ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809666
Junichiro Tsuji, Yutaka Iima, S. Tojo, Shoji Enomoto
{"title":"Dialogue management in the personal sequential inference machine (PSI)","authors":"Junichiro Tsuji, Yutaka Iima, S. Tojo, Shoji Enomoto","doi":"10.1145/800171.809666","DOIUrl":"https://doi.org/10.1145/800171.809666","url":null,"abstract":"PSI (Personal Sequential Inference Machine) is being developed as a research tool for the FGCS (Fifth Generation Computer Systems) project, and SIMPOS (Sequential Inference Machine's Programming and Operating System) is also under development.\u0000 In this paper, we present the dialogue management component of SIMPOS. We describe and discuss the background, design, implementation, and future at our work. The window system and the Coordinator, along with the bitmapped display and mouse cursor controls, are the primary means of managing the dialogue between the user and SIMPOS.\u0000 We assume the users of PSI to be computer professionals, and dialogue management is being designed accordingly. High performance, low overhead, and allowances for customization and expansion are among our design and implementation goals. The entire system is implemented in ESP (Extended Self-contained Prolog), an enhanced logic programming language incorporating an object/class methodology similar to that of Smalltalk-80.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134310861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809602
H. Ogawa, K. Fu, James T. P. Yao
{"title":"Knowledge representation and inference control of SPERIL-II","authors":"H. Ogawa, K. Fu, James T. P. Yao","doi":"10.1145/800171.809602","DOIUrl":"https://doi.org/10.1145/800171.809602","url":null,"abstract":"SPERIL-II is an expert system for damage assessment of existing structures. Fuzzy sets for imprecise data and Dempster and Shafer's theory for combining fuzzy sets with certainty factors are used in an inexact inference. Since the process of the damage assessment is quite complex, metarules are used to control the inference in order to improve the effectiveness and reliability of results. The metarules in SPERIL-II are represented in logic form with emphases on the explicit representation of the selection of the rule group and the suitable inference method.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131772022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809609
E. Horowitz, A. Kemper, B. Narasimhan
{"title":"Application generators: Ideas for programming language extensions","authors":"E. Horowitz, A. Kemper, B. Narasimhan","doi":"10.1145/800171.809609","DOIUrl":"https://doi.org/10.1145/800171.809609","url":null,"abstract":"The continued development of higher order programming languages has not yielded major productivity improvements in the software development process. One often mentioned mechanism for achieving significant orders of improvement are application generators, such as RAMIS, NOMAD, and FOCUS. These systems have been applied to data intensive business applications with phenomenal success. The purpose of this paper is to present the basic components of application generators and show why they yield such large productivity increases in the EDP environment. We investigate the meaning of nonprocedural programming and show how it exists in current application generators. Then we analyze the possibility of extending application generators so that they may be used for non-edp type applications.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131935510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809635
L. Lichten
{"title":"The emerging technology of CAD/CAM","authors":"L. Lichten","doi":"10.1145/800171.809635","DOIUrl":"https://doi.org/10.1145/800171.809635","url":null,"abstract":"Computer-Aided Design and Manufacture (CAD/CAM) represents a merging of technological advances in computer hardware and software with pressing needs in manufacturing industries. Integrated manufacturing systems--from computer graphics-aided design through engineering analysis and automated fabrication--are only now beginning to fulfill nearly twenty-five-year old promises of increased production efficiency. This paper summarizes CAD/CAM's evolution and its current state and then describes some areas that will experience significant change in the next decade.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"98 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132443866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809598
Reid G. Smith, R. Young
{"title":"The design of the Dipmeter Advisor system","authors":"Reid G. Smith, R. Young","doi":"10.1145/800171.809598","DOIUrl":"https://doi.org/10.1145/800171.809598","url":null,"abstract":"The Dipmeter Advisor system [11] attempts to emulate human expert performance in an important and specialized oil well-log interpretation task. The system is currently being used in a small number of Schlumberger Field Log Interpretation Centers as an aid to human dipmeter interpreters.\u0000 In this paper, we describe the problem just enough to establish the vocabulary for discussing the program and the characteristics of the domain. We then present the internal structure of the program and attempt to put it in perspective with respect to first-generation expert systems. We discuss ways in which characteristics of the task domain impose constraints on the design or\" signal interpretation programs, and attempt to extract knowledge useful to future expert system developers.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116180412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809670
J. Poirot, A. Luehrmann, Cathleen A. Norris, Harriet G. Taylor, Robert Taylor
{"title":"Proposed curriculum for programs leading to teacher certification in computer science","authors":"J. Poirot, A. Luehrmann, Cathleen A. Norris, Harriet G. Taylor, Robert Taylor","doi":"10.1145/800171.809670","DOIUrl":"https://doi.org/10.1145/800171.809670","url":null,"abstract":"Would a school system allow a person with only an eight-grade education to become an English teacher? Would a self-taught math teacher be given full responsibility for the high school math program? The answers to these questions are obvious to everyone: to become a subject-matter specialist school teacher, one must demonstrate competency by fulfilling state certification requirements.\u0000 Yet these same school systems, which have well-defined qualification standards for English teachers and math teachers, today often assign full responsibility for the computer studies/computer science program to teachers who are self-taught or whose formal training is equivalent to an eight-grade education in the subject.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117000361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809634
D. Dodds
{"title":"Towards knowledge-based robotics systems","authors":"D. Dodds","doi":"10.1145/800171.809634","DOIUrl":"https://doi.org/10.1145/800171.809634","url":null,"abstract":"A spatial planning technique is examined whereby the robot system plans in a general space which greatly enhances the flexibility of manipulator operation by leaving resolution of trajectory and placement minutae to “motion execution time”. This permits the robot planning system to deal with elements in the working environment which are in continuous or semi-continuous motion, as well as those normally considered to be at rest. A multi-modal representation and Knowledge-Base (KB) are used.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809669
Ronald E. Anderson, R. Aiken, Richard T. Close, K. Duncan, Marc Tucker
{"title":"National educational computing policy alternatives","authors":"Ronald E. Anderson, R. Aiken, Richard T. Close, K. Duncan, Marc Tucker","doi":"10.1145/800171.809669","DOIUrl":"https://doi.org/10.1145/800171.809669","url":null,"abstract":"During the past two years a number of bills have been introduced in the U. S. Congress to improve the quantity and quality of computer instruction in our nation's schools and colleges. While none of these bills are likely to pass before the presidential election, they raise major policy questions regarding what is needed (and should be implemented) in 1985 and beyond.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127164656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809647
R. Kling
{"title":"Truth in advertising in present and future generation computing","authors":"R. Kling","doi":"10.1145/800171.809647","DOIUrl":"https://doi.org/10.1145/800171.809647","url":null,"abstract":"The capabilities of advanced computing technologies are best understood by computer scientists and substantially less so by non-specialists. There is a strong bias toward oversimplifying the capabilities and limitations of new technologies when they are presented to a larger public: through presentations to policymakers, advertisements for specific products and through media exposure of enthusiasts or demoters of new technologies. Overall, the capabilities of new technologies seem often exaggerated, even when the artifacts are usable and useful. In the case of new technologies, reliance on market forces is problematic since the public does not have much information on which to wisely evaluate their possible choices. Does the computer science community have any role to play in helping assure that policymakers and the public receive relatively accurate representations about the character, values, problems, and costs of new classes of computing technologies?","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125464085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809644
S. Thompson
{"title":"Evaluation of computer and network security systems","authors":"S. Thompson","doi":"10.1145/800171.809644","DOIUrl":"https://doi.org/10.1145/800171.809644","url":null,"abstract":"This topic deals with the net difference in the security posture resulting from the proliferation of the business world by microcomputers and computer networks.\u0000 The following are the premises that will be discussed:\u0000 A. Large 4th generation computer systems, while not fully secured, were designed with some level of controls, auditibility and recovery;\u0000 B. Microcomputer design and operational characteristics have created a multitude of new security problems while resolving a variety of old security problems;\u0000 C. Networks, while compounding some security problems, also mitigated many microcomputers related data base system controls and auditing problems.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127773416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}