ACM '84Pub Date : 1985-09-01DOI: 10.1145/800171.809657
C. Hammer
{"title":"Beyond the data processing horizon","authors":"C. Hammer","doi":"10.1145/800171.809657","DOIUrl":"https://doi.org/10.1145/800171.809657","url":null,"abstract":"The transition to the post-industrial society is characterized by the introduction of electronic computer-communication systems whose mind- amplifying powers have made data and information our most precious resource. Realtime services provide knowledge workers with access to powerful information systems, in offices, factories, laboratories, class rooms and even the home. Spectacular hardware progress has been attributed to the “miracle of the chip”. We find such chips at the heart of computers, communication devices, and input/output peripherals with whose help we perform such functions as packet-switched communications, distributed data bases, and computer networking. Powerful software engineering tools brought into existence new and improved programming languages, powerful computer operating systems, and a plethora of applications programs.\u0000 These advances have also created problems. As the data trail grew, citizens voiced their concern about privacy protection of these data. Computer security and the design of trusted computer bases are expected to stem the rising tide of reported “computer crimes”. Electronic Funds Transfer Systems are used to move astronomical sums of “virtual money” over worldwide networks; “virtual books” and other electronic communications are being read widely and instantaneously without the need for hard copy; mechanical slide rules and mechanical watches have gone the way of the Dodo Bird after being replaced by their electronic offspring. Their is even talk of impending changes in the structures of our institutions as a consequence of the pervasive transfer of this new technology into the hands of everyone.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131833946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1984-11-07DOI: 10.1145/800171.809613
F. Buckley
{"title":"The IEEE Software Engineering standards process","authors":"F. Buckley","doi":"10.1145/800171.809613","DOIUrl":"https://doi.org/10.1145/800171.809613","url":null,"abstract":"Software Engineering has emerged as a field in recent years, and those involved increasingly recognize the need for standards. As a result, members of the Institute of Electrical and Electronics Engineers (IEEE) formed a subcommittee to develop these standards. This paper discusses the ongoing standards development, and associated efforts.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1984-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130012564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809648
T. Winograd
{"title":"The ethics of macines which mimic people","authors":"T. Winograd","doi":"10.1145/800171.809648","DOIUrl":"https://doi.org/10.1145/800171.809648","url":null,"abstract":"In presenting machines as “intelligent” we produce an illusion which may be beneficial, may lead to breakdown in the interaction, or may be used by parties to deceive and exploit others.\u0000 The following quote (from a researcher at a major computer firm) is a bit extreme, but makes it clear the concern clear.\u0000 “From my point of view, natural language processing is unethical for one main reason: It plays on the central position which language holds in human behavior. I suggest that the deep involvement Weizenbaum found some people to have with ELIZA, is due to the intensity with which most people react to language in any form. When a person sees a lingusitic utterance in any form, the person reacts, much as a dog reacts to an odor. We are creatures of language .... Since this is so, it is my feeling that baiting people with strings of characters (tokens) clearly intended by someone to be interpreted as SYMBOLS, is as much misrepresentation as would be your attempt to sell me property for which you had a false deed. In both cases, an attempt is made to encourage someone to believe that something is a thing other than what it is, AND, only one party in the interaction is aware of the deception.”\u0000 This talk will examine the ethical and practical choices in developing machines which mimic human behavior.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115670519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809622
B. Szymanski, N. Prywes, E. Lock, A. Pnueli
{"title":"On the scope of static checking in definitional languages","authors":"B. Szymanski, N. Prywes, E. Lock, A. Pnueli","doi":"10.1145/800171.809622","DOIUrl":"https://doi.org/10.1145/800171.809622","url":null,"abstract":"The paper concerns the use in software development of a class of very high level languages characterized as definitional, where a specification of a program consists of assertions expressed as conditional equations. As compared to logic programming, where assertion are expressed in the form of Horn clauses, definitional languages are more amenable to efficient compilation. Also, use of equations is a natural way of expressing mathematical models in science, engineering and economics, where computer simulation of such models is often required. Finally, definitional languages are well suited for programming dataflow machines, another important building block in a Fifth Generation Project. Thus, in many applications definitional languages are preferred choice for programming new generation computers.\u0000 In using definitional languages to develop programs, a user relies heavily on static analysis during the compilation stage of development, as compared to the traditional practice of relying much more extensively on dynamic analysis performed by execution of the program with test data. As this seems to be the common trend in development of all software tools for Fifth Generation Computers, the limits of static checking are investigated for definitional languages in this paper.\u0000 A comprehensive approach to selecting and implementing automatic checks in the compiler is proposed. The checking methodology consists of representing the specification of a program by a directed graph and propagating various attributes throughout the entire graph. The choice of attributes and checks depends greatly on the types of errors that users are prone to make. This approach is described in the context of the MODEL language and compiler. The paper reports also on an experiment to evaluate the effectiveness of various checking methods incorporated in the compiler and on reliance of static vs dynamic methods of checking. The types of checking constructed were: syntax analysis, ambiguity in naming, completeness of definitions, data type consistency, dimensionality (corresponds to nesting of loops), ranges of dimensions (corresponds to loop terminations) and circular logic.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":" 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120935927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809639
L. Chalmers
{"title":"User identification, access control, and audit requirements","authors":"L. Chalmers","doi":"10.1145/800171.809639","DOIUrl":"https://doi.org/10.1145/800171.809639","url":null,"abstract":"Good computer security depends upon knowing who is using the system and managing how each individual is able to access the information on the system. The next generation of computer should build in the kind of controls which are often added on to today's systems. This session will discuss the objectives for positively identifying system users, controlling their use of computerized resources, and providing accountability for users who are authorized and for those who attempt to exceed their authority.\u0000 Traditionally, user identification depends upon an identification code (ID) and a password. Password security has proven to be weak: where users are allowed to select their own passwords, they tend to select ones that are easily guessed, and where passwords are assigned, the users tend to write them down. Future user identification systems should expand into something a user has (e.g. a badge) or something a user is (e.g. fingerprints). Signature verification is a technology which is worth improving since it offers good security within existing legal and social contexts. Ideally, user identification and authentication should be based upon a combination of two or more technologies.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126835840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809597
W. Clancey
{"title":"Knowledge acquisition for classification expert systems","authors":"W. Clancey","doi":"10.1145/800171.809597","DOIUrl":"https://doi.org/10.1145/800171.809597","url":null,"abstract":"Expert systems are generally described by a mixture of terms that confuse implementation language with knowledge structure and the search process. This confusion makes it difficult to analyze new problems and to derive a set of knowledge engineering principles. A rigorous, logical description of expert systems reveals that a small set of terms and relations can be used to describe many rule-based expert systems. In particular, one common method for solving problems is by classification—heuristically relating data abstractions to a preenumerated network of solutions. This model can be used as a framework for knowledge acquisition, particularly in the early stages for organizing the expert's vocabulary and decomposing problems.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124182221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809599
Jon R. Wright, F. Miller, G. V. E. Otto, Elizabeth M. Siegfried, Gregg T. Vesonder, J. E. Zielinski
{"title":"ACE: Going from prototype to product with an expert system","authors":"Jon R. Wright, F. Miller, G. V. E. Otto, Elizabeth M. Siegfried, Gregg T. Vesonder, J. E. Zielinski","doi":"10.1145/800171.809599","DOIUrl":"https://doi.org/10.1145/800171.809599","url":null,"abstract":"ACE (Automated Cable Expertise) is a knowledge-based expert system that provides trouble-shooting and diagnostic reports for telephone company managers. Its application domain is telephone cable maintenance. ACE departs from standard expert system architecture in that a separate data base system is used as its primary source of information. ACE designers were influenced by the R1/XCON project, and ACE uses techniques similar to those of R1/XCON. This paper reports the progress of ACE as it moves out of experimentation and into a live software environment, and characterizes it in terms of current expert system technology.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124382178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809663
Sharon C. Adler
{"title":"Delivering the word—integrating publications technologies","authors":"Sharon C. Adler","doi":"10.1145/800171.809663","DOIUrl":"https://doi.org/10.1145/800171.809663","url":null,"abstract":"The panelists will provide a concise overview describing the role of the Standard Document Markup Metalanguage in modern integrated, automated publication processing systems. The Metalanguage is being developed concurrently within the American National Standards Institute (ANSI) Task Group X3J6.1 and the International Organisation for Standardisation (ISO) Working Group TC97/SC/18/WG8. The main thrust of the Metalanguage is to allow documents to be created by an author in a form which allows interchange across a broad range of dissimilar processing systems or devices. All types of documents may be handled, including office documents, books and journals, and technical documentation. These documents may be generated in any sector—academic, commercial, governmental, or industrial.\u0000 The rationale for the basic premise of the Standard Document Markup Metalanguage—separation of form and content—will be established. The application of the logical (editorial) structure of a document will be shown. Structure designation is accomplished with explicit, unambiguous, and simple markup codes for each editorial element included in a given document. The process by which the generation of multiple, different output product forms (e.g., photocomposed pages, databases, online documentation, videotex, etc.) from the same coded source file will be described.\u0000 The panelists will also discuss how the standard may be implemented in various environments.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126258005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809619
Alexis Koster
{"title":"Compiling prolog programs for parallel execution on a cellular machine","authors":"Alexis Koster","doi":"10.1145/800171.809619","DOIUrl":"https://doi.org/10.1145/800171.809619","url":null,"abstract":"This paper investigates features of a PROLOG compiler for Mago's cellular machine. The compiler generates parallel FFP (Formal Functional Programming) code. Hence high efficiency in the execution of PROLOG programs can be achieved on this machine, owing to the almost unbounded parallelism it can accommodate.\u0000 Techniques for implementing the parallel evaluation of the clauses of a relation (OR parallelism) are given. Problems in the exploitation of the parallel evaluation of a conjunction of goals (AND parallelism) are discussed. An FFP representation of the run-time environment of PROLOG is given. It is based on a previously published FFP implementation of unification. It allows matching of arguments through unification in linear time and space.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809667
Tim Leso
{"title":"Modern educational techniques - high tech and the traditional approach","authors":"Tim Leso","doi":"10.1145/800171.809667","DOIUrl":"https://doi.org/10.1145/800171.809667","url":null,"abstract":"Personal computers are enhancing the teaching techniques that are currently being used in classrooms and laboratories. They also possess the potential to transform the dormitories and other homework units into new forms of learning centers. Here at The Altoona Campus of The Pennsylvania State University, new technology and the traditional approach are being merged, tested, and accepted by students, faculty, and administrators as modern educational techniques leading into the 1990s. Typifying these techniques is a case study of a complex and tedious teaching task of instructing a novice to design a “shape table” and implement a program that personally demonstrates the color graphics capability of the APPLE Personal Computer and provides a fundamental understanding of the concepts of computer graphics.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"617 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134452867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}