CRN What It Was Doing and Why It Was Cognitive Systems Vision Doing It, and to Recover from Mental Continued on Page 8 Expanding the Pipeline

Total Page:16

File Type:pdf, Size:1020Kb

CRN What It Was Doing and Why It Was Cognitive Systems Vision Doing It, and to Recover from Mental Continued on Page 8 Expanding the Pipeline COMPUTING RESEARCH NEWS Computing Research Association, Celebrating 30 Years of Service to the Computing Research Community November 2002 Vol. 14/No. 5 DARPA’s New Cognitive Systems Vision By Ron Brachman and IPTO’s goal is to create a new to cope with systems both keep Zachary Lemnios generation of cognitive systems. growing. In order to make our systems more reliable, more secure, The impact of the Defense Mired in Moore’s Law? and more understandable, and to Advanced Research Projects Agency One benefit of such cognitive continue making substantial contri- (DARPA) on computing over the systems would be their help in butions to society, we need to do past 40 years has been profound. Led extracting us from a corner into something dramatically different. by the visionary J.C.R. Licklider and which our success seems to have his innovative successors in the painted us. The research that has The Promise of Cognitive Information Processing Techniques helped the industry follow Moore’s Systems Office (IPTO), DARPA initiated “Law” has created processors that are IPTO is attacking this problem by work that ultimately put personal remarkably fast and small, and data driving a fundamental change in computers on millions of desktops storage capabilities that are vast and computing systems. By giving systems Ron Brachman and made the global Internet a cheap. Unfortunately, these incred- more cognitive capabilities, we reality. In fact, the original IPTO, ible developments have cut two ways. believe we can make them more which lasted from 1962 to 1985, was While today’s computers are more responsible for their own behavior in large part responsible for estab- powerful than ever, we have been and maintenance. lishing Computer Science as a field. lured by processing power and Ideally, in the next generation, a DARPA has recently re-energized inexpensive memory into creating computer system will be cognizant of IPTO (now the Information Process- systems that are enormously large and its role in a larger organization or ing Technology Office), and has complex. Many of today’s systems are team (and of the overarching goals of rededicated its attention to modern virtually impossible for humans to that team), capable of acting Computer Science by looking both to understand, use, or maintain. autonomously, and able to interact its roots and to a dramatic vision of Beyond the resulting maintenance rationally with other systems and the future. Licklider imagined com- problem, with the total lifetime cost humans in real time. It will also be Zachary Lemnios puters and humans working closely of systems now heavily dominated by able to take care of itself in a self- together in a form of symbiosis. The after-production costs, this com- aware and knowledgeable way. blind alleys. It should be able to new, 21st century IPTO wants to plexity has also led to serious vulner- Ultimately, these new capabilities reflect on what goes wrong when an realize this vision by giving com- abilities. More complexity means will be the basis for artificial systems anomaly occurs, and anticipate such puting systems unprecedented abili- greater opportunity for intruders. that can respond as robustly to occurrences in the future. It should ties to reason, to learn, to explain, More elements mean more ways that surprise as natural systems can. be able to reconfigure itself in and to reflect, in order to finally things can go wrong; systems crash A cognitive computer system response to environmental changes. create systems able to cope robustly and software rots. And the training should be able to learn from its And it should be able to be config- with unforeseen circumstances. burden and level of expertise required experience, as well as by being ured, maintained, and operated by advised. It should be able to explain non-experts. All of these potential Inside CRN what it was doing and why it was Cognitive Systems Vision doing it, and to recover from mental Continued on Page 8 Expanding the Pipeline .......................2 Taulbee Historical Data.......................4 Research Lab Salaries........................3 Federal Budget Cycle Primer..............4 Digital Fellow’s Article .........................3 Professional Opportunities ................12 PAID U.S. POSTAGE PERMIT NO. 993 NONPROFIT ORG. The Intel Research Network: An Innovative DC WASHINGTON, Model of Industry-University Collaboration By Hans Mulder This is another in a series of CRN Formation of Intel Research articles describing the activities of CRA’s In 1999, David Tennenhouse industry laboratory members. Others joined Intel and was charged with are posted at: http://www.cra.org/ launching a new internal organiza- reports/labs. tion, Intel Research, to explore the Intel has a long history of funding disruptive and emerging technologies academic research through sponsored that could advance Intel’s business programs and grants. Today more and create new markets and opportu- than 250 Intel-sponsored research nities. Tennenhouse had been chief engagements are underway at univer- scientist and director of the informa- sities throughout the world. Recently tion technology office at the Defense Hans Mulder we have developed a bold new Advanced Research Projects Agency approach to conducting joint (DARPA), an organization known needs and take action on their research with universities in an for its ability to catalyze innovation behalf. Intel Research set out to open collaborative environment. by funding highly targeted university translate that vision into reality. We believe this innovative model research projects. The research model developed for will accelerate Intel’s exploratory this long-term and exploratory research efforts, while addressing The Vision of Proactive program uses Intel funding to sample the most pressing concerns of all Computing the broad array of university research. parties involved in collaborative Tennenhouse arrived at Intel with However, just sponsoring university initiatives between companies a vision of a future world of proactive research would not be sufficient to and universities. computing, in which billions of devices embedded throughout the Intel Research Network CRA NW 1100 Seventeenth Street, Suite 507 DC 20036-4632 Washington, environment will anticipate people’s Continued on Page 9 COMPUTING RESEARCH NEWS November 2002 Expanding the Pipeline Computing Research Award Validates Berkeley’s Diversity Association Board Officers Programs James Foley Chair By Sheila Humphreys Georgia Institute of Technology Janice Cuny Berkeley’s “EECS Excellence and Vice Chair Diversity Student Programs” were Berkeley Milestones University of Oregon recently awarded the 2002 Women 1971 Susan Graham appointed Assistant Professor of Computer Science. Kathleen McKeown in Engineering Programs Award 1977 WICSE (women’s graduate group) founded by CS graduate students. Secretary (WIEP) by WEPAN (Women Columbia University 1978 Working in Engineering and Computer Science: A conference for women in Engineering Programs and attended by 800 students. John Stankovic Treasurer Advocacy Network). 1983 Computer Science Reentry Program Established by Computer Science University of Virginia At a time when diversity Division to increase number of women graduate students. Board Members programs are under attack, such 1986 EECS (Prof. Eugene Wong) creates “Excellence and Diversity Student Philip Bernstein an award validates Berkeley’s Programs.” Microsoft Research programs for women. The passage 1987 WICSE 10th Anniversary: MIT Professor Dresselhaus, speaker. Randal Bryant of Proposition 209 in California, 1992 AUWICSEE founded by women undergraduates; Professor Katherine Carnegie Mellon University which prohibits programs that Yelick appointed. Doris Carver confer educational benefits based 1994 Faculty pass Parent Policy allowing graduate student parents to modify Louisiana State University solely on gender or ethnicity, has led their academic program. Lori Clarke to a perceived shift away from 1996 CS Reentry Program phased out because of Proposition 209. University of Massachusetts valuing diversity. Further, the con- 2000 CS sends 15 students to Grace Hopper Celebration of Women in Timothy Finin tinuing economic downturn in Computing. University of Maryland Baltimore County California undermines all academic 2001 Jennifer Mankoff appointed Assistant Professor of CS; Berkeley estab- programs, but particularly diversity lishes a Virtual Development Center. Ambuj Goyal IBM T.J. Watson Research Center programs, which lie outside core 2002 WICSE celebrates 25th year Maria Klawe visits CS as Regents’ Lecturer. Barbara Grosz instructional activities. The WIEP Award recognizes CS sends 22 students to Hopper Conference; Barbara Grosz visits as Harvard University McKay Professor in Computer Science. James Horning Berkeley’s “sustained national NAI Labs impact” in several areas, including: Mary Jane Irwin 1) attracting women to electrical with staff assistance, space, facilita- mid-‘90s a number of women grad- Pennsylvania State University engineering and computer science at tion of conference travel, a guaran- uate students struggled with graduate Leah H. Jamieson Berkeley; 2) providing orientation Purdue University teed voice at the annual Faculty degree timelines and expectations and sustained academic support to Retreat, and funding to support while dealing with infant care. The Michael Jones women students in EECS; 3) fos- Microsoft Research its activities. Parent Policy, championed by tering a sense of community
Recommended publications
  • The Conference Program Booklet
    Austin Convention Center Conference Austin, TX Program http://sc15.supercomputing.org/ Conference Dates: Exhibition Dates: The International Conference for High Performance Nov. 15 - 20, 2015 Nov. 16 - 19, 2015 Computing, Networking, Storage and Analysis Sponsors: SC15.supercomputing.org SC15 • Austin, Texas The International Conference for High Performance Computing, Networking, Storage and Analysis Sponsors: 3 Table of Contents Welcome from the Chair ................................. 4 Papers ............................................................... 68 General Information ........................................ 5 Posters Research Posters……………………………………..88 Registration and Conference Store Hours ....... 5 ACM Student Research Competition ........ 114 Exhibit Hall Hours ............................................. 5 Posters SC15 Information Booth/Hours ....................... 5 Scientific Visualization/ .................................... 120 Data Analytics Showcase SC16 Preview Booth/Hours ............................. 5 Student Programs Social Events ..................................................... 5 Experiencing HPC for Undergraduates ...... 122 Registration Pass Access .................................. 7 Mentor-Protégé Program .......................... 123 Student Cluster Competition Kickoff ......... 123 SCinet ............................................................... 8 Student-Postdoc Job & ............................. 123 Convention Center Maps ................................. 12 Opportunity Fair Daily Schedules
    [Show full text]
  • The AWK Programming Language
    The Programming ~" ·. Language PolyAWK- The Toolbox Language· Auru:o V. AHo BRIAN W.I<ERNIGHAN PETER J. WEINBERGER TheAWK4 Programming~ Language TheAWI(. Programming~ Language ALFRED V. AHo BRIAN w. KERNIGHAN PETER J. WEINBERGER AT& T Bell Laboratories Murray Hill, New Jersey A ADDISON-WESLEY•• PUBLISHING COMPANY Reading, Massachusetts • Menlo Park, California • New York Don Mills, Ontario • Wokingham, England • Amsterdam • Bonn Sydney • Singapore • Tokyo • Madrid • Bogota Santiago • San Juan This book is in the Addison-Wesley Series in Computer Science Michael A. Harrison Consulting Editor Library of Congress Cataloging-in-Publication Data Aho, Alfred V. The AWK programming language. Includes index. I. AWK (Computer program language) I. Kernighan, Brian W. II. Weinberger, Peter J. III. Title. QA76.73.A95A35 1988 005.13'3 87-17566 ISBN 0-201-07981-X This book was typeset in Times Roman and Courier by the authors, using an Autologic APS-5 phototypesetter and a DEC VAX 8550 running the 9th Edition of the UNIX~ operating system. -~- ATs.T Copyright c 1988 by Bell Telephone Laboratories, Incorporated. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy­ ing, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Published simultaneously in Canada. UNIX is a registered trademark of AT&T. DEFGHIJ-AL-898 PREFACE Computer users spend a lot of time doing simple, mechanical data manipula­ tion - changing the format of data, checking its validity, finding items with some property, adding up numbers, printing reports, and the like.
    [Show full text]
  • Curriculum Vitae
    Massachusetts Institute of Technology School of Engineering Faculty Personnel Record Date: April 1, 2020 Full Name: Charles E. Leiserson Department: Electrical Engineering and Computer Science 1. Date of Birth November 10, 1953 2. Citizenship U.S.A. 3. Education School Degree Date Yale University B. S. (cum laude) May 1975 Carnegie-Mellon University Ph.D. Dec. 1981 4. Title of Thesis for Most Advanced Degree Area-Efficient VLSI Computation 5. Principal Fields of Interest Analysis of algorithms Caching Compilers and runtime systems Computer chess Computer-aided design Computer network architecture Digital hardware and computing machinery Distance education and interaction Fast artificial intelligence Leadership skills for engineering and science faculty Multicore computing Parallel algorithms, architectures, and languages Parallel and distributed computing Performance engineering Scalable computing systems Software performance engineering Supercomputing Theoretical computer science MIT School of Engineering Faculty Personnel Record — Charles E. Leiserson 2 6. Non-MIT Experience Position Date Founder, Chairman of the Board, and Chief Technology Officer, Cilk Arts, 2006 – 2009 Burlington, Massachusetts Director of System Architecture, Akamai Technologies, Cambridge, 1999 – 2001 Massachusetts Shaw Visiting Professor, National University of Singapore, Republic of 1995 – 1996 Singapore Network Architect for Connection Machine Model CM-5 Supercomputer, 1989 – 1990 Thinking Machines Programmer, Computervision Corporation, Bedford, Massachusetts 1975
    [Show full text]
  • Sensory Information Processing (1 January 1976
    Im plem enting Functional Program s Using M utable Abstract Data Types Ganesh C. Gopalakrishnan, Department of Computer Science, Univ. of Utah, Salt Lake City, Utah 84112 and Mandayam K. Srivas, Department of Computer Science, SUNY, Stony Brook, N Y 11794 W e study the following problem in this paper. Suppose we have a purely functional program that uses a set of abstract data types by invoking their operations. Is there an order of evaluation of the operations in the program that preserves the applicative order of evaluation semantics of the program even when the abstract data types behave as mutable modules. An abstract data type is mutable if one of its operations destructively updates the object rather than returning a new object as a result. This problem is important for several reasons. It can help eliminate unnecessary copying of data structure states. It supports a methodology in which one can program in a purely functional notation for purposes of verification and clarity, and then automatically transform the program into one in an object oriented, imperative language, such as CLU, A D A , Smalltalk, etc., that supports abstract data types. It allows accruing both the benefits of using abstract data types in programming, and allows modularity and verifiability. Keywords: Functional Program Implementation, Mutable Modules, Abstract Data Types, Syntactic Conditions. C o n t e n t s 1 Introduction 1 1.1 Related W o r k ........................................................................................................................... 2 1.2 Terminology, Assumptions, and Problem Statement............................................... 2 2 Syntactic Characterization of In Situ Evaluability 3 2.1 Syntactic Conditions for Straight-line Expressions..................................................
    [Show full text]
  • Understanding Programming Languages
    Understanding Programming Languages M. Ben-Ari Weizmann Institute of Science Originally published by John Wiley & Sons, Chichester, 1996. Copyright °c 2006 by M. Ben-Ari. You may download, display and print one copy for your personal use in non-commercial academic research and teaching. Instructors in non-commerical academic institutions may make one copy for each student in his/her class. All other rights reserved. In particular, posting this document on web sites is prohibited without the express permission of the author. Contents Preface xi I Introduction to Programming Languages 1 1 What Are Programming Languages? 2 1.1 The wrong question . 2 1.2 Imperative languages . 4 1.3 Data-oriented languages . 7 1.4 Object-oriented languages . 11 1.5 Non-imperative languages . 12 1.6 Standardization . 13 1.7 Computer architecture . 13 1.8 * Computability . 16 1.9 Exercises . 17 2 Elements of Programming Languages 18 2.1 Syntax . 18 2.2 * Semantics . 20 2.3 Data . 21 2.4 The assignment statement . 22 2.5 Type checking . 23 2.6 Control statements . 24 2.7 Subprograms . 24 2.8 Modules . 25 2.9 Exercises . 26 v Contents vi 3 Programming Environments 27 3.1 Editor . 28 3.2 Compiler . 28 3.3 Librarian . 30 3.4 Linker . 31 3.5 Loader . 32 3.6 Debugger . 32 3.7 Profiler . 33 3.8 Testing tools . 33 3.9 Configuration tools . 34 3.10 Interpreters . 34 3.11 The Java model . 35 3.12 Exercises . 37 II Essential Concepts 38 4 Elementary Data Types 39 4.1 Integer types .
    [Show full text]
  • BRIDGE Linking Engin Ee Ring and Soci E T Y
    Summer 2009 ENERGY EFFICIENCY The BRIDGE LINKING ENGIN ee RING AND SOCI E TY The Potential of Energy Efficiency: An Overview Lester B. Lave Improving Energy Efficiency in the Chemical Industry Jeremy J. Patt and William F. Banholzer Energy Efficiency in Passenger Transportation Daniel Sperling and Nic Lutsey Building Materials, Energy Efficiency, and the American Recovery and Reinvestment Act Robin Roy and Brandon Tinianov Coming of Age in New York: The Maturation of Energy Efficiency as a Resource Paul A. DeCotis The Greening of the Middle Kingdom: The Story of Energy Efficiency in China Mark D. Levine, Nan Zhou, and Lynn Price Promoting the technological welfare of the nation by marshalling the knowledge and insights of eminent members of the engineering profession. The BRIDGE NationaL AcaDemy OF Engineering Irwin M. Jacobs, Chair Charles M. Vest, President Maxine L. Savitz, Vice President Thomas F. Budinger, Home Secretary George Bugliarello, Foreign Secretary William L. Friend, Treasurer Editor in Chief (interim): George Bugliarello Managing Editor: Carol R. Arenberg Production Assistant: Penelope Gibbs The Bridge (USPS 551-240) is published quarterly by the National Academy of Engineering, 2101 Constitution Avenue, N.W., Washington, DC 20418. Periodicals postage paid at Washington, DC. Vol. 39, No. 2, Summer 2009 Postmaster: Send address changes to The Bridge, 2101 Constitution Avenue, N.W., Washington, DC 20418. Papers are presented in The Bridge on the basis of general interest and time- liness. They reflect the views of the authors and not necessarily the position of the National Academy of Engineering. The Bridge is printed on recycled paper. © 2009 by the National Academy of Sciences.
    [Show full text]
  • Second International Computer Programming Education Conference
    Second International Computer Programming Education Conference ICPEC 2021, May 27–28, 2021, University of Minho, Braga, Portugal Edited by Pedro Rangel Henriques Filipe Portela Ricardo Queirós Alberto Simões OA S I c s – Vo l . 91 – ICPEC 2021 www.dagstuhl.de/oasics Editors Pedro Rangel Henriques Universidade do Minho, Portugal [email protected] Filipe Portela Universidade do Minho, Portugal [email protected] Ricardo Queirós Politécnico do Porto, Portugal [email protected] Alberto Simões Politécnico do Cávado e Ave, Portugal [email protected] ACM Classifcation 2012 Applied computing → Education ISBN 978-3-95977-194-8 Published online and open access by Schloss Dagstuhl – Leibniz-Zentrum für Informatik GmbH, Dagstuhl Publishing, Saarbrücken/Wadern, Germany. Online available at https://www.dagstuhl.de/dagpub/978-3-95977-194-8. Publication date July, 2021 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografe; detailed bibliographic data are available in the Internet at https://portal.dnb.de. License This work is licensed under a Creative Commons Attribution 4.0 International license (CC-BY 4.0): https://creativecommons.org/licenses/by/4.0/legalcode. In brief, this license authorizes each and everybody to share (to copy, distribute and transmit) the work under the following conditions, without impairing or restricting the authors’ moral rights: Attribution: The work must be attributed to its authors. The copyright is retained by the corresponding authors. Digital Object Identifer: 10.4230/OASIcs.ICPEC.2021.0 ISBN 978-3-95977-194-8 ISSN 1868-8969 https://www.dagstuhl.de/oasics 0:iii OASIcs – OpenAccess Series in Informatics OASIcs is a series of high-quality conference proceedings across all felds in informatics.
    [Show full text]
  • A Auxiliary Definitions
    A Auxiliary Definitions This appendix contains auxiliary definitions omitted from the main text. Variables fun lvars :: com ⇒ vname set where lvars SKIP = {} lvars (x ::= e)={x} lvars (c1;; c2)=lvars c1 ∪ lvars c2 lvars (IF b THEN c1 ELSE c2)=lvars c1 ∪ lvars c2 lvars (WHILE b DO c)=lvars c fun rvars :: com ⇒ vname set where rvars SKIP = {} rvars (x ::= e)=vars e rvars (c1;; c2)=rvars c1 ∪ rvars c2 rvars (IF b THEN c1 ELSE c2)=vars b ∪ rvars c1 ∪ rvars c2 rvars (WHILE b DO c)=vars b ∪ rvars c definition vars :: com ⇒ vname set where vars c = lvars c ∪ rvars c Abstract Interpretation fun strip :: aacom⇒ com where strip (SKIP {P})=SKIP strip (x ::= e {P})=x ::= e © Springer International Publishing Switzerland 2014 281 T. Nipkow and G. Klein, Concrete Semantics, DOI 10.1007/978-3-319-10542-0 282 A Auxiliary Definitions strip (C 1;;C 2)=strip C 1;; strip C 2 strip (IF b THEN {P 1} C 1 ELSE {P 2} C 2 {P})= IF b THEN strip C 1 ELSE strip C 2 strip ({I } WHILE b DO {P} C {Q})=WHILE b DO strip C fun annos :: aacom⇒ a list where annos (SKIP {P})=[P] annos (x ::= e {P})=[P] annos (C 1;;C 2)=annos C 1 @ annos C 2 annos (IF b THEN {P 1} C 1 ELSE {P 2} C 2 {Q})= P 1 # annos C 1 @ P 2 # annos C 2 @ [Q] annos ({I } WHILE b DO {P} C {Q})=I # P # annos C @ [Q] fun asize :: com ⇒ nat where asize SKIP = 1 asize (x ::= e)=1 asize (C 1;;C 2)=asize C 1 + asize C 2 asize (IF b THEN C 1 ELSE C 2)=asize C 1 + asize C 2 + 3 asize (WHILE b DO C )=asize C + 3 definition shift :: (nat ⇒ a) ⇒ nat ⇒ nat ⇒ a where shift f n =(λp.
    [Show full text]
  • Awk Short Intro
    awk short intro Robert Kofler awk • scripng language for reformang text files or extracng informaon from text files • good performance with large text files ⇒ thus “awk” is like PCR for NGS data analysis Why awk: very powerful (you can answer a lot of NGS related quesons with a simple awk command) easy to learn good performance with large text files may be used with other Unix‐command (pipe) Our input file basics • Name: Alfred Aho, Peter Weinberger, Brian Kernighan • How to use awk awk ‘command’ input_file.txt or cat input_file.txt | awk ‘command’ Let’s start: awk ‘{print $1}’ sample.txt cat sample.txt| awk ‘{print $1}’ Structure of awk command full structure of a awk command: awk ‘BEGIN{command}condition{command}END{command}’ # BEGIN{command} => execute this command at the beginning # condition{command} => MOST IMPORTANT PART, will be executed for every line in the file! # END{command} => execute this command at the end example: awk ‘BEGIN{print “File start”}$1==“2L”{print $0}END{print “End of file”}’ sample.txt Most things are oponal shortest example possible awk ‘’ sample.txt => not doing anything awk ‘$1’ sample.txt => prints line if $1 is not empty # above, we are only using ‘condition{command}’ # we are not using ‘BEGIN{command}’ and ‘END{command}’ default for ‘condion{command}’ is the following ‘condion’ => ‘condion{print $0}’ awk ‘$1’ sample.txt # is per default using the following command: awk ‘$1{print $0}’ # {print $0} is the default for the loop!! # {print $0} just means print the line Now some more meaningful condions awk ‘$1==“2L”’
    [Show full text]
  • Assembling a Prehistory for Formal Methods: a Personal View Thomas Haigh [email protected]
    Assembling A Prehistory for Formal Methods: A Personal View Thomas Haigh [email protected] University of Wisconsin—Milwaukee & Siegen University www.tomandmaria.com This is a preprint copy. Please quote and cite the final version, which will appear in a special issue of Formal Aspects of Computing devoted to historical work. Thanks to Cliff Jones and the anonymous reviewers for their encouragement and feedback on earlier drafts of this paper. Preprint Draft Haigh – Assembling a History for Formal Methods 2 Although I was pleased to be asked to contribute something to this volume I have a confession to make: I have never studied the history of formal methods. So this is not going to be a history of formal methods as much as a reflection on how such a story might be written. My plan is to triangulate from my personal experiences as a computer science student a quarter century ago, my Ph.D. training as a historian of science and technology, and my subsequent career researching and writing about various aspects of the history of computing. The fact that, despite a general familiarity with the literature on the history of computing, I don’t have a better grasp of the history of formal methods tells us a lot about the need for this special issue. Most of the history is so far locked up in the heads of participants, which is not a convenient place for the rest of us to find it. Stories written by participants or people with a personal connection to the events described are not usually the last word on historical events, but they are a vital starting point.
    [Show full text]
  • Appendix B: Annotated Bibliography
    Appendix B: Annotated Bibliography There are a wide variety of texts available for those who are interested in learning more about assem- bly language or other topics this text covers. The following is a partial list of texts that may be of interest to you. Many of these texts are now out of print. Please consult your local library if you cannot find a particu- lar text at a bookstore. Microprocessor Programming for Computer Hobbyists Neill Graham TAB books ISBN 0-8306-6952-3 1977 This book provides a gentle introduction to data structures for computer hobbyists. Although it uses the PL/M programming language, many of the concepts apply directly to assembly language programs. IBM Assembler Language and Programming Peter Able Prentice-Hall ISBN 0-13-448143-7 1987 A college text book on assembly language. Contains good sections on DOS and disk formats for earlier versions of DOS. MS-DOS Developer’s Guide John Angermeyer and Keven Jaeger Howard W. Sams & Co. ISBN 0-672-22409-7 An excellent reference book on programming MS-DOS. Compilers: Principles, Techniques, and Tools Alfred Aho, Ravi Sethi, and Jeffrey Ullman Addison Wesley ISBN 0-201-10088-6 1986 The standard text on compiler design and implementation. Contains lots of material on pattern matching and other related subjects. C Programmer’s Guide to Serial Communications Joe Campbell Howard W. Sams & Co. ISBN 0-672-22584-0 An indispensible guide to serial communications. Although written specifically for C programmers, the material applies equally well to assembly language programmers. The MS-DOS Encyclopedia Ray Duncan, General Editor & various authors Microsoft Press ISBN 1-55615-049-0 An excellent description of MS-DOS programming.
    [Show full text]
  • TECHNOLOGY MADE LEGIBLE a Cultural Study of Software As A
    TECHNOLOGY MADE LEGIBLE A Cultural Study of Software as a Form of Writing in the Theories and Practices of Software Engineering Federica Frabetti Goldsmiths College, University of London Submitted for the degree of PhD 2009 Abstract My dissertation proposes an analytical framework for the cultural understanding of the group of technologies commonly referred to as 'new' or 'digital'. I aim at dispelling what the philosopher Bernard Stiegler calls the 'deep opacity' that still surrounds new technologies, and that constitutes one of the main obstacles in their conceptualization today. I argue that such a critical intervention is essential if we are to take new technologies seriously, and if we are to engage with them on both the cultural and the political level. I understand new technologies as technologies based on software. I therefore suggest that a complex understanding of technologies, and of their role in contemporary culture and society, requires, as a preliminary step, an investigation of how software works. This involves going beyond studying the intertwined processes of its production, reception and consumption - processes that typically constitute the focus of media and cultural studies. Instead, I propose a way of accessing the ever present but allegedly invisible codes and languages that constitute software. I thus reformulate the problem of understanding software-based technologies as a problem of making software legible. I build my analysis on the concept of software advanced by Software Engineering, a technical discipline born in the late 1960s that defines software development as an advanced writing technique and software as a text. This conception of software enables me to analyse it through a number of reading strategies.
    [Show full text]