perm filename NINE.PUB[BIB,CSR]3 blob sn#531293 filedate 1980-08-22 generic text, type C, neo UTF8

COMMENT ā VALID 00015 PAGES C REC PAGE DESCRIPTION C00001 00001 C00003 00002 .require "setup.csr[bib,csr]" source file C00005 00003 %3STAN-CS-80-806:%1 C00009 00004 %3STAN-CS-80-807:%1 C00011 00005 %3AIM-337 (STAN-CS-80-808):%1 C00012 00006 %3AIM-338 (STAN-CS-80-809):%1 C00015 00007 %3STAN-CS-80-810:%1 C00016 00008 %3PVG-18 (STAN-CS-80-811):%1 C00019 00009 %3HPP-80-14 (STAN-CS-80-812):%1 C00022 00010 %3AIM-340 (STAN-CS-80-813):%1 C00026 00011 %3HPP-80-17 (STAN-CS-80-814):%1 C00031 00012 %3HPP-80-16 (STAN-CS-80-815):%1 C00034 00013 %3STAN-CS-79-816:%1 C00036 00014 %3STAN-CS-79-817:%1 C00038 00015 %3AIM-341 (STAN-CS-80-818):%1 C00042 ENDMK Cā; .require "setup.csr[bib,csr]" source file; .font A "math55"; .once center %3Stanford University Computer Science Reports %3List Number 9ā? 1980%1 @Listed here are abstracts of the most recent reports published by the Department of Computer Science at Stanford University. @%3Request Reports:%1 Complete the enclosed order form, and return the entire order form page (including mailing label) as soon as possible. In many cases we can print only a limited number of copies, and requests will be filled on a first come, first served basis as the reports become available. If the code (FREE) is printed on your mailing label, you will not be charged for hardcopy. This exemption from payment is limited primarily to libraries. (The costs shown include all applicable sales taxes. %2Please send no money now, wait until you get an invoice%1.) @%3Alternatively:%1 Copies of most Stanford CS Reports may be obtained by writing (about 2 months after the "%2Most Recent CS Reports%1" listing) to %2National Technical Information Service%1, 5285 Port Royal Road, Springfield, Virginia 22161. Stanford Ph.D. theses are available from %2University Microfilms%1, 300 North Zeeb Road, Ann Arbor, Michigan 48106. .skip %3STAN-CS-80-806:%1 .once preface 0 @%2On the Approximate Solution of Hyperbolic Initial-Boundary Value Problems%1 by William M. Coughran, Jr. (Thesis, 177 pages, June 1980) @Hyperbolic initial-boundry value problems arise in a number of scientific disciplines, such as meteorology, ocanography, geophysics, aerodynamics, acoustics, and magnetohydrodynamics. These problems usually cannot be solved analytically, so approximate methods must be used. Unfortunately, the construction of stable finite difference approximations is a subtle matter, which often confuses the practitioner; the existing theories for establishing the well-posedness of continuous initial-boundary value problems and the stability of discrete analogs involve the verification of complicated algebraic conditions. Moreover, the stability theory fo discrete initial-boundary value problems in more than one space dimension is not well developed. @In this thesis, the existing stability theory for discrete initial-boundary value problems, which has only been applied to (essentially) salar model problems, is used to analyze the stability of some %22 %4x %22%1 model problems, not written in characteristic variables; it is noted that the most accurate interior/boundary difference scheme combinations are the least stable to perturbations in the coefficients. (A practical numerical procedure for verifying the stability of discrete initial-boundary value problems is also introduced.) The stability results for %22 %4x %22%1 systems can be used in the stability analysis of larger systems where characteristics occur only singly and in pairs; in particular, discretizations of the wave equation, the shallow water equations, and the Eulerian equations for gas dynamics, which involve boundary conditions written in "natural" variables, are examined. The stability theory is also extended to multi-dimensional initial-bondary value problems by means of the concept of "tangential dissipativity"; as an application, a tangentially dissipative leap-frog metho is shown to be stable with Euler boundary conditions for a two-dimensional wave equation problem. The viability and limitations of the theory are demonstrated with some computational experiments. Finally, combining stability results with accuracy considerations, various approximations and boundary conditions are ranked. .skip %3STAN-CS-80-807:%1 .once preface 0 @%2Path-Regular Graphs%1 by David W. Matula and Danny Dolev (39 pages, June 1980) @A graph is vertex-[edge-]path-regular if a list of shortest paths, allowing multiple copies of paths, exists where every pair of vertices are the endvertices of the same number of paths and each vertex [edge] occurs in the same number of paths of the list. The dependencies and independencies between the various path-regularity, regularity of degree, and symmetry properties are investigated. We show that every connected vertex-[edge-]symmetric graph is vertex-[edge-]path-regular, but not conversely. We show that the product of any two vertex-path-regular graphs is vertex-path-regular but not conversely, and the iterated product %2G %4x %2G %4x * * * x %2G%1 is edge-path-regular if and only if %2G%1 is edge-path-regular. An interpretation of path-regular graphs is given regarding the efficient design of concurrent communication networks. .skip %3AIM-337 (STAN-CS-80-808):%1 .once preface 0 @%2Basic Research in Artificial Intelligence and Foundations of Programming%1 by John McCarthy (Principal Investigator), Thomas Binford, David Luckham, Zohar Manna, Richard Weyhrauch (Associate Investigators) (75 pages, May 1980) @Recent research results are reviewed in the areas of formal reasoning, mathematical theory of computation, program verification, and image understanding. .skip %3AIM-338 (STAN-CS-80-809):%1 .once preface 0 @%2An Extention of Screw Theory and its Application to the Automation of Industrial Assemblies%1 by Jorgan S. Ohwovoriole (Thesis, 186 pages, April 1980) @Interest in mathematical models that adequately predict what happens in the process of assembling industrial parts has heightened in recent times. This is a result of the desire to automate the assembly process. Up to this point there has not been much success in deriving adequate mathematical models of the assembly process. @This thesis is an attempt to develop mathematical models of parts assembly. Assembly involves motion of bodies which generally contact each other during the process. Hence, we study the kinematics of the relative motion of contacting bodies. @Basic to the theory of assembly is the classical theory of screws which, however, required substantial extensions for this application. The thesis begins with a review of basic screw theory, including line geometry and reciprocal screw systems, and new and more general derivations of some of these screw systems. We then extend the screw theory by introducing such concepts as "repelling" and "contrary" screw pairs, and "total freedom." @Finally, we give a method of characterizing assemblies of industrial parts. Using the extended screw theory, we then analyze the "general peg-in-hole assembly" and subsequently give a mathematical description of this particular assembly. .skip %3STAN-CS-80-810:%1 .once preface 0 @%2Lower Bounds for algebraic Decision Trees%1 by J. Michael Steele and Andrew C. Yao (12 pages, July 1980) @A topological method is given for obtaining lower bounds for the height of algebraic decision trees. The method is applied to the knapsack problem where a %6W%2nā2)%1 bound is obtained for trees with bounded-degree polynomial tests, thus extending the Dobkin-Lipton result for linear trees. Applications to the convex hull problem and the distinct element problem are also indcated. Some open problems are discussed. .skip %3PVG-18 (STAN-CS-80-811):%1 .once preface 0 @%2An Extended Semantic Definition of Pascal for Proving the Absence of Common Runtime Errors%1 by Steven M. German (57 pages, June 1980) @We present an axiomatic definition of Pascal which is the logical basis of the Runcheck system, a working verifier for proving the absence of runtime errors such as arithmetic overflow, array subscripting out range, and accessing an uninitialized variable. Such errors cannot be detected at compile time by most compilers. Because the occurrence of a runtime error may depend on the values of data supplied to a program, techniques for assuring the absence of errors must be based on program specifications. Runchck accepts Pascal programs documented with assertions, and proves that the specifications are consistent with the program and that no runtime errors can occur. Our axiomatic definition is similar to Hoare's axiom system, but it takes into account certain restrictions that have not been considered in previous definitions. For instance, our definition accurately models uninitialized variables, and requires a variable to have a well defined value before it can be accessed. The logical problems of introducing the concept of uninitialized variables are discussed. Our definition of expression evaluation deals more fully with function calls than previous axiomatic definitions. @Some generalizations of our semantics are presented, including a new method of verifying programs with procedure and function parameters. Our semantics can be easily adopted to similar languages, such as ADA. @One of the main potential problems for the user of a verifier is the need to write detailed, repetitious assertions. We develop some simple logical properties of our definition which are exploited by Runcheck to reduce the need for such detailed assertions. .skip %3HPP-80-14 (STAN-CS-80-812):%1 .once preface 0 @%2Knowledge Engineering: The Applied Side of Artificial Intelligence%1 by Edward A. Feigenbaum (14 pages, ? 1980) @Expert System research is an emerging area of computer science that exploits the capabilities of computers for symbolic manipulation and inference to solve complex and difficult reasoning problems at the level of performance of human experts. The methods of this area are designed to acquire and represent both the formal and the informal knowledge that experts hold about the tasks of their disciplin. Numerous applications to science, engineering, and medicine have been accomplished. Expert System projects represent applied artificial intelligence research, though they also make salient numerous fundamental research issues in the acquisition, representation, and utilization of knowledge by computer programs. Knowledge engineering approaches promise significant cost savings in certain applications; intelligent computer-based aids for practitioners in fields whose knowledge is primarily nonmathematical; and the elucidation of the heuristic knowledge of experts -- the largely private knowledge of practice. There are major problems of knowledge engineering including the shortage of adequate computer equipment, the shortage of trained specialists in applied artificial intelligence, the scientific base for adequate knowledge acquisition, and the lack of sustained funding. .skip %3AIM-340 (STAN-CS-80-813):%1 .once preface 0 @%2Obstacle Avoidance and Navigation in the Real World by a Seeing Robot Rover%1 by Hans Peter Moravec (Thesis, 174 pages, September 1980) @The Stanford AI lab cart is a card-table sized mobile robot controlled remotely through a radio link, and equipped with a TV camera and transmitter. A computer has been programmed to drive the cart through cluttered indoor and outdoor spaces, gaining its knowledge about the world entirely from images broadcast by the onboard TV system. @The cart determines the three dimensional location of objects around it, and its own motion among them, by noting their apparent relative shifts in successive images obtained from the moving TV camera. It maintains a model of the location of the ground, and registers objects it has seen as potential obstacles if they are sufficiently above the surface, but not too high. It plans a path to a user-specified destination which avoids these obstructions. This plan is changed as the moving cart perceives new obstacles on its journey. @The system is moderately reliable, but very slow. The cart moves about one meter every ten to fifteen minutes, in lurches. After rolling a meter, it stops, takes some pictures and computes for a long time. Then it plans a new path, and executes a little of it, and pauses again. @The program has successfully driven the cart through several 20 meter indoor courses (each taking about five hours) complex enough to necessitate three or four avoiding swerves. A less sucessful outdoor run, in which the cart swerved around two obstacles but collided with a third, was also done. Harsh lighting (very bright surfaces next to very dark shadows) resulting in poor pictures, and movement of shadows during the cart's creeping progress, were major reasons for the poorer outdoor performance. These obstacle runs have been filmed (minus the very dull pauses). %3HPP-80-17 (STAN-CS-80-814):%1 .once preface 0 @%2Prototypes and Production Rules: A Knowledge Representation for Computer Consultations%1 by Janice S. Aikins (Thesis, 204 pages, August 1980) @This thesis presents a system called CENTAUR, which demonstrates the effectiveness of representing prototypical knowledge in a combination of frames and production rules for performing computer consultations. Key knowledge representation and control structure problems in %2production rule%1 systems similar to MYCIN are identified, and a set of important characteristics of the structures used for representing problem-solving knowledge is given. CENTAUR's frames, or %3prototypes%1, complement the production rules to satisfy these characteristics and represent expected patterns of data that permit a more focused, hypothesis-directed approach to problem solving. @Among the characteristcs identified as desrible in the representation structures are the ability to %2explicitly%1 represent (a) prototypical cases, (b) the %2context%1 in which knowledge is applied, and (c) the %2strategies%1 for applying that knowledge. CENTAUR's prototypes consist of patterns of knowledge in the domain which serve as broad contexts, guiding the more detailed processing of the production rules. Strategies for the consultation, or control knowledge, are represented in the prototypes separately from other kinds of domain knowledge. This allows the domain expert to specify control knowledge that is specific to each prototype. Examples are presented which demonstrate how this explicit representation facilitates explanations of the system's reasoning. Further, the organization of knowledge in CENTAUR provides a useful framework for acquiring new knowledge. @CENTAUR has been applied to the domain of pulmonary (lung) physiology in which it provides interpretations of pulmonary function tests. The prototypes represent standard pulmonary disease patterns, and the production rules serve as a stylized form of %2attached procedure%1. At the highest level, the stages of the consultation itself are represented in a %2Consultation%1 prototype. Thus the advantages of explicit representation apply to control of the consultation process as well. @Other important feaures of the representation include the use of prototypes as a standard of comparison in order to detect inconsistent or erroneous data, and the representation in production rules of domain expertise to deal with data discrepancies and diagnosis refinement. @Several experiments demonstrating the flexibility of the representation have also been performed. These include the implementation of different top-level prototype selection strategies (%2confirmation, elimination%1, and %2fixed-order%1), and the use of a second high-level prototype which can review knowledge stored in the domain-level prototypes. %3HPP-80-16 (STAN-CS-80-815):%1 .once preface 0 @%2Two Papers on Medical Computing -- (1) Medical Cybernetics: The Chalenges of Clinical Computing, (2) Consultation Systems for Physicians: The Role of Artificial Intelligence Techniques%1 by Edward H. Shortliffe, M.D., Ph.D. (56 pages, July 1980) @This memo contains two papers that deal with medical computing. The first, written for a book on cybernetics and society, examines the range of medical computing systems, plus some of the logistical and human engineering challenges limiting their utility or acceptance. It addressed five recurring themes that characterize the introduction of medical computing systems: 1) the need for the proposed application, 2) the system users, 3) the logistics of system introduction, 4) the required computational techniques, and 5) the required technological resources. In the context of these topics, suggestions are offered for long-range research and resource policies that are appropriate for assuring the development of practical clinical computing. @The second paper, presented at a meeting on artificial intelligence in May 1980, takes a more detailed look at the reasons that medical computing systems have had a limited impact on clinical medicine. When one examines the most common reasons for poor acceptance for such systems, the potential relevance of artificial intelligence techniques becomes evident. The paper proposes design criteria for clinical computing systems and demonstrates their relationship to current research in knowledge engineering. The MYCIN System is used to illustrate the ways in which one research group has responded to the design criteria cited. %3STAN-CS-79-816:%1 .once preface 0 @%2Automating the Study of Clinical Hypotheses on a Time-Oriented Data Base: The RX Project%1 by Robert L. Blum, M.D. (12 pages, November 1979) @The existence of large chronic disease data bases offers the possibility of studying hypotheses of major medical importance. An objective of the RX Project is to assist a clinical researcher with the tasks of experimental design and statistical analysis. A major component of RX is a knowledge base of medicine and statistics, organized as a frame-based, taxonomic tree. RX determines confounding variables, study design, and analytic techniques. It then gathers data, analyzes it, and interprets results. The American Rheumatism Association Medical Information System is used. %3STAN-CS-79-817:%1 .once preface 0 @%2Analysis of Coalesced Hashing%1 by Jeffrey Scott Vitter (Thesis, 111 pages, August 1980) @This thesis analyzes the %2coalesced hashing%1 method, in which a portin of memory (called the %2address region%1) serves as the range of the hash function while the rest of memory (called the %2cellar%1) is devoted solely to storing recrds that collide when inserted. If the cellar should get full, subsequent colliders must be stored in empty slots in the address region and, thus, may cause later collisions. Varying the relative size of the cellar affects search performance. @The main result of this thesis expresses he average search times as a function of the number of records and the cellar size, solving the long-standing open problem described in [Knuth, %2The Art of Computer Programming%1, Vol. 3, section 6.4-43]. We use these formulas to pick the cellar size that leads to %2optimum%1 search performance and then show that this "tuned" method is competitive with several well-known hashing schemes. @We also address other important practical issues, such as developing good deletion algorithms and efficient implementations, and outline some interesting problems for future research. %3AIM-341 (STAN-CS-80-818):%1 .once preface 0 @%2Expression Procedures and Program Derivation%1 by William Louis Scherlis (Thesis, 178 pages, August 1980) @We explore techniques for systematically deriving programs from specifications. The goal of this exploration is a better understanding of the development of algorithms. Thus, the intention is not to develop a theory of programs, concerned with the analysis of existing programs, but instead to develop a theory of programming, dealing with the process of constructing new programs. Such a theory would have practical benefits both for programming methodology and for automatic program synthesis. @We investigate the derivation of programs by program transformation techniques. By expanding an ordinary language of recursion equations to include a generalized procedure construct (the %2expression procedure%1), our ability to manipulate programs in that language is greatly facilitated. The expression procedure provides a means of expressing information not just about the properties of individual program elements, but also about the way they relate to each other. @A set of three operations --- abstraction, application, and composition --- for transforming programs in this extended language is presented. We prove using operational semantics that these operations preserve the strong equivalence of programs. The well-known systems of Burstall and Darlington and of Manna and Waldinger are both based on an underlying rule system that does not have this property. @Our transformation system is illustrated with several small examples, which are examined in detail to give insight to the heuristic problems of program development. A tactic of %2program specialization%1 is shown to underlie many of these derivations. While we present no implemented system, some consideration is given to issues related to the development of programming tools. @The practical value of our approach is demonstrated in the systematic development of a partial family tree of parsing algorithms, similar in spirit to the treatment of sorting by Darlington and by Green and Barstow. Several intricate parsing algorithms (Earley's, Cocke-Younger-Kasami, and Top-Down) are derived in detail.