The definitions of scheduling relations previously presented by the author are extended in this report to allow the translation of a relation net into an exact schedule. Time conditional conflicts in scheduling relation nets are detected and resolved by operating on extended versions of the bilateral implication and truth tables.

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *SCHEDULING, *MATHEMATICAL LOGIC

This report describes the technical problems associated with the design of wide bandwidth, low noise optical receivers for use within fiber optic communication systems. Noise model analysis is performed for three detection techniques using preamplifiers (resistive loading, transimpedance and high impedance). A Low Noise High Impedance Preamplifier Design is presented as well as a prototype Ultra High Gain Wide-Band Transimpedance Preamplifier. Component values are shown to allow easy...

Topics: DTIC Archive, Tenuta,G L, MITRE CORP BEDFORD MA

The theoretical performance of the antenna element for the 96-element receiving array of MITRE's High-Frequency, High-Resolution Experimental Site is analyzed. The antenna element consists of a monopole tower with a buried radial- wire ground screen of modest diameter. Each element is connected by a long buried coaxial cable to an associated receiver in one of three electronics shelters within the array. The analysis forms the basis for selecting the final design configuration of the monopole...

Topics: DTIC Archive, Lagace, R L, MITRE CORP BEDFORD MA

The Department of Defense (DoD) can foster dynamic, efficient, and innovative solutions for tomorrow s warfighter by structuring acquisition portfolios that deliver an integrated suite of capabilities. Such portfolios would permit execution of many core acquisition elements and processes at a level above the individual program to enable enterprise management, economies of scale, and faster capability deliveries. While large DoD programs navigate the acquisition life cycle individually, large...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *ACQUISITION, COMMERCE, LIFE CYCLES

This document describes the Fast Logic Circuit Test Assembly built to evaluate the system operating characteristics of nanosecond switching circuits which have been developed at The MITRE Corporation. The Test Assembly, which includes most of the classes of logic functions which might be encountered in a full scale serial or parallel computer, will also serve as a vehicle for evaluation of circuit reliability and for signal and power distribution methods. The Test Assembly includes two serial...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *COMPUTER LOGIC, COUNTING METHODS

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *NETWORK CENTRIC WARFARE, INTERNET

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *QUALITY ASSURANCE, *SOFTWARE ENGINEERING

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *INTELLIGENCE, *RECONNAISSANCE, *SURVEILLANCE, DETECTORS,...

The Knowledge-Based Software Assistant (KBSA) project has concluded its first research phase and is moving on to the second phase. This report describes a review conducted of: the short-term goals (as set out in the initial 1983 KBSA report) and how well they have been met, whether the mid-term goals should be reevaluated and how to proceed towards these mid-term goals. To facilitate integration of the various KBS facets, and to make effective use of available funding, reusable capabilities and...

Topics: DTIC Archive, Chase, Melissa, MITRE CORP BEDFORD MA, *COMPUTER PROGRAMS, INTEGRATION

The report considers the projection of spherical zone boundaries onto an image plane using the 'perspective projection'. Special cases of this type of mapping includes: the stereographic, the gnomonic, and the orthographic projections. In addition to proving that the image of any spherical zone boundary is a conic section, the formulation of the parameters of that conic section is given. An important aspect of the projection technique lies in the capability of having any point of the sphere as...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *PROJECTIVE GEOMETRY, *MAP PROJECTION, MAPPING

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *QUALITY ASSURANCE, *SOFTWARE ENGINEERING, STANDARDS

The symmetrical-but lossy-waveguide transmission cavity is analyzed with respect to resonant length, minimum and maximum insertion losses, and 3-db frequencies (loaded Q-factor). Losses are considered to originate both in the cavity proper and in the input and output discontinuities. A preferred representation of those discontinuities makes it possible effectively to lump all the various losses together. All the quantities of interest (resonant length, insertion losses and Q sub L-factor) are...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *TRANSMISSION LINES, CAVITY RESONATORS, MICROWAVES

Research shows that continuing competitive pressure applied during development and production leads to better industry performance, often at reduced cost. However, the entrenched practice of one-time competition for an entire program life-cycle often endows the winner with a very strong monopolistic power that lasts for decades. This paper describes continuous competition as leverage to acquire more effective results. It offers an alternative method for continuous competition-Multi-sourcing...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *COMPETITION, ACQUISITION, COMMERCE, CONTRACTS, PRODUCTION

A new and simple device, similar to an abacus, was invented by a Chinese mathematician; it is used for multiplication, division, and extracting square roots. The underlying idea is abstracted and generalized for possible application to contemporary computers in order to reduce computing time.

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *ANALOGS, NUMBER THEORY, COMPUTER LOGIC, GEOMETRY

PEST is a non-time-shared program which gives a user access to an editor and an assembler on PHOENIX, a computer developed by the MITRE corporation. PEST allows the user to enter, edit, assemble, load, debug, and execute a symbolic program.

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *COMPUTER PROGRAMMING, INSTRUCTION MANUALS, DIGITAL COMPUTERS

A linguistic analysis of the coordinate conjunction construction in English is given. It is shown that a standard transformational rule is insufficiently powerful to generate coordinate constructions correctly, and a broadening of linguistic theory in the form of a Principle for Conjunction is proposed. Grammatical rules are developed for the generation of a wide variety of coordinate constructions, and their place in the MITRE grammar of English is discussed.

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *ENGLISH LANGUAGE, GRAMMARS, LINGUISTICS, TRANSFORMATIONAL...

Text annotation is an expensive pre-requisite for applying data-driven natural language processing techniques to new datasets. Tools that can reliably reduce the time and money required to construct an annotated corpus would be of immediate value to MITRE's sponsors. To this end, we have explored the possibility of using active learning strategies to aid human annotators in performing a basic named entity annotation task. Our experiments consider example-based active learning algorithms that...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *NATURAL LANGUAGE, *TEXT PROCESSING, COST REDUCTION

This document presents a method of computing the coefficients of the transfer function of iterated or noniterated lumped electromagnetic delay lines. The method shows that the coefficients can be found by using Pascal's triangle for iterated delay lines.

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *ELECTROMAGNETISM, FREQUENCY SHIFT, PHASE SHIFT CIRCUITS

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *RISK MANAGEMENT, COMPUTER PROGRAMS, RISK, SYMPOSIA

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *OPERATIONS RESEARCH, MILITARY APPLICATIONS, SYMPOSIA,...

MI-3 is a primitive, interactive, one pass assembler which assembles in-core code for a family of microprogrammed computers based on an Interdata 3 (I-3) micromachine.

Topics: DTIC Archive, Cornelli, Robert W, MITRE CORP BEDFORD MA, *COMPUTER PROGRAMMING, COMPILERS, ASSEMBLY

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *COMPUTER PROGRAMS, *NAVAL PROCUREMENT, LESSONS LEARNED,...

Linear programs whose objective function can be separated into two parts are considered. The following problem is studied: given an optimal solution with respect to the total objective function, how does it have to be modified to change one part of the objective function by a certain amount and affect the other part as little as possible. The construction of an optimal simplex-tableau for the modified problem from the optimal simplextableau of the original problem is demonstrated. This can...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *LINEAR PROGRAMMING, FUNCTIONS(MATHEMATICS), OPTIMIZATION,...

Budget reductions will require the Department of Defense (DoD) to make difficult decisions on how to invest limited resources and make current programs more affordable. Traditional acquisition methods are lengthy, serial, gate-like processes, built around stringent specifications and arms-length relationships. By contrast, Challenge-Based Acquisition (ChBA) utilizes transparent, accessible, concrete challenges to satisfy warfighter needs and stimulate industry innovation. Challenges enable DoD...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *ACQUISITION, *MANAGEMENT, BUDGETS, CONTRAST, DECISION MAKING,...

The MITRE syntactic analysis procedure for transformational grammars has been used to process sentences on-line in a display-oriented mode as well as off-line. This report describes additions to the program structure and the grammar made since the last report and presents the results of experiments with the procedure.

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *COMPUTER PROGRAMMING, *TRANSFORMATIONAL GRAMMARS, *SYNTAX,...

One protocol (called the primary protocol) is independent of other protocols (jointly called the secondary protocol) if the question whether the primary protocol achieves a security goal never depends on whether the secondary protocol is in use. In this paper, we use multiprotocol strand spaces to prove that two cryptographic protocols are independent if they use encryption in non-overlapping ways. This theorem (Proposition 7.2) applies even if the protocols share public key certificates and...

Topics: DTIC Archive, Guttman, Joshua D, MITRE CORP BEDFORD MA, *COMMUNICATIONS PROTOCOLS, ELECTRONIC...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *COMPUTER PROGRAMS, DATA PROCESSING SECURITY, SYMPOSIA,...

Brightness of the sky background due to lunar phase and location can dramatically affect the limiting magnitude of astronomical detectors. Formerly, theoretical models have attained limited data sets with 10-20% differences between model and observation. This paper compares and contrasts previous investigations with over a million data points collected from various GEODSS sites located around the world, and attempts to refine predictive modeling of sky brightness for use in scheduling, as well...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *SKY BRIGHTNESS, DEEP SPACE, SPACE SURVEILLANCE, TELESCOPES

Topics: DTIC Archive, Guttman, Joshua D, MITRE CORP BEDFORD MA, *CRYPTOGRAPHY, BUNDLES, COMMUNICATIONS...

The Masked Search Program is a static trace and can be used for debugging or modifying a 7090 program. The report describes the program and how it is used in most cases. Additional information is provided to cover unusual occurrences during the program run.

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *COMPUTER PROGRAMMING, ERRORS, MEMORY DEVICES, SEARCH THEORY

When analyzing cryptographic protocols, one often finds that there is really only one thing that can happen in a run of the protocol, or at worst a small number of different things. For instance, every execution of the familiar Needham-Schroeder-Lowe protocol consists of a matching pair consisting of a run of the initiator and one of the responder; no other interaction is possible. We call such a collection of local executions by honest principals a shape. In this paper, we use the strand space...

Topics: DTIC Archive, Doghmi, Shaddin F, MITRE CORP BEDFORD MA, *BUNDLES, *COMMUNICATIONS PROTOCOLS,...

The missions of the U.S. military require great operational adaptability and depend critically on obtaining information support via networks. The information technology (IT) that enables these networks typically takes the form of single, large, releasable to US only systems that are difficult to adapt during a mission. This will present a growing problem in the expected operating environment for U.S. forces, which will feature coalition actions in which all partners operate at the same security...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *INFORMATION SYSTEMS, ADAPTIVE SYSTEMS, ECOSYSTEMS, SYSTEMS...

CORP BEDFORD MASSSDBP - A Small Data Base Package.Technical rept., Amory,W. ;MTR-2403-Vol-1F19628-71-C0002AF-515AESDTR-72-284(*data processing, networks), design, computer programmingpl/1 programming language, ibm 370 computers, ibm 360 computers, *data basesA collection of computer programs, documentation, procedures and data base design criteria have been packaged for handling small to medium-sized data bases. This first volume of the series gives a system overview of the resulting data base...

Topics: DTIC Archive, Amory, W, MITRE CORP BEDFORD MA, *DATA PROCESSING, COMPUTER PROGRAMMING, NETWORKS

This is the final report for Data Capture During Strong Angel (DARPA contract DAAB07-99-C-C201), describing MITRE's evaluation of the CommandNet collaborative groupware tool used during RIMPAC-2000, a Third Fleet multinational exercise that included Strong Angel, a humanitarian aid and disaster relief (HA/DR) scenario involving both military and non-government organizations (NGO). During this effort, MITRE worked in partnership with researchers at the Center for the Management of Information at...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *DATA MANAGEMENT, *COLLABORATIVE TECHNIQUES, DISASTERS, FLEET...

The relative motion between an earth-based radar and a satellite object is of interest for radar- tracking studies, signature simulation studies, and for developing inverse scattering techniques. Here, the motion analysis is accomplished with elementary vector algebra. This approach results in considerable simplification of the final equations and relationships.

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *RADAR TRACKING, ALGEBRA, MOTION, SIMULATION, VECTOR ANALYSIS

Some general formulas are summarized for maximum theoretical accuracy of radar measurements on a target in the presence of additive white Gussian noise. The formulas are specialized to some particular cases of interest.

Topics: DTIC Archive, MANASSE, R, MITRE CORP BEDFORD MA, *RADAR, VELOCITY, MATHEMATICAL ANALYSIS, ERRORS,...

Provenance information is inherently affected by the method of its capture. Different capture mechanisms create very different provenance graphs. In this work, we describe an academic use case that has corollaries in offices everywhere. We also describe two distinct possibilities for provenance capture methods within this domain. We generate three data sets using these two capture methods: the capture methods run individually and a trace of what an omniscient capture agent would see. We...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *COMPUTER SECURITY, *DATA ACQUISITION, *INFORMATION SECURITY,...

This supplement to TDR-63-159 describes the corpus initially used for experiments with the Statistical Association Procedures for Message Content Analysis Program. The ASTIA TABs served as a source from which the initial experimental corpus was drawn.

Topics: DTIC Archive, Spiegel, J, MITRE CORP BEDFORD MA, *STATISTICAL ANALYSIS, *MESSAGE PROCESSING,...

The Identity-Based Internet Protocol (IBIP) Network project is experimenting with a new enterprise oriented network architecture using standard IP version 6 protocol to encode user and host identity (ID) information into the IP address. Our motivation is to increase our security posture by leveraging identity, reducing our threat exposure, enhancing situational understanding of our environment, and simplifying network operations. Our current implementation plan uses credentials from the Common...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *NETWORK ARCHITECTURE, COMMUNICATIONS PROTOCOLS,...

The technical work reported here results from direct support of systems engineering or systems planning projects, and some relates to research expected to have a broad application to existing problems or to the advancement of science and technology. The research and experimentation activities are divided into nine technological areas: Sensor systems; communications systems; environmental factors; computer and display technology; systems design laboratory; information processing techniques;...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *SYSTEMS ENGINEERING, STATE OF THE ART, WAVE PROPAGATION

Some changes in operations and technology will be introduced in the post-1975 TACS. Among these will be the use of digital secure voice and data management automation. To permit the development of Air Force ground environment communications requirements for the TACS of this era, estimated total point-to- point data rates are needed. The anticipated TACS operations, with some expected changes, are modeled. The resulting information exchange data rates for the total ground environment is about...

Topics: DTIC Archive, Babineau, Emile A, MITRE CORP BEDFORD MA, *AUTOMATION, DATA PROCESSING EQUIPMENT,...

The ultimate objective of our investigations was to establish a foundation for improving how acquisition performance is managed. Our project looked broadly across the four principles highlighted in NDAA Section 804 and subsequently focused on the challenges that program managers might face in measuring adoption and impact of the user engagement principle. We discovered that the principles are interrelated and that an understanding of how acquisition success will be measured is critical to...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *ACQUISITION, LESSONS LEARNED, USER NEEDS, MANAGEMENT, CODING,...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *SYSTEMS ENGINEERING, AGILE SOFTWARE DEVELOPMENT, CASE...

The Information System Design and Optimization System (ISDOS), under development at the University of Michigan, offers automated assistance for the design of information processing systems (IPS). The Problem Statement Language (PSL) and Problem Statement Analyzer (PSA) are the components of ISDOS which are used for IPS requirements definition and analysis. This report describes the ISDOS project in general and the concepts, capabilities, and use of PSL/PSA. The report also describes future...

Topics: DTIC Archive, Fortin, R J, MITRE CORP BEDFORD MA, *DATA PROCESSING, PROGRAMMING LANGUAGES,...

This approach calls for establishing a small shared vocabulary that covers only the data to be exchanged in the present spiral, thereby minimizing the total amount of vocabulary learning required. The participants focus on the intersection of their information needs, not the union of those needs.1 This loose-coupler shared vocabulary does not have to be adopted internally by the participating applications; it is instead used as an intermediate exchange format, or as a reference schema for data...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *INFORMATION SYSTEMS, *MESSAGE PROCESSING, INFORMATION...

A small number of rocket boosters are to be deployed in a military system on a standby basis. The system's performance specifications require that in time of need at least Q missiles fire successfully with gamma probability. The reliability of these missiles is not known for certain, but is described, by the analyst, in terms of a subjective unimodal probability distribution. A technique is described in this report to provide the answer to two questions that can be raised about the situation...

Topics: DTIC Archive, Sobel, S A, MITRE CORP BEDFORD MA, *BOOSTER ROCKET ENGINES, ECONOMICS, PROBABILITY

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *INFORMATION SYSTEMS, COMMAND AND CONTROL SYSTEMS,...

The bibliography provides an indexed, annotated list of publications related to the field of microprogramming, from the introduction of the term in 1951 to the present time.

Topics: DTIC Archive, Berschback, Thomas P, MITRE CORP BEDFORD MA, *COMPUTER PROGRAMMING, ABSTRACTS,...

PAT is a computer language of the macro-assembly type. The program, which translates PAT into computer code, is designed to be used not only as a compiler of programs, but as a symbolic interface between a user and a computer. In this latter capacity, it can serve to interpret commands and accept command definitions for such programs as a text editor, on-line debugger, or simulated desk calculator. The language and the translator have been designed to allow the structure of the translator...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *COMPUTER PROGRAMMING, COMPILERS, CONTROL SEQUENCES,...

Least squares approximations obtain parameters with a variance lower than those of the data from which they are obtained. A least squares polynomial approximation to observations may be used to obtain 'smoothed' values of the observations or to make predictions. The reduction of the variance achieved by this process is determined for several special cases. Some properties of the Gram-polynomials necessary for the analysis are derived. (Author)

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *LEAST SQUARES METHOD, *POLYNOMIALS, ANALYSIS OF VARIANCE,...