skip to main content
article
Free access

Programming semantics for multiprogrammed computations

Published: 01 March 1966 Publication History
  • Get Citation Alerts
  • Abstract

    The semantics are defined for a number of meta-instructions which perform operations essential to the writing of programs in multiprogrammed computer systems. These meta-instructions relate to parallel processing, protecting of separate computations, program debugging, and the sharing among users of memory segments and other computing objects, the names of which are hierarchically structured. The language sophistication contemplated is midway between an assembly language and an advanced algebraic language.

    References

    [1]
    DESMONDE, W. H. Real-Time Data Processing Systems: Introductory Concepts. Prentice-HMl, Englewood Cliffs, N. J., 1964.
    [2]
    HAMLIN, J .E . A generM description of the National Aeronautics and Space Administration real time computing complex. Proc. ACM 19th Nat. Conf., Philadelphia, 1964, pp. 2-1 to 2-22.
    [3]
    FANO, R. M. The MAC system: the computer utility approach. IEEE Spectrum 2 (Jan. 1965), 56-64.
    [4]
    DENNIS, J. B., AND GLASEE, E. The structure of on-line information processing systems. Information Systems Sciences: Proc. Second Cong., Spartan Books, Baltimore, 1965, pp. 1-11.
    [5]
    ILIFFE, J. K., AND JODEIT, J. G. A dynamic storage allocation scheme. Comput. J. 5 (Oct. 1962), 200-209.
    [6]
    GREENFIELD, M. N. FACT segmentation. AFIPS Conf. Proc. 21, Spartan Books, Baltimore, 1962, pp. 307-315.
    [7]
    HOLT, A.W. Program organization and record keeping for dynamic storage allocation. Comm. ACM 4 (Oct. 1961), 422-431.
    [8]
    DENNIS, Z. B. Segmentation and the design of multiprogrammed computer systems. J. ACM 12 (Oct. 1965), 589-602.
    [9]
    GLASER, E., COULEUR, J., ANn OLIVER, O. System design of a computer for time-sharing applications. AFIPS Conf. Proc. 28, Spartan Books, Baltimore, 1965, p. 197-202.
    [10]
    FORGIE, J.W. A time- and memory-sharing executive program for quick-response, on-line applications. AFIPS Conf. Proc. 28, Spartan Books, Baltimore, 1965, p. 599-609.
    [11]
    COMFORT, W.T. A computing system design for user service. AFIPS Conf. Proe. 28, Spartan Books, Baltimore, 1965, p. 619-626.
    [12]
    McCuLLOUGH, J. D., SPEIERMAN, K. H., AND ZURCHER, F. W. A design for a multiple user multiprocessing system. AFIPS Conf. Proc. 28, Spartan Books, Baltimore, 1965, p. 611-617.
    [13]
    DENNIS, Z. B. Program structure in a multi-access computer. Tech. Rep. No. MAC-TR-11, Proj. MAC, MIT, Cambridge, Mass., 1964.
    [14]
    CONWAY, M. A multiprocessor system design. AFIPS Conf. Proc. 24, Spartan Books, Baltimore, 1963, pp. 139-146.
    [15]
    CRISMAN, P. (ED.) The Compatible Time-Sharing System: A Programmer's Guide. MIT Press, Cambridge, Mass., 2d ed., 1965, sec. AD. 2.
    [16]
    HoslEn, W. A. Pitfalls and safeguards in real-time digital systems with emphasis on programming. IRE Trans. EM-8 (June 1961), 99-115.
    [17]
    McCARTHY, J., CORBATO, F. J., AND DAGGETT, M.M. The linking segment subprogram language and linking loader. Comm. ACM 6 (July 1963), 391-395.
    [18]
    MIT COMPUTATION CENTER. The Compatible Time-Sharing System: A Programmer's Guide. MIT Press, Cambridge, Mass., 1st ed. 1963.
    [19]
    DALEY, R. C., AND NEUMAN, P. G. A general purpose file system for secondary storage. AFIPS Conf. Proc. 28, Spartan Books, Baltimore, 1965, p. 213-229.

    Cited By

    View all
    • (2024)Qualifying System F<:: Some Terms and Conditions May ApplyProceedings of the ACM on Programming Languages10.1145/36498328:OOPSLA1(583-612)Online publication date: 29-Apr-2024
    • (2024)Effectful Software ContractsProceedings of the ACM on Programming Languages10.1145/36329308:POPL(2639-2666)Online publication date: 5-Jan-2024
    • (2024)Cerise: Program Verification on a Capability Machine in the Presence of Untrusted CodeJournal of the ACM10.1145/362351071:1(1-59)Online publication date: 11-Feb-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 9, Issue 3
    March 1966
    116 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/365230
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 March 1966
    Published in CACM Volume 9, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)579
    • Downloads (Last 6 weeks)54

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Qualifying System F<:: Some Terms and Conditions May ApplyProceedings of the ACM on Programming Languages10.1145/36498328:OOPSLA1(583-612)Online publication date: 29-Apr-2024
    • (2024)Effectful Software ContractsProceedings of the ACM on Programming Languages10.1145/36329308:POPL(2639-2666)Online publication date: 5-Jan-2024
    • (2024)Cerise: Program Verification on a Capability Machine in the Presence of Untrusted CodeJournal of the ACM10.1145/362351071:1(1-59)Online publication date: 11-Feb-2024
    • (2024)Implementing the principle of least administrative privilege on operating systems: challenges and perspectivesAnnals of Telecommunications10.1007/s12243-024-01033-5Online publication date: 16-May-2024
    • (2023)Endoprocess: Programmable and Extensible Subprocess IsolationProceedings of the 2023 New Security Paradigms Workshop10.1145/3633500.3633507(92-101)Online publication date: 18-Sep-2023
    • (2023)GuaNary: Efficient Buffer Overflow Detection In Virtualized Clouds Using Intel EPT-based Sub-Page Write Protection SupportProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/36267877:3(1-26)Online publication date: 7-Dec-2023
    • (2023)First steps in verifying the seL4 Core PlatformProceedings of the 14th ACM SIGOPS Asia-Pacific Workshop on Systems10.1145/3609510.3609821(9-15)Online publication date: 24-Aug-2023
    • (2023)TreeSLS: A Whole-system Persistent Microkernel with Tree-structured State Checkpoint on NVMProceedings of the 29th Symposium on Operating Systems Principles10.1145/3600006.3613160(1-16)Online publication date: 23-Oct-2023
    • (2023)SEAL: Capability-Based Access Control for Data-Analytic ScenariosProceedings of the 28th ACM Symposium on Access Control Models and Technologies10.1145/3589608.3593838(67-78)Online publication date: 24-May-2023
    • (2023)Capacity: Cryptographically-Enforced In-Process Capabilities for Modern ARM ArchitecturesProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623079(874-888)Online publication date: 15-Nov-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media