Richard L. Muller, James J. Pottmyer (Eds.):
Proceedings of the 1984 ACM Annual Conference on Computer Science: The fifth generation challenge, San Francisco, CA, USA, October 1984.
ACM 1984, ISBN 0-89791-144-X
Last update Sat May 18 18:02:57 2013
CET by the DBLP Team — Data released under the ODC-BY 1.0 license — See also our legal information page
- Annie G. Brooking:
Towards a methodology for a design of knowledge based systems.
- Vipin Kumar:
Integrating knowledge in problem solving search procedures.
- William J. Clancey:
Knowledge acquisition for classification expert systems.
- Reid G. Smith, Robert L. Young:
The design of the Dipmeter Advisor system.
- Jon R. Wright, Frederick D. Miller, G. V. E. Otto, Elizabeth M. Siegfried, Gregg T. Vesonder, John E. Zielinski:
ACE: Going from prototype to product with an expert system.
- Charles Rich:
Artificial intelligence and software engineering: The Programmer's Apprentice project.
- Gian Piero Zarri:
A fifth generation approach to intelligent information retrieval.
- H. Ogawa, King-sun Fu, James T. P. Yao:
Knowledge representation and inference control of SPERIL-II.
- José Carlos Ferreira Maia Neves:
A logic interpreter to handle time and negation in logic data bases.
- Edward Babb:
Functional requirements for very large knowledge bases.
- Charles H. Applebaum, James G. Williams:
PVS - design for a practical verification system.
- Lee J. White:
The evolution of an integrated testing environment by the Domain Testing Strategy.
- Jeffrey Scott Vitter, Roger A. Simons:
Parallel algorithms for unification and other complete problems in p.
- Paul Bassett:
Design principles for software manufacturing tools.
- Ellis Horowitz, Alfons Kemper, Balaji Narasimhan:
Application generators: Ideas for programming language extensions.
- Robert P. Brazile:
A general purpose data base design.
- Nancy Giddings, Tim Colburn:
An automated software design evaluator.
- Mike Burlakoff:
An approach to software design documentation.
- Fletcher J. Buckley:
The IEEE Software Engineering standards process.
- C. S. Sankar:
Information Wheel - a framework to identify roles of information systems.
- Meir Burstin, Moshe Ben-Bassat:
A user's approach to requirements analysis of a large software system.
- P. I. Pettitt:
A design framework for the ALVEY/ICL/DHSS demonstrator process.
- David A. Gustafson:
A requirement model for the 5th generation.
- Carl McCrosky, Janice I. Glasgow, Michael A. Jenkins:
Nial: A candidate language for fifth generation computer systems.
- Alexis Koster:
Compiling prolog programs for parallel execution on a cellular machine.
- James C. Browne, James E. Dutton, Vincent Fernandes, Annette S. Palmer, Jonathan M. Silverman, Anand R. Tripathi, Pong-Sheng Wang:
Zeus: An object-oriented distributed operating system for reliable applications.
- Sukumar Ghosh, Somprakash Bandyopadhyay, Chandan Mazumdar, S. Bhattacharya:
Handling of recursion in dataflow model.
- Boleslaw K. Szymanski, Noah S. Prywes, Evan D. Lock, Amir Pnueli:
On the scope of static checking in definitional languages.
- H. T. Lau:
An application of network flow programming to locate concentrators in a communication network.
- Dan I. Moldovan:
An associative array architecture intended for semantic network processing.
- Larry E. Druffel:
Visions of future programming environments.
- Moe Shahdad:
Software and system design: VHSIC Hardware Description Language overview.
- Richard L. DesJardins:
Open systems standardization.
- Alex Pentland:
Models (fractal and otherwise) for perception and generation of images.
- Andrew J. Hanson, David M. McKeown Jr., Susan E. Brennan, Alex Pentland, Richard F. Voss:
Vision, perception and imagery.
- Susan E. Brennan:
Caricatures from images.
- David M. McKeown Jr.:
Images as MAPS / MAPS from images.
- Andrew J. Hanson:
Interactive image understanding.
- David R. Dodds:
Towards knowledge-based robotics systems.
- Larry Lichten:
The emerging technology of CAD/CAM.
- David Persin:
Treating information as an asset.
- Louise Giovane Becker:
A national perspective on computer security.
- Richard A. Smith, Leslie Chalmers, Charles C. Wood:
Security and audit: Needs of the business sector for security and integrity controls.
- Leslie Chalmers:
User identification, access control, and audit requirements.
- Charles C. Wood:
Logging, security experts data base, and crypto key management.
- Richard A. Smith:
Security design considerations of hardware.
- James J. Pottmyer, Ken Fong, Stelio Thompson, Ralph Shattuck:
Security considerations in system design.
- Ken Fong:
Contingency planning and disaster recovery.
- Stelio Thompson:
Evaluation of computer and network security systems.
- Abbe Mowshowitz:
Wealth and jobs in the fifth new world.
- Rob Kling, Terry Winograd, Paul Smolensky, Roland Schinzinger:
The impact and issues of the fifth generation: Ethical issues in new computing technologies.
- Rob Kling:
Truth in advertising in present and future generation computing.
- Terry Winograd:
The ethics of macines which mimic people.
- Paul Smolensky:
Ethical questions and military dominance in next generation computing.
- Roland Schinzinger:
Computing applications as social experimentation.
- Walt Scacchi, Elihu M. Gerson, Rob Kling, Langdon Winner:
The impact and issues of the fifth generation: Social and organization consequences of new generation technology.
- Leslie Gasser, Kenneth Laudon:
Workplace impacts—ai and automation: Privacy and accountability of large-scale high-capacity personal data systems.
- Severo M. Ornstein:
Social dimensions of reliability of complex systems.
- Ira Pohl:
Social implications of artificial intelligence.
- Ira Pohl:
A hierarchy for classifying AI implications.
- Virginia Walker, Carl Hammer, Kerry Mark Joels, Alan Kay:
Soothsayers of the electronic age.
- Carl Hammer:
Beyond the data processing horizon.
- Kerry Mark Joels:
The seventh generation.
- Myer W. Morron:
The alvey DHSS major demonstrator.
- Lubomir Bic:
The Fifth Generation grail: A survey of related research.
- Maarten H. van Emden:
Towards a western Fifth-Generation Computer System project.
- Norman Soong, Charles Atwood, Charles Eastman, William Mitchell, Douglas Stoker:
Blueprints for the computer city: The quest for an architect's computer.
- Sharon C. Adler:
Delivering the word—integrating publications technologies.
- Bruce D'Ambrosio:
Integrating uncertainty into a language for knowledge based systems.
- Russell B. Kegley, Lois M. Boggess:
Design of an ATN generator/modifier for supporting a communication prosthesis.
- Junichiro Tsuji, Yutaka Iima, Satoshi Tojo, Shoji Enomoto:
Dialogue management in the personal sequential inference machine (PSI).
- Tim Leso:
Modern educational techniques - high tech and the traditional approach.
- Richard H. Austing:
AFIPS secondary education curriculum in information technology.
- Ronald E. Anderson, Robert M. Aiken, Richard Close, Karen Duncan, Marc Tucker:
National educational computing policy alternatives.
- Jim Poirot, Arthur Luerhmann, Cathleen A. Norris, Harriet G. Taylor, Robert Taylor:
Proposed curriculum for programs leading to teacher certification in computer science.
- Jean B. Rogers:
Computer science for secondary schools: Course content.
- Doris K. Lidtke:
Government agencies' activities in education.