default search action
ACM Conference on Computer Science 1984: San Francisco, CA, USA
- Richard L. Muller, James J. Pottmyer:
Proceedings of the 1984 ACM Annual Conference on Computer Science: The fifth generation challenge, San Francisco, CA, USA, October 1984. ACM 1984, ISBN 0-89791-144-X - Annie G. Brooking:
Towards a methodology for a design of knowledge based systems. 4 - Vipin Kumar:
Integrating knowledge in problem solving search procedures. 5-10 - William J. Clancey:
Knowledge acquisition for classification expert systems. 11-14 - Reid G. Smith, Robert L. Young:
The design of the Dipmeter Advisor system. 15-23 - Jon R. Wright, Frederick D. Miller, G. V. E. Otto, Elizabeth M. Siegfried, Gregg T. Vesonder, John E. Zielinski:
ACE: Going from prototype to product with an expert system. 24-28 - Charles Rich:
Artificial intelligence and software engineering: The Programmer's Apprentice project. 29 - Gian Piero Zarri:
A fifth generation approach to intelligent information retrieval. 30-41 - H. Ogawa, King-sun Fu, James T. P. Yao:
Knowledge representation and inference control of SPERIL-II. 42-49 - José Carlos Ferreira Maia Neves:
A logic interpreter to handle time and negation in logic data bases. 50-54 - Edward Babb:
Functional requirements for very large knowledge bases. 55-56 - Charles H. Applebaum, James G. Williams:
PVS - design for a practical verification system. 58-68 - Lee J. White:
The evolution of an integrated testing environment by the Domain Testing Strategy. 69-74 - Jeffrey Scott Vitter, Roger A. Simons:
Parallel algorithms for unification and other complete problems in p. 75-84 - Paul Bassett:
Design principles for software manufacturing tools. 85-93 - Ellis Horowitz, Alfons Kemper, Balaji Narasimhan:
Application generators: Ideas for programming language extensions. 94-101 - Robert P. Brazile:
A general purpose data base design. 102-108 - Nancy Giddings, Tim Colburn:
An automated software design evaluator. 109-115 - Mike Burlakoff:
An approach to software design documentation. 116-120 - Fletcher J. Buckley:
The IEEE Software Engineering standards process. 121-126 - C. S. Sankar:
Information Wheel - a framework to identify roles of information systems. 127-132 - Meir Burstin, Moshe Ben-Bassat:
A user's approach to requirements analysis of a large software system. 133-145 - P. I. Pettitt:
A design framework for the ALVEY/ICL/DHSS demonstrator process. 146-147 - David A. Gustafson:
A requirement model for the 5th generation. 149-156 - Carl McCrosky, Janice I. Glasgow, Michael A. Jenkins:
Nial: A candidate language for fifth generation computer systems. 157-166 - Alexis Koster:
Compiling prolog programs for parallel execution on a cellular machine. 167-178 - James C. Browne, James E. Dutton, Vincent Fernandes, Annette S. Palmer, Jonathan M. Silverman, Anand R. Tripathi, Pong-Sheng Wang:
Zeus: An object-oriented distributed operating system for reliable applications. 179-188 - Sukumar Ghosh, Somprakash Bandyopadhyay, Chandan Mazumdar, S. Bhattacharya:
Handling of recursion in dataflow model. 189-196 - Boleslaw K. Szymanski, Noah S. Prywes, Evan D. Lock, Amir Pnueli:
On the scope of static checking in definitional languages. 197-207 - H. T. Lau:
An application of network flow programming to locate concentrators in a communication network. 208-211 - Dan I. Moldovan:
An associative array architecture intended for semantic network processing. 212-221 - Larry E. Druffel:
Visions of future programming environments. 222 - Moe Shahdad:
Software and system design: VHSIC Hardware Description Language overview. 223-225 - Richard L. DesJardins:
Open systems standardization. 226 - Alex Pentland:
Models (fractal and otherwise) for perception and generation of images. 228-229 - Andrew J. Hanson, David M. McKeown Jr., Susan E. Brennan, Alex Pentland, Richard F. Voss:
Vision, perception and imagery. 228-229 - Susan E. Brennan:
Caricatures from images. 228-229 - David M. McKeown Jr.:
Images as MAPS / MAPS from images. 228-229 - Andrew J. Hanson:
Interactive image understanding. 228-229 - David R. Dodds:
Towards knowledge-based robotics systems. 230-235 - Larry Lichten:
The emerging technology of CAD/CAM. 236-241 - David Persin:
Treating information as an asset. 244 - Louise Giovane Becker:
A national perspective on computer security. 245 - Richard A. Smith, Leslie Chalmers, Charles C. Wood:
Security and audit: Needs of the business sector for security and integrity controls. 246 - Leslie Chalmers:
User identification, access control, and audit requirements. 247 - Charles C. Wood:
Logging, security experts data base, and crypto key management. 248-252 - Richard A. Smith:
Security design considerations of hardware. 253-254 - James J. Pottmyer, Ken Fong, Stelio Thompson, Ralph Shattuck:
Security considerations in system design. 255 - Ken Fong:
Contingency planning and disaster recovery. 256 - Stelio Thompson:
Evaluation of computer and network security systems. 257-259 - Abbe Mowshowitz:
Wealth and jobs in the fifth new world. 261 - Rob Kling, Terry Winograd, Paul Smolensky, Roland Schinzinger:
The impact and issues of the fifth generation: Ethical issues in new computing technologies. 262 - Rob Kling:
Truth in advertising in present and future generation computing. 263 - Terry Winograd:
The ethics of macines which mimic people. 264 - Paul Smolensky:
Ethical questions and military dominance in next generation computing. 265 - Roland Schinzinger:
Computing applications as social experimentation. 266 - Walt Scacchi, Elihu M. Gerson, Rob Kling, Langdon Winner:
The impact and issues of the fifth generation: Social and organization consequences of new generation technology. 267-270 - Les Gasser, Kenneth Laudon:
Workplace impacts - ai and automation: Privacy and accountability of large-scale high-capacity personal data systems. 271 - Severo M. Ornstein:
Social dimensions of reliability of complex systems. 272 - Ira Pohl:
Social implications of artificial intelligence. 273 - Ira Pohl:
A hierarchy for classifying AI implications. 274-278 - Virginia C. Walker, Carl Hammer, Kerry Mark Joels, Alan C. Kay:
Soothsayers of the electronic age. 280 - Carl Hammer:
Beyond the data processing horizon. 281-286 - Kerry Mark Joels:
The seventh generation. 287 - Myer W. Morron:
The alvey DHSS major demonstrator. 289-290 - Lubomir Bic:
The Fifth Generation grail: A survey of related research. 293-297 - Maarten H. van Emden:
Towards a western Fifth-Generation Computer System project. 298-302 - Norman Soong, Charles Atwood, Charles Eastman, William Mitchell, Douglas Stoker:
Blueprints for the computer city: The quest for an architect's computer. 303-304 - Sharon C. Adler:
Delivering the word - integrating publications technologies. 305 - Bruce D'Ambrosio:
Integrating uncertainty into a language for knowledge based systems. 307-309 - Russell B. Kegley, Lois M. Boggess:
Design of an ATN generator/modifier for supporting a communication prosthesis. 310-313 - Junichiro Tsuji, Yutaka Iima, Satoshi Tojo, Shoji Enomoto:
Dialogue management in the personal sequential inference machine (PSI). 314-322 - Tim Leso:
Modern educational techniques - high tech and the traditional approach. 323-327 - Richard H. Austing:
AFIPS secondary education curriculum in information technology. 328 - Ronald E. Anderson, Robert M. Aiken, Richard Close, Karen A. Duncan, Marc Tucker:
National educational computing policy alternatives. 329 - Jim Poirot, Arthur Luehrmann, Cathleen A. Norris, Harriet G. Taylor, Robert Taylor:
Proposed curriculum for programs leading to teacher certification in computer science. 330 - Jean B. Rogers:
Computer science for secondary schools: Course content. 331 - Doris K. Lidtke:
Government agencies' activities in education. 332
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.