1721.1/148955</link>
<description>A Network Traffic Generator for Decent
Strazdas, Richard J.
Computer network traffic generators provide a means for supplying benchmark results and for measuring computer network performance at all levels. Eventually they will also aid in fault diagnosis. The network traffic generator described in this thesis allows flexible yet convenient control over a number of parameters useful for generating loads over both test and real networks based on DEC's PDP-11 minicomputer. Implementation on a test network provides sample results. A discussion of design compromises, an recommendations for further study and design point to various open issues.
</description>
<dc:date>1979-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148954">
<title>With what Frequency are Apparently Intractable Problems Difficult?</title>
<link>https://hdl.handle.net/1721.1/148954</link>
<description>With what Frequency are Apparently Intractable Problems Difficult?
Meyer, A.R.; Paterson, M.S.
An algorithm is almost polynomial-time (apt) iff there is a polynomial p such that for all n, the algorithm halts within p(n) steps on all by at most p(n) inputs of size at most n. It is nown that for NP-complete and polynomial space-complete problems, as well as certain other apparently intractable problems such as integer factoring, the following conditions are equivalent: (1) the problem is solveable by an apt algorithm, (2) the problem (or its complement) is polynomial-time transformable to a polynomial-sparse set, (3) the problem is solvable in polynomial time.
</description>
<dc:date>1979-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148953">
<title>Metal Poker</title>
<link>https://hdl.handle.net/1721.1/148953</link>
<description>Metal Poker
Shamir, Adi; Rivest, Ronald L.; Adleman, Leonard M.
Can two potentially dishonest players play a fair game of poker without using any cards (e.g. over the phone)? This paper provides the following answers: 1. No. (Rigorous mathematical proof supplied. 2. Yes. (Correct &amp; complete protocol given.)
</description>
<dc:date>1979-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148952">
<title>Bicontinuous Extensions of Invertible Combinatorial Functions</title>
<link>https://hdl.handle.net/1721.1/148952</link>
<description>Bicontinuous Extensions of Invertible Combinatorial Functions
Toffoli, Tommaso
We discuss and solve the problem of constructing a diffeomorphic componentwise extension for an arbitrary invertible combinatorial function. Interpreted in physical terms, our solution constitutes a proof of the physical realizability of general computing mechanisms based on reversible primitives.
</description>
<dc:date>1979-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148951">
<title>An Improved Proof of the Rabin-Harmanis-Stearns Conjecture</title>
<link>https://hdl.handle.net/1721.1/148951</link>
<description>An Improved Proof of the Rabin-Harmanis-Stearns Conjecture
Perry, Harold M.
We offer an improved presentation of Aanderaa's constructive proof of the Rabin-Hartmanis-Stearns conjecture: For all k≥2, there exists a language Lk such that Lk can be recoginzed by a k-worktape real time Turing machine but cannot be recognized by any (k-1)-worktape real time Turing machine.
</description>
<dc:date>1979-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148950">
<title>Efficient Scheduling of Tasks Without Full Use of Processor Resources</title>
<link>https://hdl.handle.net/1721.1/148950</link>
<description>Efficient Scheduling of Tasks Without Full Use of Processor Resources
Jaffe, Jeffrey
The nonpreemptive scheduling of a partially ordered set of tasks on a machine with m processors of different speeds is studied. Heuristics are presented which benefit from selective non-use of slow processors. The performance of these heuristics is aymptotic of √m times worse than optimal, whereas demand driven schedules are unboundedly worse than optimal for any fixed value of m. The algorithms are extended to the situation where functionally dediciated processors must process tasks of a given type. Here, too, the worse case performance of the algorithms improves on the worst case performance of known algorithms. The techniques of analyzing these schedules are used to obtain a bound on a large class of preemptive schedules.
</description>
<dc:date>1979-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148949">
<title>The Equivalence of R. E. Programs and Data Flow Schemes</title>
<link>https://hdl.handle.net/1721.1/148949</link>
<description>The Equivalence of R. E. Programs and Data Flow Schemes
Jaffe, Jeffrey
The Expressibe power of the data flow schemes of Dennis is evaluated. It is shown that data flow schemes have the power to express an arbitrary determinate functional. The proof involves a demonstration that "restricted data flow schemes" can simulate Turing Machines. This provides a new, simple basis for computability.
</description>
<dc:date>1979-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148948">
<title>Operational Semantics of a Data Flow Language</title>
<link>https://hdl.handle.net/1721.1/148948</link>
<description>Operational Semantics of a Data Flow Language
Brock, Jarvis D.
A data flow machine achieves high performance by the concurrent execution of machine code consisting of data flow graphs which explicitly represent the data dependencies among program instructions. This thesis presents the operational semantics of ADFL, an applicative data flow language with an iteration construct resembling tail recursion and an error-handling scheme appropriate to the concurrency of data flow. The operation semantics O*T of ADFL are expressed by a two step process. The translation algorithm T maps an ADFL expression into its graph implementation, and the semantic function O maps the graph into its semantic characterization. Data flow graphs are specified by use of a graph assembly language, and the semantics of these graphs are derived by use of Kahn's fixpoint theory of communciating processes.
</description>
<dc:date>1978-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148947">
<title>On the Security of the Merkle-Hellman Cryptographic Scheme</title>
<link>https://hdl.handle.net/1721.1/148947</link>
<description>On the Security of the Merkle-Hellman Cryptographic Scheme
Shamir, Adi; Zippel, Richard E.
In this paper we show that a simplified version of the Merkel-Hellman public-key cryptographic system is breakable. While their full-fledged system seems to be resistant to the cryptanalytic attack we propose, this result suggests some ways in which the security of their system can be further enhanced.
</description>
<dc:date>1978-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148946">
<title>Data Model Equivalence</title>
<link>https://hdl.handle.net/1721.1/148946</link>
<description>Data Model Equivalence
Borkin, Sheldon A.
The current proliferation of proposals for database system data models and the desire for database systems which support several different data models raise many questions concerning "equivalence properties" of different data models. To answer these questions, one first needs clear definitions of the concepts under discussion. This paper presents formal definitions of the terms database, operation, operation type, application model and data model. Using this formal framework, database state equivalence, operation equivalence, application model equivalence and data model equivalence are distinguished. Three types of application and data model equivalence are defined - isomorphic, composed operation and state dependent. Possiblities for partial equivalences are mentioned. Implementation implications of these different equivalences are discussed. Examples are presented using two semantic data models, the semantic relation data model and the semantic graph data model.
</description>
<dc:date>1978-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148945">
<title>Six Lectures on Dynamic Logic</title>
<link>https://hdl.handle.net/1721.1/148945</link>
<description>Six Lectures on Dynamic Logic
Pratt, Vaughan R.
The distinction made there between static and dynamic logic has a very simple character, yet can play a central and unifying role in logic as a vantage point from which one can compare propositional calculus, predicate calculus, intensional logics such as modal logic and temporal logic, various algorithmic logics (logics of programs) and Quine's notions of transparency and opacity.
</description>
<dc:date>1978-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148944">
<title>Applications of Modal Logic to Programming</title>
<link>https://hdl.handle.net/1721.1/148944</link>
<description>Applications of Modal Logic to Programming
Pratt, Vaughan R.
The modal logician's notion of possible world and the computer scientist's notion of state of a machine provide a point of commonality which can form the foundation of a logic of action. Extending ordinary modal logic with the calculus of binary relations leads to a very natural logic for describing the behavior of computer programs.
</description>
<dc:date>1978-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148943">
<title>Concurrent Programming</title>
<link>https://hdl.handle.net/1721.1/148943</link>
<description>Concurrent Programming
Bryant, Randal E.; Dennis, Jack B.
</description>
<dc:date>1978-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148942">
<title>Research Directions in Computer Architecture</title>
<link>https://hdl.handle.net/1721.1/148942</link>
<description>Research Directions in Computer Architecture
Dennis, Jack B.; Fuller, Samuel H.; Ackerman, William B.; Swan, Richard J.; Weng, Kung-Song
</description>
<dc:date>1978-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148941">
<title>A Near-optimal Method for Reasoning About Action</title>
<link>https://hdl.handle.net/1721.1/148941</link>
<description>A Near-optimal Method for Reasoning About Action
Pratt, Vaughan R.
We give an algorithm for "before-after" reasoning about action. The algorithm decides satisfiability and validity of formulae of propositional dynamic logic, a recently developed logic of change of state that subsumes the zero-order component of most other action-oriented logics. The algorithm requires time at most proportional to an exponentially growing function of the length (number of occurences of variabes and connectives) of the input. Fischer and Ladner have shown that that every algorithm for this problem must take exponential time, making this algorithm optimal to within a polynomial. No decision method for any other logic is known to be optimal to within less than an expoential. The typical time for our algorithm makes it a heuristically efficient algorithm of considerable pratical interest. Application areas incluse program verification, program synthesis, and discourse analysis. The algorithm is based on the method of semantic tableaux, appropriately generalized to dynamic logic. A novel treatment of Hintikka sets via theory algebras supplies the theoretical basis for our treatment of tableaux.
</description>
<dc:date>1978-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148940">
<title>A Decidability Result for a Second Order Process Logic</title>
<link>https://hdl.handle.net/1721.1/148940</link>
<description>A Decidability Result for a Second Order Process Logic
Parikh, Rohit
We prove the decidability of the validity problem for a rather general language for talking about computations. As corollaries of our result, we obtain some decidability results of Pratt, Constable, Fischer-Ladner, and Pnueli and also a new decidability result for deterministic propositional dynamic logic.
</description>
<dc:date>1978-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148939">
<title>Bounds on the Scheduling of Types Task Systems</title>
<link>https://hdl.handle.net/1721.1/148939</link>
<description>Bounds on the Scheduling of Types Task Systems
Jaffe, Jeffrey M.
We study the scheduling of different types of tasks on different types of processors. If there are k types of tasks and mi identifical processors for takss of type I, the finishing times of any demand driven or list schedule is at most k+1-(1/mas(m1,…,mk)) times worse than the optimal schedule. This bound is best possible. If the processors execute at different speeds then the performance ratio of any list schedule (relative to the optimal schedule) is bounded by k plus the maximum ratio between the speeds of any two processors of the same type.
</description>
<dc:date>1978-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148938">
<title>An Analysis of Preemptive Multiprocessor Job Scheduling</title>
<link>https://hdl.handle.net/1721.1/148938</link>
<description>An Analysis of Preemptive Multiprocessor Job Scheduling
Jaffe, Jeffrey M.
The preemptive scheduling of a partially ordered set of tasks is studied. A class of scheduling heuristics is introduced, and the performance of schedules in this class is analyzed with respect to the least finishing time optimality criterion. If there are m processors, then the finishing time of any schedule in the class is at most √m + (1/2) times worse than optimal, independent of the speeds of the processors. Examples are given which indicate that there are schedules whcih may be as bad as √m-1 times worse than optimal even for machines with one fast processor.
</description>
<dc:date>1978-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148937">
<title>Effectiveness</title>
<link>https://hdl.handle.net/1721.1/148937</link>
<description>Effectiveness
Parikh, Rohit
Church's thesis equates the intuitive notion "effective" with the mathematical notion "recursive." In order for this thesis to provide any information to us we have to have a clear understanding of both notions. We consider one of the prevalent definitions of "effective" and compare it with the notions of syntatic and semantic consequence to see whcih one it corresponds to better. The notion of syntactic consequence, while useful, is subservient to the semantic notion and when we go from one language to another we expect to have to change the syntatic notion of conseuqnce, if we are lucky enough to have one at all. Similiarly the prevalent notion of effectiveness is a restricted one and has had the effect of limiting our view. At the end of section 3, we give a more general analysis of effectiveness and propose a mathematical theory. In section 4 we consider the question whether the set of grammatical sentences of English is recursive. We show that this question is not well posed and that the arguments in favour of a positive answer are question begging. We reformulate this question in the form "How recursive is the set of grammatical sentences of English?", and propose a way of turning it into a precise technical problem. The method used is a generalisation of the Kolmogorov-Chaitin theory of randomness which is briefly sketched.
</description>
<dc:date>1978-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148936">
<title>An Analysis of the Solovay and Strassen Test for Primality</title>
<link>https://hdl.handle.net/1721.1/148936</link>
<description>An Analysis of the Solovay and Strassen Test for Primality
Baratz, Alan E.
In this paper we will analyze the performace of the Solovay and Strasses probabilistic primality testing algorithm. We will show that iterating Solovay and Strassen's algorithm r times using independent random numbers at each iteration, results in a test for the primality of any positive odd integer, n&gt;2, with error probability of 0 (if n is prime), error probability at most 4^-r (if n is composite and non-Carmichael), and error probability at most 2^-r (if n is composite and Carmichael).
</description>
<dc:date>1978-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148935">
<title>A Fast Signature Scheme</title>
<link>https://hdl.handle.net/1721.1/148935</link>
<description>A Fast Signature Scheme
Shamir, Adi
In this paper we propose a new scheme for generating and verifying "electronic signatures" in public-key communications. The scheme is based on the difficulty of solving the knapsack problem, and its two main advantages over previous schemes are speed and simplicity.
</description>
<dc:date>1978-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148934">
<title>A Completeness Result for a Propositional Dynamic Logic</title>
<link>https://hdl.handle.net/1721.1/148934</link>
<description>A Completeness Result for a Propositional Dynamic Logic
Parikh, Rohit
Propositional modal logic of programs has been introduced by Fischer and Ladner [1], following ideas of Pratt [4]. We shall call it propositional dynamic logic (PDL) following the terminology of Heral, Meyer and Pratt. In the following we prove the completeness of a rather natural set of axioms for this logic and for an extension of it obtained by allowing the inverse operation which converts a program into its inverse.
</description>
<dc:date>1978-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148933">
<title>A Faster Algorithm Computing String Edit Distances</title>
<link>https://hdl.handle.net/1721.1/148933</link>
<description>A Faster Algorithm Computing String Edit Distances
Masek, William J.; Patterson, Michael S.
The edit-distance between two character strings can be defined as the minimum cost of a sequence of editing operations which transforms one string into the other. The operations allowed are deleteing, inserting and replacing one symbol at a time, with possibly different costs for each of these operations. The problem of finding the logest common subsequence of two strings is a special case of the problem of computing edit-distances. We describe an algorithm for computing the edit-distance between two strings of length n and m, n&gt;=m, which requires 0(nm/min(log n, m)) steps whenever the costs of edit-operations are integral multiples of a single positive real number and the alphabet for the strings is finite. These conditions are necessary for the algorithm to achieve the time bound.
</description>
<dc:date>1978-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148932">
<title>The Use of Queues in the Parallel Data Flow Evaluation of "If-Then-While" Programs</title>
<link>https://hdl.handle.net/1721.1/148932</link>
<description>The Use of Queues in the Parallel Data Flow Evaluation of "If-Then-While" Programs
Jaffe, Jeffrey
A property of a model of parallel computation is analyzed. We show that the use of queues may speed-up the execution of well formed data flow schemas by an arbitrarily large factor. A general model of data flow computation is presented to provide a framework for the comparison of data flow models. In particular a formal definition of a data flow version of the Computation Graphs of Karp and Miller and the Data Flow Schemas of Dennis are provided within the context of this model.
</description>
<dc:date>1978-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148931">
<title>Arithemtical Completeness in Logics of Programs</title>
<link>https://hdl.handle.net/1721.1/148931</link>
<description>Arithemtical Completeness in Logics of Programs
Harel, David
We consider the problem of designing arithmetically complete axiom systems for proving general properties of programs; 1.e. axiom systems which are complete over arithmetical universes, when all first-order formulae which are valid in such universes are taken as axioms. We prove a general Theorem of Completeness which takes care of a major part of the responsibility when designing such systems. It is them shown that what is left to do in order to establish an arithmetical completeness result, such as those appearing in [12] and [14] for the logics of DL and DL+, can be described as a chain of reasoning which involves some simple utilizations of arithmetical induction. An immediate application of these observations is given in the form of an arithmetical completeness result for a new logic similar to that os Salwicki [22]. Finally, we contrast this discipline with Cook's [5] notion of relative completeness.
</description>
<dc:date>1978-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148930">
<title>Lower Bounds on Information Transfer in Distributed Computations</title>
<link>https://hdl.handle.net/1721.1/148930</link>
<description>Lower Bounds on Information Transfer in Distributed Computations
Abelson, Harold
We derive a lower bound on the interprocessor information transfer required for computing a function in a distributed network. The bound is expressed in terms of the function's derivatives, and we use it to exhibit functions whose computation requires a great deal of interprocess communication. As a sample application, we give lower bounds on information transfer in the distributed computation of some typical matrix operations.
</description>
<dc:date>1978-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148929">
<title>Descriptions and the Specialization of Concepts</title>
<link>https://hdl.handle.net/1721.1/148929</link>
<description>Descriptions and the Specialization of Concepts
Martin, William A.
The OWL II System computes with expressions which describe an object from a particular viewpoint. These partial descriptions form a tree structure under the specialization operation, which preserves intensional properties. The descriptions are also related in terms of their extensions by characterization and exemplar links. Descriptions of individuals must always specify a context of the description. Eight ways in which one description can be a specialization of another are distinguished.
</description>
<dc:date>1978-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148928">
<title>A Computer Architecture for Data-flow Computation</title>
<link>https://hdl.handle.net/1721.1/148928</link>
<description>A Computer Architecture for Data-flow Computation
Misunas, David P.
The structure of a computer which utilizes a data-flow program representation as its base language is described. The use of the data-flow representation allows full exploitation by the processor of the parallelism and concurrency achievable through the data-flow form. The unique architecture of the processor avoids the usual problems of processor switching and memory/processor interconnection by the use of interconnection networks which has a great deal of inherent parallelism. The structure of the processor allows a large number of instructions to be active simultaneously. These active instructions pass through the interconnection networks concurrently and form streams of instructions for the pipelined functional units. Due to the cyclic nature of an iterative computation, the possiblity of deadlock can arise in the performance of such a computation within the data-flow architecture. A deadlock is caused by the interaction of several simultaneously active cycles of the same iterative computation. The use of a recursive rather than iterative representation of a computation avoids the deadlock problem and provides a more efficient implementation of the computation within the architecture. For this reason, a program executed by the data-flow processor is restricted to an acyclic directed graph representation.
</description>
<dc:date>1978-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148927">
<title>The Subgraph Homeomorphism Problem</title>
<link>https://hdl.handle.net/1721.1/148927</link>
<description>The Subgraph Homeomorphism Problem
LaPaugh, Andrea Suzanne
The problem investigated in this thesis is that of finding homeomorphic images of a given graph, called the pattern graph, in a larger graph. A homeomorphism is a pair of mappings, (v,a), suc that v maps the nodes of the pattern graph to nodes of the larger graph, and a maps the edges of the mattern graph to (edge or node) disjoint paths in the larger graph. A homeomorphism represents a similarity of structure between the graphs involved. Therefore, it is an important concept for both graph theory and applications such as programming schema. We give a formal definition of the subgraph homeomorphism problem. In our investigation, we focus on algorithsm which depend on the pattern graph and allow the node mapping, v, to be partially or totally specified. Reductions between node disjoint and edge disjoint formulations of the problem are discussed. Also, reductions faciliating the solution of given subgraph homeomorphism problems are formulated. A linera time algorithm for finding a cycle in a graph containing three given nodes of the graph is presented. FInally, the two disjoint paths problem, an open problem, is discussed in detail.
</description>
<dc:date>1978-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148926">
<title>Nondeterminism in Logics of Programs</title>
<link>https://hdl.handle.net/1721.1/148926</link>
<description>Nondeterminism in Logics of Programs
Harel, David; Pratt, Vaughan R.
We investigate the principles underlying reasoning about nondeterministic programs, and present a logic to support this kind of reasoning. Our logic, an extension of dynamic logic ([22] and [12]), subsumes most existing first-order logics of nondeterministic programs, including that developed by Dijkstra based on the concept of weakest precondition. A significant feature is the strict separation between the two kinds of nonterminating computations: infinite computations and failures. The logic has a Tarskian truth-value semanics, an essential prerequisite to establishing completeness of axiomatizations of the logic. We give an axiomatization for flowchart (regular) programs that is complete relative to arithmetic in the sense of Cook. Having a satisfactory tool at hand, we turn to the clarification of the concept of the total correctness of nondeterministic programs, providing in passing, a critical evaluation of the widely used "predicate transformer" approach to the definition of programming constructs, initiated by Dijkstra [5]. Our axiom system supplies a complete axiomatization of wp.
</description>
<dc:date>1978-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148925">
<title>Computability and Completeness in Logics of Programs</title>
<link>https://hdl.handle.net/1721.1/148925</link>
<description>Computability and Completeness in Logics of Programs
Harel, David; Meyer, Albert R.; Pratt, Vaughan R.
Dynamic logic is a generalization of first order logic in which quantifiers of the form "for all X…" are replaced by phrases of the form "after executing program α…". This logic subsumes most existing first-order logic of programs that manipulate their environment, including Floyd's and Hoare's logics of partial correctness and Manna and Waldinger's logic of total correctness, yet is more closely related to classical first-order logic than any other proposed logic of programs. We consider two issues: how hard is the validity problem for the formulae of dynamic logic, and how might one axiomatize dynamic logic? We give bounds on the validity problem for some special cases, include a π0/2-completeness result for the partial correctness theories of uninterpreted flowchart programs and a π1/1-completeness result for unrestricted dynamic logic. We also demonstrate the completeness of an axiomatization of dynamic logic relative to arithmetic.
</description>
<dc:date>1978-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148924">
<title>A Complete Axiomatic System for Proving Deductions About Recursive Programs</title>
<link>https://hdl.handle.net/1721.1/148924</link>
<description>A Complete Axiomatic System for Proving Deductions About Recursive Programs
Harel, David; Pnueli, Amir; Stavi, Jonathan
Denoting a version of Hoare's system for proving partial correctness of recursive programs by H, we present an extension D which may be thought of a H u {^,v,∃,∀} uH^-1, including the rules of H, four special purpose rules and inverse rules to those of Hoare. D is shown to be a complete system (in Cook's sense) for proving deductions of the form σ1.....σn ?σ over a language, the wff's of which are assertions in some assertion language L and partial correctness specifications of the form p{α}q. All valid formulae of L are taken as axioms of D. It is shown that D is sufficient for proving partial correctness, total correctness and program equivalence as well as other important properties of programs, the proofs of which are impossibel in H. The entire presentation is worked out in the framework of nondeterministic programs employing iteration and mutually recursive procedures.
</description>
<dc:date>1978-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148923">
<title>Characterizing Second Order Logic with First Order Quantifiers</title>
<link>https://hdl.handle.net/1721.1/148923</link>
<description>Characterizing Second Order Logic with First Order Quantifiers
Harel, David
A language Q is defined and given semantics, the formulae of which are quantifier-free first-order matrices prefixed by combinations of finite partially ordered first-order quantifiers. It is shown that Q is equivalent in expressive power to second order logic by establishing the equivalence of alternating second order quantifiers and forming conjunctions of partially ordered first-order quantifiers.
</description>
<dc:date>1978-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148922">
<title>A Dynamic Debugging System for MDL</title>
<link>https://hdl.handle.net/1721.1/148922</link>
<description>A Dynamic Debugging System for MDL
Berez, Joel M.
Program debugging is a time consuming process. Conventional debugging techniques and aids typically give the user a narrow view of the program's operation, making debigging difficult. A debugging system that would present a clear overall picture of a program's behavior and would be both flexible and simple to operate would be a valuable tool. Such a system was designed and implemented in and for MDL, a high-level applicative programming language. This report discusses: the design alternatives considered during the debigging system's design and implementation phases, the reasons for the resulting design choices, and the system attributes. A major attribute of the system (MEND) is that it does not simulate the program being debugged but instead monitors it from another process. This attribute results in a robust and viable debugging system, because MEND need not be modified in order to handle each new extension to MDL and/or each new user-defined primitive.
</description>
<dc:date>1978-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148921">
<title>A Logic Design for the Cell Block of a Data-flow Processor</title>
<link>https://hdl.handle.net/1721.1/148921</link>
<description>A Logic Design for the Cell Block of a Data-flow Processor
Amikura, Katsuhiko
Recently studies on parallel computation architecture have yielded a new type of computer architecture known as the data-flow processor. As part of the effort in realizing the data-flow processor, a logic design for the Cell Block of the basic data-flow processor is proposed in this thesis. The resulting design has a modular structure which is derived from a top-down decomposition of the specification given in an Aechitecutere Description Language. The desired speed of operation of the Cell Block is obtained by exploiting the parallellism inherent in its operation. The logic design is carried out using electronic devices available commerically today, but is based on an aynchronous communciation protocol.
</description>
<dc:date>1977-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148920">
<title>Report on the Workshop on Data Flow Computer and Program Organization</title>
<link>https://hdl.handle.net/1721.1/148920</link>
<description>Report on the Workshop on Data Flow Computer and Program Organization
Misunas, David P.
The following report comprises an edited transcript of presentations made at the Workshop of Data Flow Computer and Program Organization, held at MIT on July 10-14, 1977 and co-sponsored by the Lawrence Livermore Laboratory (LLL) and the Department of Energy, Mathematical Sciences Branch. These informal transcriptions are only intended to provide a general picture of ongoing work in the area and, to that end, have been heavily edited and summarized. For further details, the interested reader should consult the bibliography at the end of the report.
</description>
<dc:date>1977-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148919">
<title>Factoring Numbers in 0(log n) Arithmetic Steps</title>
<link>https://hdl.handle.net/1721.1/148919</link>
<description>Factoring Numbers in 0(log n) Arithmetic Steps
Shamir, Adi
In this paper we show that a non-trivial factor of a composite number n can be found by performing arithmetic steps in a number proportional to the number of bits in n, and thus there are extremely short straight-line factoring programs. However, this theoretical result does not imply that natural numbers can be factored in polynomial time in the Turing-Machine model of complexity, since the numbers operated on can be as big as 2^cn^2, thus requiring exponentially many bit operations.
</description>
<dc:date>1977-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148918">
<title>An Analysis of Computer Decentralization</title>
<link>https://hdl.handle.net/1721.1/148918</link>
<description>An Analysis of Computer Decentralization
D'Oliveira, Cecilia R.
This thesis is concerned with the recent trend toward decentralization of the computer facility. We conjecture that there are strong forces in many organizations leading towards decentralization, which have been held in check by technological and economic constraints that are beginning to relax. This conjecture is explored by analyzing approxiately forty case studies of decentralization decisions. The results indicate that (1) strong decentralization forces do exist in many organizations. The forces derived from these particular case studies are classified as either functional, economic, or psychological. (2) The drop in hardware costs allows decentralization to occur at the initiative of lower level managers. The consequences could include disintegration of the organization's information system. Decisions by lower level managers may overlook the technological constraints of decentralization, especially the problems of networking loosely coupled computers. This could result in a future inability to share data or programs amond organizational units. Because of the many functional advantages it provides, we do not feel that top level management should discourage decentralization. However, top level management must be aware that the technological constraints require that decentralization occur with their guidance and their perspective of the entire organization.
</description>
<dc:date>1977-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148917">
<title>Measuring User Characteristics on the MILTICS System</title>
<link>https://hdl.handle.net/1721.1/148917</link>
<description>Measuring User Characteristics on the MILTICS System
Rodriguez, Humberto, Jr.
One of the problems in measuring the performance of a computer system is in defining its normal workload. In the case of timesharing systems, it is necessary to develop a behavioral model of the average user. This thesis presents a study of several parameter that characterize user behavior on the Multics timesharing system at MIT. Data was gathered by monitoring the logon sessions of three different groups of users. The results are presented and comparisons are made between the command usage of the groups. Some patterns of usage do appear in the results, but it is unclear if they can be applied in other situations. A probability distribution of the think time between commands is shown and compared with other distributions. The benchmark program currently used on the Multics system is also compared with the user model described in this study. The capability to monitor user behavior and characteristics is shown to be useful and worth installing in the system.
</description>
<dc:date>1977-08-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148916">
<title>On Triangulations of a Set of Points in the Plane</title>
<link>https://hdl.handle.net/1721.1/148916</link>
<description>On Triangulations of a Set of Points in the Plane
Lloyd, Error Lynn
A set, V, of points in the plane is triangulated by a subset, T, of the straight line segments whose enpoints are in V, if T is a maximal subset such that the line segments in T intersect only at their endpoints. The weight of any triangulation is the sum of the Euclidean lengths of the line segments in the triangulation. We examine two problems involving triangulations. We discuss several aspects of the problem of finding a minimum weight triangulation among all triangulations of a set of points and give counterexamples to two published solutions to this problem. Secondly, we show that the problem of determining the existence of a triangulation in a given subset of the straight line segments whose endpoints are in V is NP-Complete.
</description>
<dc:date>1977-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148915">
<title>Ancillary Reports: Kernel Design Project</title>
<link>https://hdl.handle.net/1721.1/148915</link>
<description>Ancillary Reports: Kernel Design Project
Clark, David D; Saltzer, Jerome H.; Voydock, V.L.; Janson, P.A.; Hunt, D.H.; Forsdick, H.C.; Reed, D.P.; Frankston, R.M.; Mabee, R.F.
</description>
<dc:date>1977-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148914">
<title>An Overview of OWL, A Language for Knowledge Representation</title>
<link>https://hdl.handle.net/1721.1/148914</link>
<description>An Overview of OWL, A Language for Knowledge Representation
Szolovits, Peter; Hawkinson, Lowell B.; Martin, William A.
We describe the motivation and overall organization of the OWL language for knowledge representation. OWL consists of a memory of concepts in terms of which all English phrases and all knowledge of an application domain are represented, a theory of English grammar which tells how to map English phrases into concepts, a parser to perform that mapping for individual sentences, and an interpreter to carry out procedures which are written in the same representational formalism. The system has been applied to the study of interactive dialogs, explanations of its own reasoning, and question answering.
</description>
<dc:date>1977-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148913">
<title>Finding Minimum Cutsets in Reducible Graphs</title>
<link>https://hdl.handle.net/1721.1/148913</link>
<description>Finding Minimum Cutsets in Reducible Graphs
Shamir, Adi
The analysis of many processes modelled by directed graphs requires the selection of a subset of vertices which cut all the cycles in the graph. Reducing the size of such a cutset usually leads to a simpler and more efficient analysis, but the problem of finding minimum cutsets in general directed graphs is know to be NP-complete. In this paper we show that in reducible graphs (and thus in almost all the "practicla" flowcahrts of programs), minimum cutsets can be found in linear time. An immediate application of this result is in program verification systems based on Floyd's inductive assertions method.
</description>
<dc:date>1977-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148912">
<title>The Mutual Exclusion Problem for Unreliable Processes</title>
<link>https://hdl.handle.net/1721.1/148912</link>
<description>The Mutual Exclusion Problem for Unreliable Processes
Rivest, Ronald L.; Pratt, Vaughan R.
Consider n processes operating asynchronously in parallel, each of which maintains a single "public" variable which can be read (but not written) by the other processes. We show that the processes can synchronize their actions by the basic operations of (1) reading each other's public variables, and (2) setting their own public variable to some value. A process may "die" (fail) at any time, when its public variable is (automatically) set to a special "dead" value. A dead process may revive. Reading a public variable which is being simultaneously updated returns either the old or the new value. Each process may be in a certain "critical" state (which it leaves if it dies). We present a synchronization scheme with the following properties. (1) At most one process is ever in its critical state at a time. (2) If a process wants to enter its critical state, it may do so before any other process enters its critical state more than once. (3) The public variables assume only a finite number of values. (4) A process wanting to enter its critical state can always make progress towards that goal. (5) The various processes may run arbitrary speeds relative to one another. By the definition of the problem, no process can prevent another from entering its critical state by repeatedly failing and restartying. In the case of two processes, what makes our solution of particular interest is its remarkable simplicity when compared with the extant solutions to this problem. Our n-process solution uses the two-process solution as a subroutine, and is not quite as elegant as the two-process solution.
</description>
<dc:date>1977-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148911">
<title>Construction and Analysis of Network Flow Problem Which Forces Karzanov Algorithm 0(n^3) Running Time</title>
<link>https://hdl.handle.net/1721.1/148911</link>
<description>Construction and Analysis of Network Flow Problem Which Forces Karzanov Algorithm 0(n^3) Running Time
Baratz, Alan E.
The intest of this paper is to demonstrate the construction of a network flow problem which will force the Karzanov "Preflow" algorithm to run in its theoretic worst case time 0(n^3). Once such a "bad case" network has been constructed, an analysis is performed to determine the exact time required by the algorithm to computer the maximum flow through the network.
</description>
<dc:date>1977-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148910">
<title>A Method for Obtaining Digital Signatures and Public-key Cryptosystems</title>
<link>https://hdl.handle.net/1721.1/148910</link>
<description>A Method for Obtaining Digital Signatures and Public-key Cryptosystems
Rivest, Ronald L.; Shamir, Adi; Adleman, Len
We present an encryption method with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences. 1. Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an excryption key publicly revealed by the inteded recipient. Only he can decipher the message, since only he knows the corresponding decryption key. 2. A message can be "signed" using a privately-held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in "electronic mail" and "electronic funds transfer" systems. A message is encrypted by representing it as a number M, raising M to a publicly-specified power e, and then taking the remainder when the result is dividied by the publicly specified product n of two large secrete prime numbers p and q. Decryption is similar; only a different sectre, power d is used, where e*d=1(modp-1)*(q-1)). The secruity of the system rests in part on the difficulty of factoring the published divisor, n.
</description>
<dc:date>1977-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148909">
<title>Hardware Estimatino of a Process' Primary Memory Requirements</title>
<link>https://hdl.handle.net/1721.1/148909</link>
<description>Hardware Estimatino of a Process' Primary Memory Requirements
Gifforf, David K.
It is shown that a process' primary memory requirements can be approximated by use of the miss rate in the Honeywell 6180's page table word associative memory. This primary memory requirement estimate was employed by an experimental version of Multics to control the level of multiprogramming in the system, and bill for memory usage. The resultant system's tuning parameters were shown to be configuration insensitive, and it was conjectured that the system would also track shifts in the referencing characteristics of its workload and keep the system in tune. The limitations of the assumptions made about a process' referencing characteristics are examined, and directions for future research are outlined.
</description>
<dc:date>1977-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148908">
<title>The Max Flow Algorithm of Dinis and Karzanov: An Exposition</title>
<link>https://hdl.handle.net/1721.1/148908</link>
<description>The Max Flow Algorithm of Dinis and Karzanov: An Exposition
Even, Shimon
Recently A.V. Karzanov improved Dinic's algorithm to run in time 0(n^3) for networks of n vertices. For the benefit of those who do not read Russian, the Dinic-Karzanov algorithm is explained and proved. In addition to being the best algorithm known for network flow, this algorithm is unique in that it does not use path augmentation.
</description>
<dc:date>1976-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148907">
<title>A System to Process Dialogue: A Progress Report</title>
<link>https://hdl.handle.net/1721.1/148907</link>
<description>A System to Process Dialogue: A Progress Report
Brown, Gretchen P.
This is a progress report on work toward and English language interface for expert systems. A framework for handling mixed-initiative English dialogue in a console session environment is discussed, with special emphasis placed on recognition. The ideas presented here are being implemented in a prototype system called Susie Software, which is embedded in the OWL system. OWL is currently under development in the Automatic Programming Group at the MIT Laboratory for Computer Science. We are using OWL to explore the problems of constructing expert systems, and for Susie Software the domain of expertise is programming. In the Susie effort to date, major emphasis has been placed on the construction of a computational model for the structural aspects of English dialogue; it is this structural model that will be discussed.
</description>
<dc:date>1976-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148906">
<title>Improving Information Storage Reliability Using a Data Network</title>
<link>https://hdl.handle.net/1721.1/148906</link>
<description>Improving Information Storage Reliability Using a Data Network
Benjamin, Arthur J.
Backup and recovery methods using magnetic tapes are common in computer utilities, since information stored on-line is subject to damage. The serial access nature of the tape medium severely restricts the flexibility and simplicity of accessing and managing the stored data. A method using a data network will be described, to present a backup mechanism which takes advantage of a large, inexpensive, random access remote data storage facility to provide data access and management functions that are more flexible than. those provided by a traditional backup facility. Although data transfer rates will be reduced, data access and management will be simplified, and system availability will be improved. The work described is based on a network backup facility built for the Multics computer utility, using the ARPAnet.
</description>
<dc:date>1976-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148905">
<title>Task Scheduling in the Control Robotics Environment</title>
<link>https://hdl.handle.net/1721.1/148905</link>
<description>Task Scheduling in the Control Robotics Environment
Mok, Aloysius Ka-Lau
Scheduling problems involved in Control Robotics, a software approach to control engineering are studied. The capability of a multiprocessor system to handle tasks with hard, real-time deadlines is investigated according to whether complete or partial a priori knowledge of the deadlines, computation times and frequencies of occurence of individual tasks is available. A model of preemptive scheduling, the "scheduling game" is introduced to explore mathematical relationships for different scheduling situations. A necessary and sufficient condition for scheduling tasks with simultaneous requests or deadlines is derived. Partial solutions and the difficulties involved in scheduling tasks with distributed requests are discussed. It is shown that in the most general case, there is no globally optimal algorithm in the absense of a priori knowledge about the distribution of requests of future tasks in time.
</description>
<dc:date>1976-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148904">
<title>A Note on the Average Time to Compute Transitive Closures</title>
<link>https://hdl.handle.net/1721.1/148904</link>
<description>A Note on the Average Time to Compute Transitive Closures
Bloniarz, P.A.; Fischer, M.J.; Meyer, A.R.
</description>
<dc:date>1976-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148903">
<title>K+1 Heads are Better Than K</title>
<link>https://hdl.handle.net/1721.1/148903</link>
<description>K+1 Heads are Better Than K
Yao, Andrew C.; Rivest, Ronald L.
There are languages which can be recognized by a deterministic (k+1)-headed one-way finite automaton but which cannot be recognized by a k-headed one-way (deterministic or non-deterministic) finite automaton. Furthermore, there is a language accepted by a 2-headed nondeterministic finite automaton which is accepted by no k-headed deterministic finite automaton.
</description>
<dc:date>1976-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148902">
<title>The Design of a Modular Laboratory for Control Robotics</title>
<link>https://hdl.handle.net/1721.1/148902</link>
<description>The Design of a Modular Laboratory for Control Robotics
Malvania, Nikhil
Computer have been used for the control of physical processes since the early sixties. In this thesis, we look at Control Robotics, the procedural control of physical processes. Based upon this new approach, a design for a modular laboratory is proposed. The laboratory consists of a set of experiments which can be synthesized using certain conversion and processing modules. The laboratory also entails the generation of algorithms and programs for each experiement. Experiments are proposed and analysed, and a common and in a sense, minimal set of hardward modules is selected using a minimax approach. Power, torque, strength, resolution and other similar requirements for the modules are discussed. A theoretical model is developed for predicting and analyzing the capability of a processor to perform real-time control. The model is based upon the so-called Earliest Deadline algorithm for scheduling a number of tasks on a single processor. The model relates the bandwidths of different tasks a processor can perform to the total number of tasks; the average instruction execution time for the processor; and the complexity of its instruction set. This model is used to exhibit and compare the controlling capacities of two processors - Digital Equipment Corporation's PDP 11/45 and Intel 8080. It is also used to predict the processor requirements for the experiments of the proposed modeular laboratory. Thesis results include measure of relative power of the tested processors in the context of real-time control, and their capabilities in carrying out the experiments of the proposed laboratory.
</description>
<dc:date>1976-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148901">
<title>Optimal Arrangement of Keys in a Hash Table</title>
<link>https://hdl.handle.net/1721.1/148901</link>
<description>Optimal Arrangement of Keys in a Hash Table
Rivest, Ronald L.
When open addressing is used to resolve collisions in a hash table, a given set of keys may be arranged in many ways; typically this depends on the order in which the keys are inserted. We show that arrangements minimizing either the average or worst-case number of probes required to retrieve any key in the table can be found using an algorithm for the assignment problem. The worst-case retrieval time can be reduced to 0(log2(M)) with probability 1-E(M), when storing M keys in a table of size M, where E(M) -&gt; 0 aas M -&gt; infinity. We also examine insertion algorithms to see how to apply these ideas for a dynamically changing set of keys.
</description>
<dc:date>1976-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148900">
<title>Protosystem I: An Automatic Programming System Prototype</title>
<link>https://hdl.handle.net/1721.1/148900</link>
<description>Protosystem I: An Automatic Programming System Prototype
Ruth, Gregory R.
A model of the data processing system writing process is given in terms of development stages. These stages correspond to the progression in the implementation and design process from the highest level of abstraction (English system specifications) to the lowe level (machine code). The issues and goals (including optimization of the product data processing systems) involved in automating these stages are discussed and strategies and methodologies used for doing so are developed. Protosystem I, an automatic programming system prototype, is described. The completed (and working) part automates three of the five stages identified in the proposed model of the system writing process. The basic theory, methods and structure of this part of the automatic programming systems are presented.
</description>
<dc:date>1976-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148899">
<title>On the Worst-case Behavior of String-searching Algorithms</title>
<link>https://hdl.handle.net/1721.1/148899</link>
<description>On the Worst-case Behavior of String-searching Algorithms
Rivest, Ronald L.
Any algorithm for finding a pattern of length k in a string of length n must examine at least n-k+1 of the characters of the string in the worst case. By considering the pattern 00…0, we prove that this is the best possible result. Therefore there do not exist pattern matching algorithms whose worst-case behavior is "sublinear" in n (that is, linear with constant less than one), in contrast with the situation for average behavior (the Boyer-Moore algorithm is known to be sublinear on the average).
</description>
<dc:date>1976-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148898">
<title>Automatic Design of Data Processing Systems</title>
<link>https://hdl.handle.net/1721.1/148898</link>
<description>Automatic Design of Data Processing Systems
Ruth, Gregory R.
The design of data organization and data accessing procedures for data processing systems operating on large keyed fields of data is a common and recurrent activity in modern data processing applications. A considerable amount of understanding and expertise in this area has been developed and it is time to being codifying and automating this process. It should be possible to develop a system where the user has merely to specify the characteristics of his data objects and their interrelations and the system will automatically determine the data organizations and accessing procedures that are optimal for his application. The optimizer for Protosystem I (an automatic programming system prototype at MIT) provides an example of how such automation can be accomplished.
</description>
<dc:date>1976-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148897">
<title>Improved Bounds on the Costs of Optimal and Balanced Binary Search Trees</title>
<link>https://hdl.handle.net/1721.1/148897</link>
<description>Improved Bounds on the Costs of Optimal and Balanced Binary Search Trees
Bayer, Paul J.
A binary search tree can be used to store data in a computer system for retrieval by name. Different elements in the tree may be referenced with different probabilities. If we define the cost of the tree as the average number of elements which must be examined in searching for an element, then different trees have different costs. We show that two particular types of trees, weight balanced trees and min-max trees, which are easily constructed from the probability distribution on the elements, are close to optimal. Specifically, we show that for any probability distribution with entropy H, H-log2H-(log2e-1)&lt;=Copt&lt;= Cwb ,+ H+2/Cmm,+H+2 where Copt, Cwb, and Cmm are the optimal, weigh balances, and min-max costs. We gain some added insight by deriving an expression for the expected value of the entropy of a random probability distribution.
</description>
<dc:date>1975-11-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148896">
<title>Steam-oriented Computation in Recursive Data Flow Schemas</title>
<link>https://hdl.handle.net/1721.1/148896</link>
<description>Steam-oriented Computation in Recursive Data Flow Schemas
Weng, Kung-Song
In this thesis we present a parallel programming language based on a parallel computation model known as data flow schemas. Syntactically, the language resembles programming languages such as Algol 60, but does not have GOTO's, WHILE-loops, and non-local variables. The attractiveness of this approach lies in the inherently determinate nature of data flow schemas and the possiblity of formalizing the semantics of the language within the formalism suggested by Scott and Strachey. The language provides programming features for stream-oriented computation and intercommunicating systems. We introduce the notions of proper initialization and termination of such systems. A subclass of determinate systems in which these properties can be easily checked is defined and a translation into recursive data flow schemas is given.
</description>
<dc:date>1975-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148895">
<title>Computational Complexity of the Word Problem for Commutative Semigroups</title>
<link>https://hdl.handle.net/1721.1/148895</link>
<description>Computational Complexity of the Word Problem for Commutative Semigroups
Cardoza, Edward W.
We analyze the computational complexity of some decision problems for commutative semigroups in terms of time and space on a Turing machine. The main result we present is that any decision procedure for the word problemm for commutative semigroups requires storage space at least proportional to n/logn on a multitape Turing machine. This implies that the word problem is polynomia space hard (and in particular that it is at least NP-hard). We comment on the close relation of commutative semigroups to vector addition systems and Petri nets. We also show that the lower bound of space n/logn can be extended to certain other natural algorithmic problems for commutative semigroups. Finally we show that for several other algorithmic problems for commutative semigroups there exist polynomial time algorithms.
</description>
<dc:date>1975-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148894">
<title>Formal Properties of Well-formed Data Flow Schemas</title>
<link>https://hdl.handle.net/1721.1/148894</link>
<description>Formal Properties of Well-formed Data Flow Schemas
Leung, Clement Kin Cho
This thesis presents some results in comparative schematology and some undecidability results for two models of computer programs: the class of flowchart schemas and the class of well-formed data flow schemas (wfdfs's). Algorithms are given for translating a schema in each class into an equivalent schema in the other class. The propertiees of freedom, _-freedom, openness, and completeness are defined and studied. For every path P in a free flowchart schema S, there exists an interpretation under which the flow of controls through S is along P. _-freedom is a generalization of freedom and captures the notion of freedom for wfdfs's. An open schema is one in which no basic component is redundant and a complete schema contains no subschema which, whenever enabled, does not terminate. A comparison of the expressive power of subclasses of flowchart schemas and wfdfs's possessing various combinations of these properties is made. It is shown that the class of free flowchart schemas properly contains the classes of free and _-free wfdfs's , and that the class of open and complete flowchart schemas is equivalent in expressive power to the class of open and complete wfdfs's. Three undecidabilty results for open and complete program schemas are established: openness is undecidable for complete program schemas, completeness is undecidable for open program schemas, and equivalence is undecidable for open and complete program schemas.
</description>
<dc:date>1975-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148893">
<title>The Complexity of Negotion-limited Networks: A Brief Survery</title>
<link>https://hdl.handle.net/1721.1/148893</link>
<description>The Complexity of Negotion-limited Networks: A Brief Survery
Fischer, Michael J.
</description>
<dc:date>1975-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148892">
<title>Finding Isomorph Classes for Combinatorial Structures</title>
<link>https://hdl.handle.net/1721.1/148892</link>
<description>Finding Isomorph Classes for Combinatorial Structures
Weiss, Randell B.
A common problem in combinatorial analysis is finding isomorph classes of combinatorial objects. This process is sometimes known as isomorph rejection. In graph theory, it is used to count labelled and unlabelled graphs with certain properties. In chemistry, it is used to count the number of structures with the same chemical formula. In computer science it is used in counting arguments in proofs in complexity theory. In coding theory, it is used to partition sets of vectors into easy to handle sets. This thesis presents three different algorithms for solving this type of problem and compares their timing and memory use. Some examples are given of how to apply the algorithms to graph theory and coding theory.
</description>
<dc:date>1975-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148891">
<title>Encryption Schemes for Computer Confidentiality</title>
<link>https://hdl.handle.net/1721.1/148891</link>
<description>Encryption Schemes for Computer Confidentiality
Pless, Vera
</description>
<dc:date>1975-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148890">
<title>An Asynchronous Logic Array</title>
<link>https://hdl.handle.net/1721.1/148890</link>
<description>An Asynchronous Logic Array
Patil, Suhas S.
A new asynchronous logic array for the general synthesis of asynchronous digital circuits is presented. The parallel and asynchronous nature of the array gives the realized systems the speed and characteristics of hardwired circuits even though they are implemented in a uniform diode array with appropriate terminating circuits. The logic array is particularly suited for implementing control structures and should help extend the field of micro-control to asynchronous and parallel computers.
</description>
<dc:date>1975-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148889">
<title>First Version of a Data Flow Procedure Language</title>
<link>https://hdl.handle.net/1721.1/148889</link>
<description>First Version of a Data Flow Procedure Language
Dennis, Jack B.
A language for representing computational procedures based on the concept of data flow is presented in terms of a semantic model that permits concurrent execution of noninterfering program parts. Procedures in the language operate on elementary and structured values, and always define functional transformations of values. The language is equivalent in expressive power to a block structured language with internal procedure variables and is a generalization of pure Lisp. The language is being used as a model for study of fundamental semantic constructs for programming, as a target language for evaluating translatability of programs expressed as the user-language level, and as a guide for research in advanced computer architecture.
</description>
<dc:date>1975-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148888">
<title>CAMAC: Group Manipulation System</title>
<link>https://hdl.handle.net/1721.1/148888</link>
<description>CAMAC: Group Manipulation System
Weiss, Randell B.
CAMAC is a collection of group manipulation progams with an easy to use interface. With groups defined by either generating permutations or generators and relations the system can find coset tables, normalizers, centralizers, stabilizers, orbits, conjugacy classes, and isomorph classes of combinatorial objects, etc.
</description>
<dc:date>1975-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148887">
<title>Decision Problems for Petri Nets and Vector Addition Systems</title>
<link>https://hdl.handle.net/1721.1/148887</link>
<description>Decision Problems for Petri Nets and Vector Addition Systems
Hack, Michael
Petri Nets, Generalized Petri Nets, and Vector Addition Systems can represent each other and thus have common decideability problems. The graphical appeal of Petri Nets is used in a new presentation of the classical problems of boundedness (decidable) and inclusion (undecidable). Various forms of the Reachability Problem are shown to be recursively equivalent to the Liveness Problem for Petri Nets. The decideability of these questions is still open, and some arguments both for and against the decidability of Liveness are presented.
</description>
<dc:date>1975-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148886">
<title>Decidability of Equivalence for a Class of Data Flow Schemas</title>
<link>https://hdl.handle.net/1721.1/148886</link>
<description>Decidability of Equivalence for a Class of Data Flow Schemas
Qualitz, Joseph E.
In this paper we examine a class of computation schemas and consider the problem of deciding when pairs of elements in this class represent equivalent programs. We are able to show that equivalence is decidable for a non-trivial class of unary operator data flow schemas, and consider the applicability of this result to the problem of deciding equivalence in related models of computation. The model described below is a restricted version of the data flow schema described by Dennie and Fosseen in [1]. The reader is referred to that source for a more complete discussion of the properties of data flow schemas.
</description>
<dc:date>1975-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148885">
<title>On Bateson's Logical Levels of Learning Theory</title>
<link>https://hdl.handle.net/1721.1/148885</link>
<description>On Bateson's Logical Levels of Learning Theory
Levin, Michael
</description>
<dc:date>1975-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148884">
<title>Research on Experts Systems</title>
<link>https://hdl.handle.net/1721.1/148884</link>
<description>Research on Experts Systems
Gorry, G. Anthony
</description>
<dc:date>1974-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148883">
<title>A Class of Boolean Functions with Linear Combinatorial Complexity</title>
<link>https://hdl.handle.net/1721.1/148883</link>
<description>A Class of Boolean Functions with Linear Combinatorial Complexity
Hsieh, W. N.; Harper, L.H.; Savage, J.E.
In this paper we investigate the combinatorial complexity of Boolean functions satisfying a certain property, P^nk,m. A function of n variable has the P^nk,m property if there are at least m functions obtainable from each way of restricting it to a subset of n-l variables. We show that the complexity of P^n3,5 function is no less than 7n-4/6, and this bound cannot be much improved. Further, we find that for each k, there are p^k,2^k functions with complexity linear in n.
</description>
<dc:date>1974-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148882">
<title>The Inherent Computational Complexity of Theories of Ordered Sets: A Brief Survery</title>
<link>https://hdl.handle.net/1721.1/148882</link>
<description>The Inherent Computational Complexity of Theories of Ordered Sets: A Brief Survery
Meyer, Albert R.
</description>
<dc:date>1974-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148881">
<title>MDC-Programmer: A Muddle-to-datalanguage Translator for Information Retrieval</title>
<link>https://hdl.handle.net/1721.1/148881</link>
<description>MDC-Programmer: A Muddle-to-datalanguage Translator for Information Retrieval
Bengelloun, Safwan A.
This memo describes a practical application within the framework of the ARPA computer network of the philosophy that a fully developed computer network should appear as a virtual extensino of the user's own software environment. The application involves the design and implementation of a software facility that will permit users at MIT's Dynamic Modeling System to consider the retrieval component of the Datacomputer (developed and run by the Computer Corporation of America) as an extension of the Muddle environment. This facility generates efficient Datalanguage retrieval code, handles inter-process control of the Datacomputer, and manages all the necessary network connections.
</description>
<dc:date>1974-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148880">
<title>Computing in Logarithmic Space</title>
<link>https://hdl.handle.net/1721.1/148880</link>
<description>Computing in Logarithmic Space
Lind, John C.
The set logspace, of logarithmic space computable string functions is defined. It is easily seen that logspace ≤ polytime, the set of polynomial time computable functions. ogspace is shown to equal L, the smallest class of recursive string functions containing concatenation and the equality function, and closed under explicit transformation, substitution of a function for a variable and two restricted types of recursion on notation. The first is called recursion of concatenation and only allows top level concetenation of the value of the recursive call. The second, called log bounded recursion on notation, will only define string functions whose length is bounded by 0(log n) on arguments of length n. Some additional closure properties of logspace are also described.
</description>
<dc:date>1974-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148879">
<title>An Investigation of Current Language Support for the Data Requirements of Structured Programming</title>
<link>https://hdl.handle.net/1721.1/148879</link>
<description>An Investigation of Current Language Support for the Data Requirements of Structured Programming
Aiello, Jack M.
Structured programming is a new method for constructing reliable programs. Structured programming relies upon a systematic technique of top-down development which involves the refinement of both control structures and data structures. With possibly some limitations and extensions, existing languages can support control structure refinement. On the other hand, it is the belief of many that the representation of data structure refinement cannot be satified by present-day languages. Before accepting this view, it is wise to explore its validity. Therefore this thesis will investigate whether existing languages with possibly slight modifications are adequate for supporting the data requirements of structured programming.
</description>
<dc:date>1974-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148878">
<title>An Enciphering Module for Multics</title>
<link>https://hdl.handle.net/1721.1/148878</link>
<description>An Enciphering Module for Multics
Benedict, G. Gordon
Recently IBM Corporation has declassified an algorithm for encryption usable for computer-to-computer or computer-to-terminal communications. Their algorithm was implemented in a hardware device called Lucifer. A software implementation of Lucifer for Multics is described. A proof of the algorithm's reversibility for deciphering is provided. A special hand-coded (assembly language) version of Lucifer is described whose goal is to attain performance as close as possible to that of the hardward device. Performance measurements of this program are given. Questions addressed are: How complex is it to implement an algorithm in software designed primarily for digital hardware? Can such a program perform well enough for use in the I/O system of a large time-sharing system?
</description>
<dc:date>1974-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148877">
<title>Complete Classification of (24,12) and (22,11) Self-dual Codes</title>
<link>https://hdl.handle.net/1721.1/148877</link>
<description>Complete Classification of (24,12) and (22,11) Self-dual Codes
Pless, Vera; Sloane, N.J.A.
A complete classification is given of all [22, 11] and [24, 12] self-dual codes. For each code we give the order of its group, the number of codes equivalent to it, and its weight distribution. There is a unique [24, 12, 6] self-dual code. Several theorems on the enumeration of self-orthogonal codes are used, including forumlas for the number of such codes with minimum distance ≥ 4, and for the sum of the weight enumerators of all self-dual codes.
</description>
<dc:date>1974-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148876">
<title>The Reduction Method for Establishing Lower Bounds on the Number of Additions</title>
<link>https://hdl.handle.net/1721.1/148876</link>
<description>The Reduction Method for Establishing Lower Bounds on the Number of Additions
Kedem, Zvi M.
A method for establishing lower bounds on the number of multiplications and divisions has been developed by Pan, Winograd and Strassen. A similar method is developed for establishing lower bounds on the number of additions and subtractions. The results obtained partially overlap those of Belaga, Winograd and Kirkpatrick.
</description>
<dc:date>1974-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148875">
<title>Combining Dimensionality and Rate of Growth Arguments for Establishing Lower Bounds on Number of Multiplications</title>
<link>https://hdl.handle.net/1721.1/148875</link>
<description>Combining Dimensionality and Rate of Growth Arguments for Establishing Lower Bounds on Number of Multiplications
Kedem, Zvi M.
In this paper we describe a new method for establishing lower bounds for the number of multiplications and divisions required to compute rational functions. We shall start by reminding the reader of some standard notations.
</description>
<dc:date>1974-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148874">
<title>Fast On-line Integer Multiplication</title>
<link>https://hdl.handle.net/1721.1/148874</link>
<description>Fast On-line Integer Multiplication
Fischer, Michael J.; Stockmeyer, Larry J.
A Turing machine multiplies binary integers on-line if it receives its inputs low-order digits first and produces the jth digit of the product before reading in the (j+l)st digits of the two inputs. We present a general method for converting any off-line multiplication algorithm which forms the product of two n-digit binary numbers in time F(n) into an on-line method which uses time only O(F(n) log n ), assuming that F is monotone and satisfies n F(n) F(2n)/2 ! kF(n) for some constant k.
</description>
<dc:date>1974-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148873">
<title>Symmetry Codes and Their Invariant Subcodes</title>
<link>https://hdl.handle.net/1721.1/148873</link>
<description>Symmetry Codes and Their Invariant Subcodes
Pless, Vera
We define and study the invariant subcodes of the symmetry codes in order to be able to determine the algebraic properties of these codes. An infinite family of self-orthogonal rate 1/2 codes over GF (3), called symmetry codes, were constructed in [3].
</description>
<dc:date>1974-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148872">
<title>Super-exponential Complexity of Presburger Arithmetic</title>
<link>https://hdl.handle.net/1721.1/148872</link>
<description>Super-exponential Complexity of Presburger Arithmetic
Fischer, Michael J.; Rabin, Michael O.
Lower bounds are established on the computational complexity of the decision problem and on the inherent lengths of proofs for two classical decidable theories of logic: the first order theory of the real numbers under addition, and Presburger arithmetic -- the first order theory of addition on the natural numbers. There is a fixed constant c &gt; 0 such that for every (non-deterministic) decision procedure for determining the truth of sentences of real addition and for all sufficiently large n, there is a sentence  of length n for which the decision procedure runs for more than 2 cn steps.
</description>
<dc:date>1974-02-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148871">
<title>On the Complexity of the Theories of Weak Direct Products</title>
<link>https://hdl.handle.net/1721.1/148871</link>
<description>On the Complexity of the Theories of Weak Direct Products
Rackoff, Charles
Let N be the set of nonnegative integers and let &lt; N ,+&gt; be the weak direct product of &lt; N,+&gt; with itself. Mostowski[ 9 ] shows that the theory of &lt; N ,*&gt; is decidable, but his decision procedure isn't elementary recursive. We present here a more efficient procedure which operates   within space 2 2 . As corollaries we obtain the same upper bound for the theory of finite abelian groups, the theory of finitely generated abelian groups, and the theory of the structure &lt; N ,' &gt; of positive ...
</description>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148870">
<title>String-matching and Other Products</title>
<link>https://hdl.handle.net/1721.1/148870</link>
<description>String-matching and Other Products
Fischer, Michael J.; Paterson, Michael S.
The string-matching problem considered here is to find all occurrences of a given pattern as a substring of another longer string. When the pattern is simply a given string of symbols, there is an algorithm due to Morris, Knuth and Pratt which has a  running time proportional to the total  length of the pattern and long string together. This time may be achieved even on a Turing machine. The more difficult  case where either string may have "don't care" symbols which are deemed to match with all symbols is also considered. By exploiting the formal similarity of string-matching with integer multiplication, a new algorithm has been obtained with a running time which is only slightly worse than linear.
</description>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148869">
<title>An Improved Overlap Argument for On-line Multiplication</title>
<link>https://hdl.handle.net/1721.1/148869</link>
<description>An Improved Overlap Argument for On-line Multiplication
Paterson, Michael S.; Fischer, Michael J.; Meyer, Albert R.
A lower bound of cN1ogN is proved for the mean time complexity of an on-line multitape Turing machine performing the multiplication of N-digit binary integers. For a more general class of machines the corresponding bound is  cN1ogN. These bounds compare favorably with know upper bounds of the form cN(1ogN) k, and for some classes the upper and lower bounds coincide. The proofs are based on the "overlap" argument due to Cook and Aanderaa.
</description>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148868">
<title>Discrete Computation: Theory and Open Problems</title>
<link>https://hdl.handle.net/1721.1/148868</link>
<description>Discrete Computation: Theory and Open Problems
Meyer, Albert R.
Complexity  1. Borodin, A. Computational Complexity: Theory and Practice, in Currents in the Theory of Computing, A. Aho, ed., Prentice-Hall, Englewood Cliff, N.J., 1973,pp.32-89.
</description>
<dc:date>1974-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148867">
<title>Weak Monadic Second Order Theory of Successor is not Element-recurive</title>
<link>https://hdl.handle.net/1721.1/148867</link>
<description>Weak Monadic Second Order Theory of Successor is not Element-recurive
Meyer, Albert R.
Let L SIS be the set of formulas expressible in a week monadic second order logic using only the predicates [x =y+1] and [x E z]. Bucci and Elgot [3,4] have shown that the truth of sentences in L SIS (under the standard interpretation &lt; N, successor &gt; with second order variables interpreted as ranging over finite sets) is decidable. We refer to the true sentences in L SIS as WSIS. We shall prove that WSIS is not elementary-recursive in the sense of Kalmar. In fact, we claim a stronger result:
</description>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148866">
<title>Real-time Simulation of Multidimensional Turing Machines by Storage Modification Machines</title>
<link>https://hdl.handle.net/1721.1/148866</link>
<description>Real-time Simulation of Multidimensional Turing Machines by Storage Modification Machines
Schönage, A.
In [1] the author introduced a new machine model, now called the Storage Modification Machine (SMM). It was claimed, but not proved, that SMM's can simulate all sorts of Turing machines-- those with multidimensional worktapes in particular -- in real time.
</description>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148865">
<title>A User's Guide to the Macro Control Language</title>
<link>https://hdl.handle.net/1721.1/148865</link>
<description>A User's Guide to the Macro Control Language
Geiger, Steven P.
</description>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148864">
<title>An Interactive Implementation of the ToddCoxeter Algorithm</title>
<link>https://hdl.handle.net/1721.1/148864</link>
<description>An Interactive Implementation of the ToddCoxeter Algorithm
Bonneau, Richard  J.
The Todd-Coxeter algorithm provides a systematic approach to the enumeration of cosets of a finitely presented group.  This memo describes an interactive implementation  of algorithm, including a manual on its use, examples, and methods of accessing the program. Applications of this algorithm are also discussed.
</description>
<dc:date>1973-12-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148863">
<title>Polynomial Exponentiation: The Fast Fourier Transform Revisited</title>
<link>https://hdl.handle.net/1721.1/148863</link>
<description>Polynomial Exponentiation: The Fast Fourier Transform Revisited
Bonneau, Richard J.
</description>
<dc:date>1973-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148862">
<title>A Decision Procedure for the First Order Theory of Real Addition with Order</title>
<link>https://hdl.handle.net/1721.1/148862</link>
<description>A Decision Procedure for the First Order Theory of Real Addition with Order
Ferrante, Jeanne; Rackoff, Charles
Consider the first order theory of the real numbers with the predicates + (plus) and &lt; (less than). Let S be the set of true sentences. We first present an elimination of quantifiers decision procedure for S, and then analyse it to show that it takes at most time 2^2^cn, c a constant, to decide sentences of length n. Looking more closely at this procedure, we arrive at a second procedure by showing that a given sentence doesn't change in truth value when each of the quantifiers is limited to range over an appropriately chosen finite set of rationals. This fact leads to a decision procedure for S which takes space2^cn. We also remark that our methods lead to a decision procedure for Presburger arithmetic which operates in space 2^2^cn. These upper bounds should be compared with the results of Fischer and Rabin (Proceedings of AMS Symp. on Complexity of Real Computation Processes, to appear) that for some constant c, tim 2^cn for real addition, and time 2^2^cn for Presburger arithmetic, is required to decide some sentences of length n for infitely many n.
</description>
<dc:date>1973-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148861">
<title>An Operator Embedding Theorem for Complexity Classes of Recursive Functions</title>
<link>https://hdl.handle.net/1721.1/148861</link>
<description>An Operator Embedding Theorem for Complexity Classes of Recursive Functions
Moll, Robert
Let F (t) be the set of functions computable by some machine using no more than t(x) machine steps on all but finitely many arguments x. If we order the - classes under set inclusion as t varies over the recursive functions, then it is natural to ask how rich a structure is obtained. We show that this structure is very rich indeed. If R is any countable partial order and F is any total effective operator, then we show that there is a recursively enumerable sequence of...
</description>
<dc:date>1973-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148860">
<title>A Class of Finite Computations Structures Supporting the Fast Fourier Transform</title>
<link>https://hdl.handle.net/1721.1/148860</link>
<description>A Class of Finite Computations Structures Supporting the Fast Fourier Transform
Bonneau, Richard J.
The Fast Fourier Transform (FFT) and modular arithmetic are two distinct techniques which recently have been employed to increase the efficiency of numerous algorithms in the area of symbolic and algebraic manipulation.
</description>
<dc:date>1973-03-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148859">
<title>SIM360: A S/360 Simulator</title>
<link>https://hdl.handle.net/1721.1/148859</link>
<description>SIM360: A S/360 Simulator
McCray, Wm. Arthur
Modern, large-scale computer systems typically operate under the control of an operating system or executive program, and reserve for the exclusive use of the operating system a set of privileged instructions, which the normal users may not issue. This very necessary arrangement produces a problem of equipment availability for those who wish to develop or investigate operating systems programs, because such programs cannot be run as normal user jobs under an executive program. This thesis describes SIM360, a detailed simulator of the representative IBM S/360 computer, which was written to run student programs, programs assigned as machine problems for a course in operating systems. The simulator allows programs to issue all of the priveleged instructions of the S/360, and thus provides a readily available tool for the study of operating systems programs.
</description>
<dc:date>1972-05-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148858">
<title>The Emptiness Problem for Automata on Infinite Trees</title>
<link>https://hdl.handle.net/1721.1/148858</link>
<description>The Emptiness Problem for Automata on Infinite Trees
Hossley, Robert; Rackoff, Charles
The purpose of this paper is to give an alternative proof to the decidability of the emptiness problem for tree automata, as shown in Rabin [4]. The proof reduces the emptiness problem for automata on infinite trees to that for automata on finite trees, by showing that any automata definable set of infinite trees must contain a finitely-genarable trees.
</description>
<dc:date>1972-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148857">
<title>Construction Heuristics for Geometry and a Vector Algebra Representation of Geometry</title>
<link>https://hdl.handle.net/1721.1/148857</link>
<description>Construction Heuristics for Geometry and a Vector Algebra Representation of Geometry
Wong, Richard
Heuristics for generating constructions to help solve high school geometry problems are given. Many examples of the use of these heuristics are given. A method of translating geometry problems into vector algebra problems is discussed. The solution of these vector algebra geometry problems is analyzed. The use of algebraic constructions to help solve these vector problems is also discussed.
</description>
<dc:date>1972-06-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148856">
<title>Economy of Descriptions and Minimal Indices</title>
<link>https://hdl.handle.net/1721.1/148856</link>
<description>Economy of Descriptions and Minimal Indices
Bagchi, Amitava
</description>
<dc:date>1972-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148855">
<title>Helping People Think</title>
<link>https://hdl.handle.net/1721.1/148855</link>
<description>Helping People Think
Goldstein, Robert C.
Everyone, today, is familiar with the use of machines to ease physical burdens. Since the dawn of civilization, man's progress in gaining control over his environment has been largely determined by the power and sophistication of the machines that he has been able to command. Furthermore, since simple machines can be used to construct more complicated ones, this process, once begun, tends to advance at an accelerating rate.
</description>
<dc:date>1971-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148854">
<title>The Macaims Data Management System</title>
<link>https://hdl.handle.net/1721.1/148854</link>
<description>The Macaims Data Management System
Goldstein, Robert C.; Strnad, Alois J.
MacAIMS (MAC Advanced Interactive Management System) is a relatively small research project that was initiated in the summer of 1968 to investigate the feasibility of using some of the then existing computer facilities at M.I.T. to aid in the management of Project MAC. Several interesting and useful interactive programs were developed and are currently in use.
</description>
<dc:date>1971-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148853">
<title>The Relational Approach to the Management of Data Bases</title>
<link>https://hdl.handle.net/1721.1/148853</link>
<description>The Relational Approach to the Management of Data Bases
Strnad, Alois J.
The ultimate goal of Project MacAIMS (MAC Advanced Interactive Management System) is to build a computer facility which will be able to support non-trivial decision making processes. (See reference 4). In the early stages of our experiments we discovered that traditional approaches to the management of data bases do not satisfy our needs. We have determined the following requirements for the management of Large Data Bases (LDB) in a dynamically varying  environment such as an interactive Management  Information System.
</description>
<dc:date>1971-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148852">
<title>Transmission of Information Between a Man-machine Decision System and its Environment</title>
<link>https://hdl.handle.net/1721.1/148852</link>
<description>Transmission of Information Between a Man-machine Decision System and its Environment
Wells, Douglas M.
</description>
<dc:date>1971-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148851">
<title>The Substantive Use of Computers for Intellectual Activities</title>
<link>https://hdl.handle.net/1721.1/148851</link>
<description>The Substantive Use of Computers for Intellectual Activities
Goldstein, Robert C.
</description>
<dc:date>1971-04-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148850">
<title>A Computer Model of Simple Forms of Learning</title>
<link>https://hdl.handle.net/1721.1/148850</link>
<description>A Computer Model of Simple Forms of Learning
Jones, Thomas L.
</description>
<dc:date>1971-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148849">
<title>A New List-tracing Algorithm</title>
<link>https://hdl.handle.net/1721.1/148849</link>
<description>A New List-tracing Algorithm
Fenichel, Robert R.
List-processing systems have each allowed use of only a  single size and configuration of list cell. This paper describes a system which allows use of arbitrarily many different sizes and configurations of list cell, possibly not specified until run time.
</description>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148848">
<title>Automatic Code-generation from an Object-machine Description</title>
<link>https://hdl.handle.net/1721.1/148848</link>
<description>Automatic Code-generation from an Object-machine Description
Miller, Perry L.
This memo outlines the basic elements of a macro code-generating system, and develops an informal machine-independent model of a code generator. Then the memo discusses how an implementation of this model could be set up to generate code for a particular machine from machine-dependent information given in descriptive form.
</description>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148847">
<title>Complexity Measures for Programming Languages</title>
<link>https://hdl.handle.net/1721.1/148847</link>
<description>Complexity Measures for Programming Languages
Goodman, Leonard I.
A theory of complexity is developed for algorithms implemented in typical programming languages. The complexity of a measuring a specific type of complexity is a complexity measure -- some function of the amount of a particular resource used by a program in processing an input. Typical resources would be execution time, core, I/O devices, and channels
</description>
<dc:date>1971-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148846">
<title>Pseudo-random Sequences</title>
<link>https://hdl.handle.net/1721.1/148846</link>
<description>Pseudo-random Sequences
Bruere-Dawson, Gerard
The purpose of this paper is to study some notions of randomnes for infinite sequences of 0's and 1's.
</description>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148845">
<title>An Expansion of the Data Structuring Capabilities of PAL</title>
<link>https://hdl.handle.net/1721.1/148845</link>
<description>An Expansion of the Data Structuring Capabilities of PAL
Zilles, Stephen N.
</description>
<dc:date>1970-10-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148844">
<title>Suspension of Processes in a Multiprocessing Computer System</title>
<link>https://hdl.handle.net/1721.1/148844</link>
<description>Suspension of Processes in a Multiprocessing Computer System
Vogt, Carla M.
</description>
<dc:date>1970-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148843">
<title>Use of High Level Languages for Sytems Programming</title>
<link>https://hdl.handle.net/1721.1/148843</link>
<description>Use of High Level Languages for Sytems Programming
Graham, Robert M.
(This paper is a slightly edited version of a transcript so that it still contains the colloquial flavor of the oral presentation.)  I'm going to talk about languages for systems programming what they can do for us, and what we might expect from them in the future. These comments are largely based on my experience with the Multics System and I'll quote a few figures from Multics as we go along. I'm concerned particularly with large complex system.
</description>
<dc:date>1970-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148842">
<title>File Management and Related Topics, June 12, 1970</title>
<link>https://hdl.handle.net/1721.1/148842</link>
<description>File Management and Related Topics, June 12, 1970
Graham, Robert M.
The subject of these notes is file management. We will develop the problems of file management within the environment of a large information and computing service, often called a computer utility or general purpose time-sharing system. We do this for two reasons. First, this environment imposes the most severe constraints. Other environments are obtained by relaxing these constraints. Secondly, large information and computing services will become more prevalent in the years to come.   Let us first look briefly at those objectives of an information and computing service which are significant to this discussion.
</description>
<dc:date>1970-09-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148841">
<title>Description and Flow Chart of the PDP-7/9 Communications Package</title>
<link>https://hdl.handle.net/1721.1/148841</link>
<description>Description and Flow Chart of the PDP-7/9 Communications Package
Ward, Philip W.
The PDP-7/9 Communications Package was written to provide data transfers between the buffer controller (PDP-7 or PDP-9) of an ESL Display Console and a host computer via a 50-kilobit serial Dataphone link. Initially, only one of the displays  (with a PDP-9 buffer controller) was to be operated remotely over q 50-kilobit line, and the only feasible access to the 7094 CTSS host computer was via the PDP-7 buffer controller of the other display, which is directly connected to CTSS channel D. For this connection, the PDP-7 could be looked upon as the "host" for the PDP-9, although it merely served as a message-handling intermediary for the real host, the 7094
</description>
<dc:date>1970-07-01T00:00:00Z</dc:date>
</item>
<item rdf:about="https://hdl.handle.net/1721.1/148840">
<title>Interactive Design Coordination for the Building Industry</title>
<link>https://hdl.handle.net/1721.1/148840</link>
<description>Interactive Design Coordination for the Building Industry
Jackson, James N.
The problem of effective communication in the process of building design and construction is widely recognized. The involvement of several design disciplines combined with the tendency for designers to work in distinct offices results in little capacity for them to investigate the influence of their design decisions on other design areas.  One of the responses to the need for effective Interaction in the use of computers for design project is the supersytem concept proposed for ICES, the Integrated Civil Engineering System. The supersystem is defined as the cooperative effort on the part of the designers of several problem oriented computer capabilities to implement project capabilities by allowing each of their problem oriented subsystem to reference a single file of project data. The supersystem would allow design interaction by having each of the problem oriented computer subsystem reference a single file of information specifying the project.   Future work in the application of computers to interactive and project oriented design in the building industry will have to concentrate on the file structure to be used in the Implementation of a computer building design supersystem.
</description>
<dc:date>1970-06-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
