James Maurer
Page 5
Rosalie Steier
Pages 9-10
Peter J. Denning
Pages 11-ff.
John R. White
Pages 12-13
Robert L. Ashenhurst
Pages 14-ff.
A number of years ago I visited a young and successful computer company and was given a tour of the facilities by one of the directors. We passed offices in which people were working at computer terminals; I was told they constituted …
Maurice V. Wilkes
Pages 19-21
In the Legally Speaking column last May [6], we reported on a survey conducted at last year's ACM-sponsored Conference on Computer-Human Interaction in Austin, Tex. Among the issues about which the survey inquired was whether …
Pamela Samuelson
Pages 23-27
Cyc is a bold attempt to assemble a massive knowledge base (on the order of 10
8 axioms) spanning human consensus knowledge. This article examines the need for such an undertaking and reviews the authos' efforts over the past …
Douglas B. Lenat, R. V. Guha, Karen Pittman, Dexter Pratt, Mary Shepherd
Pages 30-49
KBNL is a knowledge-based natural language processing system that is novel in several ways, including the clean separation it enforces between linguistic knowledge and world knowledge, and its use of knowledge to aid in lexical …
Jim Barnett, Kevin Knight, Inderjeet Mani, Elaine Rich
Pages 50-71
Natural language understanding must be an integral part of any automatic speech recognition system that attempts to deal with interactive problem solving. The methods for representing and integrating knowledge from different …
George M. White
Pages 72-82
Karen A. Frenkel
Pages 84-95
Although caches in most computers are invisible to programmers, they significantly affect program performance. This is particularly true for cache-coherent, shared-memory multiprocessors. This article presents recent research …
Mark D. Hill, James R. Larus
Pages 97-102
The success of the von Neumann model of sequential computation is attributable to the fact that it is an efficient bridge between software and hardware: high-level languages can be efficiently compiled on to this model; yet it …
Leslie G. Valiant
Pages 103-111
The willingness of one scientist to share data with another scientist continues to be influenced by a number of enconomic, social, psychological and political factors.
Theodor D. Sterling, James J. Weinkam
Pages 112-119
As relational technology becomes increasingly accepted in commercial data processing, conversion of some of the huge number of existing navigational databases to relational databases is inevitable. It is thus important to understand …
Mark L. Gillenson
Pages 120-131
This article describes a substring search algorithm that is faster than the Boyer-Moore algorithm. This algorithm does not depend on scanning the pattern string in any particular order. Three variations of the algorithm are given …
Daniel M. Sunday
Pages 132-142
Background A few highly visible cases of computer system exploitations have raised general awareness of existing vulnerabilities and the considerable risks they entail.
Peter G. Neumann
Page 170