An overview of the goals, methods and progress of the Programmer's Apprentice Project: The goals of the project are to develop an artificial intelligence theory of how expert programmers analyze, synthesize, modify, explain, verify and document programs, and to apply that theory towards automating the programming process. Recognizing that the long-term goal of totally automatic programming is very far off, we are presently concentrating on applying our research towards developing an intelligent computer assistant for programmers, called the Programmer's apprentice. One of our key observations is that expert programmers rely heavily on a large body of standard implementation methods and program forms. A central part of the research has therefore been to identify and codify these standard forms. For this purpose, we have developed a programming-language independent formalism, called the Plan Calculus, in which these standard forms can be written down in a canonical and abstract way, and used by an automatic programming system. An initial library of several hundred plans using has been compiled using this formalism.
{"title":"Artificial intelligence and software engineering: The Programmer's Apprentice project","authors":"C. Rich","doi":"10.1145/800171.809600","DOIUrl":"https://doi.org/10.1145/800171.809600","url":null,"abstract":"An overview of the goals, methods and progress of the Programmer's Apprentice Project:\u0000 The goals of the project are to develop an artificial intelligence theory of how expert programmers analyze, synthesize, modify, explain, verify and document programs, and to apply that theory towards automating the programming process. Recognizing that the long-term goal of totally automatic programming is very far off, we are presently concentrating on applying our research towards developing an intelligent computer assistant for programmers, called the Programmer's apprentice.\u0000 One of our key observations is that expert programmers rely heavily on a large body of standard implementation methods and program forms. A central part of the research has therefore been to identify and codify these standard forms. For this purpose, we have developed a programming-language independent formalism, called the Plan Calculus, in which these standard forms can be written down in a canonical and abstract way, and used by an automatic programming system. An initial library of several hundred plans using has been compiled using this formalism.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134360562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Creating a new mode of computing in a laboratory is a technological experiment. Transferring that same new mode computing to the lay public for routine use is a social experiment[1]. This distinction is similar to that between developing chemical compounds in a laboratory and disbursing new drugs on a large scale to the lay public. In the case of drugs, the public has come to expect careful experimentation, serious attempts by professionals to learn about the appropriateness of new drugs and successes and failures, and informed consent. Similar guidelines have not been adopted by engineers or computer scientists. This talk explores the meaning of experimentation and informed consent for the use of especially novel and powerful computer-based technologies.
{"title":"Computing applications as social experimentation","authors":"R. Schinzinger","doi":"10.1145/800171.809650","DOIUrl":"https://doi.org/10.1145/800171.809650","url":null,"abstract":"Creating a new mode of computing in a laboratory is a technological experiment. Transferring that same new mode computing to the lay public for routine use is a social experiment[1]. This distinction is similar to that between developing chemical compounds in a laboratory and disbursing new drugs on a large scale to the lay public. In the case of drugs, the public has come to expect careful experimentation, serious attempts by professionals to learn about the appropriateness of new drugs and successes and failures, and informed consent. Similar guidelines have not been adopted by engineers or computer scientists. This talk explores the meaning of experimentation and informed consent for the use of especially novel and powerful computer-based technologies.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"69 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131602766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The panelists describe the organization and current activities of the agencies with which they are associated. Brief descriptions of some past and currently funded activities in computer science and computers-and-education are presented. The areas in which funding is currently available are highlighted.
{"title":"Government agencies' activities in education","authors":"D. Lidtke","doi":"10.1145/800171.809672","DOIUrl":"https://doi.org/10.1145/800171.809672","url":null,"abstract":"The panelists describe the organization and current activities of the agencies with which they are associated. Brief descriptions of some past and currently funded activities in computer science and computers-and-education are presented. The areas in which funding is currently available are highlighted.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124775190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This session will focus on the problems for information policy in a democracy raised by new fifth generation computer technology. Panelists will discuss the theoretical role of information technology in a democracy and the special problems of accountability and privacy. The possibility of new regulation and legislation will be discussed, as well as the development of new techniques by the executive branch such as matching and data bases.
{"title":"Workplace impacts—ai and automation: Privacy and accountability of large-scale high-capacity personal data systems","authors":"L. Gasser, K. Laudon","doi":"10.1145/800171.809652","DOIUrl":"https://doi.org/10.1145/800171.809652","url":null,"abstract":"This session will focus on the problems for information policy in a democracy raised by new fifth generation computer technology. Panelists will discuss the theoretical role of information technology in a democracy and the special problems of accountability and privacy. The possibility of new regulation and legislation will be discussed, as well as the development of new techniques by the executive branch such as matching and data bases.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"4 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126040075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arriving at all the requirements of a large software system is a very difficult task, whose success or failure significantly affects the system design and implementation. A user oriented approach is suggested in this paper, that expands the definition of a user and allows hierarchal decomposition of users. Requirements are formed at the elementary level of the users and then composed to upper levels and checked. The checks are done against the real needs of the user community rather then among the requirements themselves. A possible use of automated tools in this process is suggested.
{"title":"A user's approach to requirements analysis of a large software system","authors":"M. Burstin, M. Ben-Bassat","doi":"10.1145/800171.809615","DOIUrl":"https://doi.org/10.1145/800171.809615","url":null,"abstract":"Arriving at all the requirements of a large software system is a very difficult task, whose success or failure significantly affects the system design and implementation. A user oriented approach is suggested in this paper, that expands the definition of a user and allows hierarchal decomposition of users. Requirements are formed at the elementary level of the users and then composed to upper levels and checked. The checks are done against the real needs of the user community rather then among the requirements themselves. A possible use of automated tools in this process is suggested.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123444580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Artificial Intelligence is rapidly emerging from the laboratory into the market-place. Industrial robots are cost effective in a wide range of manufacturing tasks. Expert systems are commercially available and scientifically useful. Sophisticated chess machines are routinely sold in retail outlets. Assaulted by the unprecedented pace of these developments, society is confronted with assimilating these “apparently- intelligent” artifacts. This paper will view these developments in the context of a hierarchy for classifying social impact. We examine to what extent does the appearance of apparently-intelligent machines produce a paradigmatic shift in how society defines itself and its social relations to these machines. Our analysis is performed in the framework of a taxonomy for segregating the continuum of effects that occur when advanced computer technology impacts society.
{"title":"A hierarchy for classifying AI implications","authors":"I. Pohl","doi":"10.1145/800171.809655","DOIUrl":"https://doi.org/10.1145/800171.809655","url":null,"abstract":"Artificial Intelligence is rapidly emerging from the laboratory into the market-place. Industrial robots are cost effective in a wide range of manufacturing tasks. Expert systems are commercially available and scientifically useful. Sophisticated chess machines are routinely sold in retail outlets. Assaulted by the unprecedented pace of these developments, society is confronted with assimilating these “apparently- intelligent” artifacts. This paper will view these developments in the context of a hierarchy for classifying social impact.\u0000 We examine to what extent does the appearance of apparently-intelligent machines produce a paradigmatic shift in how society defines itself and its social relations to these machines. Our analysis is performed in the framework of a taxonomy for segregating the continuum of effects that occur when advanced computer technology impacts society.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125791090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This session presents the security and integrity needs of the business sector in the form of recommendations and design criteria. Concerns, requirements, and suggested specifications are discussed in the hopes that fifth generation designers integrate the recommendations into hardware and software.
{"title":"Security and audit: Needs of the business sector for security and integrity controls","authors":"Richard A. Smith, L. Chalmers, C. Wood","doi":"10.1145/800171.809638","DOIUrl":"https://doi.org/10.1145/800171.809638","url":null,"abstract":"This session presents the security and integrity needs of the business sector in the form of recommendations and design criteria. Concerns, requirements, and suggested specifications are discussed in the hopes that fifth generation designers integrate the recommendations into hardware and software.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130093319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Soong, Charles Atwood, C. Eastman, W. Mitchell, D. Stoker
This panel session is supported by the American Institute of Architects, the AIA. The purpose of this panel is to publicize the computing needs of the building industry, which consists primarily of architects, engineers, and contractors. We thank the AIA Computers in Architecture Committee for assisting in selecting this group of panelists to speak at the ACM84" on this subject as individual industry experts. To complement the ACM84' theme, “The Fifth Generation Challenge,” this panel will address the theme of the architect's quest for a computer. The material that will be presented at the panel session, is aimed to challenge and to stimulate visionary thinking. The session is not aimed at seeking answers, although some answers may be generated.
{"title":"Blueprints for the computer city: The quest for an architect's computer","authors":"N. Soong, Charles Atwood, C. Eastman, W. Mitchell, D. Stoker","doi":"10.1145/800171.809662","DOIUrl":"https://doi.org/10.1145/800171.809662","url":null,"abstract":"This panel session is supported by the American Institute of Architects, the AIA. The purpose of this panel is to publicize the computing needs of the building industry, which consists primarily of architects, engineers, and contractors. We thank the AIA Computers in Architecture Committee for assisting in selecting this group of panelists to speak at the ACM84\" on this subject as individual industry experts.\u0000 To complement the ACM84' theme, “The Fifth Generation Challenge,” this panel will address the theme of the architect's quest for a computer. The material that will be presented at the panel session, is aimed to challenge and to stimulate visionary thinking. The session is not aimed at seeking answers, although some answers may be generated.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130803333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Kling, T. Winograd, P. Smolensky, R. Schinzinger
The spread of computer applications throughout American society is a form of social action, not simply a “scientific” laboratory exercise. Like all social actions which effect the well-being of people, different approaches to computerization entail ethical judgements, however implicit. This session examines some ethical issues which are especially pertinent in the mobilization, development, and diffusion of new generation computing technologies.
{"title":"The impact and issues of the fifth generation: Ethical issues in new computing technologies","authors":"R. Kling, T. Winograd, P. Smolensky, R. Schinzinger","doi":"10.1145/800171.809646","DOIUrl":"https://doi.org/10.1145/800171.809646","url":null,"abstract":"The spread of computer applications throughout American society is a form of social action, not simply a “scientific” laboratory exercise. Like all social actions which effect the well-being of people, different approaches to computerization entail ethical judgements, however implicit. This session examines some ethical issues which are especially pertinent in the mobilization, development, and diffusion of new generation computing technologies.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130515976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Research into construction of a communication prosthesis for the handicapped requires a system that can model a user's past language acts. We describe a system that continuously adapts to a particular user's needs by maintaining an augmented transition network (ATN) and discuss methods for optimizing and generalizing the information in the network.
{"title":"Design of an ATN generator/modifier for supporting a communication prosthesis","authors":"R. Kegley, L. Boggess","doi":"10.1145/800171.809665","DOIUrl":"https://doi.org/10.1145/800171.809665","url":null,"abstract":"Research into construction of a communication prosthesis for the handicapped requires a system that can model a user's past language acts. We describe a system that continuously adapts to a particular user's needs by maintaining an augmented transition network (ATN) and discuss methods for optimizing and generalizing the information in the network.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133351377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}