Arithmetic Transforms for Verifying Compositions of Sequential Datapaths

Size: px
Start display at page:

Download "Arithmetic Transforms for Verifying Compositions of Sequential Datapaths"

Transcription

1 Arithmetic Trasforms for Verifyig Compositios of Sequetial Datapaths Katarzya Radecka ad Zeljko Zilic McGill Uiversity, Motreal, Caada { ABSTRACT this paper, we address the issue of obtaiig compact caoical represetatios of datapath circuits with sequetial elemets, for the purpose of equivalece checkig. First, we demostrate the mechaisms for efficiet compositioal costructio of Arithmetic Trasform (AT), which is the uderlyig fuctio represetatio, used i moder word-level decisio diagrams. Secod, we itroduce a way of geeratig the caoical trasforms of the sequetial datapath circuits. Usig these priciples, we verib by AT highly sequetial Distributed Arithmetic (DA) architectures. 1. TRODUCTO Desig verificatio aims at providig a aswer to the questio: "Does the implemeted circuit coform to the specificatio?" Verificatios are ofte coducted through equivalece checkig. Uder this sceario, a caoical represetatio of the circuit is costructed ad compared agaist the descriptio obtaied from the specificatio. Origial equivalece checkig methods that relied o graph-based Biary Decisio Diagram represetatios were uable to deal with arithmetic circuits such as multipliers. However, efficiet word-level graphs like Biary Momet Diagrams (BMDs) [4] ad their geeralizatios [5] ca overcome this obstacle. Due to their word-level ature, the costructio from biary sigals is possible by backwards circuit traversal [6], but is geerally quite tedious. Further, sequetial circuits icludig arithmetic datapaths preset a obstacle to the efficiet represetatio. Related work i [9] partly overcomes these difficulties by usig uivariate realumber polyomial represetatios that ca deal with sequetial compoets. However, as oly real umbers ca be used i [9], represetatios are oly approximated. this paper we itroduce ew ways of geeratig the caoical descriptios of large datapath circuits. We propose techiques for compositioal verificatio of digital sigal processig (DSP) datapaths, cosistig of adders, multipliers, memories, etc., as i Figure 1. The goal of such verificatio is to assure correctess of the compositio of blocks. Blocks are either idividually verified, or iclude tellectual Property (P) cores that are oly give by their specificatios. Our method is based o Arithmetic Trasform (AT), which is a uderlyig represetatio used i word-level decisio diagrams, eablig the compact caoical descriptio of arithmetic circuits. The results are give i this paper i terms of AT, but also apply to graph represetatios. Sectio 3 we preset the extesios to AT that provide the cocise ad easily obtaiable descriptio of datapath arithmetic circuits, icludig sequetial oes. This allows us to develop the scheme for describig ad verifyig sequetial datapaths that have bee addressed maily with complex theorem provig or model checkig techiques [l], [7]. Sectio 5 we demostrate the efficiecy of our method at work o the example of highly sequetial Distributed Arithmetic (DA) circuits, that are well suited for field programmable gate array (FPGA) ad deep sub-micro circuit implemetatios. Figure 1 : A Datapath Example 2. ARTHMETC TRASFORM Arithmetic Trasform is a caoical polyomial represetatio of multi-output Boolea fuctios f : B" + B". To describe multi-output fuctios with a sigle polyomial, fuctio outputs are "grouped together" ito word-level (W) quatities, e.g. itegers, resultig i a pseudo-boolea fuctio f : B" W. Defiitio 1: Arithmetic Trasform (AT) of a pseudo- Boolea fuctio f : B" +W is a polyomial with arithmetic "+" operatio, word-level coefticiets c,,,~..,", biary iputs X,.., x ad biary expoets i,,...,i: that uiquely ad exactly iterpolatesf. The trasform coefficiet vector C = (c~,~~...~" } is obtaied by multiplyig the vector f of word-level fuctio /01$10.00 Q 2001 EEE 348

2 outputs with the trasform matrix T,,, C = T, * f, where T, is defied recursively by arithmetic Davio expasio: T, = [ 1, To =. (2) -',- T-1 To show that the polyomial with coefficiets geerated i this way recostructs exactly (iterpolates) a fuctio, ote that accordig to Equatio 1 AT is a liear polyomial i variables. For = 1, the coefficiets co ad C of a sigle-variable liear form f = co+clx are obtaied from cofactorsfo ad fl. By multiplyig the values with T, we get co=fo ad c =fi-fo, which is a more familiar form of Davio expasio. Matrix T, exteds this expasio recursively to -variable fuctios, oe variable at a time. Oce AT of a circuit implemetatio is geerated, the compariso to AT of the specificatio is straightforward. ts caoicity ad compact size for most arithmetic circuits, excludig the dividers, make AT very appropriate to use i equivalece checkig of datapaths. Further, the error correctig properties of AT facilitate its applicatio to verificatio by test vectors [8]. Hece, by usig AT, a cotiuum of verificatio methods ca be applied, icludig various combiatios of formal ad vector-based schemes. Additioally, as AT ca represet P core specificatios, verificatio of systems icludig proprietary P ca be performed as well. 2.1 Word Ecodig ad orm Fuctio AT accepts iputs as biary -tuples ad geerates outputs i the word-level form. A word-level ecodig is explicitly expressed by the umber orm fuctio 1: B" + W, which defies how a Boolea vector is iterpreted i the word-level domai. Table 1 cotais several commo iteger ad fractioal umber orms. Word umber orm 1x1 Usiged Sig Exteded 2's Complemet Lemma 1: Cosider a pseudo-boolea fuctio f:b"+w withaorm1 :B"+W.The, Wf 1 =f * Proof: By applyig the trasform to quatities i W, a iterpolatio polyomial is obtaied, such that for all iputs ATCf(xl, XZ.. x,)) = flxl, x2.... x,). 0 Example : AT of Multiplier. Let the iput bits to the usiged iteger multiplier be Xk ad Yk, k= 0,..., -1. ts AT is equal to the umber orm of the product: -1 AT(x*y)= xxk2k * zyk2k $X*y$X*y. + k=o k=o ote that the orm of the sum (product) of two umbers equals the sum (product) of their orms. Further, the orm of a arbitrary algebraic expressio is equal to the expressio applied to the orms of its compoets. 3. ARTHMETC TRASFORM EXTESOS We cosider the costructio of AT for the compositio of several blocks, Figure 2.a. To compose ATs of two blocks where the outputs of the first block are fed to the iputs of the secod oe, we must covert the word-level output of the first block ito a biary vector, Figure 2.b. The problem with this approach is that the biary ecodig has to be explicitly costructed at each iterface. o simple AT compositios are possible i this sceario. stead of usig the biary coversio, we propose the alterative solutio that allows the direct compositio of trasforms, as well as hadlig of sequetial circuits. To achieve these goals, we eed to itroduce two extesios to basic AT. - AT(B2(81(1))=? - a) AT of Block Compositio R =AT(Bl(l)) r T = RV S = AT(B20) c Table 1 : orm Fuctios for Commo Word Ecodigs Defiitio 2: Bialy ecodig (x,,x2...,x,) of a word w is the iverse ofthe orm fuctio, 1wl-l = (X, xq..., x, ). ote that there is o closed-form expressio for biary ecodig; istead, biary coversio algorithm must be applied to obtai w-'. Hece, there is o simple AT(1wl-l). Figure 2: aive Compositioal AT Costructio 3.1 First Extesio: Mixed Trasform Our first extesio facilitates the compositioal approach to represetig the complex datapaths. We allow the iputs to be a mix of biary, xi, ad word-level, wj, quatities, i.e., f(xl... x,,,w...wk). 349

3 Defiitio 3: Mixed AT (MAT) of fuctio J f : B" x W k + W is a polyomial with biary expoets il,... i ad el,... ek: that iterpolates$ We will use the MAT trasformatio whe some sets of iputs are kow to be word-level quatities, such as outputs of previous blocks. Lemma 2: The coeflciets of MAT ca be calculated usig the trasformatio give by Equatio 2, expaded aroud biary iput variables, with word-level iput variables uassiged, i.e., treated as symbols C(W,w2,-..wk)=T, * f. Pro03 Applicatio of the trasform to the quatities i B" results i a iterpolatio polyomial that, accordig to Lemma 1, is MAT(f(xl, x2,... x, W, w2,... wk)) = f( w1, w2,... wk)l. Assigig cocrete word-level values to uassiged word-level variables still preserves the orm fuctio, accordig to the orm properties. Hece, this trasform is equal to f which implies that the resultig MAT polyomial exactly iterpolates the fuctio. Example 2: MAT of MUX. A multiplexer (MUX) with iputs a, b ad the cotrol sigal x ca perform selectio of either bit- or word-level quatities a ad b. Arithmetic Davio expasio (Equatio 2) aroud variable x, leads to MAT(Mux) = a(1- x) + bx. This example also illustrates the use of MAT for a o-arithmetic fuctio. + MAT facilitates the compositio, by which the outputs of oe AT ca be directly used as iputs to MAT, Figure 3. For example, variables a ad b i Example 2 ca be give by ATs of previous blocks. To obtai the fial AT of the compositio, we eed to apply the followig coversio. r. -~ AT(B2(B1(1,),12)) MATB2) Proof: By usig orm of the quatities i W, we get a iterpolatio polyomial i biary iputs, with AT(f)= f. This is a correct ATU) accordig to Lemma 1. 0 Example 3: MAT of Adder. Cosider a usiged fractioal adder, where iput a is represeted at wordlevel, i.e., usiged fractioal, while iput b is treated as biary vector. The, by substitutig biary ecodig of a i the defiig MAT equatio, we obtai its AT as: MAT(a+b)=a+zbj2-' =z(a,+bj)2-' =AT(a+b). ote that "+" has the same meaig i AT ad MAT. To calculate AT of the whole combiatioal circuit, ATs should be geerated for each block fed by primary iputs, while MATS should be applied to all other blocks. The overall AT is created by substitutig AT trasforms for itermediate word-level quatities. 3.2 Secod Extesio: Sequetial Trasform To describe datapaths with sequetial compoets, we itroduce to MAT the otio of a timedfuctio. A timed fuctio A] represets the value off at the rh clock period. Defiitio 4: MAT Sequetial (MATS) is a MAT trasform MAT(f)[], of timed fuctio f at time istace. May datapath blocks are time ivariat. Hece, the timed trasform of arithmetic blocks will be exactly the same as the origial MAT trasform. The simplest role that the timed trasform plays is to represet the state iformatio kept i memory elemets. A defiig equatio for a memory is mour[] = mj,[- 1. Example 4: MATS of Add-Accumulate Loop. Cosider the additio i rh step, where oe of the summads is take from the primary iputs, while the other is supplied from the register storig the accumulated values of the previous -1 additios, Figure 4.a. Assume that the register has bee iitially reset. pdd dpaxulatelcq~ +,....-~-.... ' Figure 3: Use of MAT i Compositio of ATs V ail Lemma 3: AT(f) ca be obtaied from MAT of fuctio a) b) f : B" x Wk + W through the sytactical replacemets, Figure 4: Add- ad Multiply-Accumulate Loops word-level iput wi E is substituted by its To obtai MATS of the add-accumulate loop, cosider the biary ecodig -' : W + B", i.e., itermediate word-level fuctio A], represetig the iput to the register after additios. Assumig that the MAT( f (xi...,x,, wi -',..., wk -') = AT(f). free iput a[] is also a word-level quatity, the value of A] is give by the recurrece equatio: 350

4 f [] = ur] + f [- 13, f [O] = 0. The correspodig MATS is the: MATS( f )[] =a[] + MATS( f )[- 11, MATS( f )[O] = 0. After the rh additio, MATS of the add-ad-accumulate loop is obtaied as the followig solutio to the above recurrece equatio: = Ca[i]. + MATS (f>[] Lemma 4: MATS of a compositio of a combiatioal elemet described by fuctio f with sequetial blocks ca be obtaied from MATcf) by replacig each iput that is geerated by a sequetial block with its defiig MATS. Proof: Sice MAT describes the combiatioal fuctio of a block, with memory elemets discoected, the, by Defiitio 4, such a sytactical replacemet presets the correct fuctioality of the sequetial fuctio. 0 Corollary 1: MATS of sequetial fuctio f ca be obtaied from MAT of the combiatioal part off by replacig each MAT iput that is geerated by a memory elemet with its defiig MATS. Corollary 2: rf at least oe iput variable of combiatioal fuctio f is geerated by a sequetial block, the the trasform of the compositio, istead of MAT, eeds to be preseted as MATS:,,... wi..., w,)) = MAT( f (x,,... MATS(w,) MATS(( f ( x..., wk)) Lemma 5: MAT of a circuit at time istace ca be obtaied by solvig MATS as a recurrece equatio. Sequetial elemets eed to be iitialized. Proof: MATS represets the fuctio of a block at each time istace. By solvig the recurrece equatio, the circuit behavior at a give time istace is obtaied. Recurrece equatios describig sequetial elemets i datapaths posses forms that are easily solvable aalytically ad symbolically by tools such as Maple or Mathematica. Example 5: MATS of Multiply-ad-Accumulate (MAC) loop - a commo elemet of DSP datapaths. Cosider the trasformatio of the compositio performed over the MAC, Figure 4.b, usig previously derived MAT trasforms of its idividual blocks. puts to the MAC at the time istace i are -bit biary vectors x ad y, the output z is a biary vector of size 2. MATS of the multiplier block is defied for iputs occurrig at time istace i as: MATS(x*y)[i]= x~,[i]2~ * x ~ ~ [ =a[i]. i ] 2 ~ P=o The trasform of the accumulator-register loop, obtaied by solvig the same recurrece type as i Example 4 is: P=o Please ote that the above represetatio correspods to the MAC loop specificatio VERFCATO OF DATAPATHS A datapath of a typical DSP architecture, Figure 1, performs arithmetic ad logic operatios. ts mai buildig blocks are: register files, ROMs, shift registers, multiplexers, multipliers ad adders coected ito a MAC structure, as show i Figure 1. To verify the complete datapaths, we will rely o the verified implemetatios of its basic blocks, doe either through equivalece checkig [5], or vector-based methods [8]. For overall datapath verificatio, we ca use the library of datapath blocks, together with their trasforms. The trasform of each elemet oly depeds o its fuctioality, ad ot o the actual implemetatio. For example, AT of a adder is the same, for a ripple, lookahead or skip adder. The trasforms (AT, MAT or MATS) of the most commo arithmetic circuits were preseted i Examples 1-5. ext, we itroduce the algorithm to verify the datapath compositio from blocks. 4.1 Trasform of Complete Datapaths Havig defied trasforms of idividual blocks i a datapath, the automated costructio of the overall AT ca proceed by forward traversal from primary iputs, as show i Algorithm 1. For each block ecoutered, the trasform is costructed from its immediate iputs. Each combiatioal block depedig etirely o primary iputs requires oly AT descriptio (lie 4, Algorithm 1). Blocks with iputs geerated by previous blocks will be represeted i MAT form (lie 6, Algorithm 1) if oe of its iputs perform a sequetial fuctio, Corollary 2. Geerate MATS of the etwork of blocks 1. for each block B,i topological order Assig: iputs (6,) to output(predecessor(b,)) 4. if (combiatioa/(bj&& alliputs-primary) 5. f, = AT(6,); 6. if (combiatioa/(bj&& o-se9-iput) 7. f, = MAT(B,, assiged-iput-list); 8. else *sequetial(t3,)7 9. f, = MATS@,, assiged-iput-list); O. f, = reccurece-solve(f, ); 11. } 12. Overall-AT = f, Algorithm 1 : Compositio of Block Trasforms Every time a sequetial block is ecoutered, its recurrece equatio is solved symbolically. The outputs are the expressed i terms of the block iputs, MATS(w)[], at the time of their occurrece at the block iputs w. The iputs are the substituted by trasforms of 351

5 ~ ipits the previous blocks i the overall expressio. The process is repeated util all the blocks are traversed, ad all the outputs are expressed i terms of primary outputs of the circuit. 5. VERFCATO OF DSTRBUTED ARTHMETC CRCUTS Distributed Arithmetic (DA) refers to datapath architectures where the ier product of a vector by a costat is performed as a bit-serial operatio [lo]. DA leads to efficiet FPGA implemetatios of specialized DSP circuits like filters, but also of basic arithmetic fuctios, such as multipliers [3]. filter applicatios, the word-level quatities are usually fractios. Hece, the M-l siged umbers are represeted as: x = -xo + xi 2-', ad for usiged umbers, the sig digit xo is ot used. The calculatio of ier products of a vector of costats A& with iput vectors xk, k = 1, 2,...,h? M-l, y=ta,x,, where xj =-xjo+ cxj,2-' k= is performed bit-wise. stead of iputtig the whole M-bit xk vector i parallel, ad the executig the multiplicatio by a M-bit costat Ak, all vectors are serially shifted i. each cycle every shifted bit is "multiplied" i parallel by its costat Ak. Partial sums maitaied i this way do ot resemble the stadard partial results of ier product calculatios. The product: ( y=zajxj =CAj -x,;~ is trasformed by chagig the order of summatio ito Equatio 3 represets the form i which the ier product is calculated i the DA arithmetic. The multiplicatios i brackets, Equatio 3, do ot have to be calculated with multipliers. stead, bit products ca be pre-computed for all the possible combiatios of bits x,, of vectors x, ad stored i ROM. The, based o the actual combiatio of x,' amog all x,'s, the correspodig ROM locatio is addressed [lo]. Oe possible hardware implemetatios of the DA ier product of four 4-bit vectors is preseted i Figure Trasforms of Buildig Blocks of DA A typical DA circuit cosists of the followig blocks. Shift registers are used to serially iput the vector bits. ROMs store the pre-computed partial sums, ad addaccumulate loops maitai the partial results of the multiplicatio, Figure 5. + Trasforms of a few major datapath blocks were derived i Sectios 3.1 ad 3.2. ow, we preset the trasforms of the remaiig DA blocks. For presetatio purposes, we iitially assume that the sig bits are zero, or, equivaletly, that the usiged ecodig is employed. AT of ROM. The cotet of ROM represets the bit multiplicatio of a costat Ak by bit vector xk, k = 1,...,, Figure 5. t is easily verifiable from Figure 5 that, for the case = 4, AT of ROM is give by AT(ROM)=Aix, +A,x, +...+Ax = z A j ~ j, where each variable xj is oe-bit wide ad the coefficiets A,, j = 1,..., are fractioal umbers.... Figure 5: Distributed Arithmetic - ROM/Accumulator Structure MATS of Shift Registers. A shift register is a purely sequetial circuit, cosistig of a chai of storage cells. For each register, its discrete time defiig equatio is give as f[] = a[ - 11, where the iputs a[] are treated as bits. Buildig the shift register out of idividual storage cells amouts to composig the word-valued trasfer fuctios. For jrh shift register with M-1 stages, MATS at time k is MATS(SR(xj))[k] = xj(m-l-k). MATS of Add-Accumulate Sum with Delay Elemet. MATS of this block is calculated by costructig ad 1 solvig the recurrece: f[] = a[]+- f[ -11, f[o] = 0, 2 where variable a[] is a word-level ROM output quatity ad the iitial coditio i the register is 0. By solvig the recurrece equatio at time, we get: f[]=ca[i]*2'-" =Ca"]*2-'"-i', i=o 5.2 AT Descriptio of Complete Usiged DA The trasform of the complete circuit i Figure 5 is obtaied by forward traversal, followig Algorithm 1. The l=o 352

6 itermediate variables will be substituted i all the expressios durig the traversal. By substitutig the outputs of the shift registers to the ROM iputs, we obtai the followig timed expressio: MATS(ROM)[k]=xA.x. J j(m-1-k). ext, substitutig these variables, as the iputs to the addaccumulate sum results i: The overall fuctio AM-21 is completed at time istace M-2 as Equatio 4 at time M-2: M-2 AT(f) = MATS(f)[M -21 = CCAjXjcM-l-k,2-(M- -P). k=o The result is the same as i Equatio 3 (circuit specificatio) with the assumptio that the sig bits are zero. To verify that, we otice that by applyig the chage of idices of the first summatio, the fial AT is give by the expressio that is equivalet to Equatio 3: 5.3 AT Descriptio of Siged ad Ecoded DA The siged DA algorithm differs from the previous case i (M-Z) h step added at the ed of the executio, whe the sig bits are icorporated. The,f=AM-] is obtaied as AT(f) = MATS(f)[M - 11 = -ZAjxjo +MATS( f )[M This expressio is equal to Equatio 3; hece, the equivalece is prove. The same approach was used to prove the equivalece of additioal DA forms, icludig ecoded DA circuits from [O] that achieve the reductio i ROM sizes by alterative iteral umber ecodig. Each ew circuit ca have a differet, o-trivial DA implemetatio. The preseted method ca check the correctess of DA realizatio already o the algorithmic level. We implemeted Algorithm 1 i Mathematica, for its ease of itegratio with the recurrece solver rsolve (by M. Petkovsek), already icorporated i Mathematica. The obtaied represetatio is caoical ad compact. By comparig the sizes (measured i words) of the resultig AT with the sizes of ROMs employed i DA circuits, as i Table 2, we observe that the overall AT represetatio is logarithmic i the size of a ROM. The last colum presets worst case times spet o a 440MHz Ultra 10 workstatio with 128MB of mai memory i geeratig overall AT from ATs of DA compoets. As Mathematica is a iterpreter with lots of overhead, these times could be greatly reduced by compiled code. (4) # Terms Usiged Siged Ecoded Time ROM AT 1 ROM AT ROM AT [S k k 256 8k G 480 8G 512 Table 2: AT vs. ROM Sizes i DA mplemetatios 6. Coclusios We preseted two extesios to Arithmetic Trasform that facilitate the compositioal verificatio of sequetial datapaths. The first extesio makes the easy compositio of trasforms of idividual blocks possible, while the secod oe allows sequetial circuit represetatios. The compact caoical descriptios of large circuits ca be quickly obtaied by symbolic compositio of trasforms of idividual blocks. Verificatio of highly sequetial Distributed Arithmetic architectures was preseted usig these trasforms. We ited to apply the method to the larger classes of sequetial datapaths. 7. Refereces [l]m.d. Aagaard ad C-J. H. Seger, The Formal Verificatio of Pipelied Double-precisio EEE Floatig-poit Multiplier, Proc. EEEACM t l Co$ CAD, CCAD, pp. 7-10, [2] R. Amirtharajah, T. Xathopoulos ad A. Chadrakasa, Power Scalable Processig Usig Distributed Arithmetic, Proc. SLPED, pp , [3] A. Berkema, V. Owall, ad M. Torkelso, A Complex Multiplier with Low Logic Depth, EEE lt l. Co$ O Electroics, Circuits ad Systems, pp , [4] R.E. Bryat ad Y-A. Che, Verificatio of Arithmetic Fuctios with Biary Momet Diagrams, Proc. of 32 Desig Automatio Coferece, pp , [5] R. Drechsler, B. Becker ad S. Ruppertz, The K*BMD: A Verificatio Data Structure, EEE Desig ad Test of Computers, Vol. 14, o. 2, pp , April-Jue [6] K. Hamaguchi, A. Morita ad S. Yajima, Efficiet Costructio of Biary Momet Diagrams for Verificatio of Arithmetic Circuits, Proc. CCAD, pp.78-82, [7] J. D. Kim ad S-K. Chi, Assured VLS desig with formal verificatio, Proc. 12th Aual Co$ Computer Assurace, COMPASS, pp , [8] K. Radecka ad Z. Zilic, Usig Arithmetic Trasform for Verificatio of Datapaths via Error Modelig, Proc. of VLS Test Symposium, pp ,2000. [9] J. Smith ad G. De Micheli, Polyomial methods for allocatig complex compoets, Proc. Desig, Automatio ad Test i Europe, pp , [O] S.A. White, Applicatios of Distributed Arithmetic to Digital Sigal Processig: A Tutorial Review, EEE ASSP Magazie, pp. 4-19, July

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 ) EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA

Creating Exact Bezier Representations of CST Shapes. David D. Marshall. California Polytechnic State University, San Luis Obispo, CA , USA Creatig Exact Bezier Represetatios of CST Shapes David D. Marshall Califoria Polytechic State Uiversity, Sa Luis Obispo, CA 93407-035, USA The paper presets a method of expressig CST shapes pioeered by

More information

Major CSL Write your name and entry no on every sheet of the answer script. Time 2 Hrs Max Marks 70

Major CSL Write your name and entry no on every sheet of the answer script. Time 2 Hrs Max Marks 70 NOTE:. Attempt all seve questios. Major CSL 02 2. Write your ame ad etry o o every sheet of the aswer script. Time 2 Hrs Max Marks 70 Q No Q Q 2 Q 3 Q 4 Q 5 Q 6 Q 7 Total MM 6 2 4 0 8 4 6 70 Q. Write a

More information

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig

More information

LU Decomposition Method

LU Decomposition Method SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Computer Systems - HS

Computer Systems - HS What have we leared so far? Computer Systems High Level ENGG1203 2d Semester, 2017-18 Applicatios Sigals Systems & Cotrol Systems Computer & Embedded Systems Digital Logic Combiatioal Logic Sequetial Logic

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research

More information

Math 10C Long Range Plans

Math 10C Long Range Plans Math 10C Log Rage Plas Uits: Evaluatio: Homework, projects ad assigmets 10% Uit Tests. 70% Fial Examiatio.. 20% Ay Uit Test may be rewritte for a higher mark. If the retest mark is higher, that mark will

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Behavioral Modeling in Verilog

Behavioral Modeling in Verilog Behavioral Modelig i Verilog COE 202 Digital Logic Desig Dr. Muhamed Mudawar Kig Fahd Uiversity of Petroleum ad Mierals Presetatio Outlie Itroductio to Dataflow ad Behavioral Modelig Verilog Operators

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization Ed Semester Examiatio 2013-14 CSE, III Yr. (I Sem), 30002: Computer Orgaizatio Istructios: GROUP -A 1. Write the questio paper group (A, B, C, D), o frot page top of aswer book, as per what is metioed

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

University of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures

University of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures Uiversity of Waterloo Departmet of Electrical ad Computer Egieerig ECE 250 Algorithms ad Data Structures Midterm Examiatio ( pages) Istructor: Douglas Harder February 7, 2004 7:30-9:00 Name (last, first)

More information

FURTHER INTEGRATION TECHNIQUES (TRIG, LOG, EXP FUNCTIONS)

FURTHER INTEGRATION TECHNIQUES (TRIG, LOG, EXP FUNCTIONS) Mathematics Revisio Guides More Trigoometric ad Log Itegrals Page of 7 MK HOME TUITION Mathematics Revisio Guides Level: AS / A Level AQA : C Edexcel: C OCR: C OCR MEI: C FURTHER INTEGRATION TECHNIQUES

More information

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 4 Procedural Abstractio ad Fuctios That Retur a Value Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 4.1 Top-Dow Desig 4.2 Predefied Fuctios 4.3 Programmer-Defied Fuctios 4.4

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Introduction CHAPTER Computers

Introduction CHAPTER Computers Iside a Computer CHAPTER Itroductio. Computers A computer is a electroic device that accepts iput, stores data, processes data accordig to a set of istructios (called program), ad produces output i desired

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting)

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting) MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fittig) I this chapter, we will eamie some methods of aalysis ad data processig; data obtaied as a result of a give

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis

More information

the beginning of the program in order for it to work correctly. Similarly, a Confirm

the beginning of the program in order for it to work correctly. Similarly, a Confirm I our sytax, a Assume statemet will be used to record what must be true at the begiig of the program i order for it to work correctly. Similarly, a Cofirm statemet is used to record what should be true

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

Matrix representation of a solution of a combinatorial problem of the group theory

Matrix representation of a solution of a combinatorial problem of the group theory Matrix represetatio of a solutio of a combiatorial problem of the group theory Krasimir Yordzhev, Lilyaa Totia Faculty of Mathematics ad Natural Scieces South-West Uiversity 66 Iva Mihailov Str, 2700 Blagoevgrad,

More information

ISSN (Print) Research Article. *Corresponding author Nengfa Hu

ISSN (Print) Research Article. *Corresponding author Nengfa Hu Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 2016; 4(5):249-253 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.saspublisher.com

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

EE123 Digital Signal Processing

EE123 Digital Signal Processing Last Time EE Digital Sigal Processig Lecture 7 Block Covolutio, Overlap ad Add, FFT Discrete Fourier Trasform Properties of the Liear covolutio through circular Today Liear covolutio with Overlap ad add

More information

COP4020 Programming Languages. Functional Programming Prof. Robert van Engelen

COP4020 Programming Languages. Functional Programming Prof. Robert van Engelen COP4020 Programmig Laguages Fuctioal Programmig Prof. Robert va Egele Overview What is fuctioal programmig? Historical origis of fuctioal programmig Fuctioal programmig today Cocepts of fuctioal programmig

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Algorithm Design Techniques. Divide and conquer Problem

Algorithm Design Techniques. Divide and conquer Problem Algorithm Desig Techiques Divide ad coquer Problem Divide ad Coquer Algorithms Divide ad Coquer algorithm desig works o the priciple of dividig the give problem ito smaller sub problems which are similar

More information

FPGA IMPLEMENTATION OF BASE-N LOGARITHM. Salvador E. Tropea

FPGA IMPLEMENTATION OF BASE-N LOGARITHM. Salvador E. Tropea FPGA IMPLEMENTATION OF BASE-N LOGARITHM Salvador E. Tropea Electróica e Iformática Istituto Nacioal de Tecología Idustrial Bueos Aires, Argetia email: salvador@iti.gov.ar ABSTRACT I this work, we preset

More information

Neural Networks A Model of Boolean Functions

Neural Networks A Model of Boolean Functions Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de

More information

Lecture 2. RTL Design Methodology. Transition from Pseudocode & Interface to a Corresponding Block Diagram

Lecture 2. RTL Design Methodology. Transition from Pseudocode & Interface to a Corresponding Block Diagram Lecture 2 RTL Desig Methodology Trasitio from Pseudocode & Iterface to a Correspodig Block Diagram Structure of a Typical Digital Data Iputs Datapath (Executio Uit) Data Outputs System Cotrol Sigals Status

More information

South Slave Divisional Education Council. Math 10C

South Slave Divisional Education Council. Math 10C South Slave Divisioal Educatio Coucil Math 10C Curriculum Package February 2012 12 Strad: Measuremet Geeral Outcome: Develop spatial sese ad proportioal reasoig It is expected that studets will: 1. Solve

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

Appendix A. Use of Operators in ARPS

Appendix A. Use of Operators in ARPS A Appedix A. Use of Operators i ARPS The methodology for solvig the equatios of hydrodyamics i either differetial or itegral form usig grid-poit techiques (fiite differece, fiite volume, fiite elemet)

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

Numerical Methods Lecture 6 - Curve Fitting Techniques

Numerical Methods Lecture 6 - Curve Fitting Techniques Numerical Methods Lecture 6 - Curve Fittig Techiques Topics motivatio iterpolatio liear regressio higher order polyomial form expoetial form Curve fittig - motivatio For root fidig, we used a give fuctio

More information

A General Framework for Accurate Statistical Timing Analysis Considering Correlations

A General Framework for Accurate Statistical Timing Analysis Considering Correlations A Geeral Framework for Accurate Statistical Timig Aalysis Cosiderig Correlatios 7.4 Vishal Khadelwal Departmet of ECE Uiversity of Marylad-College Park vishalk@glue.umd.edu Akur Srivastava Departmet of

More information

Math Section 2.2 Polynomial Functions

Math Section 2.2 Polynomial Functions Math 1330 - Sectio. Polyomial Fuctios Our objectives i workig with polyomial fuctios will be, first, to gather iformatio about the graph of the fuctio ad, secod, to use that iformatio to geerate a reasoably

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

UNIT 1 RECURRENCE RELATIONS

UNIT 1 RECURRENCE RELATIONS UNIT RECURRENCE RELATIONS Structure Page No.. Itroductio 7. Objectives 7. Three Recurret Problems 8.3 More Recurreces.4 Defiitios 4.5 Divide ad Coquer 7.6 Summary 9.7 Solutios/Aswers. INTRODUCTION I the

More information

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Chapter 3. Floating Point Arithmetic

Chapter 3. Floating Point Arithmetic COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 3 Floatig Poit Arithmetic Review - Multiplicatio 0 1 1 0 = 6 multiplicad 32-bit ALU shift product right multiplier add

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

Convex hull ( 凸殻 ) property

Convex hull ( 凸殻 ) property Covex hull ( 凸殻 ) property The covex hull of a set of poits S i dimesios is the itersectio of all covex sets cotaiig S. For N poits P,..., P N, the covex hull C is the give by the expressio The covex hull

More information

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig

More information

Chapter 4 The Datapath

Chapter 4 The Datapath The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that

More information

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions Proceedigs of the 10th WSEAS Iteratioal Coferece o APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, 2006 316 A Geeralized Set Theoretic Approach for Time ad Space Complexity Aalysis of Algorithms

More information

COMP Parallel Computing. PRAM (1): The PRAM model and complexity measures

COMP Parallel Computing. PRAM (1): The PRAM model and complexity measures COMP 633 - Parallel Computig Lecture 2 August 24, 2017 : The PRAM model ad complexity measures 1 First class summary This course is about parallel computig to achieve high-er performace o idividual problems

More information

Filter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design

Filter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design Filter desig Desig cosideratios: a framework C ı p ı p H(f) Aalysis of fiite wordlegth effects: I practice oe should check that the quatisatio used i the implemetatio does ot degrade the performace of

More information

EE University of Minnesota. Midterm Exam #1. Prof. Matthew O'Keefe TA: Eric Seppanen. Department of Electrical and Computer Engineering

EE University of Minnesota. Midterm Exam #1. Prof. Matthew O'Keefe TA: Eric Seppanen. Department of Electrical and Computer Engineering EE 4363 1 Uiversity of Miesota Midterm Exam #1 Prof. Matthew O'Keefe TA: Eric Seppae Departmet of Electrical ad Computer Egieerig Uiversity of Miesota Twi Cities Campus EE 4363 Itroductio to Microprocessors

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Last Class. Announcements. Lecture Outline. Types. Structural Equivalence. Type Equivalence. Read: Scott, Chapters 7 and 8. T2 y; x = y; n Types

Last Class. Announcements. Lecture Outline. Types. Structural Equivalence. Type Equivalence. Read: Scott, Chapters 7 and 8. T2 y; x = y; n Types Aoucemets HW9 due today HW10 comig up, will post after class Team assigmet Data abstractio (types) ad cotrol abstractio (parameter passig) Due o Tuesday, November 27 th Last Class Types Type systems Type

More information

Module Instantiation. Finite State Machines. Two Types of FSMs. Finite State Machines. Given submodule mux32two: Instantiation of mux32two

Module Instantiation. Finite State Machines. Two Types of FSMs. Finite State Machines. Given submodule mux32two: Instantiation of mux32two Give submodule mux32two: 2-to- MUX module mux32two (iput [3:] i,i, iput sel, output [3:] out); Module Istatiatio Fiite Machies esig methodology for sequetial logic -- idetify distict s -- create trasitio

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

top() Applications of Stacks

top() Applications of Stacks CS22 Algorithms ad Data Structures MW :00 am - 2: pm, MSEC 0 Istructor: Xiao Qi Lecture 6: Stacks ad Queues Aoucemets Quiz results Homework 2 is available Due o September 29 th, 2004 www.cs.mt.edu~xqicoursescs22

More information

CMPT 125 Assignment 2 Solutions

CMPT 125 Assignment 2 Solutions CMPT 25 Assigmet 2 Solutios Questio (20 marks total) a) Let s cosider a iteger array of size 0. (0 marks, each part is 2 marks) it a[0]; I. How would you assig a poiter, called pa, to store the address

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information