Front Cover; Advances in Computers, Volume 29; Copyright Page; Contents; Contributors; Preface; Chapter 1. Models of Multilevel Computer Security; 1. Introduction; 2. Implementing Models; 3. Model-to-Specification Correspondence; 4. The Bell-LaPadula Model; 5. Database and Network Models; 6. Information Flow Models; 7. Conclusion; References; Chapter 2. Evaluation, Description and Invention: Paradigms for Human-Computer Interaction; 1. Introduction; 2. Human Factors Evaluation; 3. Cognitive Description; 4. Usability-Innervated Invention; 5. The Ecology of Computing; Acknowledgment; References.
1. Introduction2. Soviet Computing Before 1980: A Brief Summary; 3. Official Plans for the 1980s; 4. Hardware Development in the 1980s; 5. Perestroika and Soviet Computing; References; Auther Index; Subject Index; Contents of Previous Volumes.
5. A Brief History of Computer Chess Tournament Play6. The Rating of Chess Players; 7. The Relation Between Computer Speed and Program Strength; 8. On the Chess Skill of Chess Programmers; 9. Languages Used by Chess Programs; 10. Testing Chess Programs; 11. Debugging Chess Programs; 12. A Sample of Play: DEEP THOUGHT 0.02 (White) versus HITECH (Black); 13. Data on Programs, Computers, Languages, Authors, Affiliations, Etc.; 14. The International Computer Chess Association and the ACM's Computer Chess Committee; 15. Conclusions; References; Chapter 5. Soviet Computing in the 1980s.
Chapter 3. Protocol Engineering1. Introduction; 2 . Network Architecture; 3. Formal Models for Protocol Specification; 4. Protocol Validation; 5. Verification and Conformity Analysis; 6. Protocol Synthesis; 7. Timed Models and Performance Analysis; 8. Protocol Conversion; 9. Implementation and Conformance Testing; 10. Automated Protocol Design; 11. Conclusion; Acknowledgments; References; Chapter 4. Computer Chess: Ten Years of Significant Progress; 1. Introduction; 2. Search Techniques in Chess Programs; 3. Opening Books; 4. Endgame Play and Endgame Database.