{"id":"https://openalex.org/W2052192331","doi":"https://doi.org/10.1109/mc.1987.1663507","title":"The Architecture of Lisp Machines","display_name":"The Architecture of Lisp Machines","publication_year":1987,"publication_date":"1987-03-01","ids":{"openalex":"https://openalex.org/W2052192331","doi":"https://doi.org/10.1109/mc.1987.1663507","mag":"2052192331"},"language":"en","primary_location":{"id":"doi:10.1109/mc.1987.1663507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mc.1987.1663507","pdf_url":null,"source":{"id":"https://openalex.org/S178916657","display_name":"Computer","issn_l":"0018-9162","issn":["0018-9162","1558-0814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5097534237","display_name":"Pleszkun","orcid":null},"institutions":[{"id":"https://openalex.org/I135310074","display_name":"University of Wisconsin\u2013Madison","ror":"https://ror.org/01y2jtd41","country_code":"US","type":"education","lineage":["https://openalex.org/I135310074"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Pleszkun","raw_affiliation_strings":["Computer Sciences Department, University of Wisconsin, Madison, WI, USA","University of Wisconsin \u2013,"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, University of Wisconsin, Madison, WI, USA","institution_ids":["https://openalex.org/I135310074"]},{"raw_affiliation_string":"University of Wisconsin \u2013,","institution_ids":["https://openalex.org/I135310074"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5097482742","display_name":"Thazhuthaveetil","orcid":null},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Thazhuthaveetil","raw_affiliation_strings":["Computer Sciences Department, Pennsylvania State University, Madison, WI, USA","[Computer Sciences Department, Pennsylvania State University, Madison, WI, USA]"],"affiliations":[{"raw_affiliation_string":"Computer Sciences Department, Pennsylvania State University, Madison, WI, USA","institution_ids":["https://openalex.org/I130769515"]},{"raw_affiliation_string":"[Computer Sciences Department, Pennsylvania State University, Madison, WI, USA]","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5097534237"],"corresponding_institution_ids":["https://openalex.org/I135310074"],"apc_list":null,"apc_paid":null,"fwci":7.0808,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.97715917,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"20","issue":"3","first_page":"35","last_page":"44"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10904","display_name":"Embedded Systems Design Techniques","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/lisp","display_name":"Lisp","score":0.9818903803825378},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.866223931312561},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.8060452342033386},{"id":"https://openalex.org/keywords/common-lisp","display_name":"Common Lisp","score":0.6161893010139465},{"id":"https://openalex.org/keywords/exception-handling","display_name":"Exception handling","score":0.5676700472831726},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5215339660644531},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3353908061981201}],"concepts":[{"id":"https://openalex.org/C190883126","wikidata":"https://www.wikidata.org/wiki/Q132874","display_name":"Lisp","level":2,"score":0.9818903803825378},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.866223931312561},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.8060452342033386},{"id":"https://openalex.org/C2779353305","wikidata":"https://www.wikidata.org/wiki/Q849146","display_name":"Common Lisp","level":3,"score":0.6161893010139465},{"id":"https://openalex.org/C145428669","wikidata":"https://www.wikidata.org/wiki/Q471748","display_name":"Exception handling","level":2,"score":0.5676700472831726},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5215339660644531},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3353908061981201}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mc.1987.1663507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mc.1987.1663507","pdf_url":null,"source":{"id":"https://openalex.org/S178916657","display_name":"Computer","issn_l":"0018-9162","issn":["0018-9162","1558-0814"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W74583650","https://openalex.org/W116377350","https://openalex.org/W150252431","https://openalex.org/W1867775734","https://openalex.org/W1986511746","https://openalex.org/W1993621349","https://openalex.org/W1999200130","https://openalex.org/W2019846432","https://openalex.org/W2038453501","https://openalex.org/W2043421451","https://openalex.org/W2045255985","https://openalex.org/W2048723607","https://openalex.org/W2051768962","https://openalex.org/W2057754561","https://openalex.org/W2062662828","https://openalex.org/W2063135609","https://openalex.org/W2077311811","https://openalex.org/W2093092438","https://openalex.org/W2127007340","https://openalex.org/W2128457015","https://openalex.org/W2130376240","https://openalex.org/W2161531345","https://openalex.org/W2169516259","https://openalex.org/W4231644456","https://openalex.org/W6604725150","https://openalex.org/W6606114407"],"related_works":["https://openalex.org/W638884614","https://openalex.org/W4293423273","https://openalex.org/W1465358289","https://openalex.org/W4244303744","https://openalex.org/W1840675755","https://openalex.org/W2341116552","https://openalex.org/W1978806596","https://openalex.org/W2607262752","https://openalex.org/W64118877","https://openalex.org/W1548358088"],"abstract_inverted_index":{"Lisp":[0,40,79,127,146,166,179,196],"has":[1,13,29],"been":[2],"a":[3,72,92,178,192],"popular":[4],"programming":[5],"language":[6,17],"for":[7,35,49,86,95],"well":[8],"over":[9],"20":[10],"years":[11],"and":[12,41,53,76,83,106,110,116,147,181,204],"become":[14],"the":[15,36,59,96,138,148,156,158,171,174,195,202,206],"premier":[16],"of":[18,39,99,177,194],"artificial":[19],"intelligence":[20],"research.":[21],"Recent":[22],"interest":[23,32],"in":[24,33,209],"fifth":[25],"generation":[26],"computer":[27],"systems":[28,34,68,120,131],"sparked":[30],"renewed":[31],"efficient":[37],"execution":[38],"Lisp-like":[42],"languages.":[43],"There":[44],"are":[45,121],"two":[46],"main":[47],"reasons":[48],"Lisp's":[50,55,215],"popularity:":[51],"extensibility":[52,56],"flexibility.":[54],"derives":[57],"from":[58],"capability":[60],"that":[61,198],"it":[62,91],"provides":[63],"to":[64,137,185,212,214],"build":[65],"powerful,":[66],"friendly":[67],"starting":[69],"with":[70],"just":[71],"few":[73],"basic":[74],"primitives":[75],"data":[77],"types.":[78],"is":[80],"dynamically":[81],"typed":[82],"ideally":[84],"suited":[85],"incremental":[87],"program":[88],"development,":[89],"making":[90],"good":[93,186],"choice":[94],"fast":[97],"prototyping":[98],"software":[100],"systems.":[101],"Several":[102],"current":[103],"symbolic":[104],"manipulation":[105],"algebraic":[107],"systems,":[108,113,115],"design":[109],"graphic":[111],"description":[112],"expert":[114],"other":[117],"heavily-used":[118],"non-numeric":[119],"also":[122],"based":[123],"on":[124,169],"an":[125],"underlying":[126],"system.":[128],"Typically,":[129],"these":[130,210],"do":[132],"not":[133],"run":[134],"efficiently":[135],"due":[136],"large":[139],"semantic":[140],"gap":[141],"between":[142],"list-manipulating":[143],"languages":[144],"like":[145],"conventional":[149],"von":[150],"Neumann":[151],"machine.":[152],"In":[153],"this":[154],"survey,":[155,203],"authors":[157,172,190],"author":[159],"discuss":[160],"what":[161],"takes":[162],"place":[163],"during":[164,201],"typical":[165],"execution.":[167],"Based":[168],"this,":[170],"enumerate":[173],"runtime":[175,216],"requirements":[176],"system":[180],"identify":[182],"potential":[183],"obstacles":[184],"machine":[187],"performance.":[188],"The":[189],"provide":[191],"classification":[193],"machines":[197,211],"theymore\u00a0\u00bb":[199],"encountered":[200],"examine":[205],"techniques":[207],"employed":[208],"cater":[213],"requirements.\u00ab\u00a0less":[217]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
