ACM '84最新文献

筛选
英文 中文
Dialogue management in the personal sequential inference machine (PSI) 个人顺序推理机(PSI)中的对话管理
ACM '84 Pub Date : 1900-01-01 DOI: 10.1145/800171.809666
Junichiro Tsuji, Yutaka Iima, S. Tojo, Shoji Enomoto
{"title":"Dialogue management in the personal sequential inference machine (PSI)","authors":"Junichiro Tsuji, Yutaka Iima, S. Tojo, Shoji Enomoto","doi":"10.1145/800171.809666","DOIUrl":"https://doi.org/10.1145/800171.809666","url":null,"abstract":"PSI (Personal Sequential Inference Machine) is being developed as a research tool for the FGCS (Fifth Generation Computer Systems) project, and SIMPOS (Sequential Inference Machine's Programming and Operating System) is also under development.\u0000 In this paper, we present the dialogue management component of SIMPOS. We describe and discuss the background, design, implementation, and future at our work. The window system and the Coordinator, along with the bitmapped display and mouse cursor controls, are the primary means of managing the dialogue between the user and SIMPOS.\u0000 We assume the users of PSI to be computer professionals, and dialogue management is being designed accordingly. High performance, low overhead, and allowances for customization and expansion are among our design and implementation goals. The entire system is implemented in ESP (Extended Self-contained Prolog), an enhanced logic programming language incorporating an object/class methodology similar to that of Smalltalk-80.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134310861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge representation and inference control of SPERIL-II SPERIL-II的知识表示与推理控制
ACM '84 Pub Date : 1900-01-01 DOI: 10.1145/800171.809602
H. Ogawa, K. Fu, James T. P. Yao
{"title":"Knowledge representation and inference control of SPERIL-II","authors":"H. Ogawa, K. Fu, James T. P. Yao","doi":"10.1145/800171.809602","DOIUrl":"https://doi.org/10.1145/800171.809602","url":null,"abstract":"SPERIL-II is an expert system for damage assessment of existing structures. Fuzzy sets for imprecise data and Dempster and Shafer's theory for combining fuzzy sets with certainty factors are used in an inexact inference. Since the process of the damage assessment is quite complex, metarules are used to control the inference in order to improve the effectiveness and reliability of results. The metarules in SPERIL-II are represented in logic form with emphases on the explicit representation of the selection of the rule group and the suitable inference method.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131772022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Application generators: Ideas for programming language extensions 应用程序生成器:编程语言扩展的想法
ACM '84 Pub Date : 1900-01-01 DOI: 10.1145/800171.809609
E. Horowitz, A. Kemper, B. Narasimhan
{"title":"Application generators: Ideas for programming language extensions","authors":"E. Horowitz, A. Kemper, B. Narasimhan","doi":"10.1145/800171.809609","DOIUrl":"https://doi.org/10.1145/800171.809609","url":null,"abstract":"The continued development of higher order programming languages has not yielded major productivity improvements in the software development process. One often mentioned mechanism for achieving significant orders of improvement are application generators, such as RAMIS, NOMAD, and FOCUS. These systems have been applied to data intensive business applications with phenomenal success. The purpose of this paper is to present the basic components of application generators and show why they yield such large productivity increases in the EDP environment. We investigate the meaning of nonprocedural programming and show how it exists in current application generators. Then we analyze the possibility of extending application generators so that they may be used for non-edp type applications.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131935510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The emerging technology of CAD/CAM 新兴的CAD/CAM技术
ACM '84 Pub Date : 1900-01-01 DOI: 10.1145/800171.809635
L. Lichten
{"title":"The emerging technology of CAD/CAM","authors":"L. Lichten","doi":"10.1145/800171.809635","DOIUrl":"https://doi.org/10.1145/800171.809635","url":null,"abstract":"Computer-Aided Design and Manufacture (CAD/CAM) represents a merging of technological advances in computer hardware and software with pressing needs in manufacturing industries. Integrated manufacturing systems--from computer graphics-aided design through engineering analysis and automated fabrication--are only now beginning to fulfill nearly twenty-five-year old promises of increased production efficiency. This paper summarizes CAD/CAM's evolution and its current state and then describes some areas that will experience significant change in the next decade.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"98 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132443866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The design of the Dipmeter Advisor system 测角仪系统的设计
ACM '84 Pub Date : 1900-01-01 DOI: 10.1145/800171.809598
Reid G. Smith, R. Young
{"title":"The design of the Dipmeter Advisor system","authors":"Reid G. Smith, R. Young","doi":"10.1145/800171.809598","DOIUrl":"https://doi.org/10.1145/800171.809598","url":null,"abstract":"The Dipmeter Advisor system [11] attempts to emulate human expert performance in an important and specialized oil well-log interpretation task. The system is currently being used in a small number of Schlumberger Field Log Interpretation Centers as an aid to human dipmeter interpreters.\u0000 In this paper, we describe the problem just enough to establish the vocabulary for discussing the program and the characteristics of the domain. We then present the internal structure of the program and attempt to put it in perspective with respect to first-generation expert systems. We discuss ways in which characteristics of the task domain impose constraints on the design or\" signal interpretation programs, and attempt to extract knowledge useful to future expert system developers.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116180412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Proposed curriculum for programs leading to teacher certification in computer science 建议的计算机科学教师资格认证课程
ACM '84 Pub Date : 1900-01-01 DOI: 10.1145/800171.809670
J. Poirot, A. Luehrmann, Cathleen A. Norris, Harriet G. Taylor, Robert Taylor
{"title":"Proposed curriculum for programs leading to teacher certification in computer science","authors":"J. Poirot, A. Luehrmann, Cathleen A. Norris, Harriet G. Taylor, Robert Taylor","doi":"10.1145/800171.809670","DOIUrl":"https://doi.org/10.1145/800171.809670","url":null,"abstract":"Would a school system allow a person with only an eight-grade education to become an English teacher? Would a self-taught math teacher be given full responsibility for the high school math program? The answers to these questions are obvious to everyone: to become a subject-matter specialist school teacher, one must demonstrate competency by fulfilling state certification requirements.\u0000 Yet these same school systems, which have well-defined qualification standards for English teachers and math teachers, today often assign full responsibility for the computer studies/computer science program to teachers who are self-taught or whose formal training is equivalent to an eight-grade education in the subject.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117000361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Towards knowledge-based robotics systems 走向基于知识的机器人系统
ACM '84 Pub Date : 1900-01-01 DOI: 10.1145/800171.809634
D. Dodds
{"title":"Towards knowledge-based robotics systems","authors":"D. Dodds","doi":"10.1145/800171.809634","DOIUrl":"https://doi.org/10.1145/800171.809634","url":null,"abstract":"A spatial planning technique is examined whereby the robot system plans in a general space which greatly enhances the flexibility of manipulator operation by leaving resolution of trajectory and placement minutae to “motion execution time”. This permits the robot planning system to deal with elements in the working environment which are in continuous or semi-continuous motion, as well as those normally considered to be at rest. A multi-modal representation and Knowledge-Base (KB) are used.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
National educational computing policy alternatives 国家教育计算政策选择
ACM '84 Pub Date : 1900-01-01 DOI: 10.1145/800171.809669
Ronald E. Anderson, R. Aiken, Richard T. Close, K. Duncan, Marc Tucker
{"title":"National educational computing policy alternatives","authors":"Ronald E. Anderson, R. Aiken, Richard T. Close, K. Duncan, Marc Tucker","doi":"10.1145/800171.809669","DOIUrl":"https://doi.org/10.1145/800171.809669","url":null,"abstract":"During the past two years a number of bills have been introduced in the U. S. Congress to improve the quantity and quality of computer instruction in our nation's schools and colleges. While none of these bills are likely to pass before the presidential election, they raise major policy questions regarding what is needed (and should be implemented) in 1985 and beyond.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127164656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Truth in advertising in present and future generation computing 广告的真相在现在和未来的一代计算
ACM '84 Pub Date : 1900-01-01 DOI: 10.1145/800171.809647
R. Kling
{"title":"Truth in advertising in present and future generation computing","authors":"R. Kling","doi":"10.1145/800171.809647","DOIUrl":"https://doi.org/10.1145/800171.809647","url":null,"abstract":"The capabilities of advanced computing technologies are best understood by computer scientists and substantially less so by non-specialists. There is a strong bias toward oversimplifying the capabilities and limitations of new technologies when they are presented to a larger public: through presentations to policymakers, advertisements for specific products and through media exposure of enthusiasts or demoters of new technologies. Overall, the capabilities of new technologies seem often exaggerated, even when the artifacts are usable and useful. In the case of new technologies, reliance on market forces is problematic since the public does not have much information on which to wisely evaluate their possible choices. Does the computer science community have any role to play in helping assure that policymakers and the public receive relatively accurate representations about the character, values, problems, and costs of new classes of computing technologies?","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of computer and network security systems 评估计算机和网络安全系统
ACM '84 Pub Date : 1900-01-01 DOI: 10.1145/800171.809644
S. Thompson
{"title":"Evaluation of computer and network security systems","authors":"S. Thompson","doi":"10.1145/800171.809644","DOIUrl":"https://doi.org/10.1145/800171.809644","url":null,"abstract":"This topic deals with the net difference in the security posture resulting from the proliferation of the business world by microcomputers and computer networks.\u0000 The following are the premises that will be discussed:\u0000 A. Large 4th generation computer systems, while not fully secured, were designed with some level of controls, auditibility and recovery;\u0000 B. Microcomputer design and operational characteristics have created a multitude of new security problems while resolving a variety of old security problems;\u0000 C. Networks, while compounding some security problems, also mitigated many microcomputers related data base system controls and auditing problems.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127773416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信