Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!

2024 Participants: Hannah Ackermans * Sara Alsherif * Leonardo Aranda * Brian Arechiga * Jonathan Armoza * Stephanie E. August * Martin Bartelmus * Patsy Baudoin * Liat Berdugo * David Berry * Jason Boyd * Kevin Brock * Evan Buswell * Claire Carroll * John Cayley * Slavica Ceperkovic * Edmond Chang * Sarah Ciston * Lyr Colin * Daniel Cox * Christina Cuneo * Orla Delaney * Pierre Depaz * Ranjodh Singh Dhaliwal * Koundinya Dhulipalla * Samuel DiBella * Craig Dietrich * Quinn Dombrowski * Kevin Driscoll * Lai-Tze Fan * Max Feinstein * Meredith Finkelstein * Leonardo Flores * Cyril Focht * Gwen Foo * Federica Frabetti * Jordan Freitas * Erika FülöP * Sam Goree * Gulsen Guler * Anthony Hay * SHAWNÉ MICHAELAIN HOLLOWAY * Brendan Howell * Minh Hua * Amira Jarmakani * Dennis Jerz * Joey Jones * Ted Kafala * Titaÿna Kauffmann-Will * Darius Kazemi * andrea kim * Joey King * Ryan Leach * cynthia li * Judy Malloy * Zachary Mann * Marian Mazzone * Chris McGuinness * Yasemin Melek * Pablo Miranda Carranza * Jarah Moesch * Matt Nish-Lapidus * Yoehan Oh * Steven Oscherwitz * Stefano Penge * Marta Pérez-Campos * Jan-Christian Petersen * gripp prime * Rita Raley * Nicholas Raphael * Arpita Rathod * Amit Ray * Thorsten Ries * Abby Rinaldi * Mark Sample * Valérie Schafer * Carly Schnitzler * Arthur Schwarz * Lyle Skains * Rory Solomon * Winnie Soon * Harlin/Hayley Steele * Marylyn Tan * Daniel Temkin * Murielle Sandra Tiako Djomatchoua * Anna Tito * Introna Tommie * Fereshteh Toosi * Paige Treebridge * Lee Tusman * Joris J.van Zundert * Annette Vee * Dan Verständig * Yohanna Waliya * Shu Wan * Peggy WEIL * Jacque Wernimont * Katherine Yang * Zach Whalen * Elea Zhong * TengChao Zhou
CCSWG 2024 is coordinated by Lyr Colin (USC), Andrea Kim (USC), Elea Zhong (USC), Zachary Mann (USC), Jeremy Douglass (UCSB), and Mark C. Marino (USC) . Sponsored by the Humanities and Critical Code Studies Lab (USC), and the Digital Arts and Humanities Commons (UCSB).

[Code Critique] What does the original ELIZA code offer us.

ELIZA was developed in 1966 using the MAD computer programming language and the SLIP Application Programming Interface (API). The ELIZA code has several parts to it in execution;

  • ELIZA is the control program. It has an editor for interactive editing of a script, and it has the control program for interacting with a user.
  • SLIP is an API which provides functionality suitable for a graph, i.e., a recursive structure modeled as a list.
  • A script is a piece of data which assumes a persona when interacting with a person. That is, ELIZA uses the script as data when analyzing (disassembly) user input and generating output (assembly).

Using current standards, the code is simply awful. However looking at code at that time it is a wonder. Going back to this time we see that programs, languages, compilers, and data were all developed with a particular computer in mind. In the general sense, nothing was portable between computers or between operating systems, on the same or different computers. Portability often consisted of a rewrite, sometimes in the same computer language, often in another.

There was no need to construct some general API because programs were stand-alone creatures. A generalized API would serve no purpose, and in addition, other developers on the same computer using the same operating were typically unaware of some generalized interface and would probably not use one if aware. SLIP was a departure. It was a generalized API used, and rewritten, for multiple computers and in multiple languages. Although different implementations were different, the general functionality of the original SLIP was preserved. This was an innovation.

The concept of a a computer storing (and executing) a program from memory was relatively new. The idea that a program was a 'dumb' calculator that used data as its preemptive force was novel. The ELIZA control logic is the 'dumb' program. It has no mechanism for dealing with user input other than that provided by it's data, the script. Using a piece of data to define the interactive, or non-interactive, execution of a program was novel. Programs at that time were stand-alone creatures which had an internal state which controlled behavior, not externally supplied data.

So, why was the code awful (by current standards)? Except for the MAD conditional (WHENEVER, OR WHENEVER, OTHERWISE, END WHENEVER) the concept of a block does not exist. Idealization of code into code 'blocks' is absent, instead, if you wanted to execute some piece of code within a function, you branched to it (TRANSFER(. And much like FORTRAN at this time, ELIZA contains an uncontrolled collection of branches. This makes the understanding of what is happening problematical, and for us here and now, very difficult. Modern computer science understands this, and advises against just these constructs.

So, what makes this code worthwhile? Other than the novelty of using input data to drive program language, the entire ELIZA program is about 420 lines long. It created and impact when written; it had an impact after it was written; it remains with an impact now. How could such a small program have such a large influence? And that makes it worthwhile as a subject of investigation. It can be looked at with respect to historical computer science; it can be looked at to see if there are any societal interests contained as part of its program - it's program style.

The attachment has the original ELIZA program written in MAD and commented on by Anthony Hay. Note that MAD is not a free-form language. On a punched card, columns 1 - 7 is reserved for a label, column 8 is reserved for a comment 'R' or a continuation mark, and columns 73 - 80 are typically used to contain a card number, the compiler ignores them.

Comments

  • Great @aschwarz Though its lengthy, I'm going to just paste the commented code in here hopefully to speed along commentary:

    1. ELIZA Code annotation Sheet
    2. ;
    3. ; ELIZA by Joseph Weizenbaum.
    4. ;
    5. ; Any line beginning with a semicolon is commentary and was not part of
    6. ; the original ELIZA code. Each commentary block generally refers to the
    7. ; code just above it.
    8. ;
    9. CHANGE MAD
    10. EXTERNAL FUNCTION (KEY,MYTRAN) 000010
    11. NORMAL MODE IS INTEGER 000020
    12. ENTRY TO CHANGE. 000030
    13. LIST.(INPUT) 000040
    14. V'S G(1)=$TYPE$,$SUBST$,$APPEND$,$ADD$, 000050
    15. 1$START$,$RANK$,$DISPLA$ 000060
    16. V'S SNUMB = $ I3 *$ 000070
    17. FIT=0 000080
    18. CHANGE PRINT COMMENT $PLEASE INSTRUCT ME$ 001400
    19. LISTRD.(MTLIST.(INPUT),0) 001410
    20. JOB=POPTOP.(INPUT) 001420
    21. T'H IDENT, FOR J=1,1, J.G. 7 001430
    22. IDENT W'R G(J) .E. JOB, T'O THEMA 001440
    23. PRINT COMMENT $CHANGE NOT RECOGNIZED$ 001450
    24. T'O CHANGE 001460
    25. THEMA W'R J .E. 5, F'N IRALST.(INPUT) 001470
    26. W'R J .E. 7 001480
    27. T'H DISPLA, FOR I=0,1, I .G. 32 001490
    28. W'R LISTMT.(KEY(I)) .E. 0, T'O DISPLA 001500
    29. S=SEQRDR.(KEY(I)) 001510
    30. READ(7) NEXT=SEQLR.(S,F) 001520
    31. W'R F .G. 0, T'O DISPLA 001530
    32. PRINT COMMENT $*$ 001540
    33. TPRINT.(NEXT,0) 001550
    34. PRINT FORMAT SNUMB,I 001560
    35. PRINT COMENT $ $ 001570
    36. T'O READ(7) 001580
    37. DISPLA CONTINUE 001590
    38. PRINT COMMENT $ $ 001600
    39. PRINT COMMENT $MEMORY LIST FOLLOWS$ 001610
    40. PRINT COMMENT $ $ 001620
    41. T'H MEMLIST, FOR I=1 , 1, I .G. 4 001630
    42. MEMLST TXTPRT.(MYTRAN(I),0) 001640
    43. T'O CHANGE 001650
    44. E'L 001660
    45. THEME=POPTOP.(INPUT) 001670
    46. SUBJECT=KEY(HASH.(THEME,5)) 001680
    47. S=SEQRDR.(SUBJECT) 001690
    48. LOOK TERM=SEQLR.(S,F) 001700
    49. W'R F .G. 0, T'O FAIL 001710
    50. W'R TOP.(TERM) .E. THEME, T'O FOUND 001720
    51. T'O LOOK 001730
    52. FOUND T'O DELTA(J) 001740
    53. DELTA(1) TPRINT.(TERM,0) 001750
    54. T'O CHANGE 001760
    55. FAIL PRINT COMMENT $LIST NOT FOUND$ 001770
    56. T'O CHANGE 001780
    57. DELTA(2) S=SEQRDR.(TERM) 001790
    58. OLD=POPTOP.(INPUT) 001800
    59. READ(1) OBJCT=SEQLR.(S,F) 001810
    60. W'R F .G. 0, T'O FAIL 001820
    61. W'R F .NE. 0, T'O READ(1) 001830
    62. INSIDE=SEQRDR.(OBJECT) 001840
    63. READ(2) IT=SEQLR.(INSIDE,F) 001850
    64. W'R F .G. 0, T'O READ(1) 001860
    65. SIT=SEQRDR.(IT) 001870
    66. SOLD=SEQRDR.(OLD) 001880
    67. ITOLD TOLD=SEQLR.(SOLD,FOLD) 001890
    68. DIT=SEQLR.(SIT,FIT) 001900
    69. W'R TOLD .E. DIT .AND. FOLD .LE. 0,T'O ITOLD 001910
    70. W'R FOLD .G. 0, T'O OK(J) 001920
    71. T'O READ(2) 001930
    72. OK(2) SUBST.(POPTOP.(INPUT),LSPNTR.(INSIDE)) 001940
    73. T'O CHANGE 001950
    74. OK(3) NEWBOT.(POPTOP.(INPUT),OBJCT) 001960
    75. T'O CHANGE 001970
    76. DELTA(3) T'O DELTA(2) 001980
    77. DELTA(4) W'R NAMTST.(BOT.(TERM)) .E. 0 001990
    78. BOTTOM=POPBOT.(TERM) 002000
    79. NEWBOT.(POPTOP.(INPUT),TERM) 002010
    80. NEWBOT.(BOTTOM,TERM) 002020
    81. O'E 002030
    82. NEWBOT.(POPTOP.(INPUT),TERM) 002040
    83. E'L 002050
    84. T'O CHANGE 002060
    85. DELTA(6) S=SEQRDR.(TERM) 002070
    86. READ(6) OBJCT=SEQLR.(S,F) 002080
    87. W'R F .G. 0, T'O FAIL 002090
    88. W'R F .NE. 0, T'O READ(6) 002100
    89. OBJCT=SEQLL.(S,F) 002110
    90. W'R LNKLL.(OBJECT) .E. 0 002120
    91. SUBST.(POPTOP.(INPUT),LSPNTR.(S)) 002130
    92. O'E 002140
    93. NEWTOP.(POPTOP.(INPUT),LSPNTR.(S)) 002150
    94. E'L 002160
    95. T'O CHANGE 002170
    96. R* * * * * * * * * * END OF MODIFICATION ROUTINE 002180
    97. E'N 002200
    98. TPRINT MAD
    99. EXTERNAL FUNCTION (LST) 000010
    100. NORMAL MODE IS INTEGER 000020
    101. ENTRY TO TPRINT. 000030
    102. SA=SEQRDR.(LST) 000040
    103. LIST.(OUT) 000050
    104. READ NEXT=SEQLR.(SA,FA) 000060
    105. W'R FA .G. 0, T'O P 000070
    106. W'R FA .E. 0, T'O B 000080
    107. POINT=NEWBOT.(NEXT,OUT) 000100
    108. W'R SA .L. 0, MRKNEG.(POINT) 000110
    109. T'O READ 000120
    110. B TXTPRT.(OUT,0) 000130
    111. SEQLL.(SA,FA) 000140
    112. MORE NEXT=SEQLR.(SA,FA) 000150
    113. W'R TOP.(NEXT) .E. $=$ 000160
    114. TXTPRT.(NEXT,0) 000170
    115. T'O MORE 000180
    116. E'L 000190
    117. W'R FA .G. 0, T'O DONE 000200
    118. PRINT COMMENT $ $ 000210
    119. SB=SEQRDR.(NEXT) 000220
    120. MEHR TERM=SEQLR.(SB,FB) 000230
    121. W'R FB .L.0 000240
    122. PRINT ON LINE FORMAT NUMBER, TERM 000250
    123. V'S NUMBER = $I3 *$ 000260
    124. T'O MEHR 000270
    125. E'L 000280
    126. W'R FB .G. 0, T'O MORE 000290
    127. TXTPRT.(TERM,0) 000300
    128. T'O MEHR 000310
    129. P TXTPRT.(OUT,0) 000320
    130. DONE IRALST.(OUT) 000330
    131. F'N 000340
    132. E'N 000350
    133. LPRINT MAD
    134. EXTERNAL FUNCTION (LST,TAPE) 006340
    135. NORMAL MODE IS INTEGER 006350
    136. ENTRY TO LPRINT. 006360
    137. BLANK = $ $ 006370
    138. EXECUTE PLACE.(TAPE,0) 006380
    139. LEFTP = 606074606060K 006390
    140. RIGHTP= 606034606060K 006400
    141. BOTH = 607460603460K 006410
    142. EXECUTE NEWTOP.(SEQRDR.(LST),LIST.(STACK)) 006420
    143. S=POPTOP.(STACK) 006430
    144. BEGIN EXECUTE PLACE.(LEFTP,1) 006440
    145. NEXT WORD=SEQLR.(S,FLAG) 006450
    146. W'R FLAG .L. 0 006460
    147. EXECUTE PLACE.(WORD,1) 006470
    148. W'R S .G. 0, PLACE.(BLANK,1) 006480
    149. T'O NEXT 006490
    150. OR W'R FLAG .G. 0 006500
    151. EXECUTE PLACE.(RIGHTP,1) 006510
    152. W'R LISTMT.(STACK) .E. 0, T'O DONE 006520
    153. S=POPTOP.(STACK) 006530
    154. T'O NEXT 006540
    155. OTHERWISE 006550
    156. W'R LISTMT.(WORD) .E. 0 006560
    157. EXECUTE PLACE.(BOTH,1) 006570
    158. T'O NEXT 006580
    159. OTHERWISE 006590
    160. EXECUTE NEWTOP.(S,STACK) 006600
    161. S=SEQRDR.(WORD) 006610
    162. T'O BEGIN 006620
    163. E'L 006630
    164. E'L 006640
    165. DONE EXECUTE PLACE.(0,-1) 006650
    166. EXECUTE IRALST.(STACK) 006660
    167. FUNCTION RETURN LST 006670
    168. END OF FUNCTION 006680
    169. ;
    170. ; TESTS(CAND, S) return a sequence reader if the keyword matches the user's
    171. ; input text, otherwise return 0.
    172. ;
    173. ; CAND is the keyword candidate transformation rule
    174. ; S is the sequence reader for the user INPUT text
    175. ;
    176. ; This function has 3 tasks
    177. ;
    178. ; 1. Test whether the whole candidate keyword matches the whole word
    179. ; in the user's input text.
    180. ; 2. If the words do match, make any keyword substitution specified
    181. ; in the candidate transformation rule.
    182. ; 3. Position the candidate reader past the substitution keyword, if any.
    183. ;
    184. ; SLIP packs 6 6-bit characters into each 36-bit IBM 7094 machine word.
    185. ; If a word has more than 6 characters it is continued into the next SLIP
    186. ; cell, with the first cell having its sign bit set. ???
    187. ;
    188. ; This code abstracts this full-word matching and has the side-effect
    189. ; of modifying the user's input text with the substitution word, if
    190. ; specified.
    191. ;
    192. TESTS MAD
    193. EXTERNAL FUNCTION(CAND,S) 000010
    194. NORMAL MODE IS INTEGER 000020
    195. DIMENSION FIRST(5),SECOND(5) 000030
    196. ENTRY TO TESTS. 000040
    197. STORE=S 000050
    198. READER=SEQRDR.(CAND) 000060
    199. T'H ONE, FOR I=0,1, I .G. 100 000070
    200. FIRST(I)=SEQLR.(READER,FR) 000080
    201. ONE W'R READER .G. 0, T'O ENDONE 000090
    202. ;
    203. ; Copy all 6-character chunks of the candidate keyword to the FIRST array.
    204. ;
    205. ; [As the loop termination condition is I .G. 100 (000070), this code will
    206. ; write past the end of the FIRST array if the keyword is longer than 36
    207. ; characters (because the first 36 characters will be copied to
    208. ; FIRST(0) .. FIRST(5), and any further characters will be written to
    209. ; machine words past FIRST(5)).]
    210. ;
    211. ENDONE SEQLL.(S,F) 000100
    212. T'H TWO, FOR J=0,1, J .G. 100 000110
    213. SECOND(J)=SEQLR.(S,F) 000120
    214. TWO W'R S .G. 0, T'O ENDTWO 000130
    215. ;
    216. ; Copy all 6-character chunks of the user input word to the SECOND array.
    217. ; [May write past the end of SECOND.]
    218. ;
    219. ENDTWO W'R I .NE. J, F'N 0 000140
    220. ;
    221. ; If the keyword in FIRST has a different number of 6-character chunks to
    222. ; the word in SECOND the two words cannot be the same, so return the value 0,
    223. ; signifying no match.
    224. ;
    225. ; W'R is an abbreviation of WHENEVER
    226. ; .NE. means not equal
    227. ; F'N is an abbreviation of FUNCTION RETURN
    228. ;
    229. T'H LOOK, FOR K=0,1, K.G. J 000150
    230. LOOK W'R FIRST(K) .NE. SECOND(K), F'N 0 000170
    231. ;
    232. ; Compare each 6-character chunk of the keyword with the corresponding chunk
    233. ; of the user input word. If any are different, return 0, signifying no match.
    234. ;
    235. EQL=SEQLR.(READER,FR) 000180
    236. W'R EQL .NE. $=$ 000190
    237. SEQLL.(READER,FR) 000200
    238. F'N READER 000210
    239. O'E 000220
    240. ;
    241. ; At this point we know that the keyword matches the user's word.
    242. ; Check whether the transformation rules specify a simple word substitution,
    243. ; signified by the presence of an "=".
    244. ;
    245. ; If it is not an "=", reposition the reader back before the element and
    246. ; return the reader, signifying a successful match.
    247. ;
    248. POINT=LNKL.(STORE) 000230
    249. T'H DELETE , FOR K=0,1, K .G. J 000240
    250. REMOVE.(LSPNTR.(STORE)) 000250
    251. DELETE SEQLR.(STORE,F) 000260
    252. INSRT NEW=SEQLR.(READER,FR) 000270
    253. POINT=NEWTOP.(NEW,POINT) 000280
    254. MRKNEG.(POINT) 000290
    255. W'R READER .L. 0, T'O INSRT 000300
    256. MRKPOS.(POINT) 000310
    257. F'N READER 000320
    258. E'L 000330
    259. E'N 000340
    260. ;
    261. ; An "=" was present in the transformation rule. E.g. a script
    262. ; transformation rule may begin
    263. ;
    264. ; (YOUR = MY
    265. ; ((0 MY 0)
    266. ; (WHY ARE YOU CONCERNED OVER MY 3)
    267. ; (WHAT ABOUT YOUR OWN 3)
    268. ; :
    269. ;
    270. ; Say at this point the keyword YOUR has been found in the user's input text
    271. ; and we know that in the transformation rule the keyword (YOUR) is followed
    272. ; by an "=". So we're now going to replace the YOUR in the input text with
    273. ; the word following the "=" in the transformation rule (MY, in this case).
    274. ;
    275. ; First delete all the 6-character chunks that comprise this word, then
    276. ; insert all the 6-character chunks that comprise the replacement word.
    277. ;
    278. ; Finally, return the reader, signifying a successful match.
    279. ;
    280. DOCBCD MAD
    281. EXTERNAL FUNCTION (A,B) 000010
    282. NORMAL MODE IS INTEGER 000020
    283. ENTRY TO FRBCD. 000030
    284. W'R LNKL.(A) .E. 0, T'O NUMBER 000040
    285. B=A 000050
    286. F'N 0 000060
    287. NUMBER K=A*262144 000070
    288. B=BCDIT.(K) 000080
    289. F'N 0 000090
    290. E'N 000100
  • [Continued

    1. ; ELIZA entry point.
    2. ;
    3. ELIZA MAD
    4. NORMAL MODE IS INTEGER 000010
    5. DIMENSION KEY(32),MYTRAN(4) 000020
    6. ;
    7. ; KEY - A hashmap used to record keywords.
    8. ; KEY(0)..KEY(31) is the keyword->transformation rule hashmap
    9. ; KEY(32) is the "NONE" transformation rule
    10. ;
    11. ; MYTRAN - A hashmap used to record the MEMORY rules.
    12. ; MYTRAN(1)..MYTRAN(4) contain the four MEMORY rules.
    13. ;
    14. ; A note on MAD arrays: DIMENSION D(N) allocates N+1 machine-words of
    15. ; core memory, which are accessed using indexes 0..N.
    16. ;
    17. INITAS.(0) 000030
    18. ;
    19. ; INITAS must be the first executable statement in any program using SLIP.
    20. ; Its purpose is to create the List of Available Space from all unused
    21. ; core memory. It does not require an argument, but here is given 0.
    22. ;
    23. PRINT COMMENT $WHICH SCRIPT DO YOU WISH TO PLAY$ 000060
    24. READ FORMAT SNUMB,SCRIPT 000070
    25. ;
    26. ; Display the message "WHICH SCRIPT DO YOU WISH TO PLAY".
    27. ;
    28. ; Note that the IBM 7090/7094 character set doesn't include a question
    29. ; mark glyph. Also $ is used to delimit character strings.
    30. ;
    31. ; SNUMB is the FORTRAN format string " I3 *", defined previously, which
    32. ; expects the user to enter up to 3 decimal digits. This number is assigned
    33. ; to the variable SCRIPT and will be used as the tape drive unit number
    34. ; where the ELIZA script is expected to reside.
    35. ;
    36. LIST.(TEST) 000080
    37. LIST.(INPUT) 000090
    38. LIST.(OUTPUT) 000100
    39. LIST.(JUNK) 000110
    40. ;
    41. ; Initialise four lists. These are:
    42. ; TEST - Used to store the parts of the user's text matching a
    43. ; decomposition rule.
    44. ; INPUT - During ELIZA startup the selected script is read into this list,
    45. ; one round-bracketed list at a time.
    46. ; During the conversation phase the text entered by the user is
    47. ; read into this list.
    48. ; OUTPUT - ELIZA's response sentence is constructed in this list.
    49. ; JUNK - A list used for temporary storage for several different purposes.
    50. ;
    51. LIMIT=1 000120
    52. ;
    53. ; When Weizenbaum talks in the January 1966 CACM paper of a "certain counting
    54. ; mechanism", it is this to which he is referring. LIMIT has the value 1..4,
    55. ; in order, and then restarts at 1. The value changes to the next in the
    56. ; sequence at each user input. More on LIMIT below.
    57. ;
    58. LSSCPY.(THREAD.(INPUT,SCRIPT),JUNK) 000130
    59. MTLIST.(INPUT) 000140
    60. ;
    61. ; The THREAD function reads text from the tape unit specified by the integer
    62. ; SCRIPT into the INPUT list. The LSSCPY function copies the first list in
    63. ; that INPUT to the list named JUNK.
    64. ;
    65. ; The first list in an ELIZA script must be the hello message, e.g.
    66. ; (HOW DO YOU DO. PLEASE TELL ME YOUR PROBLEM).)
    67. ;
    68. T'H MLST, FOR I=1,1, I .G. 4 000150
    69. MLST LIST.(MYTRAN(I)) 000160
    70. ;
    71. ; Initialise each of the four MYTRAN array entries as a new list.
    72. ;
    73. ; T'H is an abbreviation for THROUGH
    74. ; .G. is the Boolean grater than operator
    75. ;
    76. ; Set I to 1, if I is greater than 4 stop looping, otherwise execute the code
    77. ; up to and including the statement labelled MLST. Then add 1 to I and return
    78. ; to the top of the loop at the point of the test to see if I is greater than
    79. ; 4 and repeat.
    80. ;
    81. ; for I in 1..4 {
    82. ; call function LIST with argument a reference
    83. ; to the Ith entry in the MYTRAN array
    84. ; }
    85. ;
    86. MINE=0 000170
    87. LIST.(MYLIST) 000180
    88. ;
    89. ; MINE - Set to 0 and is never changed. It's referenced once below. ???
    90. ; MYLIST - As memories are made using the MYTRAN MEMORY rules they are
    91. ; recorded in MYLIST. Here MYLIST is being initialised as a new
    92. ; empty list.
    93. ;
    94. T'H KEYLST, FOR I=0,1, I .G. 32 000220
    95. KEYLST LIST.(KEY(I)) 000230
    96. ;
    97. ; Initialise each of KEY(0) .. KEY(32) array entries as a new list.
    98. ; for I in 0..32 {
    99. ; call function LIST with argument a reference
    100. ; to the Ith entry in the KEY array
    101. ; }
    102. ;
    103. R* * * * * * * * * * READ NEW SCRIPT 000240
    104. BEGIN MTLIST.(INPUT) 000250
    105. NODLST.(INPUT) 000260
    106. LISTRD.(INPUT,SCRIPT) 000270
    107. ;
    108. ; Empty the INPUT list. Remove the description list??? from INPUT (NODLST).
    109. ; Read the next round-bracket-delimited list from tape unit id SCRIPT.
    110. ;
    111. W'R LISTMT.(INPUT) .E. 0 000280
    112. TXTPRT.(JUNK,0) 000290
    113. MTLIST.(JUNK) 000300
    114. T'O START 000310
    115. E'L 000320
    116. ;
    117. ; W'R is an abbreviation of WHENEVER.
    118. ; .E. means equals.
    119. ; T'O is an abbreviation for TRANSFER TO.
    120. ; E'L is an abbreviation of END OF CONDITIONAL.
    121. ;
    122. ; An empty list signals the end of the ELIZA script. (Which is presumably
    123. ; why there is () on the last line of the published DOCTOR script.)
    124. ;
    125. ; if INPUT is the empty list {
    126. ; (the whole ELIZA script has now been read and processed)
    127. ; print the value of JUNK, e.g. "HOW DO YOU DO. PLEASE TELL ME YOUR PROBLEM"
    128. ; clear the JUNK list
    129. ; goto the START label
    130. ; }
    131. ;
    132. W'R TOP.(INPUT) .E. $NONE$ 000330
    133. NEWTOP.(LSSCPY.(INPUT,LIST.(9)),KEY(32)) 000340
    134. T'O BEGIN 000350
    135. ;
    136. ; If this list is the special "NONE" list, just copy it unchanged into KEY(32)
    137. ; and then goto BEGIN to read the next list in the script.
    138. ;
    139. ; Recall that the NONE list in the DOCTOR script is:
    140. ; (NONE
    141. ; ((0)
    142. ; (I AM NOT SURE I UNDERSTAND YOU FULLY)
    143. ; (PLEASE GO ON)
    144. ; (WHAT DOES THAT SUGGEST TO YOU)
    145. ; (DO YOU FEEL STRONGLY ABOUT DISCUSSING SUCH THINGS)))
    146. ;
    147. OR W'R TOP.(INPUT) .E. $MEMORY$ 000360
    148. POPTOP.(INPUT) 000370
    149. MEMORY=POPTOP.(INPUT) 000380
    150. T'H MEM, FOR I=1,1, I .G. 4 000390
    151. MEM LSSCPY.(POPTOP.(INPUT),MYTRAN(I)) 000400
    152. T'O BEGIN 000410
    153. ;
    154. ; Otherwise, if this list is the special "MEMORY" list, process it into the
    155. ; four MYTRAN lists. Recall that the MEMORY list looks like this and is
    156. ; required to have exactly four transformation patterns:
    157. ; (MEMORY MY
    158. ; (0 YOUR 0 = LETS DISCUSS FURTHER WHY YOUR 3)
    159. ; (0 YOUR 0 = EARLIER YOU SAID YOUR 3)
    160. ; (0 YOUR 0 = BUT YOUR 3)
    161. ; (0 YOUR 0 = DOES THAT HAVE ANYTHING TO DO WITH THE FACT THAT YOUR 3))
    162. ;
    163. ; else if the first word in INPUT is "MEMORY" {
    164. ; assign the memory keyword (e.g. "MY") to the MEMORY variable
    165. ; for I in 1..4 {
    166. ; copy the Ith MEMORY pattern/reconstruction to MYTRAN(I)
    167. ; }
    168. ; goto the BEGIN label (continue reading the ELIZA script)
    169. ; }
    170. ;
    171. O'E 000420
    172. NEWBOT.(LSSCPY.(INPUT,LIST.(9)),KEY(HASH. 000430
    173. 1 (TOP.(INPUT),5))) 000440
    174. T'O BEGIN 000450
    175. E'L 000460
    176. ;
    177. ; Otherwise, the first word in the INPUT list is expected to be a keyword.
    178. ; Insert this keyword into the KEY hashtable, so that
    179. ; KEY(HASH(keyword)) -> list of transformation rules for keywords
    180. ; that hash to this entry in KEY (i.e. more than
    181. ; one keyword may hash to the same entry in KEY,
    182. ; so each entry in KEY may have zero, one or many
    183. ; keyword transformation rules associated with it.)
    184. ;
    185. ; (1 in column 11 signifies a continuation of the previous line.)
    186. ;
    187. ; The HASH function takes a word and a number (N) and returns a deterministic
    188. ; value between 0 and (2 to the power N)-1, in this case 0..31.
    189. ;
    190. ; else {
    191. ; HASH the keyword and append this transformation rule to the
    192. ; entry in KEY with that index
    193. ; goto the BEGIN label (continue reading the ELIZA script)
    194. ; }
    195. ;
    196. ; This is the end of the script reading code. When the script has been
    197. ; read and processed the script reader explicitly jumps to the START label
    198. ; to begin the user conversation.
    199. 002290
  • [cont.]

    1. ;
    2. R* * * * * * * * * * BEGIN MAJOR LOOP 000470
    3. START TREAD.(MTLIST.(INPUT),0) 000480
    4. ;
    5. ; Wait for the user to type a sentence and read it into the INPUT list,
    6. ; which is first cleared. Presumably, tape unit 0 is the console.
    7. ;
    8. ; TREAD is the SLIP system text read function.
    9. ;
    10. KEYWRD=0 000490
    11. PREDNC=0 000500
    12. ;
    13. ; KEYWRD - This will be the keyword found to have the highest precedence.
    14. ; PREDNC - The precedence of the keyword. Precedence is specified in the
    15. ; ELIZA script. E.g. (DREAMS = DREAM 3 (=DREAM)), the keyword
    16. ; DREAMS is given the precedence value 3.
    17. ;
    18. LIMIT=LIMIT+1 000510
    19. W'R LIMIT .E. 5, LIMIT=1 000520
    20. ;
    21. ; Increment the value of LIMIT. If it then equals 5, set it back to 1.
    22. ; If we just read the very first user input, LIMIT will now have the value 2.
    23. ;
    24. W'R LISTMT.(INPUT) .E. 0, T'O ENDPLA 000530
    25. ;
    26. ; If the user input is a blank line, goto the ENDPLA label.
    27. ; A blank user input tells ELIZA the conversation is over.
    28. ;
    29. IT=0 000540
    30. ;
    31. ; IT - On exit from the scanning loop IT will either be the sequence
    32. ; reader for the selected transformation rule, or it will be 0
    33. ; indicating that no keyword was detected in the user's INPUT.
    34. ;
    35. W'R TOP.(INPUT) .E. $+$ 000550
    36. CHANGE.(KEY,MYTRAN) 000560
    37. T'O START 000570
    38. E'L 000580
    39. ;
    40. ; If first word of the user input is a "+" character, call the CHANGE
    41. ; function defined higher up in this code. This function allows the user
    42. ; to modify the current ELIZA script with the commands TYPE, SUBST,
    43. ; APPEND, ADD, START, RANK and DISPLA.
    44. ; After making any changes, return to the START label and carry on the
    45. ; conversation.
    46. ;
    47. W'R TOP.(INPUT) .E. $*$, T'O NEWLST 000590
    48. ;
    49. ; If first word of the user input is a "*" character, goto the NEWLST label.
    50. ; NEWLST is defined later in this code. It inserts a new transformation rule,
    51. ; which the user will have given after the "*", into the current in-memory
    52. ; script and then returns to the START label to carry on the conversation.
    53. ;
    54. S=SEQRDR.(INPUT) 000600
    55. ;
    56. ; Create the Slip sequence reader, S, for the user's INPUT list.
    57. ;
    58. NOTYET W'R S .L. 0 000610
    59. SEQLR.(S,F) 000620
    60. T'O NOTYET 000630
    61. ;
    62. ; ???
    63. ;
    64. O'E 000640
    65. WORD=SEQLR.(S,F) 000650
    66. W'R WORD .E. $.$ .OR. WORD .E. $,$ .OR. WORD .E. $BUT$ 000660
    67. W'R IT .E. 0 000670
    68. NULSTL.(INPUT,LSPNTR.(S),JUNK) 000680
    69. MTLIST.(JUNK) 000690
    70. T'O NOTYET 000700
    71. O'E 000710
    72. NULSTR.(INPUT,LSPNTR.(S),JUNK) 000720
    73. MTLIST.(JUNK) 000730
    74. T'O ENDTXT 000740
    75. E'L 000750
    76. E'L 000760
    77. E'L 000770
    78. ;
    79. ; Set the variable WORD to the next word in the user's INPUT list. Then
    80. ; test that word to see if it's a delimiter.
    81. ;
    82. ; Note that in Weizenbaum's 1966 CACM paper, only comma and period were
    83. ; listed as delimiters. And yet the example conversation given in that
    84. ; paper could not be reproduced unless BUT is also a delimiter.
    85. ;
    86. ; Note that WORD is a 36-bit integer. Weizenbaum developed ELIZA between
    87. ; 1964 and 1966 on an IBM 7094, which has a 36-bit word and uses a 6-bit
    88. ; character encoding. Characters were packed 6 to a word. In Slip, character
    89. ; strings longer than six characters are stored in successive list cells.
    90. ; In this case WORD=SEQLR.(S,F) is assigning the first six characters of
    91. ; the next word in the user's INPUT text to the integer variable WORD.
    92. ; If the word had fewer than six characters they would be left justified
    93. ; with space characters padding to the right.
    94. ;
    95. ;
    96. ; else {
    97. ; if WORD is one of the delimiters ".", "," or "BUT" {
    98. ; if we have found no keywords in the INPUT so far (IT .E. 0) {
    99. ; discard all words in INPUT to the left of, and including, this
    100. ; delimiter
    101. ; goto NOTYET and continue scanning the rest of the user INPUT
    102. ; for keywords
    103. ; }
    104. ; else {
    105. ; discard all words in INPUT to the right of, and including, this
    106. ; delimiter
    107. ; goto ENDTXT; scanning of the user INPUT is now complete
    108. ; }
    109. ; }
    110. ; }
    111. ;
    112. W'R F .G. 0, T'O ENDTXT 000780
    113. ;
    114. ; If there were no more words to read in the user INPUT list, goto the
    115. ; ENDTXT label; scanning of the user INPUT is now complete.
    116. ; (F will be 1 when the sequence reader has traversed the whole INPUT
    117. ; list and is back at the list header.)
    118. ;
    119. I=HASH.(WORD,5) 000790
    120. SCANER=SEQRDR.(KEY(I)) 000800
    121. SF=0 000810
    122. T'H SEARCH, FOR J=0,0, SF .G. 0 000820
    123. CAND= SEQLR.(SCANER,SF) 000830
    124. W'R SF .G. 0, T'O NOTYET 000840
    125. SEARCH W'R TOP.(CAND) .E. WORD, T'O KEYFND 000850
    126. ;
    127. ; Is WORD a keyword? Try to locate it in the KEY hashmap.
    128. ;
    129. ; Recall that more than one keyword may hash to the same entry in KEY,
    130. ; so each entry in KEY is a list that may have zero, one or many keyword
    131. ; transformation rules associated with it. We need to look through this
    132. ; list to see if it contains a keyword that exactly matches WORD.
    133. ;
    134. ; HASH the WORD to get the index I in the KEY table where this word
    135. ; would have been stored, if it is a keyword
    136. ; loop {
    137. ; try to read the next candidate list from the hashmap entry KEY(I)
    138. ; if there isn't another candidate list {
    139. ; WORD didn't match any entries so it's not a keyword
    140. ; goto NOTYET to continue scanning the user's input text
    141. ; }
    142. ; if WORD is the same as the first entry in this candidate list {
    143. ; WORD is a keyword and CAND is the transformation rule for
    144. ; this keyword, so goto KEYFND
    145. ; }
    146. ; }
    147. ;
    148. KEYFND READER=TESTS.(CAND,S) 000860
    149. W'R READER .E. 0, T'O NOTYET 000870
    150. ;
    151. ; Call the TESTS function, defined higher up in this code.
    152. ;
    153. ; TESTS checks that the whole keyword matches the whole user INPUT word. It
    154. ; also performs any keyword substitution in the user INPUT. (e.g. (MY = YOUR))
    155. ;
    156. ; If TESTS returns 0 it means the keyword is not identical to the word in
    157. ; the user input, so goto NOTYET to continue scanning the user INPUT.
    158. ;
    159. ; [This suggests that keywords must differ in the first six characters.
    160. ; (Because TESTS is called only for the first keyword candidate in
    161. ; the KEY hashmap that matches the first six characters of the user's
    162. ; input word).]
    163. ;
    164. W'R LSTNAM.(CAND) .NE. 0 000880
    165. DL=LSTNAM.(CAND) 000890
    166. SEQ W'R S .L. 0 000900
    167. SEQLR.(S,F) 000910
    168. T'O SEQ 000920
    169. O'E 000930
    170. NEWTOP.(DL,LSPNTR.(S)) 000940
    171. E'L 000950
    172. O'E 000960
    173. E'L 000970
    174. ;
    175. ; ???
    176. ;
    177. NEXT=SEQLR.(READER,FR) 000980
    178. W'R FR .G. 0, T'O NOTYET 000990
    179. ;
    180. ; Read the next element in the rules associated with this keyword.
    181. ; If we are back at the rules header, the rules list was empty, so goto
    182. ; NOTYET to continue scanning the user INPUT.
    183. ;
    184. W'R IT .E. 0 .AND. FR .E. 0 001000
    185. PLCKEY IT=READER 001010
    186. KEYWRD=WORD 001020
    187. ;
    188. ; 001000 If this is the first keyword we've encountered in the user's INPUT
    189. ; (IT .E. 0), and the first entry in the associated rules is a list
    190. ; rather than a value (FR .E. 0)???, i.e. there is no precedence associated
    191. ; with this keyword, then record the associated rules reader in IT and
    192. ; the found keyword in KEYWRD. Then goto NOTYET (001100) to continue
    193. ; scanning the user's input.
    194. ;
    195. OR W'R FR .L. 0 .AND. NEXT .G. PREDNC 001030
    196. PREDNC=NEXT 001040
    197. NEXT=SEQLR.(READER,FR) 001050
    198. T'O PLCKEY 001060
    199. 0'E 001070
    200. T'O NOTYET 001080
    201. E'L 001090
    202. T'O NOTYET 001100
    203. R* * * * * * * * * * END OF MAJOR LOOP 001110
    204. ;
    205. ; 001030 Otherwise, if the first entry in the associated rules is a value???
    206. ; (FR .L. 0), i.e. the precedence of this keyword, and that value is greater
    207. ; than the precedence of the previously found highest precedence keyword
    208. ; (NEXT .G. PREDNC), then record the new highest precedence value in PREDNC
    209. ; and move the rule reader past the precedence value, then goto PLCKEY to
    210. ; also record the reader in IT and the found keyword in KEYWRD. Finally, goto
    211. ; NOTYET (001100) to continue scanning the user's input.
    212. ;
    213. ; Note that this differs from Weizenbaum's CACM paper, where it says that
    214. ; keywords of higher precedence are added to the top of a keyword stack and
    215. ; keywords of lower precedence are added to the bottom of this stack. This
    216. ; also means this code does not support the "NEWKEY" functionality he
    217. ; describes.
    218. ;
    219. ; [Note that this code implies that keywords in the script should never
    220. ; specify a precedence value of 0. If they do they would never be used
    221. ; (because NEXT .G. PREDNC will never be true).]
    222. ;
    223. ; 001080 Otherwise, ignore this keyword and return to NOTYET to continue
    224. ; scanning the user's INPUT.
    225. ;
    226. ENDTXT W'R IT .E. 0 001120
    227. W'R LIMIT .E. 4 .AND. LISTMT.(MYLIST) .NE. 0 001130
    228. OUT=POPTOP.(MYLIST) 001140
    229. TXTPRT.(OUT,0) 001150
    230. IRALST.(OUT) 001160
    231. T'O START 001170
    232. O'E 001180
    233. ES=BOT.(TOP.(KEY(32))) 001190
    234. T'O TRY 001200
    235. E'L 001210
    236. ;
    237. ; 001120 If IT is 0 it means we did not find any keywords in the user's
    238. ; input, so we cannot construct a response from the user's input combined
    239. ; with any of the transformation rules in the script.
    240. ;
    241. ; Instead we do one of two things: either print one of the memories we
    242. ; previously recorded in MYLIST, if any, or we use one of the messages
    243. ; from the NONE list (which is recorded in KEY(32)).
    244. ;
    245. ; 001130 This is the mysterious "when a certain counting mechanism is in a
    246. ; particular state": recall a memory only if the memory list (MYLIST) isn't
    247. ; empty and LIMIT happens to have the value 4.
    248. ;
    249. OR W'R KEYWRD .E. MEMORY 001220
    250. I=HASH.(BOT.(INPUT),2)+1 001230
    251. NEWBOT.(REGEL.(MYTRAN(I),INPUT,LIST.(MINE)),MYLIST) 001240
    252. SEQLL.(IT,FR) 001250
    253. T'O MATCH 001260
    254. ;
    255. ; Otherwise, we did find a keyword (IT .E. 0 is false). If the keyword is
    256. ; the MEMORY keyword ("MY" in the DOCTOR script), then add a new memory to
    257. ; MYLIST before we carry on processing the transformation rules associated
    258. ; with the matched keyword.
    259. ;
    260. ; In the 1966 CACM paper, Weizenbaum says the selection of one of the
    261. ; transformations on the MEMORY list is random. The code shows that the
    262. ; selection is determined by the HASH value of the last word in the user's
    263. ; input. This means ELIZA conversations are repeatable, not random. If we
    264. ; have the HASH algorithm we should be able to reproduce the exact
    265. ; conversation. (The HASH function is part of the SLIP system.)
    266. ;
    267. O'E 001270
    268. SEQLL.(IT,FR) 001280
    269. ;
    270. ; Otherwise, the keyword we found isn't the MEMORY keyword, so just position
    271. ; the transformation rule sequence reader past the keyword and fall through
    272. ; to the matching code.
    273. ;
    274. R* * * * * * * * * * MATCHING ROUTINE 001290
    275. MATCH ES=SEQLR.(IT,FR) 001300
    276. W'R TOP.(ES) .E. $=$ 001310
    277. S=SEQRDR.(ES) 001320
    278. SEQLR.(S,F) 001330
    279. WORD=SEQLR.(S,F) 001340
    280. I=HASH.(WORD,5) 001350
    281. SCANER=SEQRDR.(KEY(I)) 001360
    282. SCAN ITS=SEQLR.(SCANER,F) 001370
    283. W'R F .G. 0, T'O NOMATCH(LIMIT) 001380
    284. W'R WORD .E. TOP.(ITS) 001390
    285. S=SEQRDR.(ITS) 001400
    286. SCANI ES=SEQLR.(S,F) 001410
    287. W'R F .NE.0, T'O SCANI 001420
    288. IT=S 001430
    289. T'O TRY 001440
    290. O'E 001450
    291. T'O SCAN 001460
    292. E'L 001470
    293. E'L 001480
    294. W'R FR .G. 0, T'O NOMATCH(LIMIT) 001490
    295. ;
    296. ; If this keyword is a link to another keyword, switch to that keyword.
    297. ;
    298. ; An ELIZA script rule may have the form (HOW (=WHAT)). If the keyword
    299. ; HOW appears in the user's input and this transformation rule is selected,
    300. ; ELIZA will use the transformation rule associated with the keyword WHAT
    301. ; to generate its response.
    302. ;
    303. ; read the next decomposition rule from the selected transformation rule
    304. ; if the decomposition rule starts with an "=" symbol {
    305. ; assign the word after the "=" to WORD
    306. ; lookup WORD in the KEY hashmap
    307. ; if WORD doesn't exist in the KEY hashmap {
    308. ; (presumably this indicates a logical inconsistency in the script)
    309. ; goto one of the NOMATCH(1) .. NOMATCH(4) labels to print
    310. ; a message such as "HMMM" and back to the main conversation loop
    311. ; which NOMATCH label is selected is determined by the value LIMIT
    312. ; happens to have at this time
    313. ; }
    314. ; else {
    315. ; position IT at first decomposition rule for the linked keyword
    316. ; goto the TRY label to try to apply the decomposition rule
    317. ; }
    318. ; }
    319. ; else if there were no (or no more) decomposition rules (FR .G. 0) {
    320. ; (does this indicate an incorrectly formed script?)
    321. ; goto one of the NOMATCH(1) .. NOMATCH(4) labels
    322. ; }
    323. ;
    324. TRY W'R YMATCH.(TOP.(ES),INPUT,MTLIST.(TEST)) .E. 0,T'O MATCH 001500
    325. ;
    326. ; Attempt to match the current decomposition rule (TOP.(ES)) to the user's
    327. ; INPUT.
    328. ;
    329. ; If it doesn't match (YMATCH returns 0), goto MATCH to try the next
    330. ; decomposition rule in the current transformation rule set.
    331. ;
    332. ; If it does match, the list TEST will contain the decomposed matching parts
    333. ; of the INPUT text ready for reassembly. E.g. ???
    334. ;
    335. ; The YMATCH function is part of the SLIP system.
    336. ;
    337. ESRDR=SEQRDR.(ES) 001510
    338. SEQLR.(ESRDR,ESF) 001520
    339. POINT=SEQLR.(ESRDR,ESF) 001530
    340. POINTR=LSPNTR.(ESRDR) 001540
    341. W'R ESF .E. 0 001550
    342. NEWBOT.(1,POINTR) 001560
    343. TRANS=POINT 001570
    344. T'O HIT 001580
    345. O'E 001590
    346. T'H FNDHIT,FOR I=0,1, I .G. POINT 001600
    347. FNDHIT TRANS=SEQLR.(ESRDR,ESF) 001610
    348. W'R ESF .G. 0 001620
    349. SEQLR.(ESRDR,ESF) 001630
    350. SEQLR.(ESRDR,ESF) 001640
    351. TRANS=SEQLR.(ESRDR,ESF) 001650
    352. SUBST.(1,POINTR) 001660
    353. T'O HIT 001670
    354. 0'E 001680
    355. SUBST.(POINT+1,POINTR) 001690
    356. T'O HIT 001700
    357. E'L 001710
    358. E'L 001720
    359. ;
    360. ; Select one of the reassembly rules associated with this decomposition rule.
    361. ;
    362. ; Reassembly rules are used in turn. This code adds a counter (001560) to
    363. ; the rules and uses it to record which reassembly rule was used last (001690).
    364. ; When all reassembly rules have been used (001620) the counter is returned
    365. ; to 1 (001660) and the first rule is used again.
    366. ;
    367. HIT TXTPRT.(ASSMBL.(TRANS,TEST,MTLIST.(OUTPUT)),0) 001730
    368. T'O START 001740
    369. E'L 001750
    370. ;
    371. ; Finally, use the selected reassembly rule (TRANS) and list of decomposition
    372. ; parts (TEST) to assemble a response (in the list OUTPUT) and print it. Then
    373. ; goto the START label to await the next user input and continue the
    374. ; conversation.
    375. ;
    376. ; The ASSMBL function is part of the SLIP system.
    377. ;
    378. ; The E'L (END OF CONDITIONAL) on line 001750 closes the O'E (OTHERWISE)
    379. ; on line 001270. ???
    380. ;
    381. R* * * * * * * * * * INSERT NEW KEYWORD LIST 001760
    382. NEWLST POPTOP.(INPUT) 001770
    383. NEWBOT.(LSSCPY.(INPUT,LIST.(9)),KEY(HASH. 001780
    384. 1(TOP.(INPUT),5))) 001790
    385. T'O START 001800
    386. R* * * * * * * * * * DUMP REVISED SCRIPT 001810
    387. ENDPLA PRINT COMMENT $WHAT IS TO BE THE NUMBER OF THE NEW SCRIPT$ 001820
    388. READ FORMAT SNUMB,SCRIPT 001830
    389. LPRINT.(INPUT,SCRIPT) 001840
    390. NEWTOP.(MEMORY,MTLIST.(OUTPUT)) 001850
    391. NEWTOP.($MEMORY$,OUTPUT) 001860
    392. T'H DUMP, FOR I=1,1 I .G. 4 001870
    393. DUMP NEWBOT.(MYTRAN(I),OUTPUT) 001880
    394. LPRINT.(OUTPUT,SCRIPT) 001890
    395. MTLIST.(OUTPUT) 001900
    396. T'H WRITE, FOR I=0,1, I .G. 32 001910
    397. POPMOR W'R LISTMT.(KEY(I)) .E. 0, T'O WRITE 001920
    398. LPRINT.(POPTOP.(KEY(I)),SCRIPT) 001930
    399. T'O POPMOR 001940
    400. WRITE CONTINUE 001950
    401. LPRINT.(MTLIST.(INPUT),SCRIPT) 001960
    402. EXIT. 001970
    403. R* * * * * * * * * * SCRIPT ERROR EXIT 001980
    404. NOMATCH(1) PRINT COMMENT $PLEASE CONTINUE $ 002200
    405. T'O START 002210
    406. NOMATCH(2) PRINT COMMENT $HMMM $ 002220
    407. T'O START 002230
    408. NOMATCH(3) PRINT COMMENT $GO ON , PLEASE $ 002240
    409. T'O START 002250
    410. NOMATCH(4) PRINT COMMENT $I SEE $ 002260
    411. T'O START 002270
    412. VECTOR VALUES SNUMB= $I3 * $ 002280
    413. E'M
  • I think it's also useful to look at our project website: http://findingeliza.org. Click on "code" to see a slightly nicer formatting for the code and also you can try out a version of ELIZA.

  • This isn't an analysis of the code exactly, but one very interesting development in the history of Eliza happened ten years ago, nearly fifty years after ELIZA was released. Very, very few programs have had such enduring legacy.

    In 2014, @ElizaRBarr was created. This twitter bot, as you may have noticed from the name, was programmed to use ELIZA to come up with responses to tweets. But the novel application here was as a honeypot. You see, GamerGate was going on, which was largely a harassment campaign against several folks who were trying to bring feminist (and other) critiques against video games. One way in which this campaign played out was in endless arguments on Twitter. So, someone (I don't believe we ever found out who) decided that @ElizaRBarr would reply to people using the #gamergate hashtag. In this fashion, it was like a DDoS against the time and attention span of the harassers; every minute they'd talk to the bot would be a minute they would not be harassing a human.

    @ElizaRBarr was very successful in this endeavor, with some people engaging with it for hundreds of replies before realizing they'd been duped.

    I am wondering when ELIZA is going to pop up again.

  • Eliza has an enduring legacy; if gives the appearance of participating in a dialog, and it is fairly simple to code.

    The fascination lies in that people with no apparent effort, get 'trapped' into a dialog with a person, the Eliza Effect, and then pass this fascination on to others. The dialog becomes a game in which users communicate with others about their interactions. I wonder if the interaction is self-modifying. Whether users consciously avoid forcing Eliza into seeming to be a machine rather than a person. whether their is an avoidance of sentences and phrases which force the machine to act as a machine. This might be an interesting area to investigate.

    The other audience are the software developers who in their turn may be fascinated at both the dialog (with a 'person') and the simplicity of the code. A thought that they could create a 'person' simply. And the prospect of causing themselves and others to be fascinated at the end result.

  • Probably off topic: I asked Le Chat "Can I give you some computer code and you can explain what it does? I want a highly detailed explanation of each line" and then gave it this fragment of code from the SLIP library used by Weizenbaum for ELIZA:

    1. PARTN MAD
    2. EXTERNAL FUNCTION(SLST,PART,SIGNAL)
    3. NORMAL MODE IS INTEGER
    4. ENTRY TO PARTN.
    5. TAG=SIGNAL
    6. COUNT=0
    7. READER=SEQRDR.(SLST)
    8. READ COUNT=COUNT+1
    9. DATUM=SEQLR.(READER,FLAG)
    10. W'R FLAG .G. 0, T'O DONE
    11. W'R LNKL.(DATUM) .E. 0
    12. PART(COUNT) = DATUM
    13. T'O READ
    14. O'E
    15. W'R NAMLST.(DATUM) .NE. 0, T'O PLAIN
    16. W'R TOP.(DATUM) .NE. TAG, T'O PLAIN
    17. COUNT=COUNT-1
    18. LSSCPY.(DATUM,LIST.(IT))
    19. POPTOP.(IT)
    20. MAKEDL.(IT,PART(COUNT))
    21. IRALST.(IT)
    22. T'O READ
    23. PLAIN NEWBOT.(DATUM,LIST.(PART(COUNT)))
    24. ATTCH W'R READER .GE. 0, T'O READ
    25. LNKBOT.(SEQLR.(READER,FLAG),PART(COUNT))
    26. T'O ATTCH
    27. E'L
    28. DONE COUNT=COUNT-1
    29. PART(0)=COUNT
    30. F'N COUNT
    31. E'N

    and this is what it gave me:

    This code appears to be written in MAD (Michigan Algorithm Decoder), which is an old programming language used mainly for list processing on IBM mainframe systems. I'll provide a detailed explanation of each line:

    1. PARTN - This is the name of the MAD program (PARTition Nodes).
    2. MAD - This indicates that the code is written in the MAD programming language.
    3. EXTERNAL FUNCTION(SLST,PART,SIGNAL) - This line declares an external function with three parameters: SLST (a list), PART (an array), and SIGNAL (a value used as a tag).
    4. NORMAL MODE IS INTEGER - This line sets the normal mode for the program to be integer, which means that the program will primarily work with integer values.
    5. ENTRY TO PARTN. - This line defines the entry point for the program, which is PARTN.
    6. TAG=SIGNAL - This line assigns the value of the SIGNAL parameter to the variable TAG.
    7. COUNT=0 - This line initializes the variable COUNT to 0.
    8. READER=SEQRDR.(SLST) - This line initializes the variable READER with the value returned by the SEQRDR function, which takes the SLST parameter as input. SEQRDR likely returns a sequential reader for the list.
    9. READ - This is a label used for branching within the program.
    10. COUNT=COUNT+1 - This line increments the value of the COUNT variable by 1.
    11. DATUM=SEQLR.(READER,FLAG) - This line assigns the value returned by the SEQLR function to the variable DATUM. SEQLR likely reads an item from the list using the READER and stores the result in DATUM. The FLAG variable is used to indicate the status of the read operation.
    12. W'R FLAG .G. 0, T'O DONE - This line checks if the FLAG variable is greater than 0. If it is, the program branches to the DONE label.
    13. W'R LNKL.(DATUM) .E. 0 - This line checks if the left link of the DATUM is equal to 0. If it is, the program continues to the next line.
    14. PART(COUNT) = DATUM - This line assigns the DATUM value to the COUNT-th element of the PART array.
    15. T'O READ - This line branches to the READ label, creating a loop that continues reading and processing items from the list.
    16. O'E - This is the "otherwise" clause for the previous conditional statements, executed if none of the previous conditions were met.
    17. W'R NAMLST.(DATUM) .NE. 0, T'O PLAIN - This line checks if the NAMLST value associated with the DATUM is not equal to 0. If it is not equal to 0, the program branches to the PLAIN label.
    18. W'R TOP.(DATUM) .NE. TAG, T'O PLAIN - This line checks if the TOP value associated with the DATUM is not equal to the TAG. If it is not equal to the TAG, the program branches to the PLAIN label.
    19. COUNT=COUNT-1 - This line decrements the value of the COUNT variable by 1.
    20. LSSCPY.(DATUM,LIST.(IT)) - This line copies the contents of the DATUM to a new list item at the index specified by the IT variable.
    21. POPTOP.(IT) - This line removes the top item from the list specified by the IT variable.
    22. MAKEDL.(IT,PART(COUNT)) - This line creates a doubly-linked list with the IT variable as the first item and the COUNT-th element of the PART array as the second item.
    23. IRALST.(IT) - This line inserts the list specified by the IT variable into the main list.
    24. T'O READ - This line branches to the READ label, continuing the loop.
    25. PLAIN - This is a label used for branching within the program.
    26. NEWBOT.(DATUM,LIST.(PART(COUNT))) - This line creates a new bottom item for the list specified by the DATUM and links it to the list item specified by the COUNT-th element of the PART array.
    27. ATTCH - This is a label used for branching within the program.
    28. W'R READER .GE. 0, T'O READ - This line checks if the READER variable is greater than or equal to 0. If it is, the program branches to the READ label.
    29. LNKBOT.(SEQLR.(READER,FLAG),PART(COUNT)) - This line links the bottom item of the list specified by the READER to the COUNT-th element of the PART array.
    30. T'O ATTCH - This line branches to the ATTCH label, creating a loop that continues linking items in the list.
    31. E'L - This is the "end loop" statement, which terminates the loop.
    32. DONE - This is a label used for branching within the program.
    33. COUNT=COUNT-1 - This line decrements the value of the COUNT variable by 1.
    34. PART(0)=COUNT - This line assigns the value of the COUNT variable to the first element of the PART array.
    35. F'N COUNT - This line returns the value of the COUNT variable as the result of the function.
    36. E'N - This is the "end" statement, which signifies the end of the program.

    This MAD program appears to process a list, partitioning its nodes based on certain conditions and storing the results in the PART array. The specific functionality may depend on the exact implementation of the list and the associated functions used in the code.

    --

    It's really not bad. I think most statements are correct, but 23 is wrong: IRALST deletes the list IT. I asked it to give a high level summary of the function and it was pretty impressive, saying in part:

    In summary, the PARTN function partitions a given linked list into multiple sublists based on specific conditions and stores the resulting sublists in an array. The input parameters include the linked list to be partitioned, an array to store the partitioned sublists, and a tag value used for comparison during the partitioning process.

  • Please do take a look at our project website for more information about our work on ELIZA findingeliza.org

Sign In or Register to comment.