Advertisement

Research and Advances

Transparent-mode control procedures for data communication, using the American standard code for information interchange—a tutorial

This paper gives the considerations of Task Group X3.3.4 in the area of transparent-mode data communication control philosophy. The appearance of this paper was forecast (under the name of “second-level control”) in the earlier tutorial paper, “Control Procedures for Data Communications,” Task Group document X3.3.4.44, dated May 1964. The present paper elaborates upon solutions to the problems of transparency to the basic ASCII communication control characters, as outlined in the previous paper mentioned above. Moreover, it goes on to cover the additional control problems of handling material such as offline encrypted data or non-ASCII codes by means of systems providing complete character transparency. It does not cover concepts of transparency in which the normal character structure or modulation rate of a system may be abandoned. In conjunction with the earlier tutorial paper, this paper is expected to lead to a proposal for standardization of data communication control procedures using the American Standard Code for Information Interchange.
Research and Advances

The new program of work for the international standard vocabulary in computers and information processing

The Vocabulary Subcommittee of the International Standards Organization's Technical Committee on Computers and Information Processing (ISO/TC97/SC1) held its third meeting in New York City in May, 1964. (More precisely, this was the subcommittee's first meeting. Its earlier meetings in Geneva and Paris were as a Working Group.) The program of work agreed upon at the New York meeting marks a sharp reversal of SC1's earlier plans.
Research and Advances

Copyright aspects of computer usage

This paper is concerned with the question of what constitutes infringement of a copyright on a book or other nondramatic literary work when the work is fed into a computer and is indexed, analyzed, partially reprinted, or otherwise utilized by the computer to produce eye-readable output. The question of copyrightability of programs and infringement of copyrights on programs is also discussed. The paper is directed primarily to a discussion of the present law. Some aspects of the proposed new copyright law are also included. General recommendations are made with respect to the proposed revisions of the copyright law.
Research and Advances

Computer patent disclosures

Suppose a potentially very valuable experimental multi-computer system is being designed by you and your group. You feel you have made at least a system invention. In your Company scientists and engineers are responsible for initiating invention disclosures.
Research and Advances

Joint inventorship of computers

The term joint inventorship asks but does not necessarily answer the question, “Who is the true inventor of a computer?” I will try to show how “wrong” inventors are joined, how such improper joinder can be avoided, and its dangers. While the law permits the addition or subtraction of improperly joined inventors, it does not permit the substitution of one set of inventors for another set of inventors. Thus, despite corrective weapons, there are some pitfalls which must be avoided.

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More