• Publications
  • Influence
Theory of scheduling
TLDR
Reading theory of scheduling as one of the reading material to finish quickly to increase the knowledge and happiness in your lonely time. Expand
The Role of Work-in-Process Inventory in Serial Production Lines
TLDR
The behavior of lines buffered in this way is investigated and the distribution and quantity of work-in-process WIP inventory that accumulates is explored and design guidelines that should be useful in industrial practice are yielded. Expand
Some Tactical Problems in Digital Simulation
TLDR
This paper is concerned with the manner in which an investigation by simulated experimentation is conducted, after the model has been formulated and the computer program completed, and methods of improving the precision of results. Expand
User Recovery and Reversal in Interactive Systems
TLDR
A model for interactive systems is presented that allows recovery to be defined precisely and user and system responsibilities to be delineated and various implementation techniques for supporting recovery are described. Expand
An introduction to programming
4 First Programs 12 4.1 What is a program? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4.2 Learning programming is a challenge . . . . . . . . . . . . . .Expand
Some Problems of Digital Systems Simulation
TLDR
An attempt to describe characteristics common to many system simulations, and a discussion of some problems involved in the construction of a digital simulator; and the third concerns problems that arise in the use of such a simulator. Expand
On the implementation of security measures in information systems
TLDR
The security of an information system may be represented by a model matrix whose elements are decision rules and whose row and column indices are users and data items respectively, which is used to explain security features of several existing systems. Expand
Selective partial access to a database
TLDR
The possibility of granting something less than complete access to a specified field of a record to allow a user to perform various summary and statistical tasks over controlled fields without allowing identification of the exact value of a field in a particular record is concerned. Expand
...
1
2
3
4
5
...