Theories of speech acts view utterances as actions which attempt to change the mental states of agents participating in a conversation. Recent work in computer science has tried to formalize speech acts in terms of the logic of action in AI planning systems. However most of these planning systems make simplifying assumptions about the world which are too strong to capture many features of conversation. One of these assumptions has been that the intent of an utterance is mutually understood by...

Topics: DTIC Archive, Traum, David R, ROCHESTER UNIV NY DEPT OF COMPUTER SCIENCE, *COMPUTATIONAL...

Topics: DTIC Archive, Brusentsov, N P, FOREIGN TECHNOLOGY DIV WRIGHT-PATTERSON AFB OH, *COMPUTER LOGIC,...

The basic ideas of cybernetics are popularly expounded as the science of the general principles of control. Primary attention is allotted to technical cybernetics, questions of the control of technical processes, and the creation of artificial controlling systems consisting of devices for perception, transmission, storage, and processing of information. Elementary information from information theory is given as well as that on automatic adjustment and electronic computers. The possibilities of...

Topics: DTIC Archive, Krayzmer, L P, FOREIGN TECHNOLOGY DIV WRIGHT-PATTERSON AFB OH, *CYBERNETICS,...

A research and development program directed toward the development of technologies for high speed computer subsystems is described. Increases in the yield of low power, high speed, high density ECL complex logic arrays, made possible by improved multilevel interconnection technologies, are reported. Multichip high speed LSI subsystems have been assembled by face-down bonding. Computer aid has been incorporated into a system for designing and generating photomasks for complex high speed...

Topics: DTIC Archive, MASSACHUSETTS INST OF TECH LEXINGTON LINCOLN LAB, *DIGITAL COMPUTERS, *INTEGRATED...

The importance of intention in conversation has been considered by many researchers in artificial intelligence and psychology. However, most models of conversation have been limited to pursuing the transfer of knowledge between the system and a user. We propose that conversational goals can address communication at a number of other levels such as the conversats' emotions, their relationship, and their attitudes. MAGPIE (Multiple Active Goal Processor in Interactive Exchanges) is a computer...

Topics: DTIC Archive, Johnson,Peter N, YALE UNIV NEW HAVEN CT DEPT OF COMPUTER SCIENCE, *COMPUTER...

The report describes the following: (1) the development of 0.1- and 0.05-mil geometry high-speed transistors, (2) the development of saturated and unsaturated high-speed microcircuits, (3) the progress of the array investigation, using 3-, 9-, and 27-bit ECL versions of a parity generator as test vehicles, and (4) the design and fabrication of microcircuit form of an ECL type circuit which is being evaluated by Lincoln Laboratory as part of an experimental computer circuit design.

Topics: DTIC Archive, MASSACHUSETTS INST OF TECH LEXINGTON LINCOLN LAB, *CIRCUITS, *MICROELECTRONICS,...

John von Neumann's kinematic and cellular automaton systems are described. A complete informal description of the cellular system is presented including an explanation of the realization of logical components, the design of computer organs, the construction, destruction and movement of organs by sequences of internally originated pulses, universal computation and construction, and self-reproduction. Connections between von Neumann's automaton research and his work on computer design are brought...

Topics: DTIC Archive, Burks, Arthur W, MICHIGAN UNIV ANN ARBOR LOGIC OF COMPUTERS GROUP, *COMPUTERS,...

This report examines the performance of the QUICKE2 source code. The version referred to in this report contains an IRT Corp. modification to accommodate photon attenuation and electron emission for multiple layers. Numerous comparisons are made of QUICKE2 calculations with other computer codes and with experiments for a variety of conditions. Information of a practical nature, necessary for modeling problems with the code, is provided. Specific input requirements are listed and outputs are...

Topics: DTIC Archive, Rogers,Shelley, IRT CORP SAN DIEGO CALIF, *ELECTRON EMISSION, COMPUTER LOGIC,...

We describe a program for verifying that a set of rules in an expert system comprehensively spans the knowledge of a specialized domain. The program has been devised and tested within the context of the ONCOCIN System, a rule-based consultant for clinical oncology. The stylized format of ONCOCIN's rules has allowed the automatic detection of a number of common errors as the knowledge base has been developed. This capability suggests a general mechanism for correcting many problems with...

Topics: DTIC Archive, Suwa,Motoi, STANFORD UNIV CA DEPT OF COMPUTER SCIENCE, *SYSTEMS ENGINEERING,...

The REACT research group at Stanford under the supervision of Professor Zohar Manna, developed methodologies and tools for the verification and synthesis of reactive, real-time and hybrid systems based on their temporal specifications. A system, STeP (Stanford Temporal Prover), has been implemented to support computer-aided verification and synthesis based on these methodologies and tools. The goal of the system is to automate the development process as much as possible, thereby reducing the...

Topics: DTIC Archive, Manna, Zohar, STANFORD UNIV CA DEPT OF COMPUTER SCIENCE, *SOFTWARE ENGINEERING,...

The design and fabrication of automatic data processing subsystems (SS1A) for field artillery applications are described. Each subsystem consists of a modified BASICPAC system together with external facilities for automatic entry, transmission, and display of fire-control in formation. A detailed list of specific items included in each SS1A is presented. A short history of the SS1A project is given. Under the heading of logical design, the five major changes (sign storage change, MAB change,...

Topics: DTIC Archive, Glazer, H I, PHILCO CORP WILLOW GROVE PA, *ARTILLERY UNITS, *FIRE CONTROL COMPUTERS,...

The Economic Factors Department of MITRE has developed a computerized electronic system cost model as part of its work in system cost methodology. This document describes the initial version of the model and gives instructions for the electronic data processing procedures, including presentation of the key punch input forms, computer output formats, and a description of the computer program logic. The model, currently operational, has been programmed for the IBM 7090 computer requires a 32,768...

Topics: DTIC Archive, MITRE CORP BEDFORD MA, *DATA PROCESSING, COMPILERS, COMPUTER LOGIC, COMPUTER...

The report details the data and program structures for a conversational programming system which translates commands describing a Markovian queueing network into a matrix of transition intensities, and which provides equilibrium distributions and related solutions of the network according to requested specifications.

Topics: DTIC Archive, Irani, Keki B, MICHIGAN UNIV ANN ARBOR, *QUEUEING THEORY, *INPUT OUTPUT DEVICES,...

This report describes the results of the first year's effort of a 3- year program to develop and evaluate a new Adaptive Computerized Training System (ACTS). This combines principles of artificial intelligence, decision theory, and adaptive techniques for teaching the procedures necessary to troubleshoot electronic circuits. ACTS emphasizes the realistic simulation of maintenance problems and focuses on enhancing the acquisition of decision-making skills which underlie successful electronic...

Topics: DTIC Archive, Hopf-Weichel, Rosemarie, PERCEPTRONICS INC WOODLAND HILLS CA, *TRAINING, *ARTIFICIAL...

The development of a MATLAB based statistical pattern recognition software package (referred to as STATPACK) was begun. Initial developments include a two-dimensional coordinate projection capability, and a two-dimensional eigenvector projection capability. The operating system's directory structure has been utilized to allow for multiple levels of data separation algorithms in subsequent development.

Topics: DTIC Archive, Montana, Shaun P., ROME LAB ROME NY, *COMPUTER PROGRAMS, *EIGENVECTORS, *PATTERN...

The intended meaning of intuitionistic logic is given by the Brouwer-Heyting-Kolmogorov (BHK) semantics which informally defines intuitionistic truth as provability and specifies the intuitionistic connectives via operations on proofs. The natural problem of formalizing the BHK semantics and establishing the completeness of propositional intuitionistic logic Int with respect to this semantics remained open until recently. This question turned out to be a part of the more general problem of the...

Topics: DTIC Archive, Artemov, S. N., CORNELL UNIV ITHACA NY CENTER FOR FOUNDATIONS OF INTELLIGENT SYSTEMS,...

We present a dependent-type system for a lambda-calculus with explicit substitutions. In this system, meta-variables, as well as substitutions, are first-class objects. We show that the system enjoys properties like type uniqueness, subject reduction, soundness, confluence and weak normalization.

Topics: DTIC Archive, Munoz, Cesar, INSTITUTE FOR COMPUTER APPLICATIONS IN SCIENCE AND ENGINEERING HAMPTON...

There is a rapidly growing interest in problem-scale parallelism, both as a model of animal brains and as a paradigm for VLSI. Work at Rochester has concentrated on connectionist models and their application to vision. This paper lays out a framework for dealing with such problems. The framework is built around computational modules, the simplest of which are termed p-units. We develop their properties and show how they can be applied to a variety of problems. To show how the framework can be...

Topics: DTIC Archive, Feldman, J A, ROCHESTER UNIV NY DEPT OF COMPUTER SCIENCE, *MATHEMATICAL MODELS,...

The 'Language Studies' contract is divided into four project areas, all of which are directed to the problems of effectively, reliably and efficiently using modern computers in a wide range of applications. Three of the projects deal with methods of communicating with computers. Proving Program Correctness (P.O.: J.C. Reynolds). This group is working towards programming language designs which increase the probability that specification errors will be detected by the compiler or interpreter and...

Topics: DTIC Archive, Reynolds,John C, SYRACUSE UNIV NY SCHOOL OF COMPUTER AND INFORMATION SCIENCE,...

This project concerned developing new logical formalisms for representing information. New formalisms allow us to represent information that we previously could not capture. New reasoning methods allow us to integrate more information and can yield conclusions that were previously unavailable. One basic method that was developed involves introducing contexts as mathematical objects and developing formal language for describing the relations between sentences true in different contexts. This...

Topics: DTIC Archive, McCarthy, John, STANFORD UNIV CA DEPT OF COMPUTER SCIENCE, *ARTIFICIAL INTELLIGENCE,...

Volume I of this report describes the proposed Runway Configuration Management System (RCMS) operational software for review by the facility personnel. It also serves as an input to RCMS functional specifications for the Traffic Management System (TMS) program. Using interactive computer logic, RCMS helps supervisors select runway configurations which reduce aircraft delays by optimizing throughput capacity in dynamic operational environments. Volume II of this report is the User's Guide to the...

Topics: DTIC Archive, Bradley, Anthony, COMPUTER RESOURCE MANAGEMENT INC VIENNA VA, *GROUND TRAFFIC,...

Conservative logic is a comprehensive model of computation which explicitly reflects a number of fundamental principles of physics, such as the reversibility of the dynamical laws and the conservation of certain additive quantities (among which energy plays a distinguished role). Because it more closely mirrors physics than traditional models of computation, conservative logic is in a better position to provide indications concerning the realization of high-performance computing systems, i.e.,...

Topics: DTIC Archive, Fredkin,Edward, MASSACHUSETTS INST OF TECH CAMBRIDGE LAB FOR COMPUTER SCIENCE,...

0
0.0

Oct 8, 2020
10/20

by
Brazilian Conference on Mathematical Logic (11th : 1996 : Salvador, Brazil)

texts

######
eye 0

######
favorite 0

######
comment 0

xi, 326 pages : 26 cm

Topics: Computer logic -- Congresses, Logic, Symbolic and mathematical -- Congresses, Logique informatique...

7
7.0

Jul 6, 2018
07/18

by
European Summer School in Logic, Language, and Information (20th : 2008 : Hamburg, Germany)

texts

######
eye 7

######
favorite 0

######
comment 0

viii, 166 p. : 24 cm

Topics: Computer science -- Mathematics -- Congresses, Computer logic -- Congresses, Programming languages...

Software techniques used in an automated real-time fuze testing system are discussed. Most of the techniques are independent of the electrical circuit being tested and the computer controlling the system. Although the software described was initially designed for testing the XM596 proximity fuze, only the actual fuze testing programs need be specifically designed for a given testing system. The programs comprising SOSOFT are functionally organized into eight major subsystems--real-time priority...

Topics: DTIC Archive, Link, Donald A, HARRY DIAMOND LABS ADELPHI MD, *COMPUTER PROGRAMS, *FIRING...

This report describes research done in hardware description, simulation, and design automation. Although the basic thrust of the work has been aimed at I/O and interface problems, most of the results are more general. The efforts in formal hardware description have produced a language for bus, I/O and interface specification, GLIDE. GLIDE is supported by a compiler which performs syntactic and semantic checks. A translator to the ISPL language has also been written. The resulting code and...

Topics: DTIC Archive, Parker,Alice C, CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF ELECTRICAL ENGINEERING,...

The factoring of large composite integers has an important inverse relationship with the security of certain types of encrytion systems. If a particular code is based on a 100 digit composite number, the code can be considered secure for the length of time it would take to factor a 100 digit number on the fastest computer available using the best known factoring algorithm. The continued fraction algorithm has generally been regarded as the best proven method known for factoring large integers....

Topics: DTIC Archive, Wunderlich,Marvin, NORTHERN ILLINOIS UNIV DE KALB DEPT OF MATHEMATICAL SCIENCES,...

The focus of this paper is on linear programming (LP) software in the context of model management and decision support, As a result, we will not be interested in the algorithmic properties of LP or math programming (MP) codes, but rather their applicability to more generalized modeling environments wherein models can be linked or decomposed in a manner which frees the user from having to know the internal representation which the algorithms require. In particular, we will look at the objectives...

Topics: DTIC Archive, Dolk,D R, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *Mathematical programming, *Linear...

Subset-logic programming is a paradigm of programming with subset and equality assertions. We propose this paradigm as a logical basis for programming with sets. We present a language called SEL to illustrate the approach. The terms of SEL are the usual first-order terms of Prolog, augmented with one associative-commutative (a-c) constructor, U, for defining sets. Computationally, we treat assertions as one-way rewrite rules, where the matching used is a restricted form of...

Topics: DTIC Archive, Jayaraman, Bharat, NORTH CAROLINA UNIV AT CHAPEL HILL DEPT OF COMPUTER SCIENCE,...

Abstraction reduces the problem of whether an infinite state system satisfies a temporal logic property to model checking that property on a finite state abstract version. The most common abstractions are quotients of the original system. We present a simple method of defining quotient abstractions by means of equations collapsing the set of states. Our method yields the minimal quotient system together with a set of proof obligations that guarantee its executability and can be discharged with...

Topics: DTIC Archive, Meseguer, Jose, ILLINOIS UNIV AT URBANA-CHAMPAIGN DEPT OF COMPUTER SCIENCE,...

Kolence's theory of the performance of computing systems is restated. In this development, the basic subsystems are reduced to two: logical subconfigurations and software units. These and the three fundamental variables, work, time and storage occupancy are all defined using as a basis a single logical construct, the set of instantaneous descriptions of instruction executions. Basic results are given for time relationships (utilizations and concurrency levels), work relationships (distribution...

Topics: DTIC Archive, Kovach,R P, INSTITUTE FOR SOFTWARE ENGINEERING PALO ALTO CA, *MATHEMATICAL MODELS,...

This report provides a brief summary assessment of the strengths and weaknesses of logic programming languages such as Prolog for supporting the requirements for natural language processing in the Advanced Command and Control Environment (ACCE). In order to deal as precisely as possible with ACCE requirements, this report emphasizes one of the best understood ACCE goals: natural language access to databases.

Topics: DTIC Archive, Kittredge, Richard I, ATC-NY ITHACA NY, *NATURAL LANGUAGE, *INTERFACES, *PROGRAMMING...

The Air Force VAMOSC system has been mandated by DOD to aid in decision-making for modification and acquisition of weapons systems. VAMOSC data will be used in cost models that support decisions to obligate millions of dollars. Therefore, the accuracy of VAMOSC's output and the validity of its logic are paramount to the utility of the system to the user. For this reason, the Air Force Office of VAMOSC is relying on independent contractor's to validate the VAMOSC logic and data sources. (Author)

Topics: DTIC Archive, Smith,Dennis E, DESMATICS INC STATE COLLEGE PA, *LOGISTICS SUPPORT, *MANAGEMENT...

A method was developed for designing CMOS/SOS circuits using computer-aided design tools. CMOS/SOS fabrication methods and theory of operation as well as differences between CMOS/SOS and bulk CMOS were researched. SPICE was used to determine optimum gate width-to-length ratios resulting in symmetrical transitional delays. Two designs were developed to implement the CMOS/SOS programmable logic array (PLA), and a C program was written to automatically generate one of the designs by means of a...

Topics: DTIC Archive, Sommars,W E, AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH SCHOOL OF ENGINEERING,...

Folkscanomy: A Library of Books

375
375

Dec 30, 2015
12/15

by
Workshop on Computer Science Logic (14th : 2000 : Fischbachau, Germany); Clote, Peter; Schwichtenberg, Helmut, 1942-; European Association for Computer Science Logic. Conference (9th : 2000 : Fischbachau, Germany)

texts

######
eye 375

######
favorite 0

######
comment 0

Computer Science Logic: 14th InternationalWorkshop, CSL 2000 Annual Conference of the EACSL Fischbachau, Germany, August 21 – 26, 2000 Proceedings Author: Peter G. Clote, Helmut Schwichtenberg Published by Springer Berlin Heidelberg ISBN: 978-3-540-67895-3 DOI: 10.1007/3-540-44622-2 Table of Contents: Background, Reserve, and Gandy Machines Choiceless Polynomial Time Computation and the Zero-One Law Composition and Submachine Concepts for Sequential ASMs Une tentative malheureuse de...

Topic: Computer logic

CGTPIF is a controller design program which executes interactively. Three design paths are offered: (1) design of a Proportional-plus-Integral (PI) regulator via linear-quadratic (LQ) methodology; (2) design of a Command Generator Tracker, either open-loop (CGT) or closed-loop (CGT/PI); and (3) design of a Kalman filter (KF). These three designs are components of a final controller implemented as a Command Generator Tracker, with an inner-loop proportional-plus-integral regulator, and a Kalman...

Topics: DTIC Archive, Floyd,Richard M, AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH SCHOOL OF...

Genetic algorithms (GAs) are biologically motivated adaptive systems which have been used, with varying degrees of success, for function optimization. In this study, an abstraction of the basic genetic algorithm, the Equilibrium Genetic Algorithm (EGA), and the GA in turn, are reconsidered within the framework of competitive learning. This new perspective reveals a number of different possibilities for performance improvements. This paper explores population-based incremental learning (PBIL), a...

Topics: DTIC Archive, Baluja, Shumeet, CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE,...

A program of research to explore new display device techniques and digital system architecture concepts which can be used to realize highly reliable, low cost interactive graphic display systems has been completed at the University of Illinois Coordinated Science Laboratory. The techniques and concepts which were studied are generally applicable to figure large scale computer-based information systems such as those used in ground based operations as well as in specialized computer-based...

Topics: DTIC Archive, Johnson,R L, Slottow,H G, Weber,L F, White,A B, ILLINOIS UNIV AT URBANA-CHAMPAIGN...

In this paper we present a hybrid systems approach to freeway traffic control. We introduce a model of traffic which includes both vehicles and voids, where a void is a unit of space greater than the normal following distance between vehicles. The introduction of voids allows us to successfully model traffic flow via a wave model. We discuss the fundamentals of the Multiple Agent Hybrid Control Architecture which was used to implement our control of freeway traffic and the results of a...

Topics: DTIC Archive, Kohn, W., CALIFORNIA UNIV BERKELEY, *HYBRID SYSTEMS, *KNOWLEDGE BASED SYSTEMS,...

This paper introduces a mathematical framework for evaluating the relationship between policies and mechanisms. An evaluation approach called the assignment technique is defined. This technique consists of establishing an assignment between the security classes of information established by policy constraints, and the protection domains, established by the properties of the mechanism. The assignment technique provides a theoretical foundation for assessing the sufficiency of an access control...

Topics: DTIC Archive, Shirley,Lawrence J, NAVAL POSTGRADUATE SCHOOL MONTEREY CA, *MATHEMATICAL MODELS,...

This study investigates the problem of real time low-level mission planning against highly transient targets within the Battlefield Air Interdiction (BAI) environment. The dual objective was to test the feasibility of a computerized mission planning aid and reducing computer memory requirements to a level that would allow implementation of the mission planning aid on a modern mini-computer system. The model is based on concept of using Multi-Attribute Decision Analysis (MADA) to capture the...

Topics: DTIC Archive, Whitney,Robert H, AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH SCHOOL OF...

This dissertation characterizes the operationalization of advice as a series of problem transformations leading from the advice statement to a procedure for achieving a specified goal (avoid taking points) or evaluating a specified quantity (decide whether an opponent is void). It describes some general operators for performing such transformations. These operators have been implemented in a program called FOO as domain-independent transformation rules that access a knowledge base of task...

Topics: DTIC Archive, Mostow, David J, CARNEGIE-MELLON UNIV PITTSBURGH PA DEPT OF COMPUTER SCIENCE,...

Concurrent logic languages are high-level programming languages for parallel and distributed systems that offer a wide range of both known novel concurrent programming techniques. Being logic programming languages, they preserve many advantages of the abstract logic programming model, including the logical reading of programs and computations, the convenience of representing data-structures with logical terms and manipulating them using unification, and the amenability to meta-programming....

Topics: DTIC Archive, Shapiro, Ehud Y, WEIZMANN INST OF SCIENCE REHOVOT (ISRAEL) DEPT OF APPLIED...

This report summarizes the first year of research on a project to produce formalisms, suitable for manipulation by computer, for the representation of specific concepts that are important for natural-language semantics, and to give an independent account of the meaning of such representations using the tools of formal logic. The major technical achievement of this effort has been the development of a logic which characterizes systems which represent and reason with information about their own...

Topics: DTIC Archive, Moore,R C, SRI INTERNATIONAL MENLO PARK CA ARTIFICIAL INTELLIGENCE CENTER,...

This report describes a fuzzy logic decision tool developed at NOSC under Independent Exploratory Development funding. The tool implements alternate versions of an algorithm based on results published by Zadeh, Bellman, Saaty, and Yager. The tool has broad application to command and control systems since decision making in a military context usually involves imprecise knowledge and subjective goals. Decision making is defined as an act of rational choice. In particular, given a set of possible...

Topics: DTIC Archive, Larsen, R W, NAVAL OCEAN SYSTEMS CENTER SAN DIEGO CA, *COMPUTER LOGIC, *COMMAND AND...

This paper introduces a new measurement, robustness, to measure the quality of machine-discovered knowledge from real-world databases that change over time. A piece of knowledge is robust if it is unlikely to become inconsistent with new database states. Robustness is different from predictive accuracy in that by the latter, the system considers only the consistency of a rule with unseen data, while by the former, the consistency after deletions and updates of existing data is also considered....

Topics: DTIC Archive, Hsu, Chun-Nan, UNIVERSITY OF SOUTHERN CALIFORNIA MARINA DEL REY INFORMATION SCIENCES...

This report describes recent progress in the development of PRET, a computer program that automates the process of system identification. Given hypotheses, observations, and specifications, PRET constructs an ordinary differential equation model of a target system with no other in puts or intervention from its user. The core of the program is a set of traditional system identification (SID) methods. A layer of artificial intelligence (AI) techniques built around this core automates the high...

Topics: DTIC Archive, COLORADO UNIV AT BOULDER DEPT OF COMPUTER SCIENCE, *COMPUTER LOGIC, *ARTIFICIAL...

Proof-carrying code (PCC) and certifying model checking (CMC) are two established paradigms for obtaining objective confidence in the runtime behavior of a program. PCC enables the certification of low-level binary code against relatively simple (e.g., memory-safety) policies. In contrast, CMC provides a way to certify a richer class of temporal logic policies, but is typically restricted to high-level (e.g., source) code. In this report, an approach is presented to certify binary code against...

Topics: DTIC Archive, Chaki, Sagar, CARNEGIE-MELLON UNIV PITTSBURGH PA SOFTWARE ENGINEERING INST, *COMPUTER...

The results of a four year research program in nonlinear real-time optical signal processing are described. The goal of the program was to extend fast parallel nonlinear operations to optical processing systems with large time-bandwidth and space-bandwidth products. Real-time homomorphic and logarithmic filtering by halfonte nonlinear processing has been achieved. A detailed analysis of degradation due to the finite gamma and other non-ideal effects of the recording medium has been completed...

Topics: DTIC Archive, Sawchuk,A A, UNIVERSITY OF SOUTHERN CALIFORNIA LOS ANGELES IMAGE PROCESSING INST,...

We have developed a tool for design of relational databases, including schemas, integrity constraints, reports, and data entry forms, using semantic binary schemas. The tool is based on a top-down methodology. In this methodology, a conceptual description of an enterprise is designed using a semantic binary model. Then, this description is converted into the relational database design. The tool automates virtually all the busy work of design. With respect to the intelligent design decisions,...

Topics: DTIC Archive, Rishe, Naphtali, FLORIDA INTERNATIONAL UNIV MIAMI SCHOOL OF COMPUTER SCIENCE, *DATA...