Early Programming Activity at the University of Cambridge (Mar 1978)

Total Page:16

File Type:pdf, Size:1020Kb

Early Programming Activity at the University of Cambridge (Mar 1978) EARLY PROGRAMMING ACTIVITY AT THE UNIVERSITY OF CAMBRIDGE (FIRST DRAFT) M. Campbell-Kelly March, 1978 Department of Maths.and Computer Studies Sundetland Polytechnic England CMLEO/DC/RC/197803 David Caminer Papers LEO Computers Society Archive, Centre for Computing History, Cambridge www.computinghistory.org.uk EARLY PROGRAMMING ACTIVITY AT THE UNIVERSITY OF CAMBRIDGE 1. INTRODUCTION 1.1 The EDSAC 1.2 People 1. 3 Sources. 2. DEVELOPMENT OF PROGRAMMING TECHNIQUES 2.1 The EDSAC order code and numbers 2.2 The initial orders - first form 2.3 The co-ordinating orders 2.4 The initial orders - second form 2.5 Sub-routines 2.6 The sub-routine library. 3. A TUTORIAL ON ED SAC PROGRAMMING 3.1 The TPK algorithm 3.2 The TPK algorithm for EDSAC 3.3 Punching and running 3.4 Getting programmes right (part one). 4. FURTHER DEVELOPMENT OF PROGRAMMING TECHNIQUES 4 .1 Getting programmes right (part two) 4.2 Sub-routine assembly, floating addresses and synthetic orders 4.3 Interpretive schemes. 5. CONCLUSIONS Acknowledgements (omitted) References Figures CMLEO/DC/RC/197803 David Caminer Papers LEO Computers Society Archive, -1- Centre for Computing History, Cambridge www.computinghistory.org.uk 1. INTRODUCTION In the spring of 1949 the first two practical stored program computers came into operation : the EDSAC at Cambridge and MADM at Manchester University. The approach to the problem of programming differed considerably at the two centres. The subject of this paper is early programning activity at Cambridge; an account of progranming activity at Manchester will be the subject of a future paper. From the outset, M.V. Wilkes at Cambridge saw that the only acceptable way to write programs was in a form using mnemonic codes and decimal addresses which could easily be used by the human programmer. On the other hand A.M. Turing at Manchester saw no need to make such concessions and forced MADM progra.mners to write each computer instruction as a sequence of four teleprinter characters in base-32-backwards. In the early fifties John W. Carr III aptly characterised the prevailing attitudes to program:ning by dividing programmers into two groups : first the 'primitives' who believed programs should' be written in octal or hexadecimal or even base-32-backwards; second were the 'space cadets' who believed in human oriented codes and letting the machine do the translating. (Wilkes, 1967}. There is no question that in 1949 the Manchester school were the primitives and the Cambridge group the space cadets. CMLEO/DC/RC/197803 David Caminer Papers -2- LEO Computers Society Archive, Centre for Computing History, Cambridge www.computinghistory.org.uk 1, I The EDSAC The background to EDSAC has been entertainingly described in Wilkes 75, Mutch 69 and elsewhere, so that only a brief summary will be given here. EDSAC was patterned very directly on the EDVAC first described in von Neumann's 'First Draft of a Report on the EDVAC', June 1945. In July and August of 1946 an influential series of lectures on EDVAC were held at the Moore School of Electrical Engineering in the University of Pennsylvania, the latter part of which was attended by M,V. Wilkes, Director of the University Mathematical Laboratory (now Computer Laboratory) at Cambridge. Wilkes began work on the design of EDSAC in late 1946 and construction began in early 1947. EDSAC performed its first fully automatic computation on the 6th May 1949, although it was not capable of serious work until sometime later. EDSAC made its debut to the outside world at the Cambridge computer conference held in June 1949, EDSAC provided a regular computing service from early 1950 and was remarkable for the extent to which it was used by other departments in the University from a very early date. By the mid­ fifties literally dozens of papers had been published based on results obtained using EDSAC, some of them authored by Cambridge's leading men of science. EDSAC prOvided a regular computing service, apart from occasional periods of shut down for re-engineering, until it was dismantled in July 1958. CMLEO/DC/RC/197803 David Caminer Papers -3- LEO Computers Society Archive, Centre for Computing History, Cambridge www.computinghistory.org.uk 1.2 People The most eminent of the people associated with EDSAC was D-.R. Hartree, Plummer Professor of Mathematical Physics. However, his role was mainly one of encouragement and lending his prestige to the project. The driving force behind EDSAC, and its principal designer, was M. V. Wilkes. Prior to the outbreak of war, Wilkes had been involved with the differential analyser in the University Mathematical Laboratory and his war years were spent working on radar and operational research. Thus, on his return to Cambridge in 1945, Wilkes was well versed in the twin disciplines of mathematics and electronics. Wilkes built up a talented team of people to work under his direction; indeed, a list of the names of the people who began their early careers with EDSAC would account for a sizeable proportion of the top level of the British academic h~ rarchy in computer science. A list of the people associated with the early programming activity at Cambridge appears in the preface of Wilkes, Wheeler and Gill, 1951. Unfortunately it is not possible to single out everyone's individual contribution at this distance in time, although wherever possible this will be done. Unquestionably though, apart from Wilkes, the two leading spirits in the programning activity were D.J. Wheeler and S. Gill. D.J. Wheeler became a research student under the supervision of Wilkes in October 1948. Wheeler did brilliant work and was responsible for the input routine on EDSAC, developing the nucleus of the sub-routine library and much besides. He left Cambridge in 1951 to become Visiting Assistant Professor at the University of Illinois for a period of two years, subsequently returning to spend the remainder of his career to date at Cambridge. CMLEO/DC/RC/197803 David Caminer Papers -4- LEO Computers Society Archive, Centre for Computing History, Cambridge www.computinghistory.org.uk S. Gill became a research student under Wilkes in October 1949, coming from the National Physical Laboratory where he had worked under Turing. Gill was responsible for developing checking (trace) subroutines, an interpretive floating point scheme and made important contributions to the subroutine library. Gill left Cambridge in 1954 to follow Wheeler as Visiting Assistant Professor at the University of Illinois, and did not subsequently return to Cambridge. An early contributor to 'the programming effort was R.A. Brooker who originally joined the University Mathematical Laboratory to work on the differential analyser in October 1949, but transferred his interest to EDSAC early in 1950 with the encouragement of Wilkes. Brooker' s most important contribution was an impressive interpretive floating point scheme developed in collaboration with Wheeler. Brooker left Cambridge in Sept 1951 to join Manchester University. J.M. Bennett, an engineering research student under Wilkes, did early work on interpretive sub-routines. K.N. Dodd and A. E. Glennie were seconded from the Armaments Research Establishment from December 1949 for a period of several months and made substantial contributions to the early development of the sub-routine library. Other names mentioned in the preface of Wilkes, Wheeler and Gill were : B. Noble, J.P. Stanley, B,H. Worsley, L.A.G. Dresel, E.E.C. McKee and C.M. Munford. Perhaps to this list we should add the names of the slightly later contributors : A.S. Douglas, B. Hazelgrove and P. Naur. Another important figure was E.N. Mutch who was little concerned with progrannning directly, but was responsible for documentation of the sub-routine library, the preparation of programming bulletins and th~ day to day operation of EDSAC. Mutch' s careful documentation has been one of the most useful sources of information in preparing this account. CMLEO/DC/RC/197803 David Caminer Papers -5- LEO Computers Society Archive, Centre for Computing History, Cambridge www.computinghistory.org.uk 1.3 ~ In addition to the open literature (see references) a number of unpublished or little known sources have been used in preparing this paper. Probably the earliest extant document on EDSAC is a report produced in May 1948 (UML, 1948). This report gives the logical design of EDSAC as it was seen at that time, and is somewhat different in detail to the machine which was eventually constructed. The report was not circulated outside the laboratory. An important e•rly publication is the Proceedings of the first European computer conference held at Cambridge in June 1949 (UML, 1949). These proceedings give an interesting glimpse of the period imnediately after the construction of EDSAC but before the programming techniques had been finalised. This publication has been difficult to obtain but is presently being reprinted by the Computer Laboratory at Cambridge. The earliest systematic account of the progranming techniques developed at Cambridge is a spirit duplicated "Report on the preparation of programmes for the EDSAC and the use of the library of sub-routines" dated September 1950 (UML, 1950). The report had a limited private circulation outside Cambridge. In due course Wilkes arranged with Addison-Wesley to publish the report in book form. The book, 'The Preparation of Programmes for an Electronic Digital Computer', (Wilkes, Wheeler and Gill, 1951) as far as is known was the first text book on programming. The book was essentially the same as the September 1950 report with the addition of a preface (dated March 1951) and a foreword by Hartree. The book was very influential and did much to spread the gospel of symbolic coding and the sub-routine library as the basis of programming.
Recommended publications
  • Image Processing with the Artificial Swarm Intelligence 86 Xiaodong Zhuang, Nikos E
    Advances in Image Analysis - Nature Inspired Methodology Dr. Xiaodong Zhuang 1 Associate Professor, Qingdao University, China 2 WSEAS Research Department, Athens, Greece Prof. Dr. Nikos E. Mastorakis 1 Professor, Technical University of Sofia, Bulgaria 2 Professor, Military Institutes of University Education, Hellenic Naval Academy, Greece 3 WSEAS Headquarters, Athens, Greece Published by WSEAS Press ISBN: 978-960-474-290-5 www.wseas.org Advances in Image Analysis – Nature Inspired Methodology Published by WSEAS Press www.wseas.org Copyright © 2011, by WSEAS Press All the copyright of the present book belongs to the World Scientific and Engineering Academy and Society Press. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the Editor of World Scientific and Engineering Academy and Society Press. All papers of the present volume were peer reviewed by two independent reviewers. Acceptance was granted when both reviewers' recommendations were positive. See also: http://www.worldses.org/review/index.html ISBN: 978-960-474-290-5 World Scientific and Engineering Academy and Society Preface The development of human society relies on natural resources in every area (both material and spiritual). Nature has enormous power and intelligence behind its common daily appearance, and it is generous. We learn in it and from it, virtually as part of it. Nature-inspired systems and methods have a long history in human science and technology. For example, in the area of computer science, the recent well-known ones include the artificial neural network, genetic algorithm and swarm intelligence, which solve hard problems by imitating mechanisms in nature.
    [Show full text]
  • CS 488/688 Fall 2017 Stephen Mann CONTENTS 2 Contents
    1 CS 488/688 Fall 2017 Stephen Mann CONTENTS 2 Contents 1 Administration 5 1.1 General Information . .5 1.2 Topics Covered . .6 1.3 Assignments . .6 2 Introduction 9 2.1 History . .9 2.2 Pipeline . 10 2.3 Primitives . 11 2.4 Algorithms . 12 2.5 APIs . 12 3 Devices and Device Independence 13 3.1 Calligraphic and Raster Devices . 13 3.2 How a Monitor Works . 13 3.3 Physical Devices . 14 4 Device Interfaces 17 4.1 Device Input Modes . 17 4.2 Application Structure . 17 4.3 Polling and Sampling . 18 4.4 Event Queues . 18 4.5 Toolkits and Callbacks . 19 4.6 Example for Discussion . 20 5 Geometries 23 5.1 Vector Spaces . 23 5.2 Affine Spaces . 23 5.3 Inner Product Spaces . 24 5.4 Euclidean Spaces . 24 5.5 Cartesian Space . 25 5.6 Why Vector Spaces Inadequate . 25 5.7 Summary of Geometric Spaces . 27 6 Affine Geometry and Transformations 29 6.1 Linear Combinations . 29 6.2 Affine Combinations . 29 6.3 Affine Transformations . 31 6.4 Matrix Representation of Transformations . 33 6.5 Geometric Transformations . 34 6.6 Compositions of Transformations . 35 6.7 Change of Basis . 36 6.8 Ambiguity . 39 6.9 3D Transformations . 40 CONTENTS 3 6.10 World and Viewing Frames . 42 6.11 Normals . 45 7 Windows, Viewports, NDC 47 7.1 Window to Viewport Mapping . 47 7.2 Normalized Device Coordinates . 49 8 Clipping 51 8.1 Clipping . 51 9 Projections and Projective Transformations 55 9.1 Projections . 55 9.2 Why Map Z? .
    [Show full text]
  • Deep Learning-Based Method for Classifying and Localizing Potato Blemishes
    Deep Learning-based Method for Classifying and Localizing Potato Blemishes Sofia Marino, Pierre Beauseroy and André Smolarz Institut Charles Delaunay/M2S, FRE 2019, Université de Technologie de Troyes, Keywords: Deep Learning, Potato Blemishes, Classification, Localization, Autoencoder, SVM. Abstract: In this paper we address the problem of potato blemish classification and localization. A large database with multiple varieties was created containing 6 classes, i.e., healthy, damaged, greening, black dot, common scab and black scurf. A Convolutional Neural Network was trained to classify face potato images and was also used as a filter to select faces where more analysis was required. Then, a combination of autoencoder and SVMs was applied on the selected images to detect damaged and greening defects in a patch-wise manner. The localization results were used to classify the potato according to the severity of the blemish. A final global evaluation of the potato was done where four face images per potato were considered to characterize the entire tuber. Experimental results show a face-wise average precision of 95% and average recall of 93%. For damaged and greening patch-wise localization, we achieve a False Positive Rate of 4.2% and 5.5% and a False Negative Rate of 14.2% and 28.1% respectively. Concerning the final potato-wise classification, we achieved in a test dataset an average precision of 92% and average recall of 91%. 1 INTRODUCTION is the difficulty to design a feature extractor adap- ted to each pattern, that require human expertise to Potato is one of the most important food crops con- suitable transform the raw input image into a good sumed all over the world with a total production that representation, exploitable to achieve the classifica- exceeds 374.000.000 tons (IPC, 2018).
    [Show full text]
  • Multiscene: a Large-Scale Dataset and Benchmark for Multi-Scene
    This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. arXiv:2104.02846v3 [cs.CV] 7 Sep 2021 SUBMITTED TO IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING 2 MultiScene: A Large-scale Dataset and Benchmark for Multi-scene Recognition in Single Aerial Images Yuansheng Hua, Lichao Mou, Pu Jin, and Xiao Xiang Zhu, Fellow, IEEE Abstract—This is the preprint version. To read the final ver- sion, please go to IEEE Transactions on Geoscience and Remote woodland bridge Sensing. Aerial scene recognition is a fundamental research river problem in interpreting high-resolution aerial imagery. Over the woodland past few years, most studies focus on classifying an image into one scene category, while in real-world scenarios, it is more often that a single image contains multiple scenes. Therefore, parking lot residential parking lot in this paper, we investigate a more practical yet underexplored task—multi-scene recognition in single images. To this end, we create a large-scale dataset, called MultiScene, composed of bridge residential 100,000 unconstrained high-resolution aerial images. Considering river train station that manually labeling such images is extremely arduous, we resort to low-cost annotations from crowdsourcing platforms, e.g., OpenStreetMap (OSM). However, OSM data might suffer from incompleteness and incorrectness, which introduce noise into image labels. To address this issue, we visually inspect (a) Single-scene recognition (b) Multi-scene recognition 14,000 images and correct their scene labels, yielding a subset of cleanly-annotated images, named MultiScene-Clean.
    [Show full text]
  • Esoteric Programming Languages
    Esoteric Programming Languages An introduction to Brainfuck, INTERCAL, Befunge, Malbolge, and Shakespeare Sebastian Morr Braunschweig University of Technology [email protected] ABSTRACT requires its programs to look like Shakespearean plays, mak- There is a class of programming languages that are not actu- ing it a themed language. It is not obvious at all that the ally designed to be used for programming. These so-called resulting texts are, in fact, meaningful programs. For each “esoteric” programming languages have other purposes: To language, we are going describe its origins, history, and to- entertain, to be beautiful, or to make a point. This paper day’s significance. We will explain how the language works, describes and contrasts five influential, stereotypical, and give a meaningful example and mention some popular imple- widely different esoteric programming languages: The mini- mentations and variants. All five languages are imperative languages. While there mal Brainfuck, the weird Intercal, the multi-dimensional Befunge, the hard Malbolge, and the poetic Shakespeare. are esoteric languages which follow declarative programming paradigms, most of them are quite new and much less popu- lar. It is also interesting to note that esoteric programming 1. INTRODUCTION languages hardly ever seem to get out of fashion, because While programming languages are usually designed to be of their often unique, weird features. Whereas “real” multi- used productively and to be helpful in real-world applications, purpose languages are sometimes replaced by more modern esoteric programming languages have other goals: They can ones that add new features or make programming easier represent proof-of-concepts, demonstrating how minimal a in some way, esoteric languages are not under this kind of language syntax can get, while still maintaining universality.
    [Show full text]
  • Aerospace Medicine and Biology
    https://ntrs.nasa.gov/search.jsp?R=19760006642 2020-03-22T17:35:15+00:00Z NASA SP-7011 (147) AEROSPACE MEDICINE AND BIOLOGY A CONTINUING BIBLIOGRAPHY WITH INDEXES (Supplement 147) NOVEMBER 1975 NATIONAL AERONAUTICS AND SPACE ADMINISTRATION ACCESSION NUMBER RANGES Accession numbers cited in this Supplement fall within the following ranges: STAR (N-10000 Series) N75-28003—N75-29995 IAA (A-10000 Series) A75-38854—A75-41898 This bibliography was prepared by the NASA Scientific and Technical Information Facility operated for the National Aeronautics and Space Administration by Informatics Information Systems Company. NASA SP-7011 (147) AEROSPACE MEDICINE AND BIOLOGY A CONTINUING BIBLIOGRAPHY WITH INDEXES (Supplement 147) A selection of annotated references to unclas- sified reports and journal articles that were introduced into the NASA scientific and tech- nical information system and announced in October 1975 in • Scientific and Technical Aerospace Reports (STAR} • International Aerospace Abstracts (IAA) Scientific and Technical Information Office NOVEMBER 1975 NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Washington, D.C. NASA SP-7011 and its supplements are available from the National Technical Information Service (NTIS). Questions on the availability of the predecessor publications, Aerospace Medicine and Biology (Volumes I - XI) should be directed to NTIS. This Supplement is available from the National Technical Information Service (NTIS), Springfield, Virginia 22161 for $4 00 For copies mailed to addresses outside the United States, add $2 50 per copy for handling and postage INTRODUCTION This Supplement to Aerospace Medicine and Biolog\ (NASA SP-7011) lists 253 reports, articles and other documents announced during October 1975 in Scientific and Technical Aerospace Reports (STAR) or in International Aerospace Abstracts HA A) The first issue of the bibliography was published in July 1964, since that time, monthly supplements have been issued.
    [Show full text]
  • Complexity & Verification: the History of Programming As Problem Solving
    COMPLEXITY & VERIFICATION: THE HISTORY OF PROGRAMMING AS PROBLEM SOLVING A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY Joline Zepcevski IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Arthur L. Norberg February 2012 © Copyright by Joline Zepcevski 2012 All Rights Reserved Acknowledgments It takes the work of so many people to help a student finish a dissertation. I wish to thank Professor Arthur L. Norberg for postponing his retirement to be my advisor and my friend over the course of this project. Thank you to my committee, Professor Jennifer Alexander, Professor Susan Jones, Dr. Jeffery Yost, and Professor Michel Janssen, all of whom individually guided this dissertation at different times and in specific ways. Thank you also to Professor Thomas Misa for his guidance and assistance over many years. I had a great faculty and a great cohort of graduate students without whom this dissertation would never have been completed. I particularly want to thank Sara Cammeresi, whose unending support and friendship were invaluable to the completion of this project. I wish to thank my family, Jovan Zepcevski, Geraldine French, Nicole Zepcevski, and Brian Poff, who supported me and loved me throughout it all. I also want to thank my friends: Tara Jenson, Holly and Aaron Adkins, Liz Brophey, Jennifer Nunnelee, Jen Parkos, Vonny and Justin Kleinman, Zsuzsi Bork, AJ Letournou, Jamie Stallman, Pete Daniels, and Megan Longo who kept me sane. I need to thank Lisa Needham for all her assistance. Without your help, I wouldn’t sound nearly as smart.
    [Show full text]
  • Adversarial Continual Learning
    Adversarial Continual Learning Sayna Ebrahimi1;2, Franziska Meier1, Roberto Calandra1, Trevor Darrell2, and Marcus Rohrbach1 1Facebook AI Research, USA 2UC Berkeley EECS, Berkeley, CA, USA fsayna,[email protected], ffmeier,rcalandra,[email protected] Abstract. Continual learning aims to learn new tasks without forget- ting previously learned ones. We hypothesize that representations learned to solve each task in a sequence have a shared structure while containing some task-specific properties. We show that shared features are signifi- cantly less prone to forgetting and propose a novel hybrid continual learn- ing framework that learns a disjoint representation for task-invariant and task-specific features required to solve a sequence of tasks. Our model combines architecture growth to prevent forgetting of task-specific skills and an experience replay approach to preserve shared skills. We demon- strate our hybrid approach is effective in avoiding forgetting and show it is superior to both architecture-based and memory-based approaches on class incrementally learning of a single dataset as well as a sequence of multiple datasets in image classification. Our code is available at https: //github.com/facebookresearch/Adversarial-Continual-Learning. 1 Introduction Humans can learn novel tasks by augmenting core capabilities with new skills learned based on information for a specific novel task. We conjecture that they can leverage a lifetime of previous task experiences in the form of fundamental skills that are robust to different task contexts. When a new task is encountered, these generic strategies form a base set of skills upon which task-specific learning can occur. We would like artificial learning agents to have the ability to solve many tasks sequentially under different conditions by developing task-specific and task-invariant skills that enable them to quickly adapt while avoiding catas- trophic forgetting [24] using their memory.
    [Show full text]
  • Fortran 1957А–А2008
    Fortran 1957 ± 2008 : A Language with a Past, Present and Future Peter Crouch [email protected] Chairman Fortran Specialist Group www.fortran.bcs.org BCS Birmingham Branch meeting 19 May 2008 My Background 1968 - 1984 Industrial research chemist. Started programming in BASIC and Pascal in the late 1970s. Began to to use FORTRAN in the early 1980s. 1985 - 2001 Software developer for Computer Aided Design and Manufacturing systems using Fortran and C. 2003 - 2005 Civil servant in the Department for Work and Pensions. 1993 Joined the British Computer Society 1997 - 2002 Chairman of the BCS Birmingham Branch 2002 - 2008 Chairman of the BCS Fortran Specialist Group Presentation Outline In the Beginning Fortran Pioneers IBM Films Early Developments with example code Standardisation Modern Developments with example code Applications BCS Fortran Specialist Group In the Beginning In the beginning the only practical way to program computers was in machine code, which was extremely tedious. The source code used octal notation. By the 1950s assembly code had been developed, which was less tedious but still error prone and required a detailed knowledge of the computer hardware. FORTRAN Conceived In late 1953, John Backus sent a brief letter to his boss at IBM, asking that he be allowed to search for a "better way" of programming computers, with a project timescale of six months. He got the nod and began the research project that would eventually produce FORTRAN. As John Backus says in the film, ªproject completion was always six months awayº! Fortran
    [Show full text]
  • SE 016 990 Adaptive Schemes Called Sequential Reproductive Computers
    DOCUMENT RESUME ED 099 184 SE 016 990 AUTHOR Martin, Nancy TITLE Convergence Properties of a Class of Probabilistic Adaptive Schemes Called Sequential Reproductive Plans. Psychology and Education Series, Technical Report No. 210. INSTITUTION Stanford Univ., Calif. Inst. for Mathematical Studies in Social Science. SPONS AGENCY National Science Foundation, Washington, D.C. PUB DATE 31 Jul 73 NOTE 63p. EDRS PRICE EF-$0.75 HC-$3.15 PLUS POSTAGE DESCRIPTORS Computers; *Computer Science Education; Educational Research; *Genetics; Linear Programing; *Mathematical Models; Reproduction (Biology); Science Education; Social Sciences ABSTRACT Presented is a technical report concerning the use of a mathematical model describing certain aspects of the duplication and selection processes in natural genetic adaptation. This reproductive plan/model occurs in artificial genetics (the use of ideas from genetics to develop general problem solving techniques for computers). The reproductive plan is a sequential stochastic process involving n-tuples (corresponding to chromosomes in genetics) which may be simple numeric constants or complex structures such as computer algorithms. The plan also involves a sequence of probability distributions defined over n-tuples,, The report consists of five chapters: introduction; reproductive plans; deterministic problem bases; a chapter divided into sections on the search for an arena, the linear additive model, the linear models and pure problem bases; and conclusions. An appendix illustrating the theorem involved and a list of references conclude the report. (PEB) ! ..,ot Jr HI AL TN t A ALLF Alit .e.S1,Ttatt OF BEST COPYAVAILABLE t % -ttr . % % ; - % ftt ts` !CONVERGENCE PROPERTIES OF A CLASS OF PROBABILISTIC ADAPTIVESCHEMES CALLED SEQUENTIAL REPRODUCTIVE PLANS BY NANCY MARTIN TECHNICAL REPORT NO.
    [Show full text]
  • Making Construals in the CONSTRUIT Environment and Computing Education
    Making Construals In The CONSTRUIT Environment and Computing Education Kenneth Bugembe Discrete Mathematics - USCA-G4G1 19/20 Supervised by Mike Joy on behalf of Meurig Beynon (Emeritus Reader) 0 Introduction 3 Methodology (Theory) 7 Theoretical Content 9 Construals as an aspect of Computing Education 9 Construals as support for traditional Computing Education 13 Methodology (Technical) 16 Technical Discussion 17 Construal 1 - TPK Algorithm 17 Construal 2 - Turing Machine 23 Construals as “Objects to converse with” 30 Conclusions and Future Work 34 References 35 Appendix - Construals 38 1 Abstract There is growing recognition in the United Kingdom that everyone, regardless of their future occupation, will need some capacity to interact with computers as well as knowledge of both Computing and programming. However, there is increasing concern that current approaches to British Computing education are not adequate for this agenda. That the current curriculum is failing to properly equip students with the knowledge and skills to cope with an increasingly digital world and that the vast majority are choosing not to study Computing past Key Stage 3. Many argue that it is the difficulty of programming hindering the success and uptake of Computing education. Through the CONSTRUIT! project, the Empirical Modelling Research Group promote the theory of Empirical Modelling as a complementary experiential account of Computing. From this account, the practice of “making construals” arises; a mode of computer interaction they claim is more accessible to non-computing specialists and therefore better suited to an agenda of widely promoting Computing than conventional programming. This project aims to evaluate the theoretical and practical work of the CONSTRUIT! project in order to determine whether the principles and practice of making construals can be used to improve British Computing education.
    [Show full text]
  • Information to Users
    Adaptive digital image data compression using RIDPCM and a neural network for subimage classification Item Type text; Thesis-Reproduction (electronic) Authors Allan, Todd Stuart, 1964- Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 24/09/2021 23:55:43 Link to Item http://hdl.handle.net/10150/278109 INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. Each original is also photographed in one exposure and is included in reduced form at the back of the book.
    [Show full text]