Directorate for Mathematical and Physical REPORT NO' *Artificial

Total Page:16

File Type:pdf, Size:1020Kb

Directorate for Mathematical and Physical REPORT NO' *Artificial DOCUMENT RESUME ED 259 943 SE 045 918 TITLE Division of Computer Research Summary of Awards, Fiscal Year 1984. INSTITUTION National Science Foundation, Washington, DC. Directorate for Mathematical and Physical Sciences. REPORT NO' NSF-84-77 PUB DATE 84 NOTE 93p. PUB TYPE Reports - Descriptive (141) EDRS PRICE MF01/PC04 Pigs Postage. DESCRIPTORS *Artificial Intelligence; *Computer Oriented Programs; *Computers; *Computer Science; Databases; *Grants; Higher Education; Mathematics; Program Descriptions IDENTIFIERS National Science Foundation ABSTRACT Provided in this report are summaries of grants awarded by the National Science Foundation Division of Computer Research in fiscal year 1984. Similar areas of research are grouped (for the purposes of this report only) into these major categories: (1) computational mathematics; (2) computer systems design; (3) intelligent systems;(4) software engineering; (5) software systems science; (6) special projects, such as database management, computer-based modeling, and privacy and security of computer systems; (7) theoretical computer science; (8) computer research equipment; and (9) coordinated experimental research. Also included are presidential young investigator awards and awards for small business innovation research. Within each category, awards are listed alphabetically by state and institution. Each entry includes the grantee institution, name of the principal investigator(s), project title, award identification number, award amount, award duration, and desCription. (This report lists fewer than the actual number of projects currently receiving support because the duration of some grants exceeds 1 year.) (JN) /1 ********************:-************************************************** * Reproductions suiplied by EDRS are the best that can be made * * from the original document. * *********************************************************************** No S or IND IMP U.E. DEPARTMENT OF EDUCATION . NATIONAL INSTITUTE OF EDUCATION EDUCATIONAL RESOURCES INFORMATION CENTER (ERIC) 4Thus document has been reproduce(' as received from the person or organization originating It LI Minor changes have been made to improve reproduction quality A Points of view or opinions .stated in this docu moot do not necessarily represent official NIE position or policy. NM MIIIMOL__ A Ila_ IIM GM MI6 =NI IMO A G M 11=1 al. 00 "PERMISSION TO REPRODUCE THIS 0-- MATERIAL HAS BEEN GRANTED SY Li) klattnal &ience_ Emoda iort. 4.84 111, 4te 0 ,:. TO THE EDUCATIONAL RESOURCES ill INFORMATION CENTER (ERIC)." M 4%46- a as ID .1M 1M1. MN, :.: 1 The Foundation provides awards for research in the sciences and engineerin The awardee is wholly responsible for the conduct of such research and pre- paration of the results for publication. The Foundation, therefore, does not assume responsibility for such findings or their interpretation. The Foundation welcomes proposals on behalf of all qualified scientists and engineers, and F,trongly encourages women and minorities to compete fully in any of the research and research-related Programs described in this document. In accordance with Federal statutes and regulations and NSF policies, no person on grounds of race, color, age, sex, national origin, or physical handicap shall be excluded from participation in, denied the benefits of, or be subject to discrimination under any program or activity receiving financial assistance from the National Science Foundation. NSF has TDD (Telephonic Device for the` Deaf) capability which enables individuals with hearing impairments to communicate with the Division of Personnel Management for information relating to NSF programs, employment, or general information. This number is (202) 357-7492. } Preface The purpoLe of this report is to provide the scientific community with a summary of those grants awarded by the Division of Computer Research in Fiscal Year 1984. The report lists fewer than the actual number of projects currently receiving support because the duration of some grants exceeds one year. Similar areas of researcil are grouped together for reader convenience. The reader is cautioned, however, not to assume these categories represent either the totality or interests of each program or the total scope of each grant. Projects may bridge several programs or deal with topics not explicitly mentioned herein. Thus, these categories have been assigned administratively and for the purposes of this report only.* In this document, grantee institutions and principal investigators are identified first. Award identification numbers, award amounts, and award durations are enumerated after the individual project titles, Within each category, awards are listed alphabetically by state and institution. Readers wishing further information on any pat ticular project described in this report are advised to contact principal investigators directly. Kent K. Curtis Division Director Division ,of Computer Research *To get an idea of the scope of possible programs. consult What Can Be Automated? The Computer Science and Engineering Research Study (COSERS 1. Bruce Arden (Ed.), MIT Press, Cambridge. MA (1980). iii Table of Contents Page Preface iii Table of Contents iv Introduction vi Staff vii Summary viii Computational Mathematics 1 Computer Systems Design 7 VLSI Design Methodology 7 Computer System Architecture 8 Fault Tolerance and Reliability 14 Computer System Performance Measurement and Evaluation 15 Computer Graphics 16 Intelligent Systems 17 Computer Vision and Image Processing 17 Natural Language and Signal Understanding 20 Automatic Theorem Proving, Concept Learning, and Inference 23 Knowledge Representation and Problem Solving 25 Software Engineering 31 Quality Software 31 Symbolic and Algebraic Manipulation 32 Software Studies and Metrics 33 Program Testing and Verification 35 Software Tools and Programming Environfrients 36 Software Systems Science 41 Programming Languages: Design, Semantics, Implementation 41 Operating Systems and Concurrency 42 Data Bases 43 Programming Methodology 45 Distributed Computing 48 Verification 49 Special Projects 51 Data Handling, Data Manipulation. Database Research 51 Privacy & Security 51 The Societal Impact of Computing 52 Modelling & Simulation 53 Networking, Computer Communications, & Distributed Computing 53 Other Projects, Symposia, Colloquia, and Studies 55 Theoretical Computer Science 57 Concrete Complexity and Analysis of Algorithms 57 Parallel. Distributed. and Data Base Models 62 Foundations of Computer Science 67 Automata and Language-based Models 70 iv Compdter Research Equipment 73 Coordinated Expqrimental Research , . 77 Experimental Computer Research 77 Computer Science Research Network (CSNET) 82 Presidential Young Investigator Awards 83 Small Business Innovation Research 87 V 6 1 s INTRODUCTION This report provides summaries of awards made by the National including: advanced programming languages and optimizing Science Foundation (NSF) through the Division of Computer compilers; functional and re: ational specification; program Research in Fiscal Year 1984. transforming systems; systems for the verification and proof of In Fiscal Year 1984, the Division of Computer Research correctness of programs; the study of the concurrency of orera- Award Activities were carried out through eight programs. tions; the dist.overy of new algorithms and itiiproved measures Topics of interest to the Foundation include, but are not limited, of effectiveness of known algorithms. to the folrowing: Special Projects. Computer Systems Design New directions in computer science alai applications includ- Principles of computer systems design relating to the struc- ing computer networks; database management; computer-based ture of computer systems or the process of systems design. modeling; privacy and security of computer systems; and other Topics include, but are not limited to: computer system architec- topics of special nterest in computer science. ture; distributed computer systems; integrated hardware/soft- ware systems; performance measurement and evaluation; fault Theoretical Computer Science tolerant systems; logic design; computer graphics; man- machine interact;rm; and VLSI design methodology. The scope Theories of computation and formal languages; analysis of of this program includes experimental implementation where algorithms; theoretical models for computation; and other the- that is an integral part of the research. oretical problems concerned with the foundations of computer science. - Intelligent Systems Computer Research Equipment Computer-based systems that have some of the characteristics of intelligence. Relevant areas of inquiry include: knowledge Support of special purpose equipment needed by more than one engineering; automated theorem-proving; mechanical inferenc- computer research project and difficult to justify on a single ing; problem solving; pattern analysis; computer vision; natural project. language and speech understanding; and areas related to the automatic analysis and handling of complex tasks. Coordinated Experimental Research Software Engineering Experim, eta! Computer Research The establishment and enhancement of experimental research facilities, needed tech- The structure and design process of computer software, es- nical and professional support personnel, and necessary mainte- pecially verification, testing, portability, reliability, and human nance,of facilities; large multi-investigator projects in experi- interfacing to numeric and non-numeric software systems. mental
Recommended publications
  • Audiosity= Audio+ Radiosity
    AUDIOSITY = AUDIO + RADIOSITY A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES AND RESEARCH IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE UNIVERSITY OF REGINA By Hao Li Regina, Saskatchewan September 2009 © Copyright 2009: Hao Li Library and Archives Bibliotheque et 1*1 Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A 0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-65704-1 Our file Notre reference ISBN: 978-0-494-65704-1 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library and permettant a la Bibliotheque et Archives Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'lntemet, preter, telecommunication or on the Internet, distribuer et vendre des theses partout dans le loan, distribute and sell theses monde, a des fins commerciales ou autres, sur worldwide, for commercial or non­ support microforme, papier, electronique et/ou commercial purposes, in microform, autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in this et des droits moraux qui protege cette these. Ni thesis. Neither the thesis nor la these ni des extraits substantiels de celle-ci substantial extracts from it may be ne doivent etre imprimes ou autrement printed or otherwise reproduced reproduits sans son autorisation.
    [Show full text]
  • Central Library National Institute of Technology Tiruchirappalli
    1 CENTRAL LIBRARY NATIONAL INSTITUTE OF TECHNOLOGY TIRUCHIRAPPALLI TAMIL NADU-62001 1 i CENTRAL LIBRARY CIRCULATION PROCEDURE Books and other publications can be checked out from the circulation counter. The barrowing rights of various members are tabled with lending period respectively. Books can be called back during the loan period, if there is demand from another user. Consecutive renewals of any particular copy of a bound journal by the same borrower over a long period of time may not be allowed. However, a book may be re- issued to a borrower if there is no demand for it from other members. The library generally issues overdue notices, but failure to receive such a notice is not sufficient reason for non-return of overdue books or journals etc. Additionally, through Book Bank Service SC, ST, Scholarship, and rank holder students are eligible for borrowing 5 books per semester over and above the listed eligibility. Member Type Number of books can Lending Period barrowed UG/ PG Students 6 30 Days PhD, MS & Research Scholars 6 30 Days Faculty 10 180 Days Temp Faculty and PDF 8 180 Days Group A Staff 5 180 Days Staff 4 180 Days External Member/ Alumni 2 30 Days Borrowing Rules: 1. The reader should check the books thoroughly for missing pages, chapters, etc while getting them issued. 2. The overdue fine of Rs.1.00 will be charged per day after the due date for the books. 3. Absence from the Institute will not be allowed as an excuse for the delay in the return of books.
    [Show full text]
  • Oral History of Fernando Corbató
    Oral History of Fernando Corbató Interviewed by: Steven Webber Recorded: February 1, 2006 West Newton, Massachusetts CHM Reference number: X3438.2006 © 2006 Computer History Museum Oral History of Fernando Corbató Steven Webber: Today the Computer History Museum Oral History Project is going to interview Fernando J. Corbató, known as Corby. Today is February 1 in 2006. We like to start at the very beginning on these interviews. Can you tell us something about your birth, your early days, where you were born, your parents, your family? Fernando Corbató: Okay. That’s going back a long ways of course. I was born in Oakland. My parents were graduate students at Berkeley and then about age 5 we moved down to West Los Angeles, Westwood, where I grew up [and spent] most of my early years. My father was a professor of Spanish literature at UCLA. I went to public schools there in West Los Angeles, [namely,] grammar school, junior high and [the high school called] University High. So I had a straightforward public school education. I guess the most significant thing to get to is that World War II began when I was in high school and that caused several things to happen. I’m meandering here. There’s a little bit of a long story. Because of the wartime pressures on manpower, the high school went into early and late classes and I cleverly saw that I could get a chance to accelerate my progress. I ended up taking both early and late classes and graduating in two years instead of three and [thereby] got a chance to go to UCLA in 1943.
    [Show full text]
  • Topic a Dataflow Model of Computation
    Department of Electrical and Computer Engineering Computer Architecture and Parallel Systems Laboratory - CAPSL Topic A Dataflow Model of Computation CPEG 852 - Spring 2014 Advanced Topics in Computing Systems Guang R. Gao ACM Fellow and IEEE Fellow Endowed Distinguished Professor Electrical & Computer Engineering University of Delaware CPEG852-Spring14: Topic A - Dataflow - 1 [email protected] Outline • Parallel Program Execution Models • Dataflow Models of Computation • Dataflow Graphs and Properties • Three Dataflow Models – Static – Recursive Program Graph – Dynamic • Dataflow Architectures CPEG852-Spring14: Topic A - Dataflow - 1 2 Terminology Clarification • Parallel Model of Computation – Parallel Models for Algorithm Designers – Parallel Models for System Designers • Parallel Programming Models • Parallel Execution Models • Parallel Architecture Models CPEG852-Spring14: Topic A - Dataflow - 1 3 What is a Program Execution Model? . Application Code . Software Packages User Code . Program Libraries . Compilers . Utility Applications PXM (API) . Hardware System . Runtime Code . Operating System CPEG852-Spring14: Topic A - Dataflow - 1 4 Features a User Program Depends On . Procedures; call/return Features expressed within .Access to parameters and a Programming language variables .Use of data structures (static and dynamic) But that’s not all !! . File creation, naming and access Features expressed Outside .Object directories a (typical) programming .Communication: networks language and peripherals .Concurrency: coordination; scheduling CPEG852-Spring14: Topic A - Dataflow - 1 5 Developments in the 1960s, 1970s Highlights 1960 Other Events . Burroughs B5000 Project . Project MAC Funded at MIT Started . Rice University Computer . IBM announces System 360 . Vienna Definition Method . Tasking introduced in Algol . Common Base Language, 1970 68 and PL/I Dennis . Burroughs builds Robert . Contour Model, Johnston Barton’s DDM1 . Book on the B6700, .
    [Show full text]
  • NASA Contrattbr 4Report 178229 S E M I a N N U a L R E P O
    NASA Contrattbr 4Report 178229 ICASE SEMIANNUAL REPORT April 1, 1986 through September 30, 1986 Contract No. NAS1-18107 January 1987 INSTITUTE FOR COMPUTER APPLICATIONS IN SCIENCE AND ENGINEERING NASA Langley Research Center, Hampton, Virginia 23665 Operatsd by the Universities Space Research Association National Aeronautics and Space Ad minis t rat ion bnglay Research Center HamDton,Virginia23665 CONTENTS Page Introduction .............................................................. iii Research in erogress ...................................................... 1 Reports and Abstracts ..................................................... 32 ICASE Colloquia........................................................... 49 ICASE Summer Activities ................................................... 52 Other Activities .......................................................... 58 ICASE Staff ............................................................... 60 i INTRODUCTION The Institute for Computer Applications in Science and Engineering (ICASE) is operated at the Langley Research Center (LaRC) of NASA by the Universities Space Research Associat€on (USRA) under a contract with the Center. USRA is a nonpro€it consortium of major U. S. colleges and universities. The Institute conducts unclassified basic research in applied mathematics, numerical analysis, and computer science in order to extend and improve problem-solving capabilities in science and engineering, particularly in aeronautics and space. ICASE has a small permanent staff. Research
    [Show full text]
  • Interpretation of Molecule Conformations from Drawn Diagrams” by Dana Tenneson, Ph.D., Brown University, May 2008
    Abstract of \Interpretation of Molecule Conformations from Drawn Diagrams" by Dana Tenneson, Ph.D., Brown University, May 2008. In chemistry, molecules are drawn on paper and chalkboards as diagrams consisting of lines, letters, and symbols which represent not only the atoms and bonds in the molecules but concisely encode cues to the 3D geometry of the molecules. Recent efforts into pen-based input methods for chemistry software have made progress at allowing chemists to input 2D diagrams of molecules into a computer simply by drawing them on a digitizer tablet. However, the task of interpreting these parsed sketches into proper 3D models has been largely unsolved due to the difficulty in making the models satisfy both the natural properties of molecule structure and the geometric cues made explicit in the drawing. This dissertation presents a set of techniques developed to solve this model construction problem within the context of an educational application for chemistry students. Our primary contribution is a framework for combining molecular structure knowledge and molecule diagram understanding via augmenting molecular mechanics equations to include drawing-based penalty terms. Additionally, we present an algorithm for generating molecule models from drawn diagrams which leverages domain- specific and diagram-driven heuristics. These heuristics make our process fast and accurate enough for molecule diagram drawing to be used as an interactive technique for model construction on modern Tablet PC computers. Interpretation of Molecule Conformations
    [Show full text]
  • Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University
    Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University. Linda A. Cicero/Stanford News Service. Whitfield Diffie Martin E. Hellman ernment–private sector relations, and attracts billions of Whitfield Diffie, former chief security officer of Sun Mi- dollars in research and development,” said ACM President crosystems, and Martin E. Hellman, professor emeritus Alexander L. Wolf. “In 1976, Diffie and Hellman imagined of electrical engineering at Stanford University, have been a future where people would regularly communicate awarded the 2015 A. M. Turing Award of the Association through electronic networks and be vulnerable to having for Computing Machinery for their critical contributions their communications stolen or altered. Now, after nearly to modern cryptography. forty years, we see that their forecasts were remarkably Citation prescient.” The ability for two parties to use encryption to commu- “Public-key cryptography is fundamental for our indus- nicate privately over an otherwise insecure channel is try,” said Andrei Broder, Google Distinguished Scientist. fundamental for billions of people around the world. On “The ability to protect private data rests on protocols for a daily basis, individuals establish secure online connec- confirming an owner’s identity and for ensuring the integ- tions with banks, e-commerce sites, email servers, and the rity and confidentiality of communications. These widely cloud. Diffie and Hellman’s groundbreaking 1976 paper, used protocols were made possible through the ideas and “New Directions in Cryptography,” introduced the ideas of methods pioneered by Diffie and Hellman.” public-key cryptography and digital signatures, which are Cryptography is a practice that facilitates communi- the foundation for most regularly used security protocols cation between two parties so that the communication on the Internet today.
    [Show full text]
  • Oral History Interview with Bernard A. Galler
    An Interview with BERNARD A. GALLER OH 236 Conducted by Enid H. Galler on 8, 10-11, and 16 August 1991 Sutton's Bay, MI Ann Arbor, MI Charles Babbage Institute Center for the History of Information Processing University of Minnesota, Minneapolis Copyright, Charles Babbage Institute 1 Bernard A. Galler Interview 8, 10-11, and 16 August 1991 Abstract In this wide-ranging interview, Galler describes the development of computer science at the University of Michigan from the 1950s through the 1980s and discusses his own work in computer science. Prominent subjects in Galler's description of his work at Michigan include: his arrival and classes with John Carr, research use of International Business Machines (IBM) and later Amdahl mainframe computers, the establishment of the Statistical Laboratory in the Mathematics Dept., the origin of the computer science curriculum and the Computer Science Dept. in the 1950s, interactions with Massachusetts Institute of Technology and IBM about timesharing in the 1960s, the development of the Michigan Algorithm Decoder, and the founding of the MERIT network. Galler also discusses Michigan's relationship with ARPANET, CSNET, and BITNET. He describes the atmosphere on campus in the 1960s and early 1970s and his various administrative roles at the university. Galler discusses his involvement with the Association for Computing Machinery, the American Federation of Information Processing Societies, the founding of the Charles Babbage Institute, and his work with the Annals of the History of Computing. He describes his consultative work with Israel and his consulting practice in general, his work as an expert witness, and his interaction with the Patent Office on issues surrounding the patenting of software and his role in the establishment of the Software Patent Institute.
    [Show full text]
  • Operating Systems & Virtualisation Security Knowledge Area
    Operating Systems & Virtualisation Security Knowledge Area Issue 1.0 Herbert Bos Vrije Universiteit Amsterdam EDITOR Andrew Martin Oxford University REVIEWERS Chris Dalton Hewlett Packard David Lie University of Toronto Gernot Heiser University of New South Wales Mathias Payer École Polytechnique Fédérale de Lausanne The Cyber Security Body Of Knowledge www.cybok.org COPYRIGHT © Crown Copyright, The National Cyber Security Centre 2019. This information is licensed under the Open Government Licence v3.0. To view this licence, visit: http://www.nationalarchives.gov.uk/doc/open-government-licence/ When you use this information under the Open Government Licence, you should include the following attribution: CyBOK © Crown Copyright, The National Cyber Security Centre 2018, li- censed under the Open Government Licence: http://www.nationalarchives.gov.uk/doc/open- government-licence/. The CyBOK project would like to understand how the CyBOK is being used and its uptake. The project would like organisations using, or intending to use, CyBOK for the purposes of education, training, course development, professional development etc. to contact it at con- [email protected] to let the project know how they are using CyBOK. Issue 1.0 is a stable public release of the Operating Systems & Virtualisation Security Knowl- edge Area. However, it should be noted that a fully-collated CyBOK document which includes all of the Knowledge Areas is anticipated to be released by the end of July 2019. This will likely include updated page layout and formatting of the individual Knowledge Areas KA Operating Systems & Virtualisation Security j October 2019 Page 1 The Cyber Security Body Of Knowledge www.cybok.org INTRODUCTION In this Knowledge Area, we introduce the principles, primitives and practices for ensuring se- curity at the operating system and hypervisor levels.
    [Show full text]
  • Computer Science Engineering Bsc
    FACULTY OF INFORMATICS 4028 Debrecen, Kassai út 26., 4002 Debrecen, P.O.Box 400. (36) 52/518-630, [email protected] COMPUTER SCIENCE ENGINEERING BSC Mode: Full-time training Program Coordinator: Dr. István Oniga ([email protected]) Mentor: Dr. Attila Kuki ([email protected]) Specialization: - General requirements of the diploma are regulated by The Rules and Regulations of The University of Debrecen. Diploma credit requirements Natural Science 44 credits Human and Economic Knowledge 15 credits Compulsory topics 96 credits Differentiated knowledge topics 30 credits Thesis 15 credits Free choise 10 credits Work and fire safety training 0 credit Physical Education (2 semesters) 0 credit Total (number of credits required to obtain degree) 210 credits 1 Natural Science – needed 44 credits Type and number Cre- Asses- Semes- Code Subject name practice Prerequisites Period dit lec. ment ter sem. lab Algorithms and INBMA0101G Basics of 2 2 PM 1 1 Programming INBMA0102E Electronics 6 2 2 PM 1 1 INBMA0102L INBMA0103E E Physics 6 2 2 1 1 INBMA0103L S INBMA0104E E Calculus 6 2 2 1 1 INBMA0104G S INBMA0105E Mathematics for 6 2 2 PM 1 1 INBMA0105L Engineers 1 INBMA0207E Data Structures E 6 2 2 2 2 INBMA0207G and Algorithms S INBMA0208E Mathematics for E INBMA0104 6 2 2 2 2 INBMA0208L Engineers 2 S INBMA0105 Probability INBMA0313E Theory and INBMA0104 6 2 2 PM 1 3 INBMA0313L Mathematical INBMA0105 Statistics Human and Economic Knowledge – needed 15 credits Type and number Cre- Asses- Semes- Code Subject name practice Prerequisites Period dit lec. ment ter sem.
    [Show full text]
  • UC Berkeley Previously Published Works
    UC Berkeley UC Berkeley Previously Published Works Title Building the Second Mind, 1961-1980: From the Ascendancy of ARPA-IPTO to the Advent of Commercial Expert Systems Permalink https://escholarship.org/uc/item/7ck3q4f0 ISBN 978-0-989453-4-6 Author Skinner, Rebecca Elizabeth Publication Date 2013-12-31 eScholarship.org Powered by the California Digital Library University of California Building the Second Mind, 1961-1980: From the Ascendancy of ARPA to the Advent of Commercial Expert Systems copyright 2013 Rebecca E. Skinner ISBN 978 09894543-4-6 Forward Part I. Introduction Preface Chapter 1. Introduction: The Status Quo of AI in 1961 Part II. Twin Bolts of Lightning Chapter 2. The Integrated Circuit Chapter 3. The Advanced Research Projects Agency and the Foundation of the IPTO Chapter 4. Hardware, Systems and Applications in the 1960s Part II. The Belle Epoque of the 1960s Chapter 5. MIT: Work in AI in the Early and Mid-1960s Chapter 6. CMU: From the General Problem Solver to the Physical Symbol System and Production Systems Chapter 7. Stanford University and SRI Part III. The Challenges of 1970 Chapter 8. The Mansfield Amendment, “The Heilmeier Era”, and the Crisis in Research Funding Chapter 9. The AI Culture Wars: the War Inside AI and Academia Chapter 10. The AI Culture Wars: Popular Culture Part IV. Big Ideas and Hardware Improvements in the 1970s invert these and put the hardware chapter first Chapter 11. AI at MIT in the 1970s: The Semantic Fallout of NLR and Vision Chapter 12. Hardware, Software, and Applications in the 1970s Chapter 13.
    [Show full text]
  • Computer Graphics: Principles and Practice Pdf, Epub, Ebook
    COMPUTER GRAPHICS: PRINCIPLES AND PRACTICE PDF, EPUB, EBOOK John F. Hughes,Morgan S. McGuire,James Foley,David F. Sklar,Steven K. Feiner,Kurt Akeley,Andries Van Dam,James D. Foley | 1264 pages | 25 Sep 2013 | Pearson Education (US) | 9780321399526 | English | New Jersey, United States Computer Graphics: Principles and Practice PDF Book Showing The important algorithms in 2D and 3D graphics are detailed for easy implementation, including a close look at the more subtle special cases. Random-Scan Display Processor. Illumination And Shading. Chapter 18 discusses advanced raster graphics architecture. Many people have already succeeded with blogging as it is considered quicker and easier to complete the blogging courses. Anticipating our use of these material models in rendering, we also discuss the software interface a material model must support to be used effectively. Implicit curves are defined as the level set of some function on the plane; on a weather map, the isotherm lines constitute implicit curves. Good ebookpdf. Alternative Forms of Hierarchical Modeling. As CPUs and graphics peripherals have increased in speed and memory capabilities, the feature sets of graphics platforms have evolved to harness new hardware features and to shoulder more of the application development burden. The second edition became an even more comprehensive resource for practitioners and students alike. Bhau rated it really liked it Jan 14, We discuss inside-outside testing for points in polygons. Show More Show Less. But if we want to render things accurately, we need to start from a physical understanding of light. Sections on current computer graphics practice show how to apply given principles in common situations, such as how to approximate an ideal solution on available hardware, or how to represent a data structure more efficiently.
    [Show full text]