ACM '76Pub Date : 1976-10-20DOI: 10.1145/800191.805529
I. Goldstein, G. Hendrix, R. Fikes
{"title":"The role of representation in artificial intelligence(Tutorial Session)","authors":"I. Goldstein, G. Hendrix, R. Fikes","doi":"10.1145/800191.805529","DOIUrl":"https://doi.org/10.1145/800191.805529","url":null,"abstract":"In the effort to construct intelligent computer systems, a primary consideration is how to represent large amounts of knowledge in a fashion that permits their effective use and interaction. Indeed, many researchers in the field of artificial intelligence have come to believe that knowledge representation is the fundamental issue in the attempt to understand intelligence. The presentations in this session explore this issue and describe two current important knowledge representation methodologies, namely frames and semantic nets.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126256903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '76Pub Date : 1976-10-20DOI: 10.1145/800191.805640
K. Kraemer
{"title":"Retailing computer technology to the uninitiated consumer: the case of computer applications transfer in local governments","authors":"K. Kraemer","doi":"10.1145/800191.805640","DOIUrl":"https://doi.org/10.1145/800191.805640","url":null,"abstract":"The “faith in technology” attitude prevalent in the U.S. extends to local governments, where large programs have been instituted to facilitate technology transfer. This paper examines the technology transfer of computer applications among and into local governments by comparing the benefit claims of transfer software with new data on local government transfer activity and planning, and the harsher realities of actual transfer experience as expressed in seven key points most often found in literature about information systems in local government. This paper does not support or discredit claims about transfer in local government. Rather, it attempts to fill part of the void in rational discussion about transfer by offering broad perspectives on why more transfers do not occur and, in some instances, why they shouldn't occur.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125683677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '76Pub Date : 1976-10-20DOI: 10.1145/800191.805515
P. Wang
{"title":"Formal properties of sequential/parallel matrix languages","authors":"P. Wang","doi":"10.1145/800191.805515","DOIUrl":"https://doi.org/10.1145/800191.805515","url":null,"abstract":"A new type of grammar for generating two-dimensional patterns is introduced. The generation of a pattern occurs in two phases. First, a string grammar generates a “row” of syntactic variables (the sequential phase). Then a battery of instances of string grammars—one for each symbol produced in the first phase—operate in tandem to create the columns of the final pattern (the parallel phase). Several unrelated properties of the classes of patterns generated by various varieties of matrix grammars are announced.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127109107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '76Pub Date : 1976-10-20DOI: 10.1145/800191.805630
B. Buckles, G. Hintze
{"title":"Levels of abstraction and compilers","authors":"B. Buckles, G. Hintze","doi":"10.1145/800191.805630","DOIUrl":"https://doi.org/10.1145/800191.805630","url":null,"abstract":"Based upon experience gained through the development of a compiler, this paper recommends the software partitioning technique known as levels of abstraction as a practical strategy for organizing medium to large-scale software systems. How to identify levels of abstraction, specific properties possessed by levels of abstraction, and how to integrate the technique into the software design phase are the principal topics. Each concept is illustrated by examples from the compiler. Some parallels are drawn between levels of abstraction and the concepts of resource management, of data abstractions, and of information hiding.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127486324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '76Pub Date : 1976-10-20DOI: 10.1145/800191.805524
R. Wilensky
{"title":"Using plans to understand natural language","authors":"R. Wilensky","doi":"10.1145/800191.805524","DOIUrl":"https://doi.org/10.1145/800191.805524","url":null,"abstract":"Our ability to build a natural language understanding system is limited by the degree to which we can organize and apply world knowledge. This paper describes a program, called PAM, that has knowledge about people's intentions. PAM uses its knowledge to infer the relationships between sentences in a text. A sample run of the program is presented and is described in detail. The inference mechanisms of PAM are compared to those of other knowledge-application programs.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131516431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '76Pub Date : 1976-10-20DOI: 10.1145/800191.805590
Ted Cary, J. Tartar
{"title":"SIGMINI (Tutorial Session)","authors":"Ted Cary, J. Tartar","doi":"10.1145/800191.805590","DOIUrl":"https://doi.org/10.1145/800191.805590","url":null,"abstract":"Prof. Tartar's presentation will include comparisons and contrasts between minicomputers and microprocessors. Topics to be covered in the presentation include technical organization, software support, applications, and social implications of the future development of this technology.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133160668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '76Pub Date : 1976-10-20DOI: 10.1145/800191.805563
R. Clark, C. Quenneville, H. Kriloff, J. Sturman, Larry Cornish, I. Hirschsohn
{"title":"SIGGRAPH (Papers and Panel Session)","authors":"R. Clark, C. Quenneville, H. Kriloff, J. Sturman, Larry Cornish, I. Hirschsohn","doi":"10.1145/800191.805563","DOIUrl":"https://doi.org/10.1145/800191.805563","url":null,"abstract":"Maybe you think computer graphics has little application in your operation. This session may change your mind. It will show how computer graphics is being used to grind out graphs, charts, pie graphs and maps - at the rate of thousands per day.\u0000 The papers will demonstrate how graphics is being used in real world installations on a variety of devices simutaneously, both passively and interactively. It will show how graphics is being used intensively not only by engineers and scientists, but by bankers, statisticians and (would you believe) congressmen and senators. This session will not only show examples of the amazing use of simple and multicolor graphics in day to day applications but also how easy it is to go graphics.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127633648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '76Pub Date : 1976-10-20DOI: 10.1145/800191.805565
C. Quenneville, H. Kriloff
{"title":"The BIG system - synergetic graphics","authors":"C. Quenneville, H. Kriloff","doi":"10.1145/800191.805565","DOIUrl":"https://doi.org/10.1145/800191.805565","url":null,"abstract":"The recent decrease in the cost of graphics hardware has created an expanded potential opportunity for the use of graphic techniques. However, this potential is reduced by a lack of agreement on the software interface for this graphics environment. In almost every forum that discusses graphical techniques, new systems are introduced that are syntactically unique, but semantically very similar2,8,16. One of the major reasons for this proliferation of graphic systems is the large number of possible tradeoffs that exist between the performance parameters of these devices. Each graphics system can be optimized for a limited number of these parameters by adjusting a feature of the system design until the best results are obtained. Where more than one design feature affects a particular performance parameter, the system designer usually selects a single feature for adjustment and restricts the user's ability to modify any others. The users discover that they cannot adequately adjust that graphics system for their particular problem, leading to the creation of yet another graphics system.\u0000 An evaluation of the techniques that have been used to provide this design factor optimization reveal that applying these techniques in combination provides a greater degree of user control over the graphics environment. This synergetic behavior leads to benefits that can be derived from a graphics system that allows the user a greater variety of implementation options. This flexibility will also allow the user to somewhat compensate for the present lack of a graphics standard. A system that utilizes this methodology is described and examples of its application are shown.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '76Pub Date : 1976-10-20DOI: 10.1145/800191.805537
R. Conway, D. Strip
{"title":"Selective partial access to a database","authors":"R. Conway, D. Strip","doi":"10.1145/800191.805537","DOIUrl":"https://doi.org/10.1145/800191.805537","url":null,"abstract":"A system to support a multi-function, shared-access database requires the capability of defining for each user an arbitrary subset of the fields of a logical record to which access is allowed. The feasibility of such a capability has already been demonstrated by several operational systems. This paper is concerned with the possibility of granting something less than complete access to a specified field of a record. The purpose would be to allow a user to perform various summary and statistical tasks over controlled fields without allowing identification of the exact value of a field in a particular record.\u0000 Three different strategies are examined: 1. An arbitrary partition of values is defined for each restricted field. A user granted this type of access can determine only which class of the partition contains the field value. 2. The actual field value is distorted by a random perturbation. 3. Access to actual field values is allowed—but values are dissociated from the actual record in which they occur.\u0000 The third strategy—dissociation—appears to be the most interesting, potentially useful, but potentially vulnerable. In each case, the utility of incomplete access is examined and various implementation alternatives are explored. The degree of protection against persistent assault is determined.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115025122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ACM '76Pub Date : 1976-10-20DOI: 10.1145/800191.805567
C. Crouch, G. Salton, E. Sibley
{"title":"Retrieval systems(Tutorial Session): documents and data","authors":"C. Crouch, G. Salton, E. Sibley","doi":"10.1145/800191.805567","DOIUrl":"https://doi.org/10.1145/800191.805567","url":null,"abstract":"This tutorial session reviews the state of the art with reference to two major types of retrieval systems, namely, Information Retrieval and Database Management. Each discussant will (1) introduce the basic concepts and terminology of his field, and (2) building on this foundation, provide information about current problem areas and, wherever possible, the indicated solutions. Similarities and differences between the two areas will be evident as a result.","PeriodicalId":379505,"journal":{"name":"ACM '76","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1976-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115073173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}