A continuation of the study of the application of on-line data processing techniques to the Navy Supply System is presented. Volumes 1 and 2 (AD226190 and AD266189), presented on July 14, 1961, included the derivation of functional, data transmission, and data storage requirements of the total Navy Supply System. In addition, these volumes included discussions of various systems and hardware configurations, and developed estimates of total systems costs. This report (Volume 3) presents the...
Topics: DTIC Archive, TELEREGISTER CORP STAMFORD CT, *INPUT OUTPUT PROCESSING, *NAVAL PROCUREMENT,...
Chronicles is introduced as an experimental recording vehicle which can regenerate an original computer test run in its entirety by playing back all the recorded inputs into the operational program. Although the playback no tion is ancient history, the successful practical application of total system playback is recent and new for complex systems such as SAGE. Chronicles recording in SAGE emerged from an experimental DCA Model 8 design to its present experimental status in Model 9. Current...
Topics: DTIC Archive, Sackman, H, SYSTEM DEVELOPMENT CORP SANTA MONICA CA, *INPUT OUTPUT PROCESSING,...
This document includes specifications for establishing the requirements for performance, design, test, and qualification of a computer program identified as the Tactical Interface System (TIS), SDSS-MMP-B1. The purpose of this program is to interface the Software Development Support System (SDSS) to the Microprogrammable Multiprocessor (MMP) system emulating an AN/GYK-12 executing the Programming Support System (PSS) software. The AN/GYK-12 PSS normally executes in combination with the TACFIRE...
Topics: DTIC Archive, ANALYTICS INC MCLEAN VA, *COMPUTER PROGRAMS, *INTERFACES, REQUIREMENTS,...
A well characterized library of Input/Output buffers is presented in this document. The library was designed for the Advanced Silicon compiler in Prolog (ASP). This document outlines the basic steps used to develop the buffers and also discusses general design issues for I/O buffers. Finally, there is a discussion of future trends in I/O buffer design.
Topics: DTIC Archive, CALIFORNIA UNIV BERKELEY COMPUTER SCIENCE DIV, *BUFFERS, *INPUT OUTPUT PROCESSING,...
A generalized adjoint system is defined. Using a given input-output system, the generalized adjoint system is patterned similarly to adjoints of bounded linear transformations. Elementary properties of the generalized adjoint system are derived. For a space of input-output systems, a generalized adjoint map from this space of systems to the space of generalized adjoints is defined. Properties of the generalized adjoint map are derived. It is shown that the inverse of an input-output system may...
Topics: DTIC Archive, NAVAL SURFACE WARFARE CENTER DAHLGREN DIV VA, *INPUT OUTPUT PROCESSING, INVERSION,...
The JIAWG Input/Output System (JIOS) provides the software/hardware Interface for Built-In-Test and l/O provided via the PI-Bus and TM-Bus for the JIAWG 16-bit Common Modules. This paper describes the need for JIOS, the functionality of the JIOS , concerns related to the use of the JIOS, and a planned JIOS demonstration.
Topics: DTIC Archive, NAVAL AVIONICS CENTER INDIANAPOLIS IN, *INPUT OUTPUT PROCESSING, AVIONICS,...
The purpose of these papers is to further the understanding of how to use selected features of the Ada Programming Language in a proper manner as viewed by the authors. Six papers are presented in this document describing the use of packages, types, tasking, exceptions, low level language features, and real data types in the Ada language. (Author)
Topics: DTIC Archive, Haberman,Nico, BATTELLE COLUMBUS LABS OH, *COMPUTER PROGRAMS, *PROGRAMMING LANGUAGES,...
In solving problems on automatic computers, it is frequently necessary to make use of standard routines. The existence of a library with a large set of standard routines and a convenient way of using them can substantially simplify and ease the process of preparing problems for solution. Sometimes convenience in making use of standard routines is achieved owing to the fact that the computer includes a special memory device into which the various standard routines may be loaded. For an entire...
Topics: DTIC Archive, Kurochkin, V M, FOREIGN TECHNOLOGY DIV WRIGHT-PATTERSON AFB OH, *COMPILERS, INPUT...
A cooperative power scheduling algorithm developed by Wang, Krunz and Cui is extended for an ad hoc network of MIMO links. This algorithm, referred to as pricebased iterative water filling (PIWF) algorithm, is a distributed algorithm by which each link computes its power scheduling through an iterative and cooperative process. The cooperation among all links is achieved by adaptive price factors applied by each link. Compared to a centralized power scheduling algorithm, the PIWF algorithm is...
Topics: DTIC Archive, CALIFORNIA UNIV RIVERSIDE, *INPUT OUTPUT PROCESSING, *ALGORITHMS, ADAPTIVE SYSTEMS,...
System test build-up and further modification of MOBILE required to meet the needs manifested by system testing is reported. Specific table formats and functions internal to MOBILE are included. The following topics are discussed: (1) MUST (MOBILE Utility Symbolic Translator) (2) Run 4 output table formats, (3) Data design table (DDT) (4) Run 8 table formats (5) Macro instructions and related table formats (6) COBOL compiler output listings (7) Qualification task in Run 1.3 and a description of...
Topics: DTIC Archive, Jervis, E W, SYLVANIA ELECTRONIC SYSTEMS-EAST NEEDHAM HEIGHTS MA, *COMPILERS,...
Topics: DTIC Archive, THOMPSON RAMO WOOLDRIDGE INC CANOGA PARK CA, *MACHINE TRANSLATION, COMPUTER LOGIC,...
An application of synthetic workloads in the evaluation of the performance of batch processing, multiprogrammed, real-memory computer systems is described. Results of controlled experiments with a Burroughs B 3500 computer system in a dedicated environment using a test workload are presented. The test workload is constructed by matching the joint probability distribution of the selected real workload characteristics. They are the core size of the program, the number of files, I/0 activity to...
Topics: DTIC Archive, Sreenivasan, K., Esposito, J. E., MITRE CORP BEDFORD MA, *CENTRAL PROCESSING UNITS,...
A security marking policy has two objectives: (1) to fulfill the basic marking requirements of the security regulations for all types of computer I/O material on a consistent, generalized basis, and (2) to ensure that the security attributes of classified data are accurately maintained on every I/O transfer. The reasons behind the need for a general policy are considered, the guidance provided by existing regulations is reviewed, and the marking policies of three existing systems are outlined....
Topics: DTIC Archive, Mogilensky, J., MITRE CORP BEDFORD MA, *DATA PROCESSING SECURITY, CLASSIFIED...
Topics: DTIC Archive, Mitchell, R L, MARK RESOURCES INC SANTA MONICA CA, *DATA BASES, MATHEMATICAL MODELS,...
This document refines some of the DoD Stoneman Requirements for Ada Programming Support Environments and imposes them upon a CAIS specification. The DoD Steelman Requirements for High Order Computer Programming Languages and the several sets of ANSI OSCRL requirements and design objectives for Operating System Command and Response Languages have also influenced this document.
Topics: DTIC Archive, TRW DEFENSE SYSTEMS GROUP REDONDO BEACH CA, *INTERFACES, *SYSTEMS ENGINEERING,...
Several methods of combining a number of time series into a single series are discussed. They are all individual filtering followed by summation and are somewhat like Wiener filtering in that a least squares criterion is used to define the filter coefficients. They differ from Wiener filtering in that signal information is given in the form of various linear constraints on the filter coefficients rather than being given as a signal correlation function. The formulas are worked out explicitly...
Topics: DTIC Archive, MASSACHUSETTS INST OF TECH LEXINGTON LINCOLN LAB, *INFORMATION SYSTEMS, TIME,...
This document is the Final Technical Report for the PETTT Pre-Planned Project PP-CCM-KY04-013-P3, 100K+ Core Challenge for Comprehensive Computing at Scale. This report presents advanced Input/Output (I/O) and co-processing analysis routines as utilized by a computational model scaling to large numbers of compute cores. The report also includes the background on the model used as a case study, I/O routine overviews, co-processing routine overviews, and timings and performance results of these...
Topics: DTIC Archive, HIGH PERFORMANCE TECHNOLOGIES INC RESTON VA, *HIGH PERFORMANCE COMPUTING,...
We give an O((square root of n)m log N) algorithm for the single-source shortest paths problem with integral arc lengths. (Here n and m is the number of nodes and arcs in the input network and N is essentially the absolute value of the most negative arc length.) This improves previous bounds for the problem.
Topics: DTIC Archive, Goldberg, Andrew, STANFORD UNIV CA DEPT OF COMPUTER SCIENCE, *ALGORITHMS,...
The QR matrix decomposition (QRD), or factorization, has many applications. In matrix computations, it is used to solve linear equations and least squares problems. In signal processing, it is used for adaptive filtering, adaptive beamforming/ interference nulling, and direction finding. In communications, it is used for adaptive equalization and transceiver design for multiple-input multiple-output (MIMO) channels. When QRD is used in signal processing and communications, it is of interest to...
Topics: DTIC Archive, DEFENCE RESEARCH AND DEVELOPMENT CANADA OTTAWA (ONTARIO), *ADAPTIVE COMMUNICATIONS,...
Several sections are discussed in this report. Section 1: Interactive Image Filtering Programs, Section 2: Interactive Image Utility Programs, Section 3: DeAnza IP8500 Manipulation Routines and Section 4: Image Manipulation Program.
Topics: DTIC Archive, Lander,W B, JAYCOR ALEXANDRIA VA, *COMPUTER PROGRAMS, *IMAGE PROCESSING, *IMAGE...
This quarter we focused our attention on the completion of the hardware and software implementations for the TO processor. the TO design represents a significant step towards the development of the T1 processor for the CNS-1 machine. TO is essentially a uniprocessor version of the T1 multiprocessor node. We also began detailed investigations into the design of the Rambus high-speed memory inteface for the T1 processor and began a study on the CNS-1 input/output processor, Hydrant. this quarter...
Topics: DTIC Archive, CALIFORNIA UNIV BERKELEY, *CONSTRUCTION, *SUPERCOMPUTERS, COMPUTER PROGRAMS,...
This paper defines a suite of requirements for future hybrid cosimulation standards, and specifically provides guidance for development of a hybrid cosimulation version of the Functional Mockup Interface (FMI) standard. A cosimulation standard defines interfaces that enable diverse simulation tools to interoperate. Specifically, one tool defines a component that forms part of a simulation model in another tool. We focus on components with inputs and outputs that are functions of time, and...
Topics: DTIC Archive, CALIFORNIA UNIV BERKELEY DEPT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES,...
A new model is introduced for reasoning about atomic transactions. This model allows careful statement of the correctness conditions to be satisfied by transaction-processing algorithms, as well as clear and concise description of such algorithms. It also serves as a framework for rigorous correctness proofs. A new algorithm is introduced for general commutativity- based locking in nested transaction systems. This algorithm and a previously- known read-update locking algorithm are presented and...
Topics: DTIC Archive, Fekete, Alan, MASSACHUSETTS INST OF TECH CAMBRIDGE LAB FOR COMPUTER SCIENCE, *INPUT...
In this paper we report on the system design and a realtime implementation of a MIMO-OFDM radio transmission system close to physical layer parameters as discussed in standardization for 3GPP-Long-Term-Evolution. We describe the implementation concept and first results on over-the-air transmission with a single user set-up occupying 20 MHz bandwidth and achieving more than 150 Mbit/s gross data rate in the 2x2 MIMO down-link and more than 50 Mbit/s in the single transmit antenna up-link. The...
Topics: DTIC Archive, NOKIA SIEMENS NETWORKS GMBH AND CO KG MUNICH (GERMANY), *CELLULAR COMMUNICATIONS,...
The first two chapters of a monograph on a Dynamic Theory of Production Correspondences are presented. The indivisible elements are time histories of inputs and outputs, related by mappings between products of function spaces. Axioms are stated for the mappings (correspondences) and compatibility and independence of the axioms are shown. An iff condition is shown for the existence of a dynamic neoclassical production function. Under certain conditions it is shown that steady state production...
Topics: DTIC Archive, Shephard,Ronald W, CALIFORNIA UNIV BERKELEY OPERATIONS RESEARCH CENTER, *PRODUCTION...
The authors present in this study an examination of the characteristics of computer symbol manipulation systems, including the conventions governing conversion of input symbols to internal code and back to output symbols. Methods to achieve flexibility in the manipulation of large, non-standard, and non-Roman-character symbol sets are discussed, primarily by examination of word processing systems designed to operate on non-Roman fonts. The intent of this discussion is to highlight the...
Topics: DTIC Archive, Artero,James C, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *DATA PROCESSING, *SYMBOLS,...
SDGC (Simulation Data Generation Control Routine) is used by the ordered execution of the data generation subroutines pre-scheduled by SIPSA, to update the system time counters, and to pack outputs from the executed subroutines in the formats requested.
Topics: DTIC Archive, Madrid, G A, SYSTEM DEVELOPMENT CORP SANTA MONICA CA, *COMPUTERIZED SIMULATION,...
FPGA-based Configurable Computing Machines (CCMs) offer powerful and flexible general-purpose computing platforms. However, development for FPGA-based designs using modern CAD tools is geared mainly toward an ASIC-like process. This is inadequate for the needs of CCM application development. This paper discusses an application framework for developing CCM-based applications beyond just the hardware configuration. This framework leverages the advantages of CCMs (availability, programmability,...
Topics: DTIC Archive, Slade, Anthony L, *CONFIGURATIONS, *COMPUTER APPLICATIONS, OPTIMIZATION, MODELS,...
Tree rewrite with typed variables can be used to represent many tree transformations in a more compact form than systems with untyped variables. By building on the work of Eduardo Pelegri-Llopart, it is possible to generate linear-time optimal solutions to SET-REACHABILITY -- a generalization of REACHABILITY with a possibly infinite goal set -- for a useful class of typed rewrite systems. The algorithms developed can also handle some untyped systems that are not in BURS, such as systems with...
Topics: DTIC Archive, CALIFORNIA UNIV BERKELEY COMPUTER SCIENCE DIV, *COMPUTER PROGRAMMING, *INPUT OUTPUT...
Reports that SDRP- the data reduction program for the Parameter Test System. States that its purpose is to format and list on a BCD tape, or on the on-line printer, the data from the recording tape generated by the Test Control Program, STCP. Also states that all records on the tape may be listed, or records may be selected for listing through the use of Selective Listing Input Messages.
Topics: DTIC Archive, Frey, Regina, SYSTEM DEVELOPMENT CORP SANTA MONICA CA, *GROUND SUPPORT EQUIPMENT,...
Viewgraphs from presentation of a compiler which synthesizes hardware circuits that run on reconfigurable hardware from parallel C programs.
Topics: DTIC Archive, Gokhale, Maya, LOS ALAMOS NATIONAL LAB NM, *COMPILERS, DATA PROCESSING, INPUT OUTPUT...
For a large Adaptive Optics (AO) system such as a large Segmented Mirror Telescope (SMT), it is often difficult, although not impossible, to directly apply common Multi-Input Multi-Output (MIMO) controller design methods due to the computational burden imposed by the large dimension of the system model. In this paper, a practical controller design method is proposed which significantly reduces the system dimension for a system where the dimension required to represent the dynamics of the plant...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *ADAPTIVE OPTICS, CONTROL SYSTEMS,...
The TRIDENT Higher Level Language (THLL) is implemented on the VAX 11/780 based TRIDENT Software Generation System (SGS) for three target machines: the TRIDENT Basic Processor (BP), the Motorola MC68000, and the VAX 11/780. This document describes implementation features of THLL, which are unique for the BP, and the runtime system for the BP.
Topics: DTIC Archive, NAVAL SURFACE WEAPONS CENTER DAHLGREN VA, *USER MANUALS, *COMPILERS, *HIGH LEVEL...
Course Outline (continued): 9) record types; 10) access types; 11) program structure and separate compilation; 12) using library units; 13) packages; 14) exceptions; 15) input/output; and 16) overview of other language features.
Topics: DTIC Archive, SOFTECH INC WALTHAM MA, *PROGRAMMING MANUALS, *TEACHING METHODS, TRAINING, INPUT...
Topics: DTIC Archive, DEFENSE LOGISTICS SERVICES CENTER BATTLE CREEK MI, *DATA BASES, *LOGISTICS...
This is a two-part manual for users of the PRIM-based U1050 emulator. The manual demonstrates as well as describes the capabilities of PRIM, running and debugging of object code, and the emulated computer system. (Author)
Topics: DTIC Archive, Gallenson, Louis, UNIVERSITY OF SOUTHERN CALIFORNIA MARINA DEL REY INFORMATION...
Interactive programs allow users to engage in input and output throughout execution. The ubiquity of such programs motivates the development of models for reasoning about their information-flow security, yet no such models seem to exist for imperative programming languages. Further, existing language-based security conditions founded on noninteractive models permit insecure information flows in interactive imperative programs. This paper formulates new strategy based information-flow security...
Topics: DTIC Archive, O'Neill,Kevin R, Cornell University Ithaca United States, information security,...
This document is the User's Guide and Reference Manual for GENAH, the Generalized Nearfield Acoustical Holography processing program. The User's Guide provides instructions for operating the GENAH programs. This includes installing and running the code, choosing input parameters and a discussion of the input and output file structure. The Reference Manual contains material explaining the theory of cylindrical nearfield holography and how this theory is implemented in the GENAH code. Sufficient...
Topics: DTIC Archive, Washburn, Karl B., NAVAL RESEARCH LAB WASHINGTON DC, *USER MANUALS, *ACOUSTIC...
These comments were provided to illustrate a probable misunderstanding in trying to prove the separation theorem for linear stochastic systems with time delays. The author points outs specific problems and amends the proof to show a better method. (Author)
Topics: DTIC Archive, Lindquist,Anders, KENTUCKY UNIV LEXINGTON DEPT OF MATHEMATICS, *STOCHASTIC PROCESSES,...
The TRIDENT Higher Level Language (THLL) is implemented on the VAX 11/780 based TRIDENT Software Generation System (SGS) for three target machines: the TRIDENT Basic Processor (BP), the Motorola MC68000, and the VAX 11/780. This document describes implementation features of THLL, which are unique for the MC68000, and the runtime support system for the MC68000.
Topics: DTIC Archive, Gaines,J A , Jr, NAVAL SURFACE WEAPONS CENTER DAHLGREN VA, *HIGH LEVEL LANGUAGES,...
In this paper, we propose a time-domain receiver design scheme for high data rate single carrier multiple-input, multiple-output (MIMO) underwater acoustic communications. In this scheme, each received packet is artificially partitioned into blocks for processing. The MIMO channel is initially estimated using training blocks at the front of transmitted packets from all transducers. With the estimated MIMO channel, one data block following the training blocks is equalized. The phase rotation in...
Topics: DTIC Archive, MISSOURI UNIV-COLUMBIA DEPT OF ELECTRICAL ENGINEERING, *UNDERWATER ACOUSTICS,...
A comparative study is made on the realizability conditions of various special cases as well as the general case of the positive-real biquadratic functions. Computer programs are written for this study to illustrate the realizability regions of zeros (or poles) of the functions. A limited study is also made on the sensitivity of the function to variation of element value in a realization.
Topics: DTIC Archive, Suparman, Achmad Ischak, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *QUADRATIC EQUATIONS,...
I/O systems are increasingly becoming a major performance limitation to faster computer systems. Recently we presented several disk array architectures designed to increase the data rate and I/O rate of supercomputing applications, transaction processing, and file systems. In this paper we present a hardware performance measurement of two of these architectures, mirroring and rotated parity. We see how throughput for these two architectures is affected by response time, request size, and the...
Topics: DTIC Archive, CALIFORNIA UNIV BERKELEY DEPT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES,...
Constraint-based programming has been used for a wide variety of applications where declarative specification and general solution mechanisms are desirable. This paper describes a prototype document preparation system, Ensemble-C, that utilizes constraint satisfaction as a mechanism for presentation maintenance and incremental formatting. The goal of the overall Ensemble project is the integration of a wide variety of media, including computer programs and dynamic media such as sound and...
Topics: DTIC Archive, CALIFORNIA UNIV BERKELEY COMPUTER SCIENCE DIV, *DOCUMENTS, *INPUT OUTPUT PROCESSING,...
The Remote-Terminal Emulator is a minicomputer-based system which generates message traffic for use in testing and evaluating large-scale, multi- terminal computer systems. This series of reports will describe the two Design Verification Models that were developed on Data General NOVA 800 minicomputers. This volume is a user's manual which contains the information necessary to prepare and run the software portions of the Remote-Terminal Emulator.
Topics: DTIC Archive, Suyemoto, T., MITRE CORP BEDFORD MA, *COMPUTER PROGRAMMING, *MINICOMPUTERS, DATA...
The purpose of the Validation Summary Report (VSR) is to identify individual FORTRAN language elements whose implementation does not conform to the language specifications defined in American Standard FORTRAN, X3.9-1966.
Topics: DTIC Archive, FEDERAL COBOL COMPILER TESTING SERVICE WASHINGTON D C, *FORTRAN, *COMPUTER PROGRAM...
There are existing wideband communications systems that were built using field programmable gate array (FPGA)- based software defined radio (SDR) designs. Despite the inherent advantages of these systems, some are functionally restricted by limited output bandwidth. This thesis was conceived in order to mitigate the restrictions imposed on such designs. This was accomplished by designing an FPGA-based SDR that can compress sampled intermediate frequency (IF) signals. The compression scheme used...
Topics: DTIC Archive, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *FIELD PROGRAMMABLE GATE ARRAYS, COMPUTER...
We describe a new shortest paths algorithm. Our algorithm achieves the same O(nm) worst-case time bound as Bellman-Ford algorithm but is superior in practice.
Topics: DTIC Archive, Goldberg, Andrew, STANFORD UNIV CA DEPT OF COMPUTER SCIENCE, *ALGORITHMS, *HEURISTIC...
The Users Manual describes each of the program in the Generalized Monitoring Facility (GMF), discusses input options required to run each program, and provides sample outputs generated by each program. The Generalized Monitoring Facility is delivered on a FILSYS SAVE tape. A description of the software is presented in section 2. Installation procedures for the GMF Monitor and guidance on how to run GMF can be found in section 5 of this manual.
Topics: DTIC Archive, Wallack,Barry, COMMAND AND CONTROL TECHNICAL CENTER WASHINGTON DC, *USER MANUALS,...
This Validation Summary Report (VSR) for the DECSYSTEM - 10 FORTRAN Compiler Version 5A (TOPS-10 Version 6.03A) provides a consolidated summary of the results obtained from the validation of the subject compiler against the 1966 FORTRAN Standard (X3.9-1966). The VSR is made up of several sections showing the discrepancies found. These include an overview of the validation which lists all categories of discrepancies; a section relating the categories of discrepancies to the language; and a...
Topics: DTIC Archive, FEDERAL COBOL COMPILER TESTING SERVICE WASHINGTON DC, *COMPUTER PROGRAM VERIFICATION,...