A method is described to prevent the operator of an IBM Personal computer (PC) from 'keying ahead' of current activities in anticipation of the next system prompt or request. The system sometimes must prompt f...
详细信息
A method is described to prevent the operator of an IBM Personal computer (PC) from 'keying ahead' of current activities in anticipation of the next system prompt or request. The system sometimes must prompt for important information that should not be eligible for 'key ahead' by the operator. One such prompt is for a document name in the IBM Displaywriter program. An operator would not wish to name a document by accident.
This report presents a method of multitask programming which enables time sharing and parallel processing for pure logical treatment. In the major task, a soft timer is used for changing the priorities of called tasks...
详细信息
This report presents a method of multitask programming which enables time sharing and parallel processing for pure logical treatment. In the major task, a soft timer is used for changing the priorities of called tasks with a constant time interval, and consequently, another called task runs in each timer period. This program can be coded by FORTRAN using the task control subroutine library developed previously. Examples of the program which operates time sharing and parallel processing with three called tasks and execution results assuring scheduled operation are shown in detail.
A technique is described whereby a software utility program is used as a tool for servicing the IBM Series/1 Real-time programming System (RPS). The program, called the Storage Allocation Utility (SAU), maintains an i...
详细信息
A technique is described whereby a software utility program is used as a tool for servicing the IBM Series/1 Real-time programming System (RPS). The program, called the Storage Allocation Utility (SAU), maintains an in-storage table of currently allocated storage for a static partition's unprotected, protected, instruction or 2K-byte aligned dynamic storage.
An arrangement is shown which permits the operator of an IBM Personal computer (PC) to receive a Revisable Form document (L3 RFTDCA) from an outside source and convert it to a Displaywriter Text document, or take a Di...
详细信息
An arrangement is shown which permits the operator of an IBM Personal computer (PC) to receive a Revisable Form document (L3 RFTDCA) from an outside source and convert it to a Displaywriter Text document, or take a Displaywriter Text document and convert it to a Revisable-Form document to send to an outside source. A driver provides an operator/L3 Converter interface.
This paper gives an overview of the keyboard playing robot WABOT-2 and presents in some detail its supervisory system and the singing voice tracking subsystem. The WABOT-2 is an anthropomorphic robot which is made up ...
详细信息
This paper gives an overview of the keyboard playing robot WABOT-2 and presents in some detail its supervisory system and the singing voice tracking subsystem. The WABOT-2 is an anthropomorphic robot which is made up of four subsystems;a supervisory system, located functionally atop the four subsystems, has the function of monitoring and controlling the operation of the respective subsystems. The problems for implementation such as communication commands, codes of musical notes, and the diagnostics for a subsystem malfunction were investigated on the simulator. And the procedure of control was represented by rules as partial and independent knowledge for the purpose of future expansion of functions. The singing voice tracking subsystem detects deviations of singing voice in the accompaniment of the WABOT-2. Codes of musical notes are generated on-line and compared with the nominal score. This result is reflected in the replay as a change of key. Also from generated musical notes this system can guess a song sung by a person.
作者:
Bui, T.D.Mai ThanhConcordia Univ
Dep of Computer Science Montreal Que Can Concordia Univ Dep of Computer Science Montreal Que Can
For almost twenty years, the Ford-Johnson algorithm for sorting t items using comparisons was believed to be optimal. Recently, G. K. Manacher was able to show that the Ford-Johnson algorithm is not optimal for certai...
详细信息
For almost twenty years, the Ford-Johnson algorithm for sorting t items using comparisons was believed to be optimal. Recently, G. K. Manacher was able to show that the Ford-Johnson algorithm is not optimal for certain ranges of values of t. The authors present some new algorithms which achieve much stronger results than Manacher's algorithms.
This paper describes the modifications made to an existing Forth system to allow compilation and execution of source code beyond the normal dictionary space. High-level extensions are added to polyFORTH (a product of ...
详细信息
This paper describes the modifications made to an existing Forth system to allow compilation and execution of source code beyond the normal dictionary space. High-level extensions are added to polyFORTH (a product of FORTH, Inc. ) which runs on a DEC 11/23 plus computer. These extensions manipulate the Memory Management Unit (MMU) while source code is loading and provide for a linkage between definitions in high memory and the Forth dictionary. Using these extensions, most of the addressable memory can become extended dictionary space.
We show in this note the application of the rough set approach to decision tables analysis yields a simple method whether the decision table is deterministic or not, and we also demonstrate how such an approach can be...
详细信息
We show in this note the application of the rough set approach to decision tables analysis yields a simple method whether the decision table is deterministic or not, and we also demonstrate how such an approach can be used to decision tables and decision algorithms simplification.
Of prime concern in the architecture of a supercomputer is ensuring that the system contains noi bottlenecks that delay getting data to a processor or peripheral when that device is ready, and putting data into a form...
详细信息
Of prime concern in the architecture of a supercomputer is ensuring that the system contains noi bottlenecks that delay getting data to a processor or peripheral when that device is ready, and putting data into a format that the device can use. To this end, supercomputers employ four principles: specialization, concurrency, parallelism, and pipelining. By applying supercomputer principles to minicomputersystems, an I/O computer relieves the host CPU of all but the highest level data-transfer problems.
As part of its Joint Interoperability of Tactical Command and Control systems (JINTACCS) software development, detailed documentation of the computer-Assisted Message Preparation System (JCAMPS) as required by MIL-STD...
详细信息
As part of its Joint Interoperability of Tactical Command and Control systems (JINTACCS) software development, detailed documentation of the computer-Assisted Message Preparation System (JCAMPS) as required by MIL-STD 483 specifications is generated. Examples of the detailed documentation output, reflecting the required format, and the original sources from which the detailed documentation is generated are presented. The detailed documentation generation program deals only with files contained in abstract data structures. File input and output was greatly simplified. The software tools converted this project's documentation from a laborious, error-prone manual task using a text editor, a word-processor, and a typist to an error-free automated process. Ada packaging concepts, data structures, and I/O procedures allowed these routines to be written in a straight-forward manner. Ada provided the flexible language needed to successfully implement a complex programming task.
暂无评论