August 1991 - Vol. 34 No. 8

August 1991 issue cover image

Features

Opinion

Revisiting computer security in the business world

In my first column (Communications, Apr. 1990) I discussed computer security in the business world. I remarked that whereas the military had always attached great importance to security, business managers regarded it as yet another demand on their budgets, and have required convincing about its importance. As a result, the military made most of the advances in research on computer security for a long time. They have evolved what is now a well-developed doctrine.
Opinion

Private life in cyberspace

I have lived most of my life in a small Wyoming town, where there is little of the privacy which both insulates and isolates suburbanites. Anyone in Pinedale who is interested in me or my doings can get most of that information in the Wrangler Café. Between them, any five customers could probably produce all that is known locally about me—including a number of items that are well known but not true. me—including a number of items that are well known but not true.
Research and Advances

Real-time knowledge-based control systems

This special section is the outgrowth of a workshop on real-time knowledge-based control systems, held during the 1990 national conference of the American Association for Artificial Intelligence (AAAI). The workshop was motivated by the recognition that constructing robotic systems capable of autonomous, flexible, intelligent behavior is an inherently interdisciplinary task. In particular, professionals from the fields of artificial intelligence (AI), control theory, process control and real-time scheduling were invited. To facilitate communication among these fields, the workshop organizers decided to focus on software design principles for real-time systems, and so sought out those who had built working systems and could express their experiences in terms of techniques they had tested and/or refuted.
Practice

A storage and access manager for ill-structured data

Database management systems are powerful tools for processing large volumes of structured, or normalized, data. Much of the data to be stored in computer systems, however, differs from normalized data in both its logical uses and the storage structure required for its effective management. For instance, Van Rijsbergen (1979) distinguishes database retrieval from information retrieval (IR)—the retrieval of references to text—by comparing the following logical characteristics of IR systems to database management systems: IR Systems employ partial (vs. exact) matching; they are built on an underlying probabilistic (vs. deterministic) model; they classify information on a polythetic (vs. monothetic) basis, and queries are incompletely (vs. completely) specified. Similarly, other forms of relatively ill-structured data such as semantic networks [15]—which require property inheritance, and production rules—which must be joined in logical chains also differ in their logical use from normalized record structures.

Recent Issues

  1. November 2024 CACM cover
    November 2024 Vol. 67 No. 11
  2. October 2024 CACM cover
    October 2024 Vol. 67 No. 10
  3. September 2024 CACM cover
    September 2024 Vol. 67 No. 9
  4. August 2024 CACM cover
    August 2024 Vol. 67 No. 8