首页 > 最新文献

ACM '83最新文献

英文 中文
The MBA and MIS: The integration of mis and management education MBA与管理信息系统:管理信息系统与管理教育的融合
Pub Date : 1900-01-01 DOI: 10.1145/800173.809744
B. Konsynski, J. Nunamaker
Over the past ten years, management information systems has emerged from obscurity to become one of the recognized functional areas of business and government. It is now impossible for most organizations to function without computer-aided information systems, and prospects are that organizations will become even more dependent upon such systems in the future. Computerized payroll systems, inventory systems, record and bookkeeping systems were among the first practical applications of modern computer technology in business and governmental organizations. As computer applications in organizations expanded, so did the volume of data collected. By the late 1960s, the need to coordinate this ever-increasing volume of data led to the concept of management information systems.
在过去的十年中,管理信息系统已经从默默无闻发展成为商业和政府公认的功能领域之一。现在大多数组织没有计算机辅助信息系统是不可能运作的,而且未来的组织可能会更加依赖于这些系统。计算机化的工资单系统、库存系统、记录和簿记系统是现代计算机技术在商业和政府组织中的第一批实际应用。随着计算机在组织中的应用扩大,收集的数据量也在增加。到1960年代后期,由于需要协调这种不断增加的数据量,因此产生了管理信息系统的概念。
{"title":"The MBA and MIS: The integration of mis and management education","authors":"B. Konsynski, J. Nunamaker","doi":"10.1145/800173.809744","DOIUrl":"https://doi.org/10.1145/800173.809744","url":null,"abstract":"Over the past ten years, management information systems has emerged from obscurity to become one of the recognized functional areas of business and government. It is now impossible for most organizations to function without computer-aided information systems, and prospects are that organizations will become even more dependent upon such systems in the future.\u0000 Computerized payroll systems, inventory systems, record and bookkeeping systems were among the first practical applications of modern computer technology in business and governmental organizations. As computer applications in organizations expanded, so did the volume of data collected. By the late 1960s, the need to coordinate this ever-increasing volume of data led to the concept of management information systems.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126444586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Considerations in the design of office DBMS's 办公数据库管理系统设计中的注意事项
Pub Date : 1900-01-01 DOI: 10.1145/800173.809689
Peter P. Chen
“Office Automation” has become a hot topic in recent years. There is considerable interest in developing database management systems (DBMS's) specifically for office applications. Before rushing into the bandwagon of developing office DBMS's the following factors should be considered:
“办公自动化”是近年来的一个热门话题。人们对开发专门用于办公应用程序的数据库管理系统(DBMS)非常感兴趣。在投身于开发办公DBMS的潮流之前,应该考虑以下因素:
{"title":"Considerations in the design of office DBMS's","authors":"Peter P. Chen","doi":"10.1145/800173.809689","DOIUrl":"https://doi.org/10.1145/800173.809689","url":null,"abstract":"“Office Automation” has become a hot topic in recent years. There is considerable interest in developing database management systems (DBMS's) specifically for office applications. Before rushing into the bandwagon of developing office DBMS's the following factors should be considered:","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116584298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Why Ada is not just another programming language 为什么Ada不只是另一种编程语言
Pub Date : 1900-01-01 DOI: 10.1145/800173.809685
J. Sammet
Since there have been hundreds of high level languages developed over the past twenty years, many people are asking why there is so much fuss about Ada. The question is frequently asked—why isn't Ada just another programming language. Although Ada was developed to meet Department of Defense requirements, those requirements were really for embedded computer systems i.e. those in which the computer is integrated with additional hardware. Such systems certainly exist in the nonmilitary environment e.g. process control, microwave ovens, and so Ada is applicable to many cases which have no connection with the military. In addition to being a programming language, Ada provides support for software engineering concepts, as well as a programming support environment, and it is this combination which is unique. Ada is unique non-technically for social, economic, and political reasons which relate to the way in which it was developed and the way in which it is being viewed by many people and organizations. Ada is unique technically because of its support for the concept of software components, its excellent blend of modern useful features, and its support for the production of very large software systems.
由于在过去的二十年中已经开发了数百种高级语言,许多人都在问为什么对Ada如此大惊小怪。经常被问到的问题是:为什么Ada不只是另一种编程语言呢?虽然Ada是为了满足国防部的要求而开发的,但这些要求实际上是针对嵌入式计算机系统的,即那些计算机与其他硬件集成在一起的系统。这种系统当然存在于非军事环境中,例如过程控制,微波炉,因此Ada适用于许多与军事无关的情况。除了作为一种编程语言之外,Ada还提供了对软件工程概念的支持,以及编程支持环境,正是这种组合是独一无二的。Ada的独特之处在于社会、经济和政治方面的非技术原因,这些原因与它的发展方式以及许多人和组织对它的看法有关。Ada在技术上是独一无二的,因为它支持软件组件的概念,它出色地融合了现代有用的特性,并且它支持非常大的软件系统的生产。
{"title":"Why Ada is not just another programming language","authors":"J. Sammet","doi":"10.1145/800173.809685","DOIUrl":"https://doi.org/10.1145/800173.809685","url":null,"abstract":"Since there have been hundreds of high level languages developed over the past twenty years, many people are asking why there is so much fuss about Ada. The question is frequently asked—why isn't Ada just another programming language.\u0000 Although Ada was developed to meet Department of Defense requirements, those requirements were really for embedded computer systems i.e. those in which the computer is integrated with additional hardware. Such systems certainly exist in the nonmilitary environment e.g. process control, microwave ovens, and so Ada is applicable to many cases which have no connection with the military.\u0000 In addition to being a programming language, Ada provides support for software engineering concepts, as well as a programming support environment, and it is this combination which is unique. Ada is unique non-technically for social, economic, and political reasons which relate to the way in which it was developed and the way in which it is being viewed by many people and organizations. Ada is unique technically because of its support for the concept of software components, its excellent blend of modern useful features, and its support for the production of very large software systems.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114671967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
The future of commercial computing 商业计算的未来
Pub Date : 1900-01-01 DOI: 10.1145/800173.809703
Robert Gilges
United States' business computing power is dedicated to the transaction-based activities of companies, not to the needs of senior executives responsible for critical corporate decisions. Software supporting current business systems is absolete and inflexible. Antiquated, inappropriate software undermines business ability to compete. Business requires new better systems that will provide external competitive data, as well as economic and research data vital to strategic decisions concerning products, operations, production, marketing, personnel and investments. There are four approaches to these future systems - redesign, package software, retrofitting, and prototyping. Retrofitting provides a unique approach to the immediate problem of prolonging the aging application portfolio while prototyping will likely be an important future direction in system design and development.
美国的商业计算能力专门用于公司基于交易的活动,而不是用于负责公司关键决策的高级管理人员的需求。支持当前业务系统的软件是绝对的、不灵活的。过时的、不合适的软件会削弱企业的竞争能力。商业需要新的更好的系统,这些系统将提供外部竞争数据,以及对产品、运营、生产、营销、人员和投资等战略决策至关重要的经济和研究数据。这些未来的系统有四种方法——重新设计、软件包、改造和原型。改造提供了一种独特的方法来解决延长老化的应用程序组合的直接问题,而原型设计可能是系统设计和开发的一个重要的未来方向。
{"title":"The future of commercial computing","authors":"Robert Gilges","doi":"10.1145/800173.809703","DOIUrl":"https://doi.org/10.1145/800173.809703","url":null,"abstract":"United States' business computing power is dedicated to the transaction-based activities of companies, not to the needs of senior executives responsible for critical corporate decisions. Software supporting current business systems is absolete and inflexible. Antiquated, inappropriate software undermines business ability to compete. Business requires new better systems that will provide external competitive data, as well as economic and research data vital to strategic decisions concerning products, operations, production, marketing, personnel and investments. There are four approaches to these future systems - redesign, package software, retrofitting, and prototyping. Retrofitting provides a unique approach to the immediate problem of prolonging the aging application portfolio while prototyping will likely be an important future direction in system design and development.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132015429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DELTA: An expert system to troubleshoot diesel electric locomotives DELTA:解决柴油电力机车故障的专家系统
Pub Date : 1900-01-01 DOI: 10.1145/800173.809697
P. Bonissone
In the last few years, expert systems have become the most visible and fastest growing branch of Artificial Intelligence. Their objective is to capture the knowledge of an expert in a particular problem domain, represent it in a modular, expandable structure, and transfer it to other users in the same problem domain. To accomplish this goal, it is necessary to address issues of knowledge acquisition, knowledge representation, inference mechanisms, control strategies, user interface and dealing with uncertainty.
在过去的几年里,专家系统已经成为人工智能中最引人注目和发展最快的分支。他们的目标是获取专家在特定问题领域的知识,用模块化、可扩展的结构表示,并将其传递给同一问题领域的其他用户。为了实现这一目标,需要解决知识获取、知识表示、推理机制、控制策略、用户界面和不确定性处理等问题。
{"title":"DELTA: An expert system to troubleshoot diesel electric locomotives","authors":"P. Bonissone","doi":"10.1145/800173.809697","DOIUrl":"https://doi.org/10.1145/800173.809697","url":null,"abstract":"In the last few years, expert systems have become the most visible and fastest growing branch of Artificial Intelligence. Their objective is to capture the knowledge of an expert in a particular problem domain, represent it in a modular, expandable structure, and transfer it to other users in the same problem domain. To accomplish this goal, it is necessary to address issues of knowledge acquisition, knowledge representation, inference mechanisms, control strategies, user interface and dealing with uncertainty.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Directions in computer security 计算机安全方向
Pub Date : 1900-01-01 DOI: 10.1145/800173.809695
Anne-Marie Claybrook
One of the primary thrusts in operating system security has come from the Department of Defense (DoD), which early recognized the need for security controls in open use, multi-user, resource-shared computer systems.1 Two features in particular, mandatory access controls and security kernel technology, have been strongly promoted by the DoD. Mandatory access controls, necessary to support a security policy that cannot be circumvented by any user (in DoD's case, the national security policy regarding personnel clearances and data classifications) are being studied for their applicability to business2 and industry security problems. Security kernel technology is an implementation of the reference monitor concept, a security enforcement abstraction which views a computer system as composed of subjects (e.g., processes, users) and objects (e.g., files) and a reference monitor which checks each access by a subject to an object. In the past ten years, several attempts to build secure operating systems have utilized security kernel technology. While none of these attempts was practical from a performance point of view, the security kernel research still serves as a basis for current attempts to build secure systems. In a continuing effort to promote secure systems for DoD use, the DoD Computer Security Center was formed in 1981. One of the first tasks of the Center was to draft a “Trusted Computer System Evaluation Criteria” which defines various levels of protection for computer systems.3 In addition to listing feature requirements, including auditing, labelling, mandatory access controls, discretionary access controls, identification and authentication, the criteria discuss both the structure and development techniques used to produce trusted systems.
操作系统安全的主要推动力之一来自国防部(DoD),它很早就认识到在开放使用、多用户、资源共享的计算机系统中需要安全控制特别是两个特性,强制访问控制和安全内核技术,得到了国防部的大力推广。强制访问控制是支持任何用户都无法规避的安全策略所必需的(在国防部的情况下,是关于人员许可和数据分类的国家安全策略),目前正在研究其对商业和行业安全问题的适用性。安全内核技术是引用监视器概念的实现,引用监视器是一种安全强制抽象,它将计算机系统视为由主体(例如,进程、用户)和对象(例如,文件)组成的,引用监视器检查主体对对象的每次访问。在过去的十年中,许多构建安全操作系统的尝试都利用了安全内核技术。虽然从性能的角度来看,这些尝试都不实用,但安全内核的研究仍然可以作为构建安全系统的基础。为了继续努力促进国防部使用的安全系统,国防部计算机安全中心于1981年成立。该中心的首要任务之一是起草“可信计算机系统评估标准”,该标准定义了计算机系统的各种保护级别除了列出功能需求(包括审计、标签、强制访问控制、自由访问控制、标识和身份验证)之外,标准还讨论了用于生成可信系统的结构和开发技术。
{"title":"Directions in computer security","authors":"Anne-Marie Claybrook","doi":"10.1145/800173.809695","DOIUrl":"https://doi.org/10.1145/800173.809695","url":null,"abstract":"One of the primary thrusts in operating system security has come from the Department of Defense (DoD), which early recognized the need for security controls in open use, multi-user, resource-shared computer systems.1 Two features in particular, mandatory access controls and security kernel technology, have been strongly promoted by the DoD. Mandatory access controls, necessary to support a security policy that cannot be circumvented by any user (in DoD's case, the national security policy regarding personnel clearances and data classifications) are being studied for their applicability to business2 and industry security problems. Security kernel technology is an implementation of the reference monitor concept, a security enforcement abstraction which views a computer system as composed of subjects (e.g., processes, users) and objects (e.g., files) and a reference monitor which checks each access by a subject to an object. In the past ten years, several attempts to build secure operating systems have utilized security kernel technology. While none of these attempts was practical from a performance point of view, the security kernel research still serves as a basis for current attempts to build secure systems.\u0000 In a continuing effort to promote secure systems for DoD use, the DoD Computer Security Center was formed in 1981. One of the first tasks of the Center was to draft a “Trusted Computer System Evaluation Criteria” which defines various levels of protection for computer systems.3 In addition to listing feature requirements, including auditing, labelling, mandatory access controls, discretionary access controls, identification and authentication, the criteria discuss both the structure and development techniques used to produce trusted systems.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130868210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Defining the ergonomic buzzwords 定义人体工程学流行语
Pub Date : 1900-01-01 DOI: 10.1145/800173.809707
J. Meads
Current software and computer systems are being advertised and sold today as FRIENDLY systems that are EASY TO USE. Most also claim to be EASY TO LEARN as well. But what is it that makes a system FRIENDLY, EASY TO USE, or EASY TO LEARN? Is it sufficient to enshrine a group of interactive features in a video box connected to a single user microcomputer? If a system is EASY TO USE does that make it FRIENDLY? Or does EASY TO LEARN mean that it is EASY TO USE? Does your friendly, easy-going personal computer salesman differentiate between these terms! Although the physical aspects of human factors have been studied for several decades and have an established scientific base, there is very little published material on the software aspects of ergonomics that is based upon well controlled experimental investigation. However, there is a fair amount of literature in which individuals describe their experiences in various ad hoc situations. The similarities among these experiences has resulted in a fair amount of “folklore” which may be beneficially applied. The terms: EASY TO LEARN, EASY TO USE, and FRIENDLY are defined below according to this experiential base.
当前的软件和计算机系统都被宣传为易于使用的友好系统。大多数也声称很容易学。但是,是什么使系统友好、易于使用或易于学习呢?将一组交互功能嵌入到连接到单个用户微型计算机的视频盒中是否足够?如果一个系统很容易使用,那么它是否就很友好?还是说EASY TO LEARN意味着它很容易使用?你们友好、随和的个人电脑推销员能区分这些术语吗?虽然人类因素的物理方面已经研究了几十年,并有一个建立的科学基础,但很少有基于良好控制的实验调查的人体工程学软件方面的出版材料。然而,有相当数量的文献中,个人描述了他们在各种特殊情况下的经历。这些经验之间的相似之处导致了相当数量的“民间传说”,可以有益地应用。术语:易学、易使用和友好是根据这个经验基础定义的。
{"title":"Defining the ergonomic buzzwords","authors":"J. Meads","doi":"10.1145/800173.809707","DOIUrl":"https://doi.org/10.1145/800173.809707","url":null,"abstract":"Current software and computer systems are being advertised and sold today as FRIENDLY systems that are EASY TO USE. Most also claim to be EASY TO LEARN as well. But what is it that makes a system FRIENDLY, EASY TO USE, or EASY TO LEARN? Is it sufficient to enshrine a group of interactive features in a video box connected to a single user microcomputer? If a system is EASY TO USE does that make it FRIENDLY? Or does EASY TO LEARN mean that it is EASY TO USE? Does your friendly, easy-going personal computer salesman differentiate between these terms!\u0000 Although the physical aspects of human factors have been studied for several decades and have an established scientific base, there is very little published material on the software aspects of ergonomics that is based upon well controlled experimental investigation. However, there is a fair amount of literature in which individuals describe their experiences in various ad hoc situations. The similarities among these experiences has resulted in a fair amount of “folklore” which may be beneficially applied. The terms: EASY TO LEARN, EASY TO USE, and FRIENDLY are defined below according to this experiential base.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121205613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Microcomputer applications 微机应用程序
Pub Date : 1900-01-01 DOI: 10.1145/800173.809709
J. McGann
Surveys of the use of micros that were made a few years ago suggested that use was concentrated in a few business functions. Calcs and financial reporting packages were expanding in use so rapidly that other types of applications seemed to be unnoticed. However, micros were being introduced in many laboratories and production facilities. A recent survey of departments of companies that use micros reported 98 separate applications that could be grouped under the following organizational areas: accounting, planning, treasurer, purchasing, administration, personnel, operations or production, marketing and other Most of the applications were financial in nature although operations or production uses were significant. Financial modeling and calc packages were used not only in financial applications, but they were also used develop a master scheduling job for manufacturing and for administrative and planning applications. Word processing packages were also used to handle many different jobs such as promotion, scheduling, tracking of assignments and automatic editing of information accessed from data bases. Packages are used quite often with micros as generalized development tools. This results in interesting support problems. Applications of micros can also be considered in terms of the data communication involved. Most uses of micros have been on a stand alone basis, but an increasing number of applications involve communication with another micro or a host computer. The micro may be an intelligent terminal controlled by the host or it may be directing the other computing system. The micro may also transfer control back and forth to the other system in an integrated application.
几年前对微型计算机的使用情况进行的调查表明,微型计算机的使用集中在几个业务功能上。微积分和财务报告软件包的使用扩展得如此之快,以至于其他类型的应用程序似乎被忽视了。但是,许多实验室和生产设施正在采用微型计算机。最近对使用微型计算机的公司各部门的调查报告了98种不同的应用程序,这些应用程序可以归为下列组织领域:会计、规划、财务、采购、行政、人事、业务或生产、营销和其他大多数应用程序都是财务性质的,尽管业务或生产用途很重要。财务建模和计算包不仅用于财务应用程序,而且还用于为制造、管理和计划应用程序开发主调度作业。文字处理软件包也被用来处理许多不同的工作,如促销、日程安排、任务跟踪和自动编辑从数据库获取的信息。包经常作为通用开发工具与微机一起使用。这导致了有趣的支持问题。还可以从所涉及的数据通信的角度来考虑微型计算机的应用。微型计算机的大多数用途都是独立的,但越来越多的应用涉及与另一台微型计算机或主机进行通信。所述微可以是由主机控制的智能终端,也可以是指挥其他计算系统的智能终端。微处理器还可以在集成应用中将控制来回转移到另一系统。
{"title":"Microcomputer applications","authors":"J. McGann","doi":"10.1145/800173.809709","DOIUrl":"https://doi.org/10.1145/800173.809709","url":null,"abstract":"Surveys of the use of micros that were made a few years ago suggested that use was concentrated in a few business functions. Calcs and financial reporting packages were expanding in use so rapidly that other types of applications seemed to be unnoticed. However, micros were being introduced in many laboratories and production facilities. A recent survey of departments of companies that use micros reported 98 separate applications that could be grouped under the following organizational areas: accounting, planning, treasurer, purchasing, administration, personnel, operations or production, marketing and other\u0000 Most of the applications were financial in nature although operations or production uses were significant. Financial modeling and calc packages were used not only in financial applications, but they were also used develop a master scheduling job for manufacturing and for administrative and planning applications. Word processing packages were also used to handle many different jobs such as promotion, scheduling, tracking of assignments and automatic editing of information accessed from data bases. Packages are used quite often with micros as generalized development tools. This results in interesting support problems.\u0000 Applications of micros can also be considered in terms of the data communication involved. Most uses of micros have been on a stand alone basis, but an increasing number of applications involve communication with another micro or a host computer. The micro may be an intelligent terminal controlled by the host or it may be directing the other computing system. The micro may also transfer control back and forth to the other system in an integrated application.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122764058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
Are we becoming addicted to computers? 我们对电脑上瘾了吗?
Pub Date : 1900-01-01 DOI: 10.1145/800173.809725
Arthur Fink
What do we mean by “addicted”? The Oxford English Dictionary defines it as: “(1) Delivered over devoted, destined, bound. (2) Attached by one's own act; given up, devoted, ... naturally attached bondage, which displaces free will.” It is a condition in which really objective self-examination does not and probably cannot guide our behavior. It is generally regarded as a pitiful state, over which one has little control.
我们所说的“上瘾”是什么意思?《牛津英语词典》对它的定义是:“(1)交付,奉献,命中注定,束缚。”(二)自作自受的;放弃的,忠诚的,……自然依附的束缚,取代了自由意志"在这种情况下,真正客观的自我反省不会也可能无法指导我们的行为。它通常被认为是一种可怜的状态,人们几乎无法控制它。
{"title":"Are we becoming addicted to computers?","authors":"Arthur Fink","doi":"10.1145/800173.809725","DOIUrl":"https://doi.org/10.1145/800173.809725","url":null,"abstract":"What do we mean by “addicted”? The <underline>Oxford English Dictionary</underline> defines it as: “(1) Delivered over devoted, destined, bound. (2) Attached by one's own act; given up, devoted, ... naturally attached bondage, which displaces free will.” It is a condition in which really objective self-examination does not and probably cannot guide our behavior. It is generally regarded as a pitiful state, over which one has little control.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124943349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Long-range planning in computer chess 计算机国际象棋的长期规划
Pub Date : 1900-01-01 DOI: 10.1145/800173.809724
J. Schaeffer
A serious deficiency in game-playing, tree-searching programs is their short-sightedness. Program strategy revolves around the maximization/minimization of what is attainable within the scope of the search tree with little consideration of what lies beyond. This paper describes Planner, a long-range chess strategist that assesses positions, determines a long-range strategy, and makes moves in the short-term (within the scope of the search tree) consistent with a long-term objective (beyond the depth of the search tree). In effect then, Planner allows the program to “see” beyond the limitations of the search tree.
在游戏中,树搜索程序的一个严重缺陷是它们的短视。程序策略围绕着搜索树范围内可实现的最大化/最小化,很少考虑搜索树范围之外的内容。本文描述了Planner,一个远程象棋战略家,它评估位置,确定长期策略,并在短期内(在搜索树的范围内)与长期目标(超出搜索树的深度)保持一致。实际上,Planner允许程序“看到”超越搜索树的限制。
{"title":"Long-range planning in computer chess","authors":"J. Schaeffer","doi":"10.1145/800173.809724","DOIUrl":"https://doi.org/10.1145/800173.809724","url":null,"abstract":"A serious deficiency in game-playing, tree-searching programs is their short-sightedness. Program strategy revolves around the maximization/minimization of what is attainable within the scope of the search tree with little consideration of what lies beyond. This paper describes Planner, a long-range chess strategist that assesses positions, determines a long-range strategy, and makes moves in the short-term (within the scope of the search tree) consistent with a long-term objective (beyond the depth of the search tree). In effect then, Planner allows the program to “see” beyond the limitations of the search tree.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125103088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
ACM '83
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1