ACM '76最新文献

筛选
英文 中文
The role of representation in artificial intelligence(Tutorial Session) 表征在人工智能中的作用(辅导课)
ACM '76 Pub Date : 1976-10-20 DOI: 10.1145/800191.805529
I. Goldstein, G. Hendrix, R. Fikes
{"title":"The role of representation in artificial intelligence(Tutorial Session)","authors":"I. Goldstein, G. Hendrix, R. Fikes","doi":"10.1145/800191.805529","DOIUrl":"https://doi.org/10.1145/800191.805529","url":null,"abstract":"In the effort to construct intelligent computer systems, a primary consideration is how to represent large amounts of knowledge in a fashion that permits their effective use and interaction. Indeed, many researchers in the field of artificial intelligence have come to believe that knowledge representation is the fundamental issue in the attempt to understand intelligence. The presentations in this session explore this issue and describe two current important knowledge representation methodologies, namely frames and semantic nets.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126256903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Retailing computer technology to the uninitiated consumer: the case of computer applications transfer in local governments 向不熟悉的消费者销售计算机技术:以地方政府的计算机应用转让为例
ACM '76 Pub Date : 1976-10-20 DOI: 10.1145/800191.805640
K. Kraemer
{"title":"Retailing computer technology to the uninitiated consumer: the case of computer applications transfer in local governments","authors":"K. Kraemer","doi":"10.1145/800191.805640","DOIUrl":"https://doi.org/10.1145/800191.805640","url":null,"abstract":"The “faith in technology” attitude prevalent in the U.S. extends to local governments, where large programs have been instituted to facilitate technology transfer. This paper examines the technology transfer of computer applications among and into local governments by comparing the benefit claims of transfer software with new data on local government transfer activity and planning, and the harsher realities of actual transfer experience as expressed in seven key points most often found in literature about information systems in local government. This paper does not support or discredit claims about transfer in local government. Rather, it attempts to fill part of the void in rational discussion about transfer by offering broad perspectives on why more transfers do not occur and, in some instances, why they shouldn't occur.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125683677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal properties of sequential/parallel matrix languages 顺序/并行矩阵语言的形式性质
ACM '76 Pub Date : 1976-10-20 DOI: 10.1145/800191.805515
P. Wang
{"title":"Formal properties of sequential/parallel matrix languages","authors":"P. Wang","doi":"10.1145/800191.805515","DOIUrl":"https://doi.org/10.1145/800191.805515","url":null,"abstract":"A new type of grammar for generating two-dimensional patterns is introduced. The generation of a pattern occurs in two phases. First, a string grammar generates a “row” of syntactic variables (the sequential phase). Then a battery of instances of string grammars—one for each symbol produced in the first phase—operate in tandem to create the columns of the final pattern (the parallel phase). Several unrelated properties of the classes of patterns generated by various varieties of matrix grammars are announced.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127109107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Levels of abstraction and compilers 抽象层次和编译器
ACM '76 Pub Date : 1976-10-20 DOI: 10.1145/800191.805630
B. Buckles, G. Hintze
{"title":"Levels of abstraction and compilers","authors":"B. Buckles, G. Hintze","doi":"10.1145/800191.805630","DOIUrl":"https://doi.org/10.1145/800191.805630","url":null,"abstract":"Based upon experience gained through the development of a compiler, this paper recommends the software partitioning technique known as levels of abstraction as a practical strategy for organizing medium to large-scale software systems. How to identify levels of abstraction, specific properties possessed by levels of abstraction, and how to integrate the technique into the software design phase are the principal topics. Each concept is illustrated by examples from the compiler. Some parallels are drawn between levels of abstraction and the concepts of resource management, of data abstractions, and of information hiding.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127486324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using plans to understand natural language 使用计划来理解自然语言
ACM '76 Pub Date : 1976-10-20 DOI: 10.1145/800191.805524
R. Wilensky
{"title":"Using plans to understand natural language","authors":"R. Wilensky","doi":"10.1145/800191.805524","DOIUrl":"https://doi.org/10.1145/800191.805524","url":null,"abstract":"Our ability to build a natural language understanding system is limited by the degree to which we can organize and apply world knowledge. This paper describes a program, called PAM, that has knowledge about people's intentions. PAM uses its knowledge to infer the relationships between sentences in a text. A sample run of the program is presented and is described in detail. The inference mechanisms of PAM are compared to those of other knowledge-application programs.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131516431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
SIGMINI (Tutorial Session) SIGMINI(辅导班)
ACM '76 Pub Date : 1976-10-20 DOI: 10.1145/800191.805590
Ted Cary, J. Tartar
{"title":"SIGMINI (Tutorial Session)","authors":"Ted Cary, J. Tartar","doi":"10.1145/800191.805590","DOIUrl":"https://doi.org/10.1145/800191.805590","url":null,"abstract":"Prof. Tartar's presentation will include comparisons and contrasts between minicomputers and microprocessors. Topics to be covered in the presentation include technical organization, software support, applications, and social implications of the future development of this technology.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133160668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIGGRAPH (Papers and Panel Session) SIGGRAPH(论文和小组讨论)
ACM '76 Pub Date : 1976-10-20 DOI: 10.1145/800191.805563
R. Clark, C. Quenneville, H. Kriloff, J. Sturman, Larry Cornish, I. Hirschsohn
{"title":"SIGGRAPH (Papers and Panel Session)","authors":"R. Clark, C. Quenneville, H. Kriloff, J. Sturman, Larry Cornish, I. Hirschsohn","doi":"10.1145/800191.805563","DOIUrl":"https://doi.org/10.1145/800191.805563","url":null,"abstract":"Maybe you think computer graphics has little application in your operation. This session may change your mind. It will show how computer graphics is being used to grind out graphs, charts, pie graphs and maps - at the rate of thousands per day.\u0000 The papers will demonstrate how graphics is being used in real world installations on a variety of devices simutaneously, both passively and interactively. It will show how graphics is being used intensively not only by engineers and scientists, but by bankers, statisticians and (would you believe) congressmen and senators. This session will not only show examples of the amazing use of simple and multicolor graphics in day to day applications but also how easy it is to go graphics.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127633648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The BIG system - synergetic graphics 大系统-协同图形
ACM '76 Pub Date : 1976-10-20 DOI: 10.1145/800191.805565
C. Quenneville, H. Kriloff
{"title":"The BIG system - synergetic graphics","authors":"C. Quenneville, H. Kriloff","doi":"10.1145/800191.805565","DOIUrl":"https://doi.org/10.1145/800191.805565","url":null,"abstract":"The recent decrease in the cost of graphics hardware has created an expanded potential opportunity for the use of graphic techniques. However, this potential is reduced by a lack of agreement on the software interface for this graphics environment. In almost every forum that discusses graphical techniques, new systems are introduced that are syntactically unique, but semantically very similar2,8,16. One of the major reasons for this proliferation of graphic systems is the large number of possible tradeoffs that exist between the performance parameters of these devices. Each graphics system can be optimized for a limited number of these parameters by adjusting a feature of the system design until the best results are obtained. Where more than one design feature affects a particular performance parameter, the system designer usually selects a single feature for adjustment and restricts the user's ability to modify any others. The users discover that they cannot adequately adjust that graphics system for their particular problem, leading to the creation of yet another graphics system.\u0000 An evaluation of the techniques that have been used to provide this design factor optimization reveal that applying these techniques in combination provides a greater degree of user control over the graphics environment. This synergetic behavior leads to benefits that can be derived from a graphics system that allows the user a greater variety of implementation options. This flexibility will also allow the user to somewhat compensate for the present lack of a graphics standard. A system that utilizes this methodology is described and examples of its application are shown.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Selective partial access to a database 对数据库的选择性部分访问
ACM '76 Pub Date : 1976-10-20 DOI: 10.1145/800191.805537
R. Conway, D. Strip
{"title":"Selective partial access to a database","authors":"R. Conway, D. Strip","doi":"10.1145/800191.805537","DOIUrl":"https://doi.org/10.1145/800191.805537","url":null,"abstract":"A system to support a multi-function, shared-access database requires the capability of defining for each user an arbitrary subset of the fields of a logical record to which access is allowed. The feasibility of such a capability has already been demonstrated by several operational systems. This paper is concerned with the possibility of granting something less than complete access to a specified field of a record. The purpose would be to allow a user to perform various summary and statistical tasks over controlled fields without allowing identification of the exact value of a field in a particular record.\u0000 Three different strategies are examined: 1. An arbitrary partition of values is defined for each restricted field. A user granted this type of access can determine only which class of the partition contains the field value. 2. The actual field value is distorted by a random perturbation. 3. Access to actual field values is allowed—but values are dissociated from the actual record in which they occur.\u0000 The third strategy—dissociation—appears to be the most interesting, potentially useful, but potentially vulnerable. In each case, the utility of incomplete access is examined and various implementation alternatives are explored. The degree of protection against persistent assault is determined.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115025122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Retrieval systems(Tutorial Session): documents and data 检索系统(辅导课):文档和数据
ACM '76 Pub Date : 1976-10-20 DOI: 10.1145/800191.805567
C. Crouch, G. Salton, E. Sibley
{"title":"Retrieval systems(Tutorial Session): documents and data","authors":"C. Crouch, G. Salton, E. Sibley","doi":"10.1145/800191.805567","DOIUrl":"https://doi.org/10.1145/800191.805567","url":null,"abstract":"This tutorial session reviews the state of the art with reference to two major types of retrieval systems, namely, Information Retrieval and Database Management. Each discussant will (1) introduce the basic concepts and terminology of his field, and (2) building on this foundation, provide information about current problem areas and, wherever possible, the indicated solutions. Similarities and differences between the two areas will be evident as a result.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115073173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信