Microsoft Research Blog

English

  1. An Assessment of the Remote Procedure Call Mechanism 

    October 2, 1992 | Andrew Birrell

    For more than ten years, many people (including myself) have been advocating the use of "Remote Procedure Calls" (RPC) as the primary technique for communication among the components of a distributed system. Many researchers have explored the design space for RPC, and they have writtenmany…

  2. Multiple Approaches to Robust Speech Recognition 

    October 1, 1992 | Fu-Hua Liu, Alex Acero, and Richard M. Stern

    As automatic speech recognition systems are finding their way into practical applications it is becoming increasingly clear that they must be able to accommodate a variety of acoustical environments. This paper describes two algorithms that provide robustness for automatic speech recognition systems in a fashion…

  3. Lessons learned from SUIT, the Simple User Interface Toolkit 

    October 1, 1992 | Randy Pausch, Matthew Conway, and Robert DeLIne

    In recent years, the computer science community has realized the advantages of GUIs (graphical user interfaces). Because high-quality GUIs are difficult to build, support tools such as UIMSs, UI Toolkits and Interface Builders have been developed. Although these tools are powerful, they typically make two…

  4. “Software Clercks (Clerks)” 

    September 1, 1992 | Mike Schroeder

    My candidate for the list of important paradigms for distributed computing is the concept of a "clerck". A clerck is software that provides distribution, replication, and location transparency to client programs (applications) in distributed systems. A clerck exports a service interface to a client. The…

  5. On-line Data Compression in a Log-structured File System 

    September 1, 1992 | Michael Burrows, Charles Jerian, Butler Lampson, and Timothy Mann

    We have incorporated on-line data compression into the low levels of a log-structured file system (Rosenblum’s Sprite LFS). Each block of data or meta-data is compressed as it is written to the disk and decompressed as it is read. The log-structuring overcomes the problems of…

  6. Pricing via processing or combatting junk mail 

    August 16, 1992 | Cynthia Dwork and Moni Naor

    We present a computational technique for combatting junk mail in particular and controlling access to a shared resource in general. The main idea is to require a user to compute a moderately hard, but not intractable, function in order to gain access to the resource,…

  7. Critique of the Lake Arrowhead Three 

    August 8, 1992 | Leslie Lamport

    For a number of years, I was a member of a committee that planned an annual workshop at Lake Arrowhead, in southern California. I was finally pressured into organizing a workshop myself. I got Brent Hailpern to be chairman of a workshop on specification and…

  8. The Certainty-Factor Model 

    August 5, 1992 | David Heckerman

    The certainty-factor (CF) model is a method for managing uncertainty in rule-based systems. Shortliffe and Buchanan (1975) developed the CF model in the mid-1970s for MYCIN, an expert system for the diagnosis and treatment of meningitis and infections of the blood. Since then, the CF…