Programmatic Coverage of Computer Science Topics Within the Institute for Computer Sciences and Technology of the National Bureau of Standards
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
"Shakey the Robot" [Videorecording]
http://oac.cdlib.org/findaid/ark:/13030/kt2s20358k No online items Guide to "Shakey the Robot" [videorecording] Daniel Hartwig Stanford University. Libraries.Department of Special Collections and University Archives Stanford, California November 2010 Copyright © 2015 The Board of Trustees of the Leland Stanford Junior University. All rights reserved. Note This encoded finding aid is compliant with Stanford EAD Best Practice Guidelines, Version 1.0. Guide to "Shakey the Robot" V0209 1 [videorecording] Overview Call Number: V0209 Creator: Stanford University Title: "Shakey the Robot" [videorecording] Dates: 1995 Physical Description: 0.125 Linear feet (1 videotape-VHS) Summary: Program of the Bay Area Computer History Perspectives held at SRI International on October 24, 1995, on a 1970 SRI project to create a robot (dubbed Shakey) that used rudimentary artificial intelligence to interact with its surroundings. Speakers were Nils Nilsson, Charles Rosen, Bertram Raphael, Bruce Donald, Richard Fikes, Peter Hart, and Stuart Russell. The video includes clips from the original "Shakey the Robot" movie. Language(s): The materials are in English. Repository: Department of Special Collections and University Archives Green Library 557 Escondido Mall Stanford, CA 94305-6064 Email: [email protected] Phone: (650) 725-1022 URL: http://library.stanford.edu/spc Information about Access This collection is open for research. Ownership & Copyright All requests to reproduce, publish, quote from, or otherwise use collection materials must be submitted in writing to the Head of Special Collections and University Archives, Stanford University Libraries, Stanford, California 94304-6064. Consent is given on behalf of Special Collections as the owner of the physical items and is not intended to include or imply permission from the copyright owner. -
Early Stored Program Computers
Stored Program Computers Thomas J. Bergin Computing History Museum American University 7/9/2012 1 Early Thoughts about Stored Programming • January 1944 Moore School team thinks of better ways to do things; leverages delay line memories from War research • September 1944 John von Neumann visits project – Goldstine’s meeting at Aberdeen Train Station • October 1944 Army extends the ENIAC contract research on EDVAC stored-program concept • Spring 1945 ENIAC working well • June 1945 First Draft of a Report on the EDVAC 7/9/2012 2 First Draft Report (June 1945) • John von Neumann prepares (?) a report on the EDVAC which identifies how the machine could be programmed (unfinished very rough draft) – academic: publish for the good of science – engineers: patents, patents, patents • von Neumann never repudiates the myth that he wrote it; most members of the ENIAC team contribute ideas; Goldstine note about “bashing” summer7/9/2012 letters together 3 • 1.0 Definitions – The considerations which follow deal with the structure of a very high speed automatic digital computing system, and in particular with its logical control…. – The instructions which govern this operation must be given to the device in absolutely exhaustive detail. They include all numerical information which is required to solve the problem…. – Once these instructions are given to the device, it must be be able to carry them out completely and without any need for further intelligent human intervention…. • 2.0 Main Subdivision of the System – First: since the device is a computor, it will have to perform the elementary operations of arithmetics…. – Second: the logical control of the device is the proper sequencing of its operations (by…a control organ. -
Towards a Secure Agent Society
Towards A Secure Agent So ciety Qi He Katia Sycara The Rob otics Institute The Rob otics Institute Carnegie Mellon University Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. Pittsburgh, PA 15213, U.S.A [email protected] [email protected] March 23, 1998 Abstract We present a general view of what a \secure agent so ciety" should b e and howtode- velop it rather than fo cus on any sp eci c details or particular agent-based application . We b elieve that the main e ort to achieve security in agent so cieties consists of the following three asp ects:1 agent authentication mechanisms that form the secure so ciety's foundation, 2 a security architecture design within an agent that enables security p olicy making, se- curity proto col generation and security op eration execution, and 3 the extension of agent communication languages for agent secure communication and trust management. In this pap er, all of the three main asp ects are systematically discussed for agent security based on an overall understanding of mo dern cryptographic technology. One purp ose of the pap er is to give some answers to those questions resulting from absence of a complete picture. Area: Software Agents Keywords: security, agent architecture, agent-based public key infrastructure PKI, public key cryptosystem PKCS, con dentiality, authentication, integrity, nonrepudiation. 1 1 Intro duction If you are going to design and develop a software agent-based real application system for elec- tronic commerce, you would immediately learn that there exists no such secure communication between agents, which is assumed by most agent mo del designers. -
2008 Annual Report
2008 Annual Report NATIONAL ACADEMY OF ENGINEERING ENGINEERING THE FUTURE 1 Letter from the President 3 In Service to the Nation 3 Mission Statement 4 Program Reports 4 Engineering Education 4 Center for the Advancement of Scholarship on Engineering Education 6 Technological Literacy 6 Public Understanding of Engineering Developing Effective Messages Media Relations Public Relations Grand Challenges for Engineering 8 Center for Engineering, Ethics, and Society 9 Diversity in the Engineering Workforce Engineer Girl! Website Engineer Your Life Project Engineering Equity Extension Service 10 Frontiers of Engineering Armstrong Endowment for Young Engineers-Gilbreth Lectures 12 Engineering and Health Care 14 Technology and Peace Building 14 Technology for a Quieter America 15 America’s Energy Future 16 Terrorism and the Electric Power-Delivery System 16 U.S.-China Cooperation on Electricity from Renewables 17 U.S.-China Symposium on Science and Technology Strategic Policy 17 Offshoring of Engineering 18 Gathering Storm Still Frames the Policy Debate 20 2008 NAE Awards Recipients 22 2008 New Members and Foreign Associates 24 2008 NAE Anniversary Members 28 2008 Private Contributions 28 Einstein Society 28 Heritage Society 29 Golden Bridge Society 29 Catalyst Society 30 Rosette Society 30 Challenge Society 30 Charter Society 31 Other Individual Donors 34 The Presidents’ Circle 34 Corporations, Foundations, and Other Organizations 35 National Academy of Engineering Fund Financial Report 37 Report of Independent Certified Public Accountants 41 Notes to Financial Statements 53 Officers 53 Councillors 54 Staff 54 NAE Publications Letter from the President Engineering is critical to meeting the fundamental challenges facing the U.S. economy in the 21st century. -
1. Course Information Are Handed Out
6.826—Principles of Computer Systems 2006 6.826—Principles of Computer Systems 2006 course secretary's desk. They normally cover the material discussed in class during the week they 1. Course Information are handed out. Delayed submission of the solutions will be penalized, and no solutions will be accepted after Thursday 5:00PM. Students in the class will be asked to help grade the problem sets. Each week a team of students Staff will work with the TA to grade the week’s problems. This takes about 3-4 hours. Each student will probably only have to do it once during the term. Faculty We will try to return the graded problem sets, with solutions, within a week after their due date. Butler Lampson 32-G924 425-703-5925 [email protected] Policy on collaboration Daniel Jackson 32-G704 8-8471 [email protected] We encourage discussion of the issues in the lectures, readings, and problem sets. However, if Teaching Assistant you collaborate on problem sets, you must tell us who your collaborators are. And in any case, you must write up all solutions on your own. David Shin [email protected] Project Course Secretary During the last half of the course there is a project in which students will work in groups of three Maria Rebelo 32-G715 3-5895 [email protected] or so to apply the methods of the course to their own research projects. Each group will pick a Office Hours real system, preferably one that some member of the group is actually working on but possibly one from a published paper or from someone else’s research, and write: Messrs. -
John Mccarthy
JOHN MCCARTHY: the uncommon logician of common sense Excerpt from Out of their Minds: the lives and discoveries of 15 great computer scientists by Dennis Shasha and Cathy Lazere, Copernicus Press August 23, 2004 If you want the computer to have general intelligence, the outer structure has to be common sense knowledge and reasoning. — John McCarthy When a five-year old receives a plastic toy car, she soon pushes it and beeps the horn. She realizes that she shouldn’t roll it on the dining room table or bounce it on the floor or land it on her little brother’s head. When she returns from school, she expects to find her car in more or less the same place she last put it, because she put it outside her baby brother’s reach. The reasoning is so simple that any five-year old child can understand it, yet most computers can’t. Part of the computer’s problem has to do with its lack of knowledge about day-to-day social conventions that the five-year old has learned from her parents, such as don’t scratch the furniture and don’t injure little brothers. Another part of the problem has to do with a computer’s inability to reason as we do daily, a type of reasoning that’s foreign to conventional logic and therefore to the thinking of the average computer programmer. Conventional logic uses a form of reasoning known as deduction. Deduction permits us to conclude from statements such as “All unemployed actors are waiters, ” and “ Sebastian is an unemployed actor,” the new statement that “Sebastian is a waiter.” The main virtue of deduction is that it is “sound” — if the premises hold, then so will the conclusions. -
By Dean R. Johnson
Alice Symposium 2009 Duke University “Who needs PowerPoint? I’ve got Alice!” By Dean R. Johnson I. Background of My Experience in Programming II. Experience with Alice A. Changes in Languages and Student Population B. Introducing Alice C. Enrollment Data III. History Lesson: Significant People in Computing A. Paper B. PowerPoint C. Alice 1. Lesson Plan 2. Grading Rubric IV. Sample Projects: Screenshots and descriptions of Student Work I. Background I started my study of Computer Science in 1982 as a high school senior when I enrolled in a one semester course titled “Computer Programming.” It was taught by my math teacher and at first seemed like a very mystifying idea. We wrote programs in BASIC b y “bubbling in” punch cards. After completing the program, we took the stack of cards to the back of the room handing them to our teacher. He was the only one allowed to insert the cards into the card reader. The PDP-11 interpreted our program and if it ran successfully, the dot matrix printer printed a table of the whole numbers from one to ten and their squares. It was amazing. The strange thing about this description is that it brings back such fond memories for me. It was during this brief exposure to programming that I was hooked for life. This is what drives me on a daily basis to do the best I can to expose students to the fascinating world of programming. I graduated from UW-Whitewater in 1986 with a Major in Mathematics and a Minor in Computer Science. -
Oral History of Butler Lampson
Oral History of Butler Lampson Interviewed by: Alan Kay Recorded: August 22, 2006 Cambridge, Mass. CHM Reference number: X3697.2007 © 2006 Computer History Museum Oral History of Butler Lampson Alan Kay: Part of my job here as given by the Computer History Museum is to try and get a few good words from you that we could use as the opening blurb for your award from the Computer History Museum. But also to get an oral history. Butler Lampson: I was going to say, I thought the job was to record hours of brilliant conversation that historians in 2100 will pore over. Kay: That is your job. My job is to only to try and instigate it. My theory about this thing is that you should not try and talk short. Lampson: Well, we’ve got lots of time right? Kay: Okay. We do have lots of time and tape is cheap. Lampson: Tape is cheap. Right. My sister’s a film editor and she hates it. She says things were much better in the days when film was expensive, because people would think about what they shot. Now, she says, they shoot hundreds of hours of crap and then they expect the editor to sort it out. Kay: We have to transcribe those hundreds of hours. Lampson: Yeah. Somebody’s got to look at it, it’s got to be fussed around with, and besides, she says, frequently in the whole of hundreds of hours you don’t find what you want because nobody thought about it beforehand. Kay: You remember Bonnie, my wife, ran a film and video company for ten years. -
Oral History Interview with Bernard A. Galler
An Interview with BERNARD A. GALLER OH 236 Conducted by Enid H. Galler on 8, 10-11, and 16 August 1991 Sutton's Bay, MI Ann Arbor, MI Charles Babbage Institute Center for the History of Information Processing University of Minnesota, Minneapolis Copyright, Charles Babbage Institute 1 Bernard A. Galler Interview 8, 10-11, and 16 August 1991 Abstract In this wide-ranging interview, Galler describes the development of computer science at the University of Michigan from the 1950s through the 1980s and discusses his own work in computer science. Prominent subjects in Galler's description of his work at Michigan include: his arrival and classes with John Carr, research use of International Business Machines (IBM) and later Amdahl mainframe computers, the establishment of the Statistical Laboratory in the Mathematics Dept., the origin of the computer science curriculum and the Computer Science Dept. in the 1950s, interactions with Massachusetts Institute of Technology and IBM about timesharing in the 1960s, the development of the Michigan Algorithm Decoder, and the founding of the MERIT network. Galler also discusses Michigan's relationship with ARPANET, CSNET, and BITNET. He describes the atmosphere on campus in the 1960s and early 1970s and his various administrative roles at the university. Galler discusses his involvement with the Association for Computing Machinery, the American Federation of Information Processing Societies, the founding of the Charles Babbage Institute, and his work with the Annals of the History of Computing. He describes his consultative work with Israel and his consulting practice in general, his work as an expert witness, and his interaction with the Patent Office on issues surrounding the patenting of software and his role in the establishment of the Software Patent Institute. -
The Computer Scientist As Toolsmith—Studies in Interactive Computer Graphics
Frederick P. Brooks, Jr. Fred Brooks is the first recipient of the ACM Allen Newell Award—an honor to be presented annually to an individual whose career contributions have bridged computer science and other disciplines. Brooks was honored for a breadth of career contributions within computer science and engineering and his interdisciplinary contributions to visualization methods for biochemistry. Here, we present his acceptance lecture delivered at SIGGRAPH 94. The Computer Scientist Toolsmithas II t is a special honor to receive an award computer science. Another view of computer science named for Allen Newell. Allen was one of sees it as a discipline focused on problem-solving sys- the fathers of computer science. He was tems, and in this view computer graphics is very near especially important as a visionary and a the center of the discipline. leader in developing artificial intelligence (AI) as a subdiscipline, and in enunciating A Discipline Misnamed a vision for it. When our discipline was newborn, there was the What a man is is more important than what he usual perplexity as to its proper name. We at Chapel Idoes professionally, however, and it is Allen’s hum- Hill, following, I believe, Allen Newell and Herb ble, honorable, and self-giving character that makes it Simon, settled on “computer science” as our depart- a double honor to be a Newell awardee. I am pro- ment’s name. Now, with the benefit of three decades’ foundly grateful to the awards committee. hindsight, I believe that to have been a mistake. If we Rather than talking about one particular research understand why, we will better understand our craft. -
November 7, 2019 Mr. Abdulhamit
Mailing Address Carol Valoris, Executive Director Public Affairs and Administrative Office PO Box 3708 Silver Spring, MD 20918 Phone (202) 812-8074 [email protected] Headquarters November 7, 2019 655 Evelyn Avenue East Meadow, NY 11554 www.concernedscientists.org Mr. Abdulhamit Gul CO-CHAIRS HONORARY BOARD MEMBERS (cont.) Minister of Justice Joel L. Lebowitz Rutgers University David Gross* Adalet Bakanlığı Paul H. Plotz, M.D. University of California Washington, DC James Langer Walter Reich Inst. of Theor. Physics, Sta 06659 Ankara, Turkey George Washington U. Barbara Lax Eugene Chudnovsky MIT Fax: +90 312 419 33 70 Lehman College Peter D. Lax Alexander Greer New York University Email: [email protected] Brooklyn College John Polanyi* University of Toronto VICE-CHAIRS Stuart Rice University of Chicago ASTRONOMY Sir Richard J Roberts* Dear Minister Gul: Arno Penzias* New England Biolabs New Enterprise Assoc. Myriam Sarachik City College of New York BIOLOGY Harold Scheraga Max Gottesman Cornell University The Committee of Concerned Scientists is an Institute of Cancer Maxine Singer Research Carnegie Inst. of independent organization of scientists, physicians, Washington CHEMISTRY Alfred I. Tauber engineers and scholars devoted to the protection Zafra Lerman Boston University MIMSAD, Inc. Steven Weinberg* and advancement of human rights and scientific U. of Texas, Austin COMPUTER SCIENCE Myrna Weissman freedom for our colleagues all over the world. Jack Minker Columbia University University of Maryland * Nobel Laureate ENGINEERING Philip Sarachik We write to express our concern for 17 successful NYU Polytechnic School of EXECUTIVE Engineering DIRECTOR scholars from Meliksah University, who were Carol Valoris MATHEMATICS Simon Levin Dorothy Hirsch (deceased) arrested in August 2016 on the charges of being a Princeton University Executive Director Emerita Sophie Cook member of an armed terrorist organization, MEDICAL SCIENCES Executive Director Emerita J. -
The People Who Invented the Internet Source: Wikipedia's History of the Internet
The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.