首页 > 最新文献

ACM '84最新文献

英文 中文
Beyond the data processing horizon 超出数据处理的范围
Pub Date : 1985-09-01 DOI: 10.1145/800171.809657
C. Hammer
The transition to the post-industrial society is characterized by the introduction of electronic computer-communication systems whose mind- amplifying powers have made data and information our most precious resource. Realtime services provide knowledge workers with access to powerful information systems, in offices, factories, laboratories, class rooms and even the home. Spectacular hardware progress has been attributed to the “miracle of the chip”. We find such chips at the heart of computers, communication devices, and input/output peripherals with whose help we perform such functions as packet-switched communications, distributed data bases, and computer networking. Powerful software engineering tools brought into existence new and improved programming languages, powerful computer operating systems, and a plethora of applications programs. These advances have also created problems. As the data trail grew, citizens voiced their concern about privacy protection of these data. Computer security and the design of trusted computer bases are expected to stem the rising tide of reported “computer crimes”. Electronic Funds Transfer Systems are used to move astronomical sums of “virtual money” over worldwide networks; “virtual books” and other electronic communications are being read widely and instantaneously without the need for hard copy; mechanical slide rules and mechanical watches have gone the way of the Dodo Bird after being replaced by their electronic offspring. Their is even talk of impending changes in the structures of our institutions as a consequence of the pervasive transfer of this new technology into the hands of everyone.
向后工业社会过渡的特点是电子计算机通信系统的引入,其放大思维的能力使数据和信息成为我们最宝贵的资源。实时服务为知识工作者提供了在办公室、工厂、实验室、教室甚至家中使用强大信息系统的途径。惊人的硬件进步被归功于“芯片奇迹”。我们在计算机、通信设备和输入/输出外设的核心发现了这样的芯片,它们帮助我们执行诸如分组交换通信、分布式数据库和计算机网络等功能。强大的软件工程工具带来了新的和改进的编程语言,强大的计算机操作系统,以及大量的应用程序。这些进步也带来了问题。随着数据轨迹的增长,公民表达了对这些数据隐私保护的担忧。计算机安全以及可信计算机基地的设计有望遏制不断上升的“计算机犯罪”报告。电子资金转移系统用于在全球网络上转移天文数字的“虚拟货币”;“虚拟图书”和其他电子通讯正在被广泛和即时地阅读,而不需要硬拷贝;机械计算尺和机械表在被电子产品所取代后,已经走上了渡渡鸟的道路。他们甚至谈到,由于这种新技术广泛地转移到每个人手中,我们的机构结构即将发生变化。
{"title":"Beyond the data processing horizon","authors":"C. Hammer","doi":"10.1145/800171.809657","DOIUrl":"https://doi.org/10.1145/800171.809657","url":null,"abstract":"The transition to the post-industrial society is characterized by the introduction of electronic computer-communication systems whose mind- amplifying powers have made data and information our most precious resource. Realtime services provide knowledge workers with access to powerful information systems, in offices, factories, laboratories, class rooms and even the home. Spectacular hardware progress has been attributed to the “miracle of the chip”. We find such chips at the heart of computers, communication devices, and input/output peripherals with whose help we perform such functions as packet-switched communications, distributed data bases, and computer networking. Powerful software engineering tools brought into existence new and improved programming languages, powerful computer operating systems, and a plethora of applications programs.\u0000 These advances have also created problems. As the data trail grew, citizens voiced their concern about privacy protection of these data. Computer security and the design of trusted computer bases are expected to stem the rising tide of reported “computer crimes”. Electronic Funds Transfer Systems are used to move astronomical sums of “virtual money” over worldwide networks; “virtual books” and other electronic communications are being read widely and instantaneously without the need for hard copy; mechanical slide rules and mechanical watches have gone the way of the Dodo Bird after being replaced by their electronic offspring. Their is even talk of impending changes in the structures of our institutions as a consequence of the pervasive transfer of this new technology into the hands of everyone.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1985-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131833946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The IEEE Software Engineering standards process IEEE软件工程标准流程
Pub Date : 1984-11-07 DOI: 10.1145/800171.809613
F. Buckley
Software Engineering has emerged as a field in recent years, and those involved increasingly recognize the need for standards. As a result, members of the Institute of Electrical and Electronics Engineers (IEEE) formed a subcommittee to develop these standards. This paper discusses the ongoing standards development, and associated efforts.
软件工程在最近几年已经成为一个领域,并且那些涉及到的人越来越认识到对标准的需求。因此,电气和电子工程师协会(IEEE)的成员组成了一个小组委员会来制定这些标准。本文讨论了正在进行的标准开发和相关工作。
{"title":"The IEEE Software Engineering standards process","authors":"F. Buckley","doi":"10.1145/800171.809613","DOIUrl":"https://doi.org/10.1145/800171.809613","url":null,"abstract":"Software Engineering has emerged as a field in recent years, and those involved increasingly recognize the need for standards. As a result, members of the Institute of Electrical and Electronics Engineers (IEEE) formed a subcommittee to develop these standards. This paper discusses the ongoing standards development, and associated efforts.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1984-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130012564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The ethics of macines which mimic people 模仿人类的机器的伦理
Pub Date : 1900-01-01 DOI: 10.1145/800171.809648
T. Winograd
In presenting machines as “intelligent” we produce an illusion which may be beneficial, may lead to breakdown in the interaction, or may be used by parties to deceive and exploit others. The following quote (from a researcher at a major computer firm) is a bit extreme, but makes it clear the concern clear. “From my point of view, natural language processing is unethical for one main reason: It plays on the central position which language holds in human behavior. I suggest that the deep involvement Weizenbaum found some people to have with ELIZA, is due to the intensity with which most people react to language in any form. When a person sees a lingusitic utterance in any form, the person reacts, much as a dog reacts to an odor. We are creatures of language .... Since this is so, it is my feeling that baiting people with strings of characters (tokens) clearly intended by someone to be interpreted as SYMBOLS, is as much misrepresentation as would be your attempt to sell me property for which you had a false deed. In both cases, an attempt is made to encourage someone to believe that something is a thing other than what it is, AND, only one party in the interaction is aware of the deception.” This talk will examine the ethical and practical choices in developing machines which mimic human behavior.
在把机器描绘成“智能”的时候,我们产生了一种错觉,这种错觉可能是有益的,也可能导致交互中断,或者可能被各方用来欺骗和剥削他人。下面这句话(来自一家大型计算机公司的研究人员)有点极端,但它清楚地表明了人们的担忧。“在我看来,自然语言处理不道德的一个主要原因是:它占据了语言在人类行为中的核心地位。我认为,Weizenbaum发现一些人对ELIZA的深度参与,是由于大多数人对任何形式的语言反应的强度。当一个人看到任何形式的语言表达时,人都会做出反应,就像狗对气味的反应一样。我们是语言的生物....既然如此,我的感觉是,用一串字符(符号)来引诱人们,显然是有人想把它们解释为符号,这和你试图把你有虚假契约的财产卖给我一样,都是虚假的陈述。在这两种情况下,都是试图鼓励某人相信某件事是另一回事,而且只有一方在互动中意识到这种欺骗。”这次演讲将探讨在开发模仿人类行为的机器时的道德和实际选择。
{"title":"The ethics of macines which mimic people","authors":"T. Winograd","doi":"10.1145/800171.809648","DOIUrl":"https://doi.org/10.1145/800171.809648","url":null,"abstract":"In presenting machines as “intelligent” we produce an illusion which may be beneficial, may lead to breakdown in the interaction, or may be used by parties to deceive and exploit others.\u0000 The following quote (from a researcher at a major computer firm) is a bit extreme, but makes it clear the concern clear.\u0000 “From my point of view, natural language processing is unethical for one main reason: It plays on the central position which language holds in human behavior. I suggest that the deep involvement Weizenbaum found some people to have with ELIZA, is due to the intensity with which most people react to language in any form. When a person sees a lingusitic utterance in any form, the person reacts, much as a dog reacts to an odor. We are creatures of language .... Since this is so, it is my feeling that baiting people with strings of characters (tokens) clearly intended by someone to be interpreted as SYMBOLS, is as much misrepresentation as would be your attempt to sell me property for which you had a false deed. In both cases, an attempt is made to encourage someone to believe that something is a thing other than what it is, AND, only one party in the interaction is aware of the deception.”\u0000 This talk will examine the ethical and practical choices in developing machines which mimic human behavior.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115670519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the scope of static checking in definitional languages 论定义语言中静态检查的作用范围
Pub Date : 1900-01-01 DOI: 10.1145/800171.809622
B. Szymanski, N. Prywes, E. Lock, A. Pnueli
The paper concerns the use in software development of a class of very high level languages characterized as definitional, where a specification of a program consists of assertions expressed as conditional equations. As compared to logic programming, where assertion are expressed in the form of Horn clauses, definitional languages are more amenable to efficient compilation. Also, use of equations is a natural way of expressing mathematical models in science, engineering and economics, where computer simulation of such models is often required. Finally, definitional languages are well suited for programming dataflow machines, another important building block in a Fifth Generation Project. Thus, in many applications definitional languages are preferred choice for programming new generation computers. In using definitional languages to develop programs, a user relies heavily on static analysis during the compilation stage of development, as compared to the traditional practice of relying much more extensively on dynamic analysis performed by execution of the program with test data. As this seems to be the common trend in development of all software tools for Fifth Generation Computers, the limits of static checking are investigated for definitional languages in this paper. A comprehensive approach to selecting and implementing automatic checks in the compiler is proposed. The checking methodology consists of representing the specification of a program by a directed graph and propagating various attributes throughout the entire graph. The choice of attributes and checks depends greatly on the types of errors that users are prone to make. This approach is described in the context of the MODEL language and compiler. The paper reports also on an experiment to evaluate the effectiveness of various checking methods incorporated in the compiler and on reliance of static vs dynamic methods of checking. The types of checking constructed were: syntax analysis, ambiguity in naming, completeness of definitions, data type consistency, dimensionality (corresponds to nesting of loops), ranges of dimensions (corresponds to loop terminations) and circular logic.
本文关注的是在软件开发中使用一类非常高级的语言,其特征是定义的,其中程序的规范由表示为条件方程的断言组成。与逻辑编程(断言以Horn子句的形式表示)相比,定义语言更易于高效编译。此外,在科学、工程和经济学中,使用方程是表达数学模型的一种自然方式,在这些领域中经常需要对这些模型进行计算机模拟。最后,定义语言非常适合编程数据流机器,这是第五代项目中的另一个重要构建块。因此,在许多应用程序中,定义语言是新一代计算机编程的首选。在使用定义语言开发程序时,用户在开发的编译阶段严重依赖于静态分析,而传统的实践则更广泛地依赖于通过使用测试数据执行程序来执行的动态分析。由于这似乎是第五代计算机所有软件工具发展的共同趋势,本文研究了定义语言的静态检查的局限性。提出了一种在编译器中选择和实现自动检查的综合方法。检查方法包括用有向图表示程序的规范,并在整个图中传播各种属性。属性和检查的选择在很大程度上取决于用户容易犯的错误类型。这种方法是在MODEL语言和编译器的上下文中描述的。本文还报道了一个实验,以评估编译器中包含的各种检查方法的有效性,以及静态检查方法与动态检查方法的依赖关系。所构建的检查类型有:语法分析、命名中的歧义、定义的完整性、数据类型一致性、维度(对应于循环嵌套)、维度范围(对应于循环终止)和循环逻辑。
{"title":"On the scope of static checking in definitional languages","authors":"B. Szymanski, N. Prywes, E. Lock, A. Pnueli","doi":"10.1145/800171.809622","DOIUrl":"https://doi.org/10.1145/800171.809622","url":null,"abstract":"The paper concerns the use in software development of a class of very high level languages characterized as definitional, where a specification of a program consists of assertions expressed as conditional equations. As compared to logic programming, where assertion are expressed in the form of Horn clauses, definitional languages are more amenable to efficient compilation. Also, use of equations is a natural way of expressing mathematical models in science, engineering and economics, where computer simulation of such models is often required. Finally, definitional languages are well suited for programming dataflow machines, another important building block in a Fifth Generation Project. Thus, in many applications definitional languages are preferred choice for programming new generation computers.\u0000 In using definitional languages to develop programs, a user relies heavily on static analysis during the compilation stage of development, as compared to the traditional practice of relying much more extensively on dynamic analysis performed by execution of the program with test data. As this seems to be the common trend in development of all software tools for Fifth Generation Computers, the limits of static checking are investigated for definitional languages in this paper.\u0000 A comprehensive approach to selecting and implementing automatic checks in the compiler is proposed. The checking methodology consists of representing the specification of a program by a directed graph and propagating various attributes throughout the entire graph. The choice of attributes and checks depends greatly on the types of errors that users are prone to make. This approach is described in the context of the MODEL language and compiler. The paper reports also on an experiment to evaluate the effectiveness of various checking methods incorporated in the compiler and on reliance of static vs dynamic methods of checking. The types of checking constructed were: syntax analysis, ambiguity in naming, completeness of definitions, data type consistency, dimensionality (corresponds to nesting of loops), ranges of dimensions (corresponds to loop terminations) and circular logic.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":" 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120935927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
User identification, access control, and audit requirements 用户标识、访问控制和审计需求
Pub Date : 1900-01-01 DOI: 10.1145/800171.809639
L. Chalmers
Good computer security depends upon knowing who is using the system and managing how each individual is able to access the information on the system. The next generation of computer should build in the kind of controls which are often added on to today's systems. This session will discuss the objectives for positively identifying system users, controlling their use of computerized resources, and providing accountability for users who are authorized and for those who attempt to exceed their authority. Traditionally, user identification depends upon an identification code (ID) and a password. Password security has proven to be weak: where users are allowed to select their own passwords, they tend to select ones that are easily guessed, and where passwords are assigned, the users tend to write them down. Future user identification systems should expand into something a user has (e.g. a badge) or something a user is (e.g. fingerprints). Signature verification is a technology which is worth improving since it offers good security within existing legal and social contexts. Ideally, user identification and authentication should be based upon a combination of two or more technologies.
良好的计算机安全取决于知道谁在使用系统,并管理每个人如何能够访问系统上的信息。下一代计算机应该内置那种经常被添加到当今系统中的控制功能。本次会议将讨论积极识别系统用户的目标,控制他们使用计算机化资源,并为获得授权的用户和试图超越其权限的用户提供责任。传统上,用户识别依赖于识别码(ID)和密码。密码安全性已被证明是很弱的:在允许用户选择自己的密码的情况下,他们倾向于选择容易被猜到的密码,而在分配密码的情况下,用户倾向于把密码写下来。未来的用户识别系统应该扩展到用户拥有的东西(例如徽章)或用户是什么(例如指纹)。签名验证是一项值得改进的技术,因为它在现有的法律和社会环境中提供了良好的安全性。理想情况下,用户识别和身份验证应该基于两种或多种技术的组合。
{"title":"User identification, access control, and audit requirements","authors":"L. Chalmers","doi":"10.1145/800171.809639","DOIUrl":"https://doi.org/10.1145/800171.809639","url":null,"abstract":"Good computer security depends upon knowing who is using the system and managing how each individual is able to access the information on the system. The next generation of computer should build in the kind of controls which are often added on to today's systems. This session will discuss the objectives for positively identifying system users, controlling their use of computerized resources, and providing accountability for users who are authorized and for those who attempt to exceed their authority.\u0000 Traditionally, user identification depends upon an identification code (ID) and a password. Password security has proven to be weak: where users are allowed to select their own passwords, they tend to select ones that are easily guessed, and where passwords are assigned, the users tend to write them down. Future user identification systems should expand into something a user has (e.g. a badge) or something a user is (e.g. fingerprints). Signature verification is a technology which is worth improving since it offers good security within existing legal and social contexts. Ideally, user identification and authentication should be based upon a combination of two or more technologies.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126835840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge acquisition for classification expert systems 分类专家系统的知识获取
Pub Date : 1900-01-01 DOI: 10.1145/800171.809597
W. Clancey
Expert systems are generally described by a mixture of terms that confuse implementation language with knowledge structure and the search process. This confusion makes it difficult to analyze new problems and to derive a set of knowledge engineering principles. A rigorous, logical description of expert systems reveals that a small set of terms and relations can be used to describe many rule-based expert systems. In particular, one common method for solving problems is by classification—heuristically relating data abstractions to a preenumerated network of solutions. This model can be used as a framework for knowledge acquisition, particularly in the early stages for organizing the expert's vocabulary and decomposing problems.
专家系统通常是由一些混淆了实现语言、知识结构和搜索过程的术语来描述的。这种混淆使得分析新问题和推导出一套知识工程原理变得困难。对专家系统的严格、逻辑的描述表明,一小组术语和关系可以用来描述许多基于规则的专家系统。特别是,解决问题的一种常用方法是通过启发式分类将数据抽象与预先列举的解决方案网络联系起来。该模型可以用作知识获取的框架,特别是在组织专家词汇和分解问题的早期阶段。
{"title":"Knowledge acquisition for classification expert systems","authors":"W. Clancey","doi":"10.1145/800171.809597","DOIUrl":"https://doi.org/10.1145/800171.809597","url":null,"abstract":"Expert systems are generally described by a mixture of terms that confuse implementation language with knowledge structure and the search process. This confusion makes it difficult to analyze new problems and to derive a set of knowledge engineering principles. A rigorous, logical description of expert systems reveals that a small set of terms and relations can be used to describe many rule-based expert systems. In particular, one common method for solving problems is by classification—heuristically relating data abstractions to a preenumerated network of solutions. This model can be used as a framework for knowledge acquisition, particularly in the early stages for organizing the expert's vocabulary and decomposing problems.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124182221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
ACE: Going from prototype to product with an expert system ACE:用专家系统从原型到产品
Pub Date : 1900-01-01 DOI: 10.1145/800171.809599
Jon R. Wright, F. Miller, G. V. E. Otto, Elizabeth M. Siegfried, Gregg T. Vesonder, J. E. Zielinski
ACE (Automated Cable Expertise) is a knowledge-based expert system that provides trouble-shooting and diagnostic reports for telephone company managers. Its application domain is telephone cable maintenance. ACE departs from standard expert system architecture in that a separate data base system is used as its primary source of information. ACE designers were influenced by the R1/XCON project, and ACE uses techniques similar to those of R1/XCON. This paper reports the progress of ACE as it moves out of experimentation and into a live software environment, and characterizes it in terms of current expert system technology.
ACE(自动电缆专家)是一个以知识为基础的专家系统,为电话公司经理提供故障排除和诊断报告。它的应用领域是电话电缆维护。ACE不同于标准的专家系统架构,它使用一个单独的数据库系统作为其主要的信息源。ACE设计师受到了R1/XCON项目的影响,ACE使用了与R1/XCON类似的技术。本文报道了ACE从实验阶段进入实时软件环境的进展,并从当前专家系统技术的角度对其进行了描述。
{"title":"ACE: Going from prototype to product with an expert system","authors":"Jon R. Wright, F. Miller, G. V. E. Otto, Elizabeth M. Siegfried, Gregg T. Vesonder, J. E. Zielinski","doi":"10.1145/800171.809599","DOIUrl":"https://doi.org/10.1145/800171.809599","url":null,"abstract":"ACE (Automated Cable Expertise) is a knowledge-based expert system that provides trouble-shooting and diagnostic reports for telephone company managers. Its application domain is telephone cable maintenance. ACE departs from standard expert system architecture in that a separate data base system is used as its primary source of information. ACE designers were influenced by the R1/XCON project, and ACE uses techniques similar to those of R1/XCON. This paper reports the progress of ACE as it moves out of experimentation and into a live software environment, and characterizes it in terms of current expert system technology.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124382178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Delivering the word—integrating publications technologies 提供整合文字的出版技术
Pub Date : 1900-01-01 DOI: 10.1145/800171.809663
Sharon C. Adler
The panelists will provide a concise overview describing the role of the Standard Document Markup Metalanguage in modern integrated, automated publication processing systems. The Metalanguage is being developed concurrently within the American National Standards Institute (ANSI) Task Group X3J6.1 and the International Organisation for Standardisation (ISO) Working Group TC97/SC/18/WG8. The main thrust of the Metalanguage is to allow documents to be created by an author in a form which allows interchange across a broad range of dissimilar processing systems or devices. All types of documents may be handled, including office documents, books and journals, and technical documentation. These documents may be generated in any sector—academic, commercial, governmental, or industrial. The rationale for the basic premise of the Standard Document Markup Metalanguage—separation of form and content—will be established. The application of the logical (editorial) structure of a document will be shown. Structure designation is accomplished with explicit, unambiguous, and simple markup codes for each editorial element included in a given document. The process by which the generation of multiple, different output product forms (e.g., photocomposed pages, databases, online documentation, videotex, etc.) from the same coded source file will be described. The panelists will also discuss how the standard may be implemented in various environments.
小组成员将简要概述标准文档标记元语言在现代集成、自动化出版处理系统中的作用。元语言是由美国国家标准协会(ANSI)工作组X3J6.1和国际标准化组织(ISO)工作组TC97/SC/18/WG8同时开发的。元语言的主旨是允许作者以一种允许在广泛的不同处理系统或设备之间交换的形式创建文档。所有类型的文档都可以处理,包括办公文档、书籍和期刊以及技术文档。这些文件可能产生于任何部门——学术、商业、政府或工业。将建立标准文档标记元语言基本前提的基本原理——形式和内容的分离。将展示文档的逻辑(编辑)结构的应用。结构指定是通过为给定文档中包含的每个编辑元素使用显式、明确和简单的标记代码来完成的。将描述从同一编码源文件生成多种不同输出产品形式(例如,照相页、数据库、在线文档、视频文本等)的过程。小组成员还将讨论如何在各种环境中实现该标准。
{"title":"Delivering the word—integrating publications technologies","authors":"Sharon C. Adler","doi":"10.1145/800171.809663","DOIUrl":"https://doi.org/10.1145/800171.809663","url":null,"abstract":"The panelists will provide a concise overview describing the role of the Standard Document Markup Metalanguage in modern integrated, automated publication processing systems. The Metalanguage is being developed concurrently within the American National Standards Institute (ANSI) Task Group X3J6.1 and the International Organisation for Standardisation (ISO) Working Group TC97/SC/18/WG8. The main thrust of the Metalanguage is to allow documents to be created by an author in a form which allows interchange across a broad range of dissimilar processing systems or devices. All types of documents may be handled, including office documents, books and journals, and technical documentation. These documents may be generated in any sector—academic, commercial, governmental, or industrial.\u0000 The rationale for the basic premise of the Standard Document Markup Metalanguage—separation of form and content—will be established. The application of the logical (editorial) structure of a document will be shown. Structure designation is accomplished with explicit, unambiguous, and simple markup codes for each editorial element included in a given document. The process by which the generation of multiple, different output product forms (e.g., photocomposed pages, databases, online documentation, videotex, etc.) from the same coded source file will be described.\u0000 The panelists will also discuss how the standard may be implemented in various environments.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126258005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compiling prolog programs for parallel execution on a cellular machine 编译在元胞机器上并行执行的前序程序
Pub Date : 1900-01-01 DOI: 10.1145/800171.809619
Alexis Koster
This paper investigates features of a PROLOG compiler for Mago's cellular machine. The compiler generates parallel FFP (Formal Functional Programming) code. Hence high efficiency in the execution of PROLOG programs can be achieved on this machine, owing to the almost unbounded parallelism it can accommodate. Techniques for implementing the parallel evaluation of the clauses of a relation (OR parallelism) are given. Problems in the exploitation of the parallel evaluation of a conjunction of goals (AND parallelism) are discussed. An FFP representation of the run-time environment of PROLOG is given. It is based on a previously published FFP implementation of unification. It allows matching of arguments through unification in linear time and space.
本文研究了用于Mago细胞机器的PROLOG编译器的特点。编译器生成并行的FFP(形式函数式编程)代码。因此,由于它可以容纳几乎无界的并行性,在这台机器上可以实现PROLOG程序的高效率执行。给出了实现关系子句并行求值(或并行)的技术。讨论了目标结合并行性评价的开发中存在的问题。给出了PROLOG运行环境的FFP表示。它基于先前发布的FFP统一实现。它允许通过线性时间和空间的统一来匹配参数。
{"title":"Compiling prolog programs for parallel execution on a cellular machine","authors":"Alexis Koster","doi":"10.1145/800171.809619","DOIUrl":"https://doi.org/10.1145/800171.809619","url":null,"abstract":"This paper investigates features of a PROLOG compiler for Mago's cellular machine. The compiler generates parallel FFP (Formal Functional Programming) code. Hence high efficiency in the execution of PROLOG programs can be achieved on this machine, owing to the almost unbounded parallelism it can accommodate.\u0000 Techniques for implementing the parallel evaluation of the clauses of a relation (OR parallelism) are given. Problems in the exploitation of the parallel evaluation of a conjunction of goals (AND parallelism) are discussed. An FFP representation of the run-time environment of PROLOG is given. It is based on a previously published FFP implementation of unification. It allows matching of arguments through unification in linear time and space.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134211881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Modern educational techniques - high tech and the traditional approach 现代教育技术——高科技和传统方法
Pub Date : 1900-01-01 DOI: 10.1145/800171.809667
Tim Leso
Personal computers are enhancing the teaching techniques that are currently being used in classrooms and laboratories. They also possess the potential to transform the dormitories and other homework units into new forms of learning centers. Here at The Altoona Campus of The Pennsylvania State University, new technology and the traditional approach are being merged, tested, and accepted by students, faculty, and administrators as modern educational techniques leading into the 1990s. Typifying these techniques is a case study of a complex and tedious teaching task of instructing a novice to design a “shape table” and implement a program that personally demonstrates the color graphics capability of the APPLE Personal Computer and provides a fundamental understanding of the concepts of computer graphics.
个人电脑正在加强目前在教室和实验室使用的教学技术。它们还具有将宿舍和其他作业单元转变为新型学习中心的潜力。在宾夕法尼亚州立大学的阿尔图纳校区,新技术和传统方法正在被学生、教师和管理人员融合、测试并接受,作为引领20世纪90年代的现代教育技术。这些技术的典型是一个复杂而乏味的教学任务的案例研究,指导新手设计一个“形状表”,并实现一个程序,亲自演示APPLE个人计算机的彩色图形功能,并提供对计算机图形学概念的基本理解。
{"title":"Modern educational techniques - high tech and the traditional approach","authors":"Tim Leso","doi":"10.1145/800171.809667","DOIUrl":"https://doi.org/10.1145/800171.809667","url":null,"abstract":"Personal computers are enhancing the teaching techniques that are currently being used in classrooms and laboratories. They also possess the potential to transform the dormitories and other homework units into new forms of learning centers. Here at The Altoona Campus of The Pennsylvania State University, new technology and the traditional approach are being merged, tested, and accepted by students, faculty, and administrators as modern educational techniques leading into the 1990s. Typifying these techniques is a case study of a complex and tedious teaching task of instructing a novice to design a “shape table” and implement a program that personally demonstrates the color graphics capability of the APPLE Personal Computer and provides a fundamental understanding of the concepts of computer graphics.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"617 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134452867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM '84
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1