ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809628
A. Hanson, D. McKeown, S. Brennan, A. Pentland, Richard F. Voss
{"title":"Vision, perception and imagery","authors":"A. Hanson, D. McKeown, S. Brennan, A. Pentland, Richard F. Voss","doi":"10.1145/800171.809628","DOIUrl":"https://doi.org/10.1145/800171.809628","url":null,"abstract":"How principles of perception and human interaction can be used to solve problems in machine vision and image generation.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132605931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809608
P. Bassett
{"title":"Design principles for software manufacturing tools","authors":"P. Bassett","doi":"10.1145/800171.809608","DOIUrl":"https://doi.org/10.1145/800171.809608","url":null,"abstract":"A good solution to the reusable code problem turns out to provide a solid technical basis from which to understand and deal with the production, quality, and maintenance issues currently besieging the software industry. To this end, a software manufacturing methodology has been developed called Computer Aided Programming tm. CAP is based on a functional programming concept called a frame, motivated in turn by the reusable code problem.\u0000 The introduction explains the necessary background ideas about frames. Section two analyzes the subtle but important distinction between problem solving and programming. CAP design principles are then developed which show how to build software tools that support problem solving through open—ended, structured, program manufacturing techniques. The principles are organized around the flow of program specifications from 'under' to 'optimally', to 'over' specified, machine executable instructions.\u0000 The components of an existing CAP system are described in section three, and section four discusses the usage of CAP as a manufacturing technique. Statistics from a case study are presented which indicate that: (a) production quality commercial software can be manufactured at rates exceeding 2000 lines of debugged COBOL per man-day (including systems design time), and (b) less than 10% of this code needs to be hand written /-maintained.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115606731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809595
A. Brooking
{"title":"Towards a methodology for a design of knowledge based systems","authors":"A. Brooking","doi":"10.1145/800171.809595","DOIUrl":"https://doi.org/10.1145/800171.809595","url":null,"abstract":"In 1974 Stevens, Myers and Constantine published a paper in the IBM Systems Journal which described “Structured Design”. Their paper stated:\u0000 “Structured Design is a set of proposed general program design considerations and techniques for making coding, debugging, and modification easier, faster and less expensive by reducing complexity.”\u0000 Further these techniques were thought to be compatible with, and enhance the coding techniques of structured programming.\u0000 Later, this work was expanded and explained in books by Stevens, Myers and Constantine together with Ed Yourdon.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122936820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809610
R. Brazile
{"title":"A general purpose data base design","authors":"R. Brazile","doi":"10.1145/800171.809610","DOIUrl":"https://doi.org/10.1145/800171.809610","url":null,"abstract":"One of the major problems facing data base designers is how to develop a logical data base design for a proposed application. Usually, for each new application, a new data base design is produced. For a Data Base Task Group (DBTG) data base management system (DBMS) this means creating a new schema and subschemas. This paper describes a non-volatile data base design that allows the DBTG structure of the data base to remain constant, regardless of changes in the applications it is portraying.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129887149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809649
P. Smolensky
{"title":"Ethical questions and military dominance in next generation computing","authors":"P. Smolensky","doi":"10.1145/800171.809649","DOIUrl":"https://doi.org/10.1145/800171.809649","url":null,"abstract":"American response to the Fifth Generation Project has been dominated by DARPA's Strategic Computing Initiative, which proposes to develop ambitious software and hardware technology for explicit military applications. The Initiative generates two classes of ethical questions:\u0000 * how well will non-military social goals be furthered by this approach to computing development?\u0000 * how well will national security goals be furthered by this approach to defense, and what role in social policy-assessment is to be played by computer professionals?","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116204352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809656
V. Walker, C. Hammer, K. Joels, Alan C. Kay
{"title":"Soothsayers of the electronic age","authors":"V. Walker, C. Hammer, K. Joels, Alan C. Kay","doi":"10.1145/800171.809656","DOIUrl":"https://doi.org/10.1145/800171.809656","url":null,"abstract":"Within our lifetimes, we have seen three generations of computers flourish and fade into the archives of technology. Today we are experiencing the fruits of the Fourth Generation. Our expectations of the Fifth Generation are the focus of this conference and, indeed, of the plans for our immediate future. From these expectations, we can extrapolate to the Sixth Generation. But what lies beyond?\u0000 Three noted thinkers in the computer industry comprise this panel of soothsayers, examining the omens and auguries of this electronic age. Dr. Carl Hammer investigates the scenario beyond the data processing horizon. He explores processing by systems which are intelligent, expert, and capable of making complex decisions, human decisions.\u0000 Dr. Kerry Joels predicts the Seventh Generation system, giving specifications, capabilities, and costs of a likely model. He maps the route for reaching the Seventh Generation and points out the landmarks on a journey we have already begun.\u0000 Dr. Alan Kay foretells the future of small computers in an age of democratization of access and universal computer literacy.\u0000 Each speaker will address the interaction between the demands of technology on society and the demands society will make of its technology. And each will forecast a future which could be possible, should we wish it to be.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126116838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809658
K. Joels
{"title":"The seventh generation","authors":"K. Joels","doi":"10.1145/800171.809658","DOIUrl":"https://doi.org/10.1145/800171.809658","url":null,"abstract":"The Fifth generation computer is fairly well defined. By extrapolation, we can make some statements about a sixth generation machine. But what of the seventh generation? This presentation explores one possible scenario for the seventh generation computer. General specifications, expandability factors, initial and operating costs, useful lifetime and special use-interactive characteristics will be defined.\u0000 The seventh generation system design will have to be sensitive to design constraints in the 2010 timeframe, including:\u0000 • energy availability,\u0000 • operational lifetime requirements,\u0000 • materials processing breakthroughs, and\u0000 • user requirements.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124359779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809642
J. J. Pottmyer, Ken Fong, S. Thompson, Ralph Shattuck
{"title":"Security considerations in system design","authors":"J. J. Pottmyer, Ken Fong, S. Thompson, Ralph Shattuck","doi":"10.1145/800171.809642","DOIUrl":"https://doi.org/10.1145/800171.809642","url":null,"abstract":"This session addresses today's design efforts, seeking to identify security issues for fifth generation computing. Emphasis is placed on disaster recovery, auditing and evaluation of computer systems, and special problems arising from the proliferation of small computers.\u0000 K. Fong, whose abstract follows in these Proceedings, describes our changing approach to providing uninterruptable access to automated information resources. These changes can include total redundancy and geographic dispersion, ensuring compatibility and transportability of information and software, as well as automated facilities to recover essential functions after disasters.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"809 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117051752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809618
C. McCrosky, J. Glasgow, M. A. Jenkins
{"title":"Nial: A candidate language for fifth generation computer systems","authors":"C. McCrosky, J. Glasgow, M. A. Jenkins","doi":"10.1145/800171.809618","DOIUrl":"https://doi.org/10.1145/800171.809618","url":null,"abstract":"The anticipated fifth generation of computing systems presents many challenges. One of the more important is the challenge of designing languages suitable for describing the parallel computations which these systems will achieve. The new systems will outpace the expressive power of most existing languages. As the hardware components and AI techniques are developed to achieve the fifth generation, so must appropriate languages be created.\u0000 Another view of the fifth generation is that it is to be distinguished from previous systems, in large part, by being language driven. That is, the abstraction of some functional language is to be the driving force behind the machine design, and that potential parallelism in the language should motivate parallelism in the machine.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125528628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '84Pub Date : 1900-01-01DOI: 10.1145/800171.809596
Vipin Kumar
{"title":"Integrating knowledge in problem solving search procedures","authors":"Vipin Kumar","doi":"10.1145/800171.809596","DOIUrl":"https://doi.org/10.1145/800171.809596","url":null,"abstract":"With the help of a model for discrete optimization problems, we show that a large number of heuristic search procedures (for searching state-space graphs, AND/OR graphs, game trees, etc.) of artificial intelligence (AI), and dynamic programming (DP) and branch-and-bound (B&B) procedures of operations research use problem-specific knowledge in a framework based upon context-free grammar. The model reveals the true nature of these procedures, and aids in synthesizing new variations as well as generalizations and parallel implementations of these procedures. The paper concludes by commenting upon how this model may be generalized and made more powerful to encompass a greater variety of problems, and to help synthesize more efficient search procedures.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"329 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122264753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}