Self-Adjusting Output Data Compression: An Efficient BIST Technique for RAMs
|
|
- Dorothy Hampton
- 6 years ago
- Views:
Transcription
1 Design, Automtion nd Test in Europe, DATE 98, Pris, Frnce, Ferury 23-26, 998 Self-Adjusting Output Dt Compression: An Efficient BIST Technique for s V. N. Yrmolik Computer Systems Deprtment Belrussin Stte University of Informtics nd Rdioelectronics, Minsk, Belrus S. Hellernd, H.-J. Wunderlich Division of Computer Architecture University of Stuttgrt Germny Astrct After write opertions, BIST schemes for s relying on signture nlysis must compress the entire memory contents to updte the reference signture. This pper introduces new scheme for output dt compression which voids this overhed while retining the enefits of signture nlysis. The proposed technique is sed on new memory chrcteristic derived s the modulo-2 sum of ll ddresses pointing to non-zero cells. This chrcteristic cn e djusted concurrently with write opertions y simple EXOR-opertions on the initil chrcteristic nd on the ddresses ffected y the chnge. Introduction High density memories constitute n integrl prt of most present dy micro-electronic systems. To gurntee relile storge of dt, prticulrly in systems for sfety criticl pplictions, efficient test procedures re indispensle. Besides production testing, periodic mintennce testing is especilly importnt for memories to del with the prolem of dt retention, e. g. checking for dt losses fter power-off conditions or during run-time. Moreover, frequent opertions on the memory contents require on-line or periodic consistency checks. When memories re emedded in lrger integrted circuits, such s microprocessors or digitl communiction devices, conventionl techniques for externl memory testing cn no longer e pplied due to the limited ccessiility of the memories. To solve this prolem, nd lso to reduce the long testing times inherent to conventionl externl testing, numer of theoreticl nd prcticl uilt-in selftest (BIST solutions hve een proposed in the pst [-5, 7, -3, 6, 8]. This work ws supported y BMBF-Grnt WEI-X23.2. This pper ddresses the prolem of periodic consistency checking for emedded memories. The proposed strtegy is sed on the BIST rchitecture sketched in Figure. The test pttern genertor produces predetermined sequence of memory ddresses, nd the corresponding sequence of dt is fed into the output dt compressor, the finl stte of which represents chrcteristic of the memory contents. For the initil correct memory contents reference chrcteristic C is lerned this wy on chip nd sved in specific loction [4]. The sme procedure is repeted periodiclly, nd the respective chrcteristics re compred to C to revel inconsistencies. The test pttern genertor cn lso e used to generte the dt to e written into the memory for the production test. In this mode stndrd lgorithms my e pplied which re not considered within the frmework of this pper [6, 8]. Test Pttern Genertor Figure : ddresses Memory dt Block digrm of self-testing memory. Output Dt Compressor Since the descried technique checks the memory offline, there is certin ltency of error detection compred to conventionl on-line checking schemes [5]. But this is more thn outweighed y much smller re overhed nd simpler design. In [4] checking scheme sed on the rchitecture of Figure hs een proposed relying on signture nlysis for output dt compression. It hs een demonstrted y the uthors tht this kind of BIST rchitecture offers some very importnt dvntges, whereof the most vlule re: low re overhed, rther unffected ccess time during norml opertion, nd high fult coverge due to the low proility of lising errors [3, 9]. The min disdvntge, however, is the necessity to
2 2 djust the lerned signture fter write opertions. Updting the lerned signture requires to run through complete cycle of the test pttern genertor nd thus repeting the complete initil lerning phse. In this pper, we propose new scheme for output dt compression which voids this overhed while retining the dvntges of schemes relying on lerned signtures. It is sed on new chrcteriztion of the fult free memory contents nd cn esily e djusted during write opertions, which elimintes the repeted lerning phses of previous pproches nd significntly reduces the test time. It will e shown tht the scheme is prticulrly suitle for Ds, lthough it cn e efficiently implemented for vrious types of memory. The chievle test qulity is the sme s for schemes using conventionl signture nlysis: the proility of lising errors is 2 -k, where k denotes the length of the memory chrcteristic. The sic concepts of the proposed technique re introduced in Section 2 for it-oriented s well s for wordoriented s, complete BIST rchitecture is descried in Section 3. 2 A Self-Adjusting Chrcteristic for s In the following chrcteristic for fult free s is introduced which cn esily e djusted concurrently with write opertions. The updted chrcteristic is otined s comintionl function of the initil chrcteristic nd the ddresses ffected y the chnge. The sic principles of the proposed pproch will e explined in Section 2. for it-oriented s, the generliztion to wordoriented memories is descried in Section Bit-Oriented Memories As illustrted in Figure 2, the proposed reference chrcteristic C of the correct initil memory contents is defined s the modulo-2 sum of ll ddresses pointing to cells contining, nd it will therefore e clled modulo-2 ddress chrcteristic throughout the pper. ddress Figure 2: dt C = Modulo-2 ddress chrcteristic for it-oriented s. As shown in Figure 3, during BIST test pttern genertor (n LFSR with primitive feedck polynomil or counter, e.g. produces ll possile ddresses in n ritrry order. The output dt compressor determines the modulo-2 sum of ll ddresses corresponding to, nd if C = holds, the memory is considered s fult free. Figure 3: TPG test ptterns Output Dt Compressor C ddresses Comprtor pss/fil dt register Memory BIST sed on the modulo-2 ddress chrcteristic. The compressor circuit, which is shown in more detil in Figure 4, simply hs to perform itwise EXOR-opertions on ddresses controlled y the vlue stored in the dt register. Figure 4: ddress lines = = = FF FF FF dt & clock Output dt compressor sed on the modulo-2 ddress chrcteristic. In cse of write opertions, the reference chrcteristic must e djusted to the new chrcteristic C new, which is otined y modulo-2 ddition of ll ddresses with
3 3 chnges from to nd modulo-2 sutrction (which is equivlent to modulo-2 ddition of ll ddresses with chnges from to. More specificlly, ltering the contents of single cell corresponds to the modulo-2 ddition of the cell ddress to the initil chrcteristic C. In prticulr, this implies tht the compressor circuit of Figure 4 is lso cple of djusting the reference chrcteristic during write opertions in system mode ( detiled description of the complete implementtion with BIST will e given in Section 3. To summrize the sic concepts of the proposed pproch more formlly let the memory e represented y n rry M[,, m] with ddress spce A = {,, m}, nd let A := { " A M[] = } denote the set of ll memory ddresses pointing to entries. With " A representing the itwise modulo-2 sum of the inry representtion of ll ddresses in A,, the initil chrcteristic is otined s C = " A, nd the new reference chrcteristic fter write opertion t specific ddress * is given y new ( old new old C C * M * M *. = # [ ] [ ] Besides the simple mechnism of mpping chnges in memory to chnges in the chrcteristic, the proposed scheme hs numer of dditionl dvntgeous properties: All single errors re detectle nd dignosle, since if only single errors re ssumed, the expression C CTEST provides the ddress of the fulty memory cell. 2 All doule errors re detectle, since in this cse C CTEST corresponds to the sum of two ddresses r nd s, nd r $ s implies C C $. TEST 3 As shown elow, output dt compression sed on the modulo-2 ddress chrcteristic is equivlent to seril signture nlysis nd the proility of lising errors is thus estimted y 2 %k, where k denotes the length of the chrcteristic. Property 3 is n immedite consequence of the following oservtion. Oservtion: Let &(X " GF(2[X] e primitive polynomil of degree k, nd let & % k ( X : = X & ' ( X * denote the reciprocl polynomil. An LFSR with feedck polynomil & % (X nd initil stte (,,, genertes the sme stte trnsition sequence (in reverse component order s the LFSR with feedck polynomil &(X counting ckwrd from (,,,. The exmple shown in Figure 5 exploits this oservtion to verify property 3 for 7-it. A conventionl BIST is implemented using 3-it LFSR with primitive feedck polynomil &(X = + X + X 3 s test pttern genertor nd seril signture nlyzer with the reciprocl feedck polynomil & % (X = + X 2 + X 3. With n ll-zero initil stte the signture register does not chnge its contents efore the first cell contining is ddressed. The new contents is (,,, nd s the remining memory cells only contin entries, the signture nlyzer works like n utonomous LFSR with initil stte (,, for the rest of the test procedure. Since & % (X is the reciprocl of &(X, this implies tht the signture nlyzer siclly ehves like the test pttern genertor counting ckwrd from (,, (with reversed component order, thus the finl signture is (,, nd corresponds exctly to the ddress of the memory cell with entry. test ptterns TPG ddresses dt signture Figure 5: Correspondence etween signture nlysis nd modulo-2 ddress chrcteristic. If the contins more thn one non-zero entries, then similrly the signture is otined s modulo-2 sum of ll ddresses (in reversed component order corresponding to memory cells with contents. In generl the correspondence etween the modulo-2 ddress chrcteristic nd signture nlysis is descried y the following theorem which ws proven in [9, 7]. Theorem : Let M e it-oriented memory with m = 2 k - cells, &(X " GF(2[X] primitive polynomil of degree k, nd let A + GF(2 k \ {} contin the memory SA
4 4 ddresses pointing to entries. Furthermore, for = (,, k- " GF(2 k let r := ( k-,, denote the vector with components in reversed order. Then BIST using test pttern genertor with feedck polynomil &(X, seril signture nlyzer with feedck polynomil & % (X, initil sttes (,,, nd (,, for the test pttern genertor nd the signture nlyzer, respectively, nd test length of m is chrcterized y the fult free signture S = " A The theorem remins true, when the numer of memory cells is m < 2 k -, nd the initil stte of the test pttern genertor is selected, such tht the finl stte is (,,,. This implies tht for ny memory BIST sed on the modulo-2 ddress chrcteristic there exists n equivlent BIST configurtion sed on signture nlysis with primitive feedck polynomil, nd consequently the sme test qulity is gurnteed. In contrst to signture nlysis, however, the proposed scheme is cple of updting the reference chrcteristic fter write opertions in one step. This enormous gin in time (s mentioned efore, updting the reference signture in conventionl scheme requires to run through complete cycle of the test pttern genertor, is pid y only little hrdwre overhed. As explined ove, the proposed output dt compressor for n m-it memory cn e implemented using log 2 m EXOR-gtes nd one AND-gte. 2.2 Extension to word-oriented s r., - flip-flops,, log 2 m - The scheme for output dt compression introduced in the previous section cn esily e pplied to wordoriented s. As illustrted in Figure 6, for this purpose the word-oriented is considered s it-oriented memory with ddresses of the form ( w,, where w denotes the word ddress nd the it position within the word. Anlogous to Section 2. the memory cn then e modeled s two-dimensionl rry M[ m, n] with ddress spce A = {,, m} {,, n} nd -spce A := {( w, " A M[ w, ] = }. The reference chrcteristic C for the initil correct memory contents is determined s C, = ( ( w, " A where the modulo-2 sum of ddress pirs is defined y ( w, ( w, = ( w w,. w, word ddress Figure 6: it position Bit-oriented representtion of word-oriented. To clculte the corresponding chrcteristic during BIST n LFSR or counter genertes ll word ddresses in n ritrry order. For ech fixed word w* with ddress w* the modulo-2 sum of ll ddresses ( w*, pointing to entries is computed in one step, i. e. with A (w* denoting { M( w*, = } prtil chrcteristic Cw* w*, " A ( w* = ( is determined y comintionl circuit. This wy, cn e derived s CTEST Cw w,,.. m.. m " A ( w = = ( w w which is just the sum of ll it ddresses contining. To design n output dt compressor ccomplishing this tsk, it is crucil to derive n efficient implementtion for the prtil chrcteristic C w*. As introduced ove Cw* w*, w*,. " A ( w* " A ( w* " A ( w* * = ( = ' ( / It is esily verified tht w* = w*, " A ( w * if the numer of ones in w* is odd, nd " A ( w* w* yields the ll-zero vector, if the numer of ones in w* is even. Consequently, the first component of C w* cn e implemented s F # w* = " A ( w* w*, where F is function which determines the prity of the word w*. Since the it ddresses within the word w* re represented y inry l-it vectors, l log 2 n, =, -
5 " A ( w* is otined y itwise EXOR-opertions,, " A ( w* " A ( w* " A ( w* = ' l ( / K, * i with denoting the i-th component of,,. i. l. As i only it-ddresses with = cn contriute to the i-th sum " A ( w* it is sufficient to implement functions F i which count (modulo 2 the numer of ones t ll the ddresses with this property. The second component of C w* is then derived s = ( F F,, l " A ( w* i, K, Figure 7 shows n exmple for memory consisting of seven 4-it words. word ddress lines = = = = it positions dt register where A diff (w* := { M[ w*, ] old $ M[ w*, ] new }. As one cn esily verify, to ccomplish this tsk it is sufficient to feed the output dt compressor of Figure 7 with the difference-word M[ w* ] old M[ w* ] new. Concerning the hrdwre cost for the word-oriented cse, it cn e shown tht the EXOR-tree for implementing the functions F,, F l requires t most j ( 2 %. j. l EXOR-gtes. Overll, the output dt compressor of Figure 7 cn e implemented using, log 2 m- + l flipflops, log 2 m l. j. l j ( 2, % EXOR-gtes, nd AND-gte. Tle summrizes the hrdwre cost for some exmple configurtions of wordoriented s. # Words (m Wordlength (n # Flip- Flops # EXOR- Gtes # AND- Gtes F F F 2 = = = & = = FF FF FF FF FF clock Tle : Hrdwre overhed for the proposed output dt compressor. The length of chrcteristic is k : log m log n =, - +, - 2 2, nd the proility of lising errors for word-oriented % k 2 2 s is 2 2 %, log m = - %, log n-. Figure 7: Output dt compressor for word-oriented s. To djust the reference chrcteristic C in cse of write opertion t specific word-ddress w*, ll it positions hve to e determined with M[ w*, ] old $ M[ w*, ] new, nd the prtil chrcteristic C w* must e djusted to Cw new * = Cw old * ( w*,, " A ( w* diff 3 The BIST rchitecture In this section, complete BIST rchitecture sed on the proposed scheme for output dt compression is descried for Ds. The digrm in Figure 8 shows the necessry BIST equipment in shded locks. The BIST control unit distinguishes etween three min phses: During n initiliztion phse the reference chrcteristic C hs to e determined y running through complete cycle of the test pttern genertor TPG, which my e implemented s mximum period LFSR or counter. The output dt compressor is reset to the ll-zero vector t the eginning of this phse, nd
6 6 TPG Address Register M U X Decoder row ddress column ddress Memory Cells select c Refreshment Register run_bist init BIST Controller Switch Mtrix Test Register Dt Register I/O 2-input EXOR-Gtes c 2 MUX reset enle Output Dt Compressor enle enle C Comprtor pss/fil Figure 8: D with BIST. t the end of this phse the otined reference chrcteristic in the flip-flops of the output dt compressor is written to the register C. If pproprite test ptterns hve een written into the memory, C lso represents the outcome of strt-up test. 2 During system opertion C hs to e updted fter every write opertion. As explined is Section 2.2 this implies tht for ech write opertion the difference, i.e. the itwise EXOR of the old nd the new memory entry hs to e determined. Therefore, key issue in implementing the proposed BIST pproch is to ensure ckup of the old memory entry t low hrdwre nd performnce penlty. The est method to chieve this gol, of course, depends on the memory orgniztion. Here it is ssumed, tht refreshment lgorithm for the dynmic is used which writes the complete row contining the word trgeted y write request to the refreshment register efore loding the new word from dt register. In this cse the old memory entry cn e trnsferred from the refreshment register to the test register vi the switching mtrix. The updted reference chrcteristic now contined in the flip-flops of the output dt compressor is lso written to the register C. 3 During BIST, the test pttern genertor produces ll possile ddresses, nd the test chrcteristic is determined in the sme wy s the reference chrcteristic C during the initiliztion phse. However, during BIST the enle signl for register C is kept zero, such tht finlly oth chrcteristics C nd cn e compred to provide the test result t the output of the comprtor. The BIST controller hs to relize two loops, one for initiliztion nd one for BIST, nd hs to control the write opertion within two clock cycles. One counter of
7 7, - length log 2 m, two flip-flops, nd some comintionl logic re sufficient for implementing these three modes, one of which hs two sttes. In ddition to this, we need four n-it registers C,, TPG, nd Test Register, nd some comintionl logic. Prototype implementtions show n re requirement of the entire BIST equipment in the order of n-it registers nerly independent of the memory size. The BIST hrdwre is not plced within the dtpth nd the ddress logic, nd there is no time penlty for red ccesses. In strightforwrd implementtion of write ccesses there my e one dditionl clock ltency, s the old contents of the refreshment register must e written into the test register efore the new vlue of the dt register cn e cptured y the register. This ltency is voided, if the refreshment register on the one side nd the test nd dt registers on the other side work on different clock phses. They my even work on the sme phse, if the refreshment register hs two ports nd the switch mtrix is douled. 4 Conclusions In this pper we hve proposed new method for the uilt-in test of memory consistency. In contrst to methods known so fr, reference signture is not computed y scnning the entire memory periodiclly, ut y djusting it dynmiclly. The reference vlue of the fult free contents of the is computed s modulo-2 ddress chrcteristic, nd new technique for output dt compression hs een presented sed on this chrcteriztion. It hs een shown tht the sme test qulity is chieved s y conventionl pproch sed on signture nlysis. But compred to conventionl signture nlysis schemes n enormous gin in time is chieved t only slightly higher hrdwre costs. 5 References V. C. Alves, M. Nicolidis, P. Lestrt, nd B. Courtois: Built-in Self-Test for Multi-Port s; Proceedings IEEE Interntionl Conference on Computer-Aided Design, ICCAD-9, Novemer 99, pp S. Brgllo, F. Corno, P. Prinetto, M. Sonz Reord: Testing Switching Memory in Telecommuniction System; Proceedings IEEE Interntionl Test Conference, Wshington, DC, Oct. 995, pp P. H. Brdell, W. H. McAnney, nd J. Svir: Built-In Test for VLSI: Pseudorndom Techniques; New York: John Wiley & Sons, H. Cheung, S. K. Gupt: A BIST Methodology for Comprehensive Testing of with Reduced Het Dissiption; Proceedings IEEE Interntionl Test Conference, Wshington, DC, Oct. 996, pp B. Cockurn, Y.-F. N. St: Synthesized Trnsprent BIST for Detecting Scrmled Pttern-Sensitive Fults in s; Proceedings IEEE Interntionl Test Conference, Wshington, DC, Oct. 995, pp R. Dvid, A. Fuentes, nd B. Courtois: Rndom Pttern Testing Versus Deterministic Testing of s; IEEE Trns. on Computers, Vol. C-38, No. 5, My 989, pp R. Dekker, F. Beenker, nd L. Thijssen: Relistic Built-In Self-Test for Sttic s; IEEE Design & Test of Computers, Vol. 6, No., Fe. 989, pp A. J. Vn de Goor: Testing Semiconductor Memories, Theory nd Prctice; Chichester: John Wiley & Sons, O. Keichi, M. Nicolidis, V. N. Yrmolik: Exct Alising Computtion for BIST; Proceedings IEEE Int. Test Conference, Wshington, DC, Oct. 995, pp K. Kinoshit, K. K. Sluj: Built-In Testing of Memory Using n On-Chip Compct Testing Scheme; IEEE Trnsctions on Computers, Vol. C-35, No., Octoer 986, pp K. T. Le, K. K. Sluj: A Novel Approch for Testing Memories Using Built-In Self-Testing Technique, Proceedings IEEE Interntionl Test Conference, Wshington, DC, 986, pp B. Ndeu-Dostie, A. Silurt, nd V. K. Agrwl: Seril Interfcing for Emedded-Memory Testing; IEEE Design & Test of Computers, Vol. 7, No. 2, April 99, pp M. Nicolidis: Trnsprent BIST for s; Proceedings IEEE Interntionl Test Conference, Bltimore, MD, Oct. 992, pp P. Olivo, M. Dlpsso: Self-Lerning Signture Anlysis for Non-Voltile Memory Testing; Proceedings IEEE Int. Test Conference, Wshington, DC, Oct. 996, pp T. R. N. Ro, E. Fujiwr: Error-Control Coding for Computer Systems; Englewood Cliffs, NJ: Prenctice Hll, Inc., N. Skshit et l.: A Built-in Self-Test Circuit with Timing Mrgin Test Function in Git Synchronous D; Proceedings IEEE Interntionl Test Conference, Wshington, DC, Oct. 996, pp V. N. Yrmolik: Anlysis of Signture Testility of Digitl Circuits; Automtion nd Remote Control, Mrch 99, pp Y. You, J. P. Hyes: A self-testing dynmic chip; IEEE JSSC, Ferury 985, pp
UT1553B BCRT True Dual-port Memory Interface
UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl
More informationIn the last lecture, we discussed how valid tokens may be specified by regular expressions.
LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.
More informationPresentation Martin Randers
Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes
More informationSystems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits
Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion
More informationFig.25: the Role of LEX
The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing
More informationLecture 10 Evolutionary Computation: Evolution strategies and genetic programming
Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting
More information2 Computing all Intersections of a Set of Segments Line Segment Intersection
15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design
More informationP(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have
Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using
More informationBefore We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):
Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters
More informationPPS: User Manual. Krishnendu Chatterjee, Martin Chmelik, Raghav Gupta, and Ayush Kanodia
PPS: User Mnul Krishnendu Chtterjee, Mrtin Chmelik, Rghv Gupt, nd Ayush Knodi IST Austri (Institute of Science nd Technology Austri), Klosterneuurg, Austri In this section we descrie the tool fetures,
More informationA Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards
A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin
More informationComplete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li
2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min
More informationDigital Signal Processing: A Hardware-Based Approach
Digitl Signl Processing: A Hrdwre-Bsed Approch Roert Esposito Electricl nd Computer Engineering Temple University troduction Teching Digitl Signl Processing (DSP) hs included the utilition of simultion
More informationCOMP 423 lecture 11 Jan. 28, 2008
COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring
More informationSlides for Data Mining by I. H. Witten and E. Frank
Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully
More informationLexical Analysis. Amitabha Sanyal. (www.cse.iitb.ac.in/ as) Department of Computer Science and Engineering, Indian Institute of Technology, Bombay
Lexicl Anlysis Amith Snyl (www.cse.iit.c.in/ s) Deprtment of Computer Science nd Engineering, Indin Institute of Technology, Bomy Septemer 27 College of Engineering, Pune Lexicl Anlysis: 2/6 Recp The input
More informationQubit allocation for quantum circuit compilers
Quit lloction for quntum circuit compilers Nov. 10, 2017 JIQ 2017 Mrcos Yukio Sirichi Sylvin Collnge Vinícius Fernndes dos Sntos Fernndo Mgno Quintão Pereir Compilers for quntum computing The first genertion
More informationTO REGULAR EXPRESSIONS
Suject :- Computer Science Course Nme :- Theory Of Computtion DA TO REGULAR EXPRESSIONS Report Sumitted y:- Ajy Singh Meen 07000505 jysmeen@cse.iit.c.in BASIC DEINITIONS DA:- A finite stte mchine where
More informationA dual of the rectangle-segmentation problem for binary matrices
A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht
More informationEECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining
EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more
More informationThe Greedy Method. The Greedy Method
Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm
More informationCS321 Languages and Compiler Design I. Winter 2012 Lecture 5
CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,
More informationFrom Dependencies to Evaluation Strategies
From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute
More informationPARALLEL AND DISTRIBUTED COMPUTING
PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce
More informationCS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis
CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl
More informationGeorge Boole. IT 3123 Hardware and Software Concepts. Switching Algebra. Boolean Functions. Boolean Functions. Truth Tables
George Boole IT 3123 Hrdwre nd Softwre Concepts My 28 Digitl Logic The Little Mn Computer 1815 1864 British mthemticin nd philosopher Mny contriutions to mthemtics. Boolen lger: n lger over finite sets
More informationEfficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism
Efficient K-NN Serch in Polyphonic Music Dtses Using Lower Bounding Mechnism Ning-Hn Liu Deprtment of Computer Science Ntionl Tsing Hu University Hsinchu,Tiwn 300, R.O.C 886-3-575679 nhliou@yhoo.com.tw
More informationCS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata
CS 432 Fll 2017 Mike Lm, Professor (c)* Regulr Expressions nd Finite Automt Compiltion Current focus "Bck end" Source code Tokens Syntx tree Mchine code chr dt[20]; int min() { flot x = 42.0; return 7;
More informationAgilent Mass Hunter Software
Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss
More informationNOTES. Figure 1 illustrates typical hardware component connections required when using the JCM ICB Asset Ticket Generator software application.
ICB Asset Ticket Genertor Opertor s Guide Septemer, 2016 Septemer, 2016 NOTES Opertor s Guide ICB Asset Ticket Genertor Softwre Instlltion nd Opertion This document contins informtion for downloding, instlling,
More informationSpectral Analysis of MCDF Operations in Image Processing
Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity
More informationAccelerating 3D convolution using streaming architectures on FPGAs
Accelerting 3D convolution using streming rchitectures on FPGAs Hohun Fu, Robert G. Clpp, Oskr Mencer, nd Oliver Pell ABSTRACT We investigte FPGA rchitectures for ccelerting pplictions whose dominnt cost
More informationIf you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.
Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online
More informationthis grammar generates the following language: Because this symbol will also be used in a later step, it receives the
LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.
More informationParallel Square and Cube Computations
Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu
More informationAddress/Data Control. Port latch. Multiplexer
4.1 I/O PORT OPERATION As discussed in chpter 1, ll four ports of the 8051 re bi-directionl. Ech port consists of ltch (Specil Function Registers P0, P1, P2, nd P3), n output driver, nd n input buffer.
More informationComputer Arithmetic Logical, Integer Addition & Subtraction Chapter
Computer Arithmetic Logicl, Integer Addition & Sutrction Chpter 3.-3.3 3.3 EEC7 FQ 25 MIPS Integer Representtion -it signed integers,, e.g., for numeric opertions 2 s s complement: one representtion for
More informationConcepts Introduced. A 1-Bit Logical Unit. 1-Bit Half Adder (cont.) 1-Bit Half Adder
oncepts Introduced A -Bit Logicl Unit sic rithmetic/logic unit clocks ltches nd ip-ops registers SRAMs nd RAMs nite stte mchines Below is -it logicl unit tht performs AN nd OR opertions Both the AN nd
More informationDefinition of Regular Expression
Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll
More informationSimrad ES80. Software Release Note Introduction
Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the
More informationReducing a DFA to a Minimal DFA
Lexicl Anlysis - Prt 4 Reducing DFA to Miniml DFA Input: DFA IN Assume DFA IN never gets stuck (dd ded stte if necessry) Output: DFA MIN An equivlent DFA with the minimum numer of sttes. Hrry H. Porter,
More informationPerformance enhancement of IEEE DCF using novel backoff algorithm
Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 http://jis.eursipjournls.com/content/212/1/274 RESEARCH Open Access Performnce enhncement of IEEE 82.11 using novel ckoff lgorithm
More information2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE
2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE Antoni Wolski nd Jri Veijlinen Technicl Reserch Centre of Finlnd Lortory for Informtion Processing Lehtisrentie
More informationEnginner To Engineer Note
Technicl Notes on using Anlog Devices DSP components nd development tools from the DSP Division Phone: (800) ANALOG-D, FAX: (781) 461-3010, EMAIL: dsp_pplictions@nlog.com, FTP: ftp.nlog.com Using n ADSP-2181
More informationCourse Administration
/4/7 Spring 7 EE 363: Computer Orgniztion Arithmetic for Computers Numer Representtion & ALU Avinsh Kodi Deprtment of Electricl Engineering & Computer Science Ohio University, Athens, Ohio 457 E-mil: kodi@ohio.edu
More informationEvolutionary Approaches To Minimizing Network Coding Resources
This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE INFOCOM 2007 proceedings. Evolutionry Approches To Minimizing Network Coding
More informationMcAfee Network Security Platform
10/100/1000 Copper Active Fil-Open Bypss Kit Guide Revision E McAfee Network Security Pltform This document descries the contents nd how to instll the McAfee 10/100/1000 Copper Active Fil-Open Bypss Kit
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationFinite Automata. Lecture 4 Sections Robb T. Koether. Hampden-Sydney College. Wed, Jan 21, 2015
Finite Automt Lecture 4 Sections 3.6-3.7 Ro T. Koether Hmpden-Sydney College Wed, Jn 21, 2015 Ro T. Koether (Hmpden-Sydney College) Finite Automt Wed, Jn 21, 2015 1 / 23 1 Nondeterministic Finite Automt
More informationLecture 7: Integration Techniques
Lecture 7: Integrtion Techniques Antiderivtives nd Indefinite Integrls. In differentil clculus, we were interested in the derivtive of given rel-vlued function, whether it ws lgeric, eponentil or logrithmic.
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-204 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationCS 241 Week 4 Tutorial Solutions
CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it
More informationA Reconfigurable Arithmetic Datapath Architecture
A Reconfigurle Arithmetic Dtpth Architecture Reiner W. Hrtenstein, Riner Kress, Helmut Reinig University of Kiserslutern Erwin-Schrödinger-Strße, D-67663 Kiserslutern, Germny Fx: 49 631 205 2640, emil:
More informationThe dictionary model allows several consecutive symbols, called phrases
A dptive Huffmn nd rithmetic methods re universl in the sense tht the encoder cn dpt to the sttistics of the source. But, dpttion is computtionlly expensive, prticulrly when k-th order Mrkov pproximtion
More informationEfficient Rerouting Algorithms for Congestion Mitigation
2009 IEEE Computer Society Annul Symposium on VLSI Efficient Rerouting Algorithms for Congestion Mitigtion M. A. R. Chudhry*, Z. Asd, A. Sprintson, nd J. Hu Deprtment of Electricl nd Computer Engineering
More information5 Regular 4-Sided Composition
Xilinx-Lv User Guide 5 Regulr 4-Sided Composition This tutoril shows how regulr circuits with 4-sided elements cn be described in Lv. The type of regulr circuits tht re discussed in this tutoril re those
More informationCSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona
CSc 453 Compilers nd Systems Softwre 4 : Lexicl Anlysis II Deprtment of Computer Science University of Arizon collerg@gmil.com Copyright c 2009 Christin Collerg Implementing Automt NFAs nd DFAs cn e hrd-coded
More informationWhat are suffix trees?
Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl
More informationFault injection attacks on cryptographic devices and countermeasures Part 2
Fult injection ttcks on cryptogrphic devices nd countermesures Prt Isrel Koren Deprtment of Electricl nd Computer Engineering University of Msschusetts Amherst, MA Countermesures - Exmples Must first detect
More informationA Comparison of High-Level Approaches for Speeding Up Pathfinding
A Comprison of High-Level Approches for Speeding Up Pthfinding Nthn R. Sturtevnt Deprtment of Computing Science University of Alert Edmonton, Alert, Cnd nthnst@cs.ulert.c Roert Geiserger Fculty of Informtics
More informationTries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries
Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer
More informationDistributed Systems Principles and Paradigms
Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784
More informationSolving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016
Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl
More informationCSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011
CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the
More informationAlgorithm Design (5) Text Search
Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:
More informationRevisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network
Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy
More informationNetwork Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved
Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed
More informationIZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI
IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI Appliction Note Rel-time nd offline modultion from ETI files Generting nd nlyzing ETI files Rel-time interfce using EDI/ETI IZT DAB CONTENTSERVER
More informationTool Vendor Perspectives SysML Thus Far
Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com
More information10.5 Graphing Quadratic Functions
0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions
More informationA Sparse Grid Representation for Dynamic Three-Dimensional Worlds
A Sprse Grid Representtion for Dynmic Three-Dimensionl Worlds Nthn R. Sturtevnt Deprtment of Computer Science University of Denver Denver, CO, 80208 sturtevnt@cs.du.edu Astrct Grid representtions offer
More informationEpson Projector Content Manager Operation Guide
Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time
More informationPosition Heaps: A Simple and Dynamic Text Indexing Data Structure
Position Heps: A Simple nd Dynmic Text Indexing Dt Structure Andrzej Ehrenfeucht, Ross M. McConnell, Niss Osheim, Sung-Whn Woo Dept. of Computer Science, 40 UCB, University of Colordo t Boulder, Boulder,
More informationGENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES
GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of
More informationDr. D.M. Akbar Hussain
Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence
More informationProduct of polynomials. Introduction to Programming (in C++) Numerical algorithms. Product of polynomials. Product of polynomials
Product of polynomils Introduction to Progrmming (in C++) Numericl lgorithms Jordi Cortdell, Ricrd Gvldà, Fernndo Orejs Dept. of Computer Science, UPC Given two polynomils on one vrile nd rel coefficients,
More informationStep-Voltage Regulator Model Test System
IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node
More informationBasics of Logic Design Arithmetic Logic Unit (ALU)
Bsics of Logic Design Arithmetic Logic Unit (ALU) CPS 4 Lecture 9 Tody s Lecture Homework #3 Assigned Due Mrch 3 Project Groups ssigned & posted to lckord. Project Specifiction is on We Due April 9 Building
More informationLexical analysis, scanners. Construction of a scanner
Lexicl nlysis scnners (NB. Pges 4-5 re for those who need to refresh their knowledge of DFAs nd NFAs. These re not presented during the lectures) Construction of scnner Tools: stte utomt nd trnsition digrms.
More informationOn Computation and Resource Management in Networked Embedded Systems
On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,
More informationCS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08
CS412/413 Introduction to Compilers Tim Teitelum Lecture 4: Lexicl Anlyzers 28 Jn 08 Outline DFA stte minimiztion Lexicl nlyzers Automting lexicl nlysis Jlex lexicl nlyzer genertor CS 412/413 Spring 2008
More informationDigital Design using HDLs EE 4755 Final Examination
Nme Solution Digitl Design using HDLs EE 4755 Finl Exmintion Thursdy, 8 Decemer 6 :3-4:3 CST Alis The Hottest Plce in Hell Prolem Prolem Prolem 3 Prolem 4 Prolem 5 Prolem 6 Exm Totl (3 pts) ( pts) (5 pts)
More informationCompilers Spring 2013 PRACTICE Midterm Exam
Compilers Spring 2013 PRACTICE Midterm Exm This is full length prctice midterm exm. If you wnt to tke it t exm pce, give yourself 7 minutes to tke the entire test. Just like the rel exm, ech question hs
More informationTransparent neutral-element elimination in MPI reduction operations
Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-188 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationTopic 2: Lexing and Flexing
Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of
More informationImplementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona
Implementing utomt Sc 5 ompilers nd Systems Softwre : Lexicl nlysis II Deprtment of omputer Science University of rizon collerg@gmil.com opyright c 009 hristin ollerg NFs nd DFs cn e hrd-coded using this
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-208 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationSolving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence
Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl component
More informationA New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method
A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,
More informationA Heuristic Approach for Discovering Reference Models by Mining Process Model Variants
A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl
More informationMcAfee Network Security Platform
Revision D McAfee Network Security Pltform (NS5x00 Quick Strt Guide) This quick strt guide explins how to quickly set up nd ctivte your McAfee Network Security Pltform NS5100 nd NS5200 Sensors in inline
More informationMcAfee Network Security Platform
NTBA Applince T-200 nd T-500 Quick Strt Guide Revision B McAfee Network Security Pltform 1 Instll the mounting rils Position the mounting rils correctly nd instll them t sme levels. At the front of the
More informationA REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS
A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationBleach: A Distributed Stream Data Cleaning System
Blech: A Distriuted Strem Dt Clening System Yongcho Tin Eurecom Biot, Frnce Emil: yongcho.tin@eurecom.fr Pietro Michirdi Eurecom Biot, Frnce Emil: pietro.michirdi@eurecom.fr Mrko Vukolić IBM Reserch Zurich,
More information2014 Haskell January Test Regular Expressions and Finite Automata
0 Hskell Jnury Test Regulr Expressions nd Finite Automt This test comprises four prts nd the mximum mrk is 5. Prts I, II nd III re worth 3 of the 5 mrks vilble. The 0 Hskell Progrmming Prize will be wrded
More informationThe Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center
Resource Overview Quntile Mesure: Skill or Concept: 80Q Multiply two frctions or frction nd whole numer. (QT N ) Excerpted from: The Mth Lerning Center PO Box 99, Slem, Oregon 9709 099 www.mthlerningcenter.org
More informationECEN 468 Advanced Logic Design Lecture 36: RTL Optimization
ECEN 468 Advnced Logic Design Lecture 36: RTL Optimiztion ECEN 468 Lecture 36 RTL Design Optimiztions nd Trdeoffs 6.5 While creting dtpth during RTL design, there re severl optimiztions nd trdeoffs, involving
More informationAn Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization
An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction
More information