Abstract is missing.
- Towards a methodology for a design of knowledge based systemsAnnie G. Brooking. 4 [doi]
- Integrating knowledge in problem solving search proceduresVipin Kumar. 5-10 [doi]
- Knowledge acquisition for classification expert systemsWilliam J. Clancey. 11-14 [doi]
- The design of the Dipmeter Advisor systemReid G. Smith, Robert L. Young. 15-23 [doi]
- ACE: Going from prototype to product with an expert systemJon R. Wright, Frederick D. Miller, G. V. E. Otto, Elizabeth M. Siegfried, Gregg T. Vesonder, John E. Zielinski. 24-28 [doi]
- Artificial intelligence and software engineering: The Programmer s Apprentice projectCharles Rich. 29 [doi]
- A fifth generation approach to intelligent information retrievalGian Piero Zarri. 30-41 [doi]
- Knowledge representation and inference control of SPERIL-IIH. Ogawa, King-sun Fu, James T. P. Yao. 42-49 [doi]
- A logic interpreter to handle time and negation in logic data basesJosé Carlos Ferreira Maia Neves. 50-54 [doi]
- Functional requirements for very large knowledge basesEdward Babb. 55-56 [doi]
- PVS - design for a practical verification systemCharles H. Applebaum, James G. Williams. 58-68 [doi]
- The evolution of an integrated testing environment by the Domain Testing StrategyLee J. White. 69-74 [doi]
- Parallel algorithms for unification and other complete problems in pJeffrey Scott Vitter, Roger A. Simons. 75-84 [doi]
- Design principles for software manufacturing toolsPaul Bassett. 85-93 [doi]
- Application generators: Ideas for programming language extensionsEllis Horowitz, Alfons Kemper, Balaji Narasimhan. 94-101 [doi]
- A general purpose data base designRobert P. Brazile. 102-108 [doi]
- An automated software design evaluatorNancy Giddings, Tim Colburn. 109-115 [doi]
- An approach to software design documentationMike Burlakoff. 116-120 [doi]
- The IEEE Software Engineering standards processFletcher J. Buckley. 121-126 [doi]
- Information Wheel - a framework to identify roles of information systemsC. S. Sankar. 127-132 [doi]
- A user s approach to requirements analysis of a large software systemMeir Burstin, Moshe Ben-Bassat. 133-145 [doi]
- A design framework for the ALVEY/ICL/DHSS demonstrator processP. I. Pettitt. 146-147 [doi]
- A requirement model for the 5th generationDavid A. Gustafson. 149-156 [doi]
- Nial: A candidate language for fifth generation computer systemsCarl McCrosky, Janice I. Glasgow, Michael A. Jenkins. 157-166 [doi]
- Compiling prolog programs for parallel execution on a cellular machineAlexis Koster. 167-178 [doi]
- Zeus: An object-oriented distributed operating system for reliable applicationsJames C. Browne, James E. Dutton, Vincent Fernandes, Annette S. Palmer, Jonathan M. Silverman, Anand R. Tripathi, Pong-Sheng Wang. 179-188 [doi]
- Handling of recursion in dataflow modelSukumar Ghosh, Somprakash Bandyopadhyay, Chandan Mazumdar, S. Bhattacharya. 189-196 [doi]
- On the scope of static checking in definitional languagesBoleslaw K. Szymanski, Noah S. Prywes, Evan D. Lock, Amir Pnueli. 197-207 [doi]
- An application of network flow programming to locate concentrators in a communication networkH. T. Lau. 208-211 [doi]
- An associative array architecture intended for semantic network processingDan I. Moldovan. 212-221 [doi]
- Visions of future programming environmentsLarry E. Druffel. 222 [doi]
- Software and system design: VHSIC Hardware Description Language overviewMoe Shahdad. 223-225 [doi]
- Open systems standardizationRichard L. DesJardins. 226 [doi]
- Vision, perception and imageryAndrew J. Hanson, David M. McKeown Jr., Susan E. Brennan, Alex Pentland, Richard F. Voss. 228-229 [doi]
- Caricatures from imagesSusan E. Brennan. 228-229 [doi]
- Interactive image understandingAndrew J. Hanson. 228-229 [doi]
- Models (fractal and otherwise) for perception and generation of imagesAlex Pentland. 228-229 [doi]
- Images as MAPS / MAPS from imagesDavid M. McKeown Jr.. 228-229 [doi]
- Towards knowledge-based robotics systemsDavid R. Dodds. 230-235 [doi]
- The emerging technology of CAD/CAMLarry Lichten. 236-241 [doi]
- Treating information as an assetDavid Persin. 244 [doi]
- A national perspective on computer securityLouise Giovane Becker. 245 [doi]
- Security and audit: Needs of the business sector for security and integrity controlsRichard A. Smith, Leslie Chalmers, Charles C. Wood. 246 [doi]
- User identification, access control, and audit requirementsLeslie Chalmers. 247 [doi]
- Logging, security experts data base, and crypto key managementCharles C. Wood. 248-252 [doi]
- Security design considerations of hardwareRichard A. Smith. 253-254 [doi]
- Security considerations in system designJames J. Pottmyer, Ken Fong, Stelio Thompson, Ralph Shattuck. 255 [doi]
- Contingency planning and disaster recoveryKen Fong. 256 [doi]
- Evaluation of computer and network security systemsStelio Thompson. 257-259 [doi]
- Wealth and jobs in the fifth new worldAbbe Mowshowitz. 261 [doi]
- The impact and issues of the fifth generation: Ethical issues in new computing technologiesRob Kling, Terry Winograd, Paul Smolensky, Roland Schinzinger. 262 [doi]
- Truth in advertising in present and future generation computingRob Kling. 263 [doi]
- The ethics of macines which mimic peopleTerry Winograd. 264 [doi]
- Ethical questions and military dominance in next generation computingPaul Smolensky. 265 [doi]
- Computing applications as social experimentationRoland Schinzinger. 266 [doi]
- The impact and issues of the fifth generation: Social and organization consequences of new generation technologyWalt Scacchi, Elihu M. Gerson, Rob Kling, Langdon Winner. 267-270 [doi]
- Workplace impacts—ai and automation: Privacy and accountability of large-scale high-capacity personal data systemsLeslie Gasser, Kenneth Laudon. 271 [doi]
- Social dimensions of reliability of complex systemsSevero M. Ornstein. 272 [doi]
- Social implications of artificial intelligenceIra Pohl. 273 [doi]
- A hierarchy for classifying AI implicationsIra Pohl. 274-278 [doi]
- Soothsayers of the electronic ageVirginia Walker, Carl Hammer, Kerry Mark Joels, Alan Kay. 280 [doi]
- Beyond the data processing horizonCarl Hammer. 281-286 [doi]
- The seventh generationKerry Mark Joels. 287 [doi]
- The alvey DHSS major demonstratorMyer W. Morron. 289-290 [doi]
- The Fifth Generation grail: A survey of related researchLubomir Bic. 293-297 [doi]
- Towards a western Fifth-Generation Computer System projectMaarten H. van Emden. 298-302 [doi]
- Blueprints for the computer city: The quest for an architect s computerNorman Soong, Charles Atwood, Charles Eastman, William Mitchell, Douglas Stoker. 303-304 [doi]
- Delivering the word—integrating publications technologiesSharon C. Adler. 305 [doi]
- Integrating uncertainty into a language for knowledge based systemsBruce D Ambrosio. 307-309 [doi]
- Design of an ATN generator/modifier for supporting a communication prosthesisRussell B. Kegley, Lois M. Boggess. 310-313 [doi]
- Dialogue management in the personal sequential inference machine (PSI)Junichiro Tsuji, Yutaka Iima, Satoshi Tojo, Shoji Enomoto. 314-322 [doi]
- Modern educational techniques - high tech and the traditional approachTim Leso. 323-327 [doi]
- AFIPS secondary education curriculum in information technologyRichard H. Austing. 328 [doi]
- National educational computing policy alternativesRonald E. Anderson, Robert M. Aiken, Richard Close, Karen Duncan, Marc Tucker. 329 [doi]
- Proposed curriculum for programs leading to teacher certification in computer scienceJim Poirot, Arthur Luerhmann, Cathleen A. Norris, Harriet G. Taylor, Robert Taylor. 330 [doi]
- Computer science for secondary schools: Course contentJean B. Rogers. 331 [doi]
- Government agencies activities in educationDoris K. Lidtke. 332 [doi]