Advertisement

Research and Advances

Prolog in 10 figures

In the fall of 1981, a Japanese report officially initiated the quest for fifth-generation computers that would encompass the functions of knowledge processing and artificial intelligence. The conceptual underpinnings behind Prolog—Japan's language of choice for these activities—are presented here in a way that suggests why Prolog or a similar language might be considered a model for designing the computers of the future.
Research and Advances

The P2 algorithm for dynamic calculation of quantiles and histograms without storing observations

A heuristic algorithm is proposed for dynamic calculation of the median and other quantiles. The estimates are produced dynamically as the observations are generated. The observations are not stored; therefore, the algorithm has a very small and fixed storage requirement regardless of the number of observations. This makes it ideal for implementing in a quantile chip that can be used in industrial controllers and recorders. The algorithm is further extended to histogram plotting. The accuracy of the algorithm is analyzed.
Research and Advances

A probability model for overflow sufficiency in small hash tables

For hash tables in which a strict physical separation exists between primary storage and storage for overflow records, with bucket capacity at least three, a complete probability model is described. A measure of hash table efficiency is introduced, called the table sufficiency index (TSI), and defined as the probability that the overflow space is sufficient assuming that the set of hashed keys has a uniform distribution. The constructed probability model may be used to compute the TSI for hash tables with parameters chosen from a restricted domain. The TSI is advocated as a tool for making decisions about the parameters of small hash tables.
Research and Advances

An expert system for a resource allocation problem

We describe an expert system for resource allocation in a particular military domain. The system incorporates variants of several important techniques of artificial intelligence and makes the first use of the Merit system for question selection. This technique enables the system to direct the acquisition of information by finding questions with a high ratio of probable importance to difficulty. In the current application, each resource is a military weapon, each task to which such a resource can be allocated is firing at a military target, and the objective function is the expected reduction in value of targets. The coefficients that relate a particular resource to a particular task are not provided explicitly. Instead, in the first phase of the allocation process, the system uses a computation network to determine the effectiveness of each individual weapon against each prospective target. The network, built by a domain expert in advance, allows reasoning with logical, Bayesian, and expert-defined operators. After the calculation of individual effectiveness values, portions of an allocation tree are constructed to determine good allocation plans for the set of weapons. The individual effectiveness values are used to direct the traversal and pruning of the allocation tree.
Research and Advances

Concepts of the text editor Lara

Lara, a text editor developed for the Lilith workstation, exemplifies the principles underlying modern text-editor design: a high degree of interactivity, an internal data structure that mirrors currently displayed text, and extensive use of bitmap controlled displays and facilities.

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More