You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The pillars of the bridge on the cover of this book date from the Roman Empire and they are in daily use today, an example of conventional engineering at its best. Modern commodity operating systems are examples of current system programming at its best, with bugs discovered and fixed on a weekly or monthly basis. This book addresses the question of whether it is possible to construct computer systems that are as stable as Roman designs. The authors successively introduce and explain specifications, constructions and correctness proofs of a simple MIPS processor; a simple compiler for a C dialect; an extension of the compiler handling C with inline assembly, interrupts and devices; and the v...
Hardware correctness is becoming ever more important in the design of computer systems. The authors introduce a powerful new approach to the design and analysis of modern computer architectures, based on mathematically well-founded formal methods which allows for rigorous correctness proofs, accurate hardware costs determination, and performance evaluation. This book develops, at the gate level, the complete design of a pipelined RISC processor with a fully IEEE-compliant floating-point unit. In contrast to other design approaches, the design presented here is modular, clean and complete.
Reinhard Wilhelm's career in Computer Science spans more than a third of a century. This Festschrift volume, published to honor him on his 60th Birthday on June 10, 2006, includes 15 refereed papers by leading researchers, his graduate students and research collaborators, as well as current and former colleagues, who all attended a celebratory symposium held at Schloss Dagstuhl, Germany.
This monograph is based on the third author's lectures on computer architecture, given in the summer semester 2013 at Saarland University, Germany. It contains a gate level construction of a multi-core machine with pipelined MIPS processor cores and a sequentially consistent shared memory. The book contains the first correctness proofs for both the gate level implementation of a multi-core processor and also of a cache based sequentially consistent shared memory. This opens the way to the formal verification of synthesizable hardware for multi-core processors in the future. Constructions are in a gate level hardware model and thus deterministic. In contrast the reference models against which correctness is shown are nondeterministic. The development of the additional machinery for these proofs and the correctness proof of the shared memory at the gate level are the main technical contributions of this work.
To make communication and computation secure against catastrophic failure and malicious interference, it is essential to build secure software systems and methods for their development. This book describes the ideas on how to meet these challenges in software engineering.
Designed to provide English readers of German literature the opportunity to familiarize themselves with both the established canon and newly emerging literatures that reflect the concerns of women and ethnic minorities, the Encyclopedia of German Literature includes more than 500 entries on writers, individual work, and topics essential to an understanding of this rich literary tradition. Drawing on the expertise of an international group of experts, the essays in the encyclopedia reflect developments of the latest scholarship in German literature, culture, and history and society. In addition to the essays, author entries include biographies and works lists; and works entries provide information about first editions, selected critical editions, and English-language translations. All entries conclude with a list of further readings.
With reference to the treatment of mind-body problems in the novels and non-fictional writings of Johann Karl Wezel, Karl Philipp Moritz, and Jean Paul, this impressive study follows the development of, and demonstrates the continuity, in the history of ideas in Germany between the Late Enlightenment and Romanticism.
This book constitutes the refereed proceedings of the 12th IFIP WG 10.5 Advanced Research Working Conference on Correct Hardware Design and Verification Methods, CHARME 2003, held in L'Aquila, Italy in October 2003. The 24 revised full papers and 8 short papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on software verification, automata based methods, processor verification, specification methods, theorem proving, bounded model checking, and model checking and applications.
This book introduces the theory of stochastic processes with applications taken from physics and finance. Fundamental concepts like the random walk or Brownian motion but also Levy-stable distributions are discussed. Applications are selected to show the interdisciplinary character of the concepts and methods. In the second edition of the book a discussion of extreme events ranging from their mathematical definition to their importance for financial crashes was included. The exposition of basic notions of probability theory and the Brownian motion problem as well as the relation between conservative diffusion processes and quantum mechanics is expanded. The second edition also enlarges the treatment of financial markets. Beyond a presentation of geometric Brownian motion and the Black-Scholes approach to option pricing as well as the econophysics analysis of the stylized facts of financial markets, an introduction to agent based modeling approaches is given.