Data Stream Linkage Mechanism

نویسنده

  • J. Paul Morrison
چکیده

(DSLM), a program can be built by linking program modules to form a network through which data passes. The network is speciJed by the program designer using a mixture of pre-coded and custom coded modules. This linkage technique and the capabilities that result from it constitute an approach to programming that is radically diferent from conventional techniques. It can increase the productivity of programmers and can result in programs that are easier to understand and to maintain. This paper gives examples based on a specijic implementation of ' DSLM and describes some of the experience gained from the implementation over the last six years. Symptoms of a problem in conventional application development have been evident for a long time. Almost every programmer has experienced cost and schedule overruns, long debugging times, and difficult and costly maintenance of programs. Solutions that have been tried include various clerical and management disciplines and a number of novel programming languages and programming techniques, with varying degrees of success. ' It has been proposed that the problem could be addressed by applying engineering disciplines to application development. " A key concept referred to as design modularity was identified by R. B. Miller of IBM as early as 1966.3 It provided principles on which systems could be designed in terms of modules with well-defined functions. The intent was to allow easier construction of new systems and modification of existing ones. While there are doubtless many reasons for our inability to achieve this modularity in programming, a major factor identified by a number of writers is the control-flow orientation of conventional pr~gramming.~' This orientation is related to the fact that Copyright 1978 by International Business Machines Corporation. Copying is permitted without payment of royalty provided that (1) each reproduction is done without alteration and (2) the Journal reference and IBM copyright notice are included on the first page. The title and abstract may be used without further permission in computer-based and other information-service systems. Permission to republish other excerpts should be obtained from the Editor.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Linkage factors optimization of Multi-outputs of compliant mechanism using Response Surface

This paper presents a linkage factors synthesis and multi-level optimization technique for bi-stable compliant mechanism. The linkage synthesis problem is modeled as multiple level factors and responses optimization problem with constraints. The bi-stable compliant mechanism is modeled as a crank slider mechanism using pseudo-rigid-body model (PRBM). The model exerts the large deflection of fle...

متن کامل

Dynamic Behavior Analysis of a Planar Four-bar Linkage with Multiple Clearances Joint

 In practice, clearances in the joints are inevitable due to tolerances, and defects arising from design and manufacturing. In the presence of clearance at a joint, a mechanism gains some additional, uncontrollable degrees of freedom which are the source of error. Moreover, joints undergo wear and backlashes and so cannot be used in precision mechanisms. In this study, the dynamic behaviour of ...

متن کامل

Large-scale environmental controls on microbial biofilms in high-alpine streams

Glaciers are highly responsive to global warming and important agents of landscape heterogeneity. While it is well established that glacial ablation and snowmelt regulate stream discharge, linkage among streams and streamwater geochemistry, the controls of these factors on stream microbial biofilms remain insufficiently understood. We investigated glacial (metakryal, hypokryal), groundwater-fed...

متن کامل

Time and Space Complexity Reduction of a Cryptanalysis Algorithm

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

متن کامل

Hydrologic exchange and N uptake by riparian vegetation in an arid-land stream

Riparian zones can strongly influence the exchange of nutrients between streams and their watersheds. Most riparian studies have been done in mesic watersheds, which differ significantly from arid-land watersheds hydrologically. The goals of our work were to determine the strength and direction of hydrologic linkages between stream and riparian zone, and to estimate the extent of uptake of stre...

متن کامل

Time and Space Complexity Reduction of a Cryptanalysis Algorithm

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IBM Systems Journal

دوره 17  شماره 

صفحات  -

تاریخ انتشار 1978