This paper describes a fully operational AI-CAI system (accessible over the ARPANET) which incorporates Artificial Intelligence techniques to perform question answering, hypothesis verification and theory formation activities in the domain of electronic troubleshooting. Much of its logical or inferencing capabilities are derived from uses of simulation models in conjunction with numerous procedural specialists. The system also includes a highly tuned structural parser for allowing the student to communicate in natural language. Although the system is extremely large it is sufficiently fast to be thoroughly exercised in a training or classroom environment.
{"title":"SOPHIE: a pragmatic use of artificial intelligence in CAI","authors":"J. Brown, R. Burton","doi":"10.1145/1408800.1408855","DOIUrl":"https://doi.org/10.1145/1408800.1408855","url":null,"abstract":"This paper describes a fully operational AI-CAI system (accessible over the ARPANET) which incorporates Artificial Intelligence techniques to perform question answering, hypothesis verification and theory formation activities in the domain of electronic troubleshooting. Much of its logical or inferencing capabilities are derived from uses of simulation models in conjunction with numerous procedural specialists. The system also includes a highly tuned structural parser for allowing the student to communicate in natural language. Although the system is extremely large it is sufficiently fast to be thoroughly exercised in a training or classroom environment.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130802515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The problems involved in using a smaller alphabet than that naturally called for are investigated, with attention focussed on the use of 12 digit keyboards such as found on Touch-Tone (trademark reg.) telephones. The feasibility of avoiding the use of codebooks or user encodings is examined for some medical information systems, and a technique to minimize redundant inputs is described.
{"title":"Touch-Tone input techniques: Data entry using a constrained keyboard","authors":"E. Desautels, Stuart B. Soffer","doi":"10.1145/800182.810409","DOIUrl":"https://doi.org/10.1145/800182.810409","url":null,"abstract":"The problems involved in using a smaller alphabet than that naturally called for are investigated, with attention focussed on the use of 12 digit keyboards such as found on Touch-Tone (trademark reg.) telephones. The feasibility of avoiding the use of codebooks or user encodings is examined for some medical information systems, and a technique to minimize redundant inputs is described.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133251465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
MYCIN is an interactive computer program, relying to a large extent upon artificial intelligence (AI) techniques, which uses decision rules acquired from experts to advise physicians who request advice regarding infectious disease therapy selection. MYCIN provides consultatations in this problem area by means of three inter-related subprograms: (1) - A Consultation System, which uses information provided by the physician, together with its own rule-based knowledge, to choose an appropriate therapeutic regimen for a patient with a bacterial infection; (2) - An Explanation System, which understands simple English questions and answers them in order to justify its decisions or instruct the user; (3) - A Rule-Acquisition System, which accepts new rules from experts and codes them for use during future consultation sessions.
{"title":"A rule-based computer program for advising physicians regarding antimicrobial therapy selection","authors":"E. Shortliffe","doi":"10.1145/1408800.1408906","DOIUrl":"https://doi.org/10.1145/1408800.1408906","url":null,"abstract":"MYCIN is an interactive computer program, relying to a large extent upon artificial intelligence (AI) techniques, which uses decision rules acquired from experts to advise physicians who request advice regarding infectious disease therapy selection. MYCIN provides consultatations in this problem area by means of three inter-related subprograms:\u0000 (1) - A Consultation System, which uses information provided by the physician, together with its own rule-based knowledge, to choose an appropriate therapeutic regimen for a patient with a bacterial infection;\u0000 (2) - An Explanation System, which understands simple English questions and answers them in order to justify its decisions or instruct the user;\u0000 (3) - A Rule-Acquisition System, which accepts new rules from experts and codes them for use during future consultation sessions.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130129542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The first step in automatic programming is the statement of information requirements in a Requirements Statement Language (RSL), a language for stating system requirements without needing to state the procedures implementing the system. The objective of this paper is development of language design principles for an RSL offering extensive requirements statement facilities. This objective is achieved through the formulation of a formal description of an information processing system. The formal description provides the criteria for requirements statement facilities of an RSL and for the capabilities of software for requirements statement analysis.
{"title":"Requirements statement language principles for automatic programming","authors":"Thomas I. M. Ho","doi":"10.1145/800182.810414","DOIUrl":"https://doi.org/10.1145/800182.810414","url":null,"abstract":"The first step in automatic programming is the statement of information requirements in a Requirements Statement Language (RSL), a language for stating system requirements without needing to state the procedures implementing the system. The objective of this paper is development of language design principles for an RSL offering extensive requirements statement facilities. This objective is achieved through the formulation of a formal description of an information processing system. The formal description provides the criteria for requirements statement facilities of an RSL and for the capabilities of software for requirements statement analysis.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116714602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Design Automation is emerging as a discipline and as such necessitates the development of appropriate curricula within the University environment. It is proposed that this can be achieved within the context of existing syllabi with the objective of producing graduates having an orientation in Design Automation. Some requirements for design automation are identified and corresponding curricula are proposed.
{"title":"Design Automation in a computer science curriculum","authors":"J. Linders, W. M. V. Cleemput","doi":"10.1145/800182.810423","DOIUrl":"https://doi.org/10.1145/800182.810423","url":null,"abstract":"Design Automation is emerging as a discipline and as such necessitates the development of appropriate curricula within the University environment. It is proposed that this can be achieved within the context of existing syllabi with the objective of producing graduates having an orientation in Design Automation. Some requirements for design automation are identified and corresponding curricula are proposed.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114636048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Program verification is a relatively new application area for symbolic mathematical systems. We report on an interactive program verification system, based on the inductive assertion method, which system is implemented using an existing symbolic mathematical language and supporting system, Reduce. Reduce has been augmented with a number of capabilities which are important to program verification, particularly transformations on relational and Boolean expressions. We believe these capabilities would be valuable in other contexts and should be incorporated more widely into symbolic mathematical systems for general use. The program verification application can serve as a guide to an appropriate definition of such capabilities, particularly with regard to the need to distinguish between undefined program variables and polynomial indeterminates. Additional capabilities which would benefit the program verification application include representation of user-defined functions by internal forms which directly incorporate properties such as commutativity and associativity (as is commonly done with plus and times), and a comprehensive facility for defining conditionally applicable transformations
{"title":"The application of a symbolic mathematical system to program verification","authors":"R. L. London, D. Musser","doi":"10.1145/800182.810412","DOIUrl":"https://doi.org/10.1145/800182.810412","url":null,"abstract":"Program verification is a relatively new application area for symbolic mathematical systems. We report on an interactive program verification system, based on the inductive assertion method, which system is implemented using an existing symbolic mathematical language and supporting system, Reduce. Reduce has been augmented with a number of capabilities which are important to program verification, particularly transformations on relational and Boolean expressions. We believe these capabilities would be valuable in other contexts and should be incorporated more widely into symbolic mathematical systems for general use. The program verification application can serve as a guide to an appropriate definition of such capabilities, particularly with regard to the need to distinguish between undefined program variables and polynomial indeterminates. Additional capabilities which would benefit the program verification application include representation of user-defined functions by internal forms which directly incorporate properties such as commutativity and associativity (as is commonly done with plus and times), and a comprehensive facility for defining conditionally applicable transformations","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"21 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132241289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A data base system should have built-in capabilities to meet the objectives of data independence, relatability, compatibility, structural adaptability, integrity, recoverability, and security. These requirements are major constraints on data base design and will be discussed in turn. Since data integrity, recoverability, and security are receiving attention elsewhere, e.g. [BR71][D71] [T71], this paper will confine its treatment of those three objectives to an introduction of their major design-related issues.
{"title":"Data base system objectives as design constraints","authors":"Mary E. Snuggs, G. Popek, Ronald J. Peterson","doi":"10.1145/1408800.1408871","DOIUrl":"https://doi.org/10.1145/1408800.1408871","url":null,"abstract":"A data base system should have built-in capabilities to meet the objectives of data independence, relatability, compatibility, structural adaptability, integrity, recoverability, and security. These requirements are major constraints on data base design and will be discussed in turn. Since data integrity, recoverability, and security are receiving attention elsewhere, e.g. [BR71][D71] [T71], this paper will confine its treatment of those three objectives to an introduction of their major design-related issues.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132252345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Program structure is inherent in program design; therefore special keywords such as "if... then ... else” or "do ... while” are useful only to the extent that they reveal that structure. A simple listing of Fortran program statements is ineffective for revealing program structure. Proposals have been made for manually inserting keywords, comments, indentations, etc., either during a separate preprocessing stage or during the normal coding process. We show how the flow graph can provide independent structural information. Although the flow graph may be said to exist as soon as a program has been designed, it is most readily generated from the program statements. “Bad” structure can be detected objectively, and “good” programs can be reconstituted to reveal their block structure more clearly. Our implementation is based on an algorithm suggested by Peterson et al (CACM, August 1973). We have extended this algorithm to automatically detect block exits.
节目结构是节目设计所固有的;因此,诸如“if…”然后……否则“或”do…然而,“只有在它们揭示了这种结构的程度上才有用。一个简单的Fortran程序语句列表对于揭示程序结构是无效的。已经提出了在单独的预处理阶段或在正常编码过程中手动插入关键字、注释、缩进等的建议。我们展示了流图如何提供独立的结构信息。虽然流程图可以说在程序设计完成后就存在了,但它最容易从程序语句中生成。可以客观地发现“坏”结构,对“好”程序进行重构,更清晰地揭示其块结构。我们的实现基于Peterson等人(ccam, August 1973)提出的算法。我们扩展了这个算法来自动检测块退出。
{"title":"A method to expose the hidden structure of Fortran programs","authors":"L. Meissner","doi":"10.1145/800182.810402","DOIUrl":"https://doi.org/10.1145/800182.810402","url":null,"abstract":"Program structure is inherent in program design; therefore special keywords such as \"<underline>if</underline>... <underline>then</underline> ... <underline>else</underline>” or \"<underline>do</underline> ... <underline>while</underline>” are useful only to the extent that they <italic>reveal</italic> that structure.\u0000 A simple listing of Fortran program statements is ineffective for revealing program structure. Proposals have been made for manually inserting keywords, comments, indentations, etc., either during a separate preprocessing stage or during the normal coding process.\u0000 We show how the <italic>flow graph</italic> can provide independent structural information. Although the flow graph may be said to exist as soon as a program has been designed, it is most readily generated from the program statements. “Bad” structure can be detected objectively, and “good” programs can be reconstituted to reveal their block structure more clearly. Our implementation is based on an algorithm suggested by Peterson et al (CACM, August 1973). We have extended this algorithm to automatically detect block exits.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Multi-State Information System (MSIS), a patient oriented, clinical and administrative system designed for use in Psychiatric hospitals and Community Mental Health Centers, is currently in use in twelve states and several countries. The need to protect the confidentiality of the highly sensitive data stored by the users of this system and at the same time provide ease of access to a wide range of non-technical personnel actively engaged in the legitimate use of this data was mandatory. This paper describes the MSIS FRONTEND processing which was designed to accommodate authorized personnel who are not technically sophisticated, and at the same time, deny access to unauthorized personnel by combining the FRONTEND with internal OS and HASP modifications also described.
{"title":"The multi-state information system: frontend processing and data security","authors":"W. Zeitz, B. Fairman, B. Zeitz","doi":"10.1145/1408800.1408885","DOIUrl":"https://doi.org/10.1145/1408800.1408885","url":null,"abstract":"The Multi-State Information System (MSIS), a patient oriented, clinical and administrative system designed for use in Psychiatric hospitals and Community Mental Health Centers, is currently in use in twelve states and several countries. The need to protect the confidentiality of the highly sensitive data stored by the users of this system and at the same time provide ease of access to a wide range of non-technical personnel actively engaged in the legitimate use of this data was mandatory. This paper describes the MSIS FRONTEND processing which was designed to accommodate authorized personnel who are not technically sophisticated, and at the same time, deny access to unauthorized personnel by combining the FRONTEND with internal OS and HASP modifications also described.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122019223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As hardware technology progressed in the 1960's, we developed very sophisticated computer systems dedicated to our burgeoning communications requirements. The result is today's "front end" computer, a special purpose system devoted to collecting, storing, and presenting data to the more general purpose computer connected behind it.
{"title":"Data base machines used as rear-end processors","authors":"M. O'Connell","doi":"10.1145/1408800.1408897","DOIUrl":"https://doi.org/10.1145/1408800.1408897","url":null,"abstract":"As hardware technology progressed in the 1960's, we developed very sophisticated computer systems dedicated to our burgeoning communications requirements. The result is today's \"front end\" computer, a special purpose system devoted to collecting, storing, and presenting data to the more general purpose computer connected behind it.","PeriodicalId":204185,"journal":{"name":"ACM '74","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130024368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}