skip to main content
Skip header Section
The fifth generation: artificial intelligence and Japan's computer challenge to the worldNovember 1983
Publisher:
  • Addison-Wesley Longman Publishing Co., Inc.
  • 75 Arlington Street, Suite 300 Boston, MA
  • United States
ISBN:978-0-201-11519-2
Published:12 November 1983
Pages:
275
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Haigh T (2024). How the AI Boom Went Bust, Communications of the ACM, 67:2, (22-26), Online publication date: 1-Feb-2024.
  2. Zheng W, Yan L, Gou C and Wang F (2022). Computational knowledge vision: paradigmatic knowledge based prescriptive learning and reasoning for perception and vision, Artificial Intelligence Review, 55:8, (5917-5952), Online publication date: 1-Dec-2022.
  3. Myers J and Yamakoshi K (2021). The Japanese fifth generation computing project, Journal of Computing Sciences in Colleges, 36:2, (53-60), Online publication date: 1-Oct-2020.
  4. Con Diaz G (2019). From the Editor's Desk, IEEE Annals of the History of Computing, 41:4, (5-5), Online publication date: 1-Oct-2019.
  5. Shin Y (2019). The Spring of Artificial Intelligence in Its Global Winter, IEEE Annals of the History of Computing, 41:4, (71-82), Online publication date: 1-Oct-2019.
  6. Lu R, Jin X, Zhang S, Qiu M and Wu X (2019). A Study on Big Knowledge and Its Engineering Issues, IEEE Transactions on Knowledge and Data Engineering, 31:9, (1630-1644), Online publication date: 1-Sep-2019.
  7. Nesterov A (2019). On the Unification of the Conceptual Model of the Meta-Ontology, Scientific and Technical Information Processing, 46:1, (34-37), Online publication date: 1-Jan-2019.
  8. Berry P, Donneau-Golencer T, Duong K, Gervasio M, Peintner B and Yorke-Smith N (2017). Evaluating intelligent knowledge systems, Knowledge and Information Systems, 52:2, (379-409), Online publication date: 1-Aug-2017.
  9. Grier D (2017). The Yau Years: 1981-1984, Computer, 50:6, (10-11), Online publication date: 1-Jan-2017.
  10. Lu R (2016). A peep at knowledge science in a categorical prospect, Frontiers of Computer Science: Selected Publications from Chinese Universities, 10:5, (767-768), Online publication date: 1-Oct-2016.
  11. Rubin S, Bouabana-Tebibel T and Hoadjli Y (2016). On the empirical justification of theoretical heuristic transference and learning, Information Systems Frontiers, 18:5, (981-994), Online publication date: 1-Oct-2016.
  12. Sun W, Xiang L, Liu X and Zhao D A Novel Web Text Classification Model Based on SAS for e-commerce Revised Selected Papers of the Second International Conference on Human Centered Computing - Volume 9567, (919-924)
  13. Batzias F and Bountri A Adding fault tree analysis (FTA) into a knowledge Proceedings of the 11th WSEAS international conference on Artificial Intelligence, Knowledge Engineering and Data Bases, (101-106)
  14. ACM
    Gaines B Knowledge capture through the millennia Proceedings of the sixth international conference on Knowledge capture, (1-8)
  15. Grudin J (2011). Human-computer interaction, Annual Review of Information Science and Technology, 45:1, (367-430), Online publication date: 1-Jan-2011.
  16. Lu R Towards a software/knowware co-engineering Proceedings of the First international conference on Knowledge Science, Engineering and Management, (23-32)
  17. Lu R (2005). From Hardware to Software to Knowware, IEEE Intelligent Systems, 20:2, (82-85), Online publication date: 1-Mar-2005.
  18. Schwartz D (2003). From Open IS Semantics to the Semantic Web, IEEE Intelligent Systems, 18:3, (52-58), Online publication date: 1-May-2003.
  19. Johnston S and Imai K (1995). Parallel Processing in Japan, IEEE Computational Science & Engineering, 2:1, (32-41), Online publication date: 1-Mar-1995.
  20. ACM
    Davison A (1994). KL1 and the early days of the FGCS project, ACM SIGPLAN Notices, 29:7, (39-41), Online publication date: 1-Jul-1994.
  21. ACM
    Zysman S and Geiss G (1990). Mental hygiene practitioners' attitudes toward applying computers in health care, ACM SIGCAS Computers and Society, 20:3, (22-26), Online publication date: 1-Aug-1990.
  22. ACM
    Zysman S and Geiss G Mental hygiene practitioners' attitudes toward applying computers in health care Proceedings of the conference on Computers and the quality of life, (22-26)
  23. ACM
    Weitzel J and Kerschberg L (1989). Developing knowledge-based systems: reorganizing the system development life cycle, Communications of the ACM, 32:4, (482-488), Online publication date: 1-Apr-1989.
  24. ACM
    Chung H (1989). Empirical analysis of inductive knowledge acquisition methods, ACM SIGART Bulletin:108, (156-159), Online publication date: 1-Apr-1989.
  25. ACM
    Domanski B (1989). A PROLOG-based expert system for tuning MVS/XA, ACM SIGMETRICS Performance Evaluation Review, 16:2-4, (30-47), Online publication date: 1-Feb-1989.
  26. Unger J (1988). Review of "The fifth generation fallacy, Computational Linguistics, 14:4, (93-96), Online publication date: 1-Dec-1988.
  27. Mahoney M (1988). The History of Computing in the History of Technology, IEEE Annals of the History of Computing, 10:2, (113-125), Online publication date: 1-Apr-1988.
  28. ACM
    Sosnowski R (1987). Prolog dialects: a deja vu of BASICs, ACM SIGPLAN Notices, 22:6, (39-48), Online publication date: 1-Jun-1987.
  29. ACM
    Malone T, Yates J and Benjamin R (1987). Electronic markets and electronic hierarchies, Communications of the ACM, 30:6, (484-497), Online publication date: 1-Jun-1987.
  30. ACM
    Micco M An undergraduate curriculum in expert systems design or knowledge engineering Proceedings of the 15th annual conference on Computer Science, (36-39)
  31. Turn R Security and privacy requirements in computing Proceedings of 1986 ACM Fall joint computer conference, (1106-1114)
  32. Miura H, Imai M, Yamashita M and Ibaraki T Implemention of parallel Prolog on tree machines Proceedings of 1986 ACM Fall joint computer conference, (287-296)
  33. Stefik M (1986). The Next Knowledge Medium, AI Magazine, 7:1, (34-46), Online publication date: 1-Mar-1986.
  34. ACM
    Ashenhurst R (1985). ACM forum, Communications of the ACM, 28:11, (1117-1120), Online publication date: 1-Nov-1985.
  35. ACM
    Steir R (1985). Authors, Communications of the ACM, 28:8, (787-788), Online publication date: 1-Aug-1985.
  36. ACM
    Stefik M (1985). Strategic computing at DARPA: overview and assessment, Communications of the ACM, 28:7, (690-704), Online publication date: 1-Jul-1985.
  37. ACM
    King R and Nolen J A computer ethics course Proceedings of the sixteenth SIGCSE technical symposium on Computer science education, (99-104)
  38. ACM
    King R and Nolen J (1985). A computer ethics course, ACM SIGCSE Bulletin, 17:1, (99-104), Online publication date: 1-Mar-1985.
  39. ACM
    Grant J (1984). A course in applied logic, ACM SIGCSE Bulletin, 16:3, (26-28), Online publication date: 1-Sep-1984.
  40. ACM
    Olfman L (1984). Research issues in systems development prototyping, ACM SIGCPR Computer Personnel, 9:4, (6-16), Online publication date: 1-Aug-1984.
  41. ACM
    Flowers M and Dyer M Really arguing with your computer in natural language Proceedings of the July 9-12, 1984, national computer conference and exposition, (651-659)
  42. Doyle J (1984). Expert Systems Without Computers Or Theory and Trust in Artificial Intelligence, AI Magazine, 5:2, (59-63), Online publication date: 1-Jun-1984.
  43. Niwa K, Sasaki K and Ihara H (1984). An Experimental Comparison of Knowledge Representation Schemes, AI Magazine, 5:2, (29-36), Online publication date: 1-Jun-1984.
  44. Nilsson N (1983). Artificial Intelligence Prepares for 2001, AI Magazine, 4:4, (7-14), Online publication date: 1-Dec-1983.
  45. Stefik M, Bobrow D, Mittal S and Conway L (1983). KNOWLEDGE PROGRAMMING IN LOOPS, AI Magazine, 4:3, (3-13), Online publication date: 1-Sep-1983.
Contributors
  • Stanford University
  • Columbia University

Recommendations

John D. Sankey

This book has strong parallels to another by Servan-Schreiber [1]. Servan-Schreiber argued that France, even Europe, was doomed to lose its future unless its managers abandoned French norms to adopt the methods of the Harvard Business School, and its society abandoned European traditions in favor of an American style of education. Servan-Schreiber was wrong. Despite his own later personal involvement in French government, France refined existing social and governmental structures and, as we all know, has remained very much a power in world affairs. I recently saw several copies of his book, rejected in the 25 cents boxes outside a second-hand bookstore. The Fifth Generation, at heart, has a similar message. The traditions of the United States hide a potentially fatal weakness that will allow Japan to seize the future, unless America adopts Japanese methods, at least with regard to research into computer intelligence, and formally organizes a massive centralized AI program. It is not possible to discuss the book in detail without first dealing with these fundamental assumptions for, in my view, they are wrong on two counts. First, research is the study of what we do not understand, and we certainly do not at present understand how we understand, which is what AI is about. Research is done by thinking in a way that no one has before, a notion inherently antithetical to centralist direction. Second, as an outsider, it seems to me that the strength of the United States has always been in a seething mass of ideas backed up, not led, by the business strength of large corporations and government. Now, when the software business so easily provides financial rewards adequate for small peer-group business, seems the worst of all times to lose faith in the American way with ideas. I suggest that readers skip the polemics, and start with Part 3, on expert systems. As one might expect from these authors, they write with precision and clarity on the history of AI, and the structure and commercial possibilities of expert systems. In Part 4, they sketch the basic details of the plan of the Japanese institute directing the work, and present a very sympathetic view of the difficulties, both cultural and technical, that the Japanese themselves foresee. Their view of British plans, in Part 5, is considerably less sympathetic, and Russian possibilities are dismissed in a page. It is in Part 6, which details all the reasons why the United State is going to fail in AI, where I feel the authors have misjudged most the strength of their own society. It is not on the factory floors that AI will flourish. To a foreigner, to hear an American wailing that “we have no national vision to sustain us” seems inappropriate, when a third of all research is funded by one agency, the Pentagon. To claim, as the authors do, that the US is in a “dismal national tailspin” because children are not studying mathematics and physics any more, is reminiscent of the British belief that no one could govern without the guidance of the Odes of Pindar. Truly useful computer software, including AI, depends on neither. The authors' despair, over the distrust of many Americans of intellect, denies the evident fact that intellect is prized by the tiny peer-group businesses that are turning out some of the best software in the world. I suspect that this book, like Servan-Schreiber's, will end up in the 25 cents bin. The United States seems perfectly capable of solving AI problems in its own way, as are the French, of refining social and governmental structures to defend itself from crisis.

Oscar Firschein

“Generations” of computers have been counted as follows: (1) vacuum tube computers, (2) transistorized computers, (3) integrated circuit computers, and (4) Very Large Scale Integrated (VLSI) circuit computers. Knowledge information processing systems are considered to be the Fifth Generation. Japan's Fifth Generation project began three years ago, to much fanfare, with the setting up of the Institute for New Generation Computing Technology (ICOT) and a projected budget of 500 million dollars over a ten-year period. This book is a passionate warning about what will happen to the US if the importance of the Fifth Generation is ignored. The Japanese efforts at ICOT are used as the exemplar of what should be done. Feigenbaum and McCorduck are our modern day Isaiahs; like Old Testament prophets, afraid that the people will not listen, their voices are sometimes strident. The major parts of the book, with the catchy titles of the authors, are as follows: (1)The New Wealth of Nations: “Knowledge is power. Machines that can amplify human knowledge will amplify every dimension of power.” (2)It's Not Just the Second Computer Revolution—It's the Important One: “The computer, even in its early awkward, exasperating childhood, is changing our lives as we hoped, we knew, it would.” (3)Experts in Silicon: “Expert systems are agents of the second computer revolution.” This is a really good chapter describing expert systems to the lay person. (4)The Japanese Fifth Generation: “. . . the Japanese are the farthest ahead in perceiving where the new wealth of nations lies.” This section is an interesting one, first describing the Japanese Fifth Generation project and then examining myths about the Japanese. (5)The Nations: “. . . nobody can be unduly optimistic that the UK can reverse decades of bickering and carry out a coordinated national plan. . . . [T]he French, like the British, show that they understand where the future of their country's economic survival lies. Whether they can overcome the enervating arguments that seem to accompany almost any French undertaking remains to be seen.” (6)The American Response: “The Fifth Generation and what it represents compel us to confront an enduring theme in American life. It is anti-intellectu- alism. . . . [In contrast to the Japanese] we are currently betting that uncoordinated development of the information processing industry is a luxury we can still afford. . . . We [the authors] believe that Americans should mount a large-scale concentrated project of our own; that not only is it in the national interest to do so, but it is essential to the national defense.” (7)Epilogue, or It is Hard to Predict, Especially the Future: “. . . - reasoning machines will change things from how we know them in vastly unpredictable ways.” It is unfortunate that this book is being reviewed three years after publication since it is a call for immediate action. However, the late review provides an opportunity to examine what has happened in response to the Fifth Generation during this period. Datamation [1] reports that “Japan's fifth generation computer project moves into its ambitious middle phase with waning support from industry participants. . . . The budget of $20 million for fiscal 1985 is down 8.3 percent from 1984.” Rigas et al. [2] indicate that the tool-building phase is now complete at ICOT with the development of the Personal Sequential Inference (PSI) machine and a relational database machine known as the Delta machine. The main hope of this book, a National Center for Knowledge Technology, has not materialized. Instead, the major US efforts are those of the Defense Department's DARPA and the private-sector MCC, described below. There has also been an explosion of interest in the private sector as people find that a project incorporating the name “expert system” smells more sweetly to funding agencies than projects not so named. DARPA began the Strategic Computing Initiative (SCI) in late 1983, “to provide the United States with a broad line of machine intelligence technology and to demonstrate applications of the technology to critical problems in defense.” SCI was originally projects to be a $100 to $150 million/year project, but will be impacted by DoD budget cuts. SCI has a technology base development effort ranging from microelectronics to AI areas, such as expert systems, vision, and natural language, and culminating in three demonstration systems: an Autonomous Land Vehicle (ALV), a Pilot's Associate, and an Airland Battle Management System. The ALV is the farthest along, with the initial field test of the vehicle running autonomously on a paved road at 5 km/hr; this project was completed in the Fall of 1985. The Pilot's Associate project started in the Spring of 1986, and the Airland Battle Management project will begin shortly thereafter; see [3] for more details. The Microelectronics and Computer Technology Corp (MCC) was formed in 1983 by ten otherwise competing computer and semiconductor companies. (IBM is not part of MCC.) Davis [3] reports that three years later there are 21 companies, each of which pays one million dollars to join, along with yearly fees that support each research program in which it participates. The 1986 budget is about $65 million. MCC's work will not culminate in a specific Fifth Generation computer. Rather, it will advance computer technology to prototypes, and it is up to the shareholders to convert this into marketable products. The chairman, Bob R. Inman, sounds very much like Feigenbaum and McCorduck when he says, “In the 1990's we aren't talking about a computer industry, or a semiconductor industry, or a telecommunications industry. We're talking about an information-handling industry.” Fischetti [4] reports on the European work in AI, including multinational efforts such as the European Economic Community's ESPRIT and national efforts such as the French-initiated Eureka technology advancement program. Much of the work involves expert systems. The British Alvey program launched in 1983 projected a five-year, $500 million budget. So, in retrospect, it appears that the world is now moving in a direction desired by the authors: Attention has indeed been paid to the importance of the Fifth Generation. In the US, the DARPA and the MCC programs provide the only significant coordinated efforts, with private industry efforts being carried out the way the authors predicted: “a lot of short-term . . . research and development, spurred by nothing but immediate market considerations." One doesn't often find passion and commitment in the computing literature. (Besides the present book, only Weizenbaum [5] and Papert [6] come to mind.) The authors feel strongly about the dangers of ignoring the Fifth Generation and do their best to warn us, sometimes using Time/Newsweek-like prose for dramatic effect. Except for the third part, which describes expert systems, the book is more concerned with political, economic, and social issues than with technical exposition. Much of the rhetoric concerning the potential of expert systems should not be interpreted as scientifically based evaluation. Thus, the reader can expect to encounter fanciful gems such as, “. . . who can say how universal access to machine intelligence—faster, deeper, better than human intelligence—will change science, economics, and warfare, and the whole intellectual and sociological development of mankind__ __”

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.