by Phil Moorby The Verilog Hardware Description Language has had an amazing impact on the mod em electronics industry, considering that the essential composition of the language was developed in a surprisingly s...
详细信息
ISBN:
(数字)9781461517139
ISBN:
(纸本)9780792375685;9781461356912
by Phil Moorby The Verilog Hardware Description Language has had an amazing impact on the mod em electronics industry, considering that the essential composition of the language was developed in a surprisingly short period of time, early in 1984. Since its introduc tion, Verilog has changed very little. Over time, users have requested many improve ments to meet new methodology needs. But, it is a complex and time consuming process to add features to a language without ambiguity, and maintaining consistency. A group of Verilog enthusiasts, the IEEE 1364 Verilog committee, have broken the Verilog feature doldrums. These individuals should be applauded. They invested the time and energy, often their personal time, to understand and resolve an extensive wish-list of language enhancements. They took on the task of choosing a feature set that would stand up to the scrutiny of the standardization process. I would like to per sonally thank this group. They have shown that it is possible to evolve Verilog, rather than having to completely start over with some revolutionary new language. The Verilog 1364-2001 standard provides many of the advanced building blocks that users have requested. The enhancements include key components for verification, abstract design, and other new methodology capabilities. As designers tackle advanced issues such as automated verification, system partitioning, etc., the Verilog standard will rise to meet the continuing challenge of electronics design.
丛书名:
The springerinternationalseries in engineering and computerscience
1000年
The general concept of information is here, for the first time, defined mathematically by adding one single axiom to the probability theory. This Mathematical Theory of Information is explored in fourteen chapters: 1....
详细信息
ISBN:
(数字)9781461509752
ISBN:
(纸本)9781402070648;9781461353324
The general concept of information is here, for the first time, defined mathematically by adding one single axiom to the probability theory. This Mathematical Theory of Information is explored in fourteen chapters: 1. Information can be measured in different units, in anything from bits to dollars. We will here argue that any measure is acceptable if it does not violate the Law of Diminishing Information. This law is supported by two independent arguments: one derived from the Bar-Hillel ideal receiver, the other is based on Shannon's noisy channel. The entropy in the 'classical information theory' is one of the measures conforming to the Law of Diminishing Information, but it has, however, properties such as being symmetric, which makes it unsuitable for some applications. The measure reliability is found to be a universal information measure. 2. For discrete and finite signals, the Law of Diminishing Information is defined mathematically, using probability theory and matrix algebra. 3. The Law of Diminishing Information is used as an axiom to derive essential properties of information. Byron's law: there is more information in a lie than in gibberish. Preservation: no information is lost in a reversible channel. Etc. The Mathematical Theory of Information supports colligation, i. e. the property to bind facts together making 'two plus two greater than four'. Colligation is a must when the information carries knowledge, or is a base for decisions. In such cases, reliability is always a useful information measure. Entropy does not allow colligation.
addresses issues in scheduling and management of resources in an interactive continuous-media (e.g., audio and video) server. The book emphasizes dynamic and run-time strategies for resource scheduling and manageme...
详细信息
ISBN:
(数字)9781461556350
ISBN:
(纸本)9780792383208;9781461375784
addresses issues in scheduling and management of resources in an interactive continuous-media (e.g., audio and video) server. The book emphasizes dynamic and run-time strategies for resource scheduling and management. Such strategies provide effective tools for supporting interactivity with on-line users who require the system to be responsive in serving their requests, and whose needs and actions vary frequently over time.;With an emphasis on responsiveness and transient performance, this book elaborates on dynamic strategies for managing and scheduling resources in Video-on-Demand/Multimedia systems. Unlike previous books, this volume presents an unprecedented detailed analysis of the start-up and departure of streams. It gives a comprehensive evaluation of various techniques as workloads are varied in multiple dimensions (including arrival rate, data rate and length of play).;collectively addresses multiple issues including QoS, throughput, responsiveness and efficiency. The solutions discussed in this volume are particularly valuable to practitioners who are building digital library, interactive multimedia and hypermedia servers.;is an excellent reference for researchers, practitioners and educators in the field of multimedia systems, and may be used for advanced courses on multimedia systems and Video-on-Demand servers.
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks...
详细信息
ISBN:
(数字)9780306470530
ISBN:
(纸本)9780792386759;9781475782837
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not deny later on that the document was signed by him/her. Cryptology addresses the above issues. It is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical of nature. This book serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First of all, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver have to share a secret key. Public key cryptosystems (the second main area) make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, like the factorization of large numbers. The remaining chapters cover a variety of topics, such as zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in great detail. One is on elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions). The other appendix gives a thorough introduction to finite fields and their algebraic structure.
Lo, soul! seest thou not God's purpose from the first? The earth to be spann'd, connected by net-work From Passage to India! Walt Whitman, "Leaves of Grass", 1900. The Internet is growing at a tremen...
详细信息
ISBN:
(数字)9781461516750
ISBN:
(纸本)9780792372813;9781461356721
Lo, soul! seest thou not God's purpose from the first? The earth to be spann'd, connected by net-work From Passage to India! Walt Whitman, "Leaves of Grass", 1900. The Internet is growing at a tremendous rate today. New services, such as telephony and multimedia, are being added to the pure data-delivery framework of yesterday. Such high demands on capacity could lead to a "bandwidth-crunch" at the core wide-area network resulting in degra dation of service quality. Fortunately, technological innovations have emerged which can provide relief to the end-user to overcome the In ternet's well-known delay and bandwidth limitations. At the physical layer, a major overhaul of existing networks has been envisaged from electronic media (such as twisted-pair and cable) to optical fibers - in the wide area, in the metropolitan area, and even in the local area set tings. In order to exploit the immense bandwidth potential of the optical fiber, interesting multiplexing techniques have been developed over the years. Wavelength division multiplexing (WDM) is such a promising tech nique in which multiple channels are operated along a single fiber si multaneously, each on a different wavelength. These channels can be independently modulated to accommodate dissimilar bit rates and data formats, if so desired. Thus, WDM carves up the huge bandwidth of an optical fiber into channels whose bandwidths (1-10 Gbps) are compati ble with peak electronic processing speed.
Machine Learning is one of the oldest and most intriguing areas of Ar tificial Intelligence. From the moment that computer visionaries first began to conceive the potential for general-purpose symbolic computa...
详细信息
ISBN:
(数字)9781461315490
ISBN:
(纸本)9780792391104;9781461288305
Machine Learning is one of the oldest and most intriguing areas of Ar tificial Intelligence. From the moment that computer visionaries first began to conceive the potential for general-purpose symbolic computa tion, the concept of a machine that could learn by itself has been an ever present goal. Today, although there have been many implemented com puter programs that can be said to learn, we are still far from achieving the lofty visions of self-organizing automata that spring to mind when we think of machine learning. We have established some base camps and scaled some of the foothills of this epic intellectual adventure, but we are still far from the lofty peaks that the imagination conjures up. Nevertheless, a solid foundation of theory and technique has begun to develop around a variety of specialized learning tasks. Such tasks in clude discovery of optimal or effective parameter settings for controlling processes, automatic acquisition or refinement of rules for controlling behavior in rule-driven systems, and automatic classification and di agnosis of items on the basis of their features. Contributions include algorithms for optimal parameter estimation, feedback and adaptation algorithms, strategies for credit/blame assignment, techniques for rule and category acquisition, theoretical results dealing with learnability of various classes by formal automata, and empirical investigations of the abilities of many different learning algorithms in a diversity of applica tion areas.
The area of personal and wireless communications is a burgeoning field. Technology advances and new frequency allocations for personal communication services (PCS) are creating numerous business and technical oppor...
详细信息
ISBN:
(数字)9781475723687
ISBN:
(纸本)9780792395553;9781441951526
The area of personal and wireless communications is a burgeoning field. Technology advances and new frequency allocations for personal communication services (PCS) are creating numerous business and technical opportunities. It is becoming clear that an essential requirement for exploiting opportunities is the ability to track the dramatic changes in wireless technology, which is a principal aim of this book.;places particular emphasis on the areas of signal processing, propagation and spread-spectrum, and emerging communication systems. This book contains new results on adaptive antennas for capacity improvements in wireless communication systems, as well as state-of-the-art information on the latest technical developments. Also included are several chapters which discuss the impact of defense conversion on the wireless industry, and related competitive issues.;The six parts of the book each focus on a distinct issue in wireless communications. Part I contains several tutorial chapters on key areas in wireless communications. The first chapter is on radio wave propagation for emerging wireless personal communication systems. Chapter two contains a comprehensive study of emerging DSP-based interference rejection techniques for single channel (antenna) systems. Chapter three deals with spread spectrum wireless communications, explaining the concept of spread spectrum, modeling techniques for spread spectrum, and current applications and research issues for spread spectrum systems. Part II focuses on digital signal processing and spread spectrum, two means of creating interference and multipath robust communications. Part III concerns propagation aspects of wireless communications. Part IV discusses the performance of emerging wireless systems. Part V describes the opportunities and pitfalls of defense conversion from the perspective of several U.S. defense firmsthat have successfully made the transition to commercial wireless. The final se
Widespread use of parallel processing will become a reality only if the process of porting applications to parallel computers can be largely automated. Usually it is straightforward for a user to determine how an appl...
详细信息
ISBN:
(数字)9781461315599
ISBN:
(纸本)9780792391227;9781461288350
Widespread use of parallel processing will become a reality only if the process of porting applications to parallel computers can be largely automated. Usually it is straightforward for a user to determine how an application can be mapped onto a parallel machine; however, the actual development of parallel code, if done by hand, is typically difficult and time consuming. Parallelizing compilers, which can gen erate parallel code automatically, are therefore a key technology for parallel processing. In this book, Ping-Sheng Tseng describes a parallelizing compiler for systolic arrays, called AL. Although parallelizing compilers are quite common for shared-memory parallel machines, the AL compiler is one of the first working parallelizing compilers for distributed memory machines, of which systolic arrays are a special case. The AL compiler takes advantage of the fine grain and high bandwidth interprocessor communication capabilities in a systolic architecture to generate efficient parallel code. xii Foreword While capable of handling an important class of applications, AL is not intended to be a general-purpose parallelizing compiler.
暂无评论