ICL Technical Journal Volume 5 Issue 3

Total Page:16

File Type:pdf, Size:1020Kb

ICL Technical Journal Volume 5 Issue 3 TECHniCAl j o u m n i Volume 5 Issue 3 May 1987 Published by INTERNATIONAL COMPUTERS LIMITED at OXFORD UNIVERSITY PRESS iCL The ICL Technical Journal is published twice a year by TECHniCRl International Computers Limited at Oxford University jouRnfli Press. Editor J. Howlett ICL House, Putney, London SW15 ISW, UK Editorial Board J. Howlett (Editor) F.F. Land H.M. Cropper (F International) (London School of Economics & D.W. Davies, FRS Political Science) G.E. Felton K.H. Macdonald M.D. Godfrey M R. Miller C.H.L. Goodman (British Telecom Research (Standard Telephone Laboratories) Laboratories and Warwick J.M. Pinkerton University) E.C.P. Portman All correspondence and papers to be considered for publication should be addressed to the Editor. The views expressed in the papers are those of the authors and do not necessarily represent ICL policy. 1987 subscription rates: annual subscription £32 UK, £40 rest of world, US $72 N. America; single issues £17 UK, £22 rest of world, US $38 N. America. Orders with remittances should be sent to the Journals Subscriptions Department, Oxford University Press, Walton Street, Oxford 0X2 6DP, UK. This publication is copyright under the Berne Convention and the Interna­ tional Copyright Convention. All rights reserved. Apart from any copying under the UK Copyright Act 1956, part 1, section 7, whereby a single copy of an article may be supplied, under certain conditions, for the purposes of research or private study, by a library of a class prescribed by the UK Board of Trade Regulations (Statutory Instruments 1957, No. 868), no part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means without the prior permission of the copyright owners. Permission is, however, not required to copy abstracts of papers or articles on condition that a full reference to the source is shown. Multiple copying of the contents of the publication without permission is always illegal. © 1987 International Computers Limited Printed by H Charlesworth & Co Ltd, Huddersfield ISSN 0142-1557 (CL TecHmcfli jouRmi Contents Volume 5 Issue 3 The ICL Fifth Generation Programme Guest Editorial B.W. Oakley 357 Foreword J.M. Watson 359 What is Fifth Generaton?-the scope of the ICL programme B. J. Proctor and C.J. Skelton 360 APPLICATIONS The Alvey DHSS Large Demonstrator Project E.C.P. Portman 371 PARAMEDICL: a computer-aided medical diagnosis system for parallel architectures M.G. Cutcher and M.J. Rigg 376 S39XC-a configurer for Series 39 mainframe systems C. W. Bartlett 385 The application of knowledge based systems to computer capacity management M. Small 404 APPLICATIONS ENVIRONMENT On knowledge bases at ECRC J.-M. Nicolas 421 Logic languages and relational databases: the design and implementa­ tion of Educe J. Bocca 425 ICL Technical Journal May 1987 I The semantic aspects of MMI J.M. Pratt 451 LANGUAGES Language overview E. Babb 471 PISA-a Persistent Information Space Architecture M.P. Atkinson, R. Morrison and G. Pratten 477 Software development using functional programming languages J. Darlington 492 Dactl: a computational model and compiler target language based on graph reduction J.R.W. Glauert, J.R. Kennaway and M.R. Sleep 509 PARALLEL DECLARATIVE SYSTEMS Designing system software for parallel declarative systems P. Broughton, C.M. Thomson, S.R. Leunig and S. Prior 541 Flagship computational models and machine architecture I. Watson, J. Sargeant, P. Watson and V. Woods 555 Flagship hardware and implementation P. Townsend 575 GRIP: A parallel graph reduction machine S.L Peyton-Jones, C. Clack andJ. Salkild 595 Notes on the authors 600 ii ICL Technical Journal May 1987 Guest Editorial The Japanese announcement of their “Fifth Generation” co-operative project in the autumn of 1981 was the trigger for a rush of other Fifth Generation programmes to emerge in the USA and Europe. In the USA this has partly taken the form of new co-operative ventures, such as the Microelectronics and Computer Corporation (MCC) at the University of Texas, supported by over 20 firms in the industry. This centre is far larger than the Japanese ICOT research centre, established by MITI using staff seconded from the eight large Japanese firms engaged in the programme. And the MCC is by no means the only US Fifth Generation programme. Of course defence money is helping to speed up the work in the USA, notably through the Defence Advanced Research Project Agencies (DARPA) Strategic Computing Pro­ gramme - not to be confused with Star Wars. In Europe the UK’s Alvey Programme, and the EEC’s ESPRIT programme are the most visible sign of work on the Fifth Generation. But, as in Japan and the USA, all the main computer firms have work going on on aspects of the Fifth Generation, almost by definition of the next generation of computing. And it is often forgotten that the European Computer Industries Joint Research Centre at Munich (ECRC) is a Fifth Generation research centre somewhat larger than ICOT, even if far less visible. This centre is funded by ICL, Bull, and Siemens, and houses a team of high quality. Some of its work is featured in this volume. If it was the Japanese announcement that triggered the Fifth Generation programmes of the Western World, or at least gave publicity to them, it was the recognition that the applications of Artificial Intelligence will lead to large new markets that has led to their funding by firms and governments. Expert Systems are going to become a feature of every considerable walk of life. And the eventual solution of the difficult problems of general purpose speech recognition and Natural Language understanding is going to unleash a whole new range of applications of computers as it becomes easier to “converse” with one’s system. Since the days when Alan Turing was the unsung prophet on the use of computers for symbolic and logical manipulation, not just for the solution of mathematically based algorithms, the UK has had an honourable place in the vanguard of the development of the techniques of Artificial Intelligence computing that lies at the heart of the Fifth Generation. Edinburgh University and other UK research centres have provided a steady stream of ICL Technical Journal May 1987 357 workers in the field, and have pioneered many of the functional and logical language techniques. ICL with its DAP was one of the first computer manufacturers to pioneer the use of parallel computers, which will be essential if the power required to handle all but the most simple of Knowledge Based Systems is to be available. The significance of the DAP is probably more widely recognised abroad, where it has been flattered by being copied, and it probably remains the parallel machine for which the most software has been written. So it is nice to see the leading part that ICL has played in both the Alvey and ESPRIT programmes. This volume brings together articles on a whole series of projects in which the company is engaged. Seen together it makes a most striking collection, both for its breadth and for its quality. The way in which ICL have developed their close links with the excellent work of the British Universities is clear from the list of authors. Is there any other firm in Europe who could put together such a record of their work for the Fifth Generation? It must give the Japanese food for thought! Brian Oakley Director, The Alvey Programme 358 ICL Technical Journal May 1987 Foreword Every industry evolves by a process of steady development - interspersed with major discontinuities. These occur when technology, industry and customer understanding and the economics of business coincide to cause a jump forward to the next plateau of development. The so called Fifth Generation potentially represents such a discontinuity in the Information Technology industry and in this issue of the ICL Technical Journal we examine some facets of this against the background of the overview of the ICL programme in this area as outlined in the first paper. The real and valuable result of any discontinuity will be the impact these technologies have on systems applications. It is in this area that Fifth Generation techniques demonstrate the economic value over alternative systems approaches. The first set of papers describe some current applica­ tions using these new techniques. To achieve this, some radical rethinking will be required in the applications environment - the way the system and the user interact. The set of papers from the European Computer Industries Research Centre (ECRC) describe the basic research goals being explored in this area. The key technology streams of new language types and the development of more powerful and parallel machine architectures provide the underpinning technical capability and the papers in this area draw heavily on the work carried out under the UK co-operative research programme - Alvey. We are making no predictions as to when Fifth Generation technology in total will have major user impact, however what is clear is that the ingredients for a substantial step forward in the quality and usability of information systems are now coming together. J.M. Watson Director, ICL Marketing and Technical Strategy ICL Technical Journal May 1987 359 What is Fifth Generation? - the scope of the ICL programme B.J. Procter and C.J. Skelton Mainframe Systems Division, ICL, West Gorton, Manchester Abstract The scope, motivation and modus operandi of the ICL Fifth Genera­ tion programme is outlined to provide a context for the remaining papers in this issue of the ICL Journal. 1 Introduction The single chip microprocessor has brought a computer-based revolution to the 1980s. In human terms, however, the applications we run on these processors are extremely simple.
Recommended publications
  • Vcf Pnw 2019
    VCF PNW 2019 http://vcfed.org/vcf-pnw/ Schedule Saturday 10:00 AM Museum opens and VCF PNW 2019 starts 11:00 AM Erik Klein, opening comments from VCFed.org Stephen M. Jones, opening comments from Living Computers:Museum+Labs 1:00 PM Joe Decuir, IEEE Fellow, Three generations of animation machines: Atari and Amiga 2:30 PM Geoff Pool, From Minix to GNU/Linux - A Retrospective 4:00 PM Chris Rutkowski, The birth of the Business PC - How volatile markets evolve 5:00 PM Museum closes - come back tomorrow! Sunday 10:00 AM Day two of VCF PNW 2019 begins 11:00 AM John Durno, The Lost Art of Telidon 1:00 PM Lars Brinkhoff, ITS: Incompatible Timesharing System 2:30 PM Steve Jamieson, A Brief History of British Computing 4:00 PM Presentation of show awards and wrap-up Exhibitors One of the defining attributes of a Vintage Computer Festival is that exhibits are interactive; VCF exhibitors put in an amazing amount of effort to not only bring their favorite pieces of computing history, but to make them come alive. Be sure to visit all of them, ask questions, play, learn, take pictures, etc. And consider coming back one day as an exhibitor yourself! Rick Bensene, Wang Laboratories’ Electronic Calculators, An exhibit of Wang Labs electronic calculators from their first mass-market calculator, the Wang LOCI-2, through the last of their calculators, the C-Series. The exhibit includes examples of nearly every series of electronic calculator that Wang Laboratories sold, unusual and rare peripheral devices, documentation, and ephemera relating to Wang Labs calculator business.
    [Show full text]
  • Validated Products List, 1995 No. 3: Programming Languages, Database
    NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 QC 100 NIST .056 NO. 5693 1995 NISTIR 5693 (Supersedes NISTIR 5629) VALIDATED PRODUCTS LIST Volume 1 1995 No. 3 Programming Languages Database Language SQL Graphics POSIX Computer Security Judy B. Kailey Product Data - IGES Editor U.S. DEPARTMENT OF COMMERCE Technology Administration National Institute of Standards and Technology Computer Systems Laboratory Software Standards Validation Group Gaithersburg, MD 20899 July 1995 (Supersedes April 1995 issue) U.S. DEPARTMENT OF COMMERCE Ronald H. Brown, Secretary TECHNOLOGY ADMINISTRATION Mary L. Good, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arati Prabhakar, Director FOREWORD The Validated Products List (VPL) identifies information technology products that have been tested for conformance to Federal Information Processing Standards (FIPS) in accordance with Computer Systems Laboratory (CSL) conformance testing procedures, and have a current validation certificate or registered test report. The VPL also contains information about the organizations, test methods and procedures that support the validation programs for the FIPS identified in this document. The VPL includes computer language processors for programming languages COBOL, Fortran, Ada, Pascal, C, M[UMPS], and database language SQL; computer graphic implementations for GKS, COM, PHIGS, and Raster Graphics; operating system implementations for POSIX; Open Systems Interconnection implementations; and computer security implementations for DES, MAC and Key Management.
    [Show full text]
  • Systems Corporation Pern SYSTEM OVERVIEW March 1984
    o PERn Systems Corporation PERn SYSTEM OVERVIEW o March 1984 This manual is for use with POS Release G.5 and subsequent releases until further notice. Copyri9ht(C) 19B3, 19Bi PERC Systems Corporation 2600 Liberty Avenue P. O. Box 2600 Pittsbur9h, PA 15230 (HZ) 355-0900 o o This document is not to be reproduced in any fonn or transmitted in whole or in part, without the prior written authorization of PERQ Systems Corporation. o The information in this document is subject to change without notice and should not be construed as a commitment by PERQ Systems Corporation. The company assumes no responsibility for any errors that may appear in this document. PERQ Systems Corporation will make every effort to keep customers apprised of all documentation changes as quickly as possible. The Reader's Comments card is distributed with this document to request users' critical evaluation to assist us in preparing future documentation. PERQ and PEROZ are trademarks of PERQ Systems Corporation. o - ii - --~---- ----------- PREFACE January 15, 1984 o PREFACE This manual is intended for new users of PERQ and PERQ2. The manual will familiarize you with the machines and get you started using either system. As you learn more about your system, you will find that it provides you with many facilities, both conveniences and necessities. This manual consists of three chapters. Chapter One describes the method to turn the system on and the bootstrap process. Chapter Two describes the PERQ and PERQ2 hardware. Chapter Three discusses the basic operation of the system software. Distinctions between the PERQ and PERQ2 are explicit.
    [Show full text]
  • Computer Conservation Society
    Issue Number 88 Winter 2019/20 Computer Conservation Society Aims and Objectives The Computer Conservation Society (CCS) is a co-operative venture between BCS, The Chartered Institute for IT; the Science Museum of London; and the Science and Industry Museum (SIM) in Manchester. The CCS was constituted in September 1989 as a Specialist Group of the British Computer Society. It is thus covered by the Royal Charter and charitable status of BCS. The objects of the Computer Conservation Society (“Society”) are: To promote the conservation, restoration and reconstruction of historic computing systems and to identify existing computing systems which may need to be archived in the future; To develop awareness of the importance of historic computing systems; To develop expertise in the conservation, restoration and reconstruction of historic computing systems; To represent the interests of the Society with other bodies; To promote the study of historic computing systems, their use and the history of the computer industry; To publish information of relevance to these objectives for the information of Society members and the wider public. Membership is open to anyone interested in computer conservation and the history of computing. The CCS is funded and supported by a grant from BCS and from donations. There are a number of active projects on specific computer restorations and early computer technologies and software. Younger people are especially encouraged to take part in order to achieve skills transfer. The CCS also enjoys a close relationship with the National Museum of Computing. Resurrection The Journal of the Computer Conservation Society ISSN 0958-7403 Number 88 Winter 2019/20 Contents Society Activity 2 News Round-Up 9 The Data Curator 10 Paul Cockshott From Tea Shops to Computer Company: The Improbable 15 Story of LEO John Aeberhard Book Review: Early Computing in Britain Ferranti Ltd.
    [Show full text]
  • Hacker's Handbook Ok Just a Quick Note, This Is a Very Early Version of the Book and Was Later Banned
    Hacker's Handbook Ok just a quick note, this is a very early version of the book and was later banned. We've done our best in converting it to ASCII. It's taken us some time to put it together because of the reformatting, so I hope it's appreciated. We have kept to the original page numbering for so that the index will be correct. Compliments Electronic Images - Gizmo Century Communications - T H E - - H A C K E R ' S - - H A N D B O O K - Copyright (c) Hugo Cornwall All rights reserved First published in Great Britain in 1985 by Century Communications Ltd Portland House, 12-13 Greek Street, London W1V 5LE. Reprinted 1985 (four times) ISBN 0 7126 0650 5 Printed and bound in Great Britain by Billing & Sons Limited, Worcester. CONTENTS Introduction vii First Principles 2 Computer-to-computer communications 7 3 Hackers' Equipment 15 4 Targets: What you can find on mainframes 30 5 Hackers' Intelligence 42 6 Hackers' Techniques 57 7 Networks 69 8 Viewdata systems 86 9 Radio computer data 99 10 Hacking: the future 108 file:///E|/Books/Hackers Handbook.htm (1 of 133) [11/28/2000 5:58:48 AM] Hacker's Handbook Appendices I troubleshooting 112 II Glossary 117 III CCITT and related standards 130 IV Standard computer alphabets 132 V Modems 141 VI Radio Spectrum 144 VII Port-finder flow chart 148 INTRODUCTION The word 'hacker' is used in two different but associated ways: for some, a hacker is merely a computer enthusiast of any kind, who loves working with the beasties for their own sake, as opposed to operating them in order to enrich a company or research project --or to play games.
    [Show full text]
  • Why Dependent Types Matter
    Why Dependent Types Matter Thorsten Altenkirch Conor McBride James McKinna The University of Nottingham The University of St Andrews {txa,ctm}@cs.nott.ac.uk [email protected] Abstract We exhibit the rationale behind the design of Epigram, a dependently typed programming language and interactive program development system, using refinements of a well known program—merge sort—as a running example. We discuss its relationship with other proposals to introduce aspects of dependent types into functional programming languages and sketch some topics for further work in this area. 1. Introduction Types matter. That’s what they’re for—to classify data with respect to criteria which matter: how they should be stored in memory, whether they can be safely passed as inputs to a given operation, even who is allowed to see them. Dependent types are types expressed in terms of data, explicitly relating their inhabitants to that data. As such, they enable you to express more of what matters about data. While conventional type systems allow us to validate our programs with respect to a fixed set of criteria, dependent types are much more flexible, they realize a continuum of precision from the basic assertions we are used to expect from types up to a complete specification of the program’s behaviour. It is the programmer’s choice to what degree he wants to exploit the expressiveness of such a powerful type discipline. While the price for formally certified software may be high, it is good to know that we can pay it in installments and that we are free to decide how far we want to go.
    [Show full text]
  • PDF (Ved-Editor+Html2pdf)
    Free, Revised (slightly extended), Version of 1978 Book (goo.gl/AJLDih) HTML and PDF Afterthoughts (2015 onwards): Minor updates: 2018, Feb 2019, Jun 2019 PDF version with contents list in side-panel (if supported by viewer). PDF page numbers may change after further editing -- so don’t use them for reference! (5 Sep 2017: increased font size) JUMP TO TABLE OF CONTENTS 1978 Book Cover I was not consulted about the cover. The book is mainly concerned with the biological, psychological and philosophical significance of virtual machinery. I did not know that the publishers had decided to associate it with paper tape devices until it was published. 1 1978 First Page Copyright: Aaron Sloman, 1978 (When the book went out of print all rights reverted to the author.) 2015: I hereby permit anyone to copy any or all of the contents of this book. The online version of this work is licensed under a Creative Commons Attribution 4.0 International License. If you use, or comment on, any of this please include a URL if possible, so that readers can see the original (or the latest version). For more freely available online books see http://onlinebooks.library.upenn.edu/ JUMP TO TABLE OF CONTENTS 2 Original front-matter -- 1978 HARVESTER STUDIES IN COGNITIVE SCIENCE General Editor: Margaret A. Boden Harvester Studies in Cognitive Science is a new series which will explore the nature of knowledge by way of a distinctive theoretical approach one that takes account of the complex structures and interacting processes that make thought and action possible. Intelligence can be studied from the point of view of psychology, philosophy, linguistics, pedagogy and artificial intelligence, and all these different emphases will be represented within the series.
    [Show full text]
  • Miscellaneous Repairs Chesapeake City Bridge Construction Solicitation
    IFB W912BU21B0004 US Army Corps of Engineers Philadelphia District Miscellaneous Repairs Chesapeake City Bridge Chesapeake City, Maryland Construction Solicitation and Specifications 15 June 2021 This page was intentionally left blank for duplex printing. INVITATION NO. W912BU21B0004 PHILADELPHIA DISTRICT CORPS OF ENGINEERS INVITATION FOR BIDS FOR MISCELLANEOUS REPAIRS CHESAPEAKE CITY BRIDGE CHESAPEAKE CITY, MARYLAND I. NOTE THE AFFIRMATIVE ACTION REQUIREMENT OF THE EQUAL OPPORTUNITY CLAUSE WHICH MAY APPLY TO THE CONTRACT RESULTING FROM THIS SOLICITATION. II. BIDDERS ARE REQUIRED TO COMPLETE THE REPRESENTATION AND CERTIFICATIONS PORTION OF SECTION 00 45 00 OF THIS SOLICITATION AND SUBMIT THIS WITH THEIR OFFER. III. PROSPECTIVE BIDDERS ARE INVITED TO VISIT THE SITE TO ACQUAINT THEMSELVES WITH THE SITE CONDITIONS AND ANY PROBLEMS INCIDENT TO THE PROSECUTION OF THE WORK. THE SITE VISIT WILL BE HELD ON 22 JUNE 2021. THE SITE VISIT WILL BEGIN AT 10:00 AM AT THE CHESAPEAKE CITY PROJECT Office - C&D CANAL 815 BETHEL ROAD, CHESAPEAKE CITY, MARYLAND 21915. ALL THOSE PLANNING TO ATTEND MUST CONTACT MR. MIKE HART VIA EMAIL AT [email protected], PRIOR TO THE SITE VISIT. 15 JUNE 2021 This page was intentionally left blank for duplex printing. SOLICITATION, OFFER, 1. SOLICITATION NO. 2. TYPE OF SOLICITATION 3. DATE ISSUED PAGE OF PAGES AND AWARD X SEALED BID (IFB) 15-Jun-2021 W912BU21B0004 1 OF 41 (Construction, Alteration, or Repair) NEGOTIATED(RFP) IMPORTANT - The "offer" section on the reverse must be fully completed by offeror. 4. CONTRACT NO. 5. REQUISITION/PURCHASE REQUEST NO. 6. PROJECT NO. 7. ISSUED BY CODE W912BU 8.
    [Show full text]
  • LFCS Now and Then
    LFCS Now and Then Gordon Plotkin LFCS@30 Edinburgh, April, 2016 Gordon Plotkin LFCS Now and Then Origins of LFCS Logic programming Gordon Plotkin LFCS Now and Then Hope Park Square Gordon Plotkin LFCS Now and Then Hope Park Square Gordon Plotkin LFCS Now and Then Metamathematics Unit Gordon Plotkin LFCS Now and Then The James Clerk Maxwell Building JCMB, KB Gordon Plotkin LFCS Now and Then 5 Readers who take a narrow view on the automation of inductive theorem proving might be surprised that we discuss the waterfall. It is impossible,however,tobuildagoodin- ductive theorem prover without considering how to transformtheinductionconclusioninto the hypothesis (or, alternatively, how to recognize that a legitimate induction hypothesis can dispatch a subgoal). So we take the expansive view and discuss not just the induction principle and its heuristic control, but also the waterfall architecture that is effectively an integral part of the success. Boyer and Moore had met in August 1971, a year before the induction work started, when Boyer took up the position of a post-doctoral research fellow at theMetamathe- matics Unit of the University of Edinburgh. Moore was at that time starting the second year of his PhD studies in “the Unit”. Ironically, they were both from Texas and they had both come to Edinburgh from MIT. Boyer’s PhD supervisor, W. W. Bledsoe,from The University of Texas at Austin, spent 1970–71 on sabbatical at MIT, and Boyer ac- companied him and completed his PhD work there. Moore got his bachelor’s degree at MIT (1966–70) before going to Edinburgh for his PhD.
    [Show full text]
  • Commerci Confidence
    COMMERCI CONFIDENCE perq.Files - perq files information. Modified: 23 oct 80 JPS. a list of all files used by Three Rivers Computer Corporation for software and hardware development of the perq system. *** warning: this list is not yet complete >OS.SOURCE - OPERATING SYSTEM SOURCES file name version file name on floppy short description. DYNAMIC.PAS 0.0 DYNAMI.PAS Dynamic allocation routines - New and Dispose. WRITER.PAS 0.0 WRITER.PAS Stream package output conversion routines. READER.PAS 0.0 READER.PAS Stream package input conversion routines. PSTRING.PAS 0.0 PSTRIN.PAS String manipulation package. STREAM.PAS 0.0 STREAM.PAS Stream package base routines - Get and Put. SYSTEM.PAS A.lS SYSTEM.PAS Operating system main program. CODECONST.PAS CODECO.PAS Linker and loader constant definitions. CODETYPE.PAS CODETY.PAS Linker and loader type definitions. LOADERl.PAS LOADRl.PAS Loader constant definitions. LOADER2.PAS LOADR2.PAS Loader type definitions. LOADER3.PAS LOADR3.PAS Loader var definitions. LOADER4.PAS LOADR4.PAS Loader procedure definiiions. SEGNUMBERS.PAS 0.0 SEGNUM.PAS System segment number constants. MEMORY.PAS 1.1 MEMORY.PAS Memory manager. , SCREEN.PAS 0.0 SCREEN.PAS PAGE 2 Screen manager. SYSVERS.PAS ' 0.0 SYSVER.PAS System ve~sion number conversion routine. CMDPARSE.PAS 1.0 CMDPAR.PAS Command parser. FILESYSTEM.PAS 2.0 FILESY.PAS File system. RASTER. PAS 0.0 RASTER.PAS Raster-op definitions. LINEDRAW.PAS 0.0 LINEDR.PAS Line drawing interface module. IOERRS.PAS 0.0 IOERRS.PAS Input/output error number constants. IO.PAS 2.2 IO.PAS Input/output manager.
    [Show full text]
  • The History of Standard ML
    The History of Standard ML DAVID MACQUEEN, University of Chicago, USA ROBERT HARPER, Carnegie Mellon University, USA JOHN REPPY, University of Chicago, USA Shepherd: Kim Bruce, Pomona College The ML family of strict functional languages, which includes F#, OCaml, and Standard ML, evolved from the Meta Language of the LCF theorem proving system developed by Robin Milner and his research group at the University of Edinburgh in the 1970s. This paper focuses on the history of Standard ML, which plays a central rôle in this family of languages, as it was the first to include the complete set of features that we now associate with the name “ML” (i.e., polymorphic type inference, datatypes with pattern matching, modules, exceptions, and mutable state). Standard ML, and the ML family of languages, have had enormous influence on the world of programming language design and theory. ML is the foremost exemplar of a functional programming language with strict evaluation (call-by-value) and static typing. The use of parametric polymorphism in its type system, together with the automatic inference of such types, has influenced a wide variety of modern languages (where polymorphism is often referred to as generics). It has popularized the idea of datatypes with associated case analysis by pattern matching. The module system of Standard ML extends the notion of type-level parameterization to large-scale programming with the notion of parametric modules, or functors. Standard ML also set a precedent by being a language whose design included a formal definition with an associated metatheory of mathematical proofs (such as soundness of the type system).
    [Show full text]
  • Another ICL Anthology
    Foreword On June 21st 1948 Tom Kilburn ran a program on the first electronically stored program computer in the world. Freddy Williams and Tom had been struggling for some time to make their cathode ray tube store work. Demonstrating the store was the key thing, for without a store the computer as we know it today could never be. This simple machine, always known as the 'BABY', was developed into the Ferranti Mark 1, the first computer to go on commercial sale anywhere in the world. Tom's program was the first program to be written and run. Some of us here in Manchester felt that the fiftieth anniversary of such stupendous achievements should not go unnoticed. So at 11 a.m. on June 21st 1998, fifty years to the dot later, Tom ran that same program again on a reconstructed BABY that had earlier been ceremonially switched on by the widow of Freddy Williams. A team of enthusiasts, almost all members or retired members of ICL, researched the design and built the machine from genuine 1940s components. This would not have been possible without the usual ICL drive and enthusiasm, typified at the personal level by Chris Burton (ex- ICL West Gorton) who led the team, and marked at the corporate level by sponsorship of the project. Anyone interested can now see BABY at the Museum of Science and Industry in Manchester. Tom Kilburn says that it looks exactly like the original - except that it's cleaner. I mention this story because it illustrates vividly what has happened to our industry over fifty years.
    [Show full text]