"Today's computers must perform with increasing reliability, which in turn depends on the problem of determining whether a circuit has been manufactured properly or behaves correctly. However, the greater circuit density of VLSI circuits and systems has made testing more difficult and costly. This book notes that one solution is to develop faster and more efficient algorithms to generate test p…
"Logo for the Macintosh teaches the art of programming to first time programmers. It begins with Turtle Geometry, a series of exercises involving both Logo programming and geometric concepts. Later chapters illustrate more advanced topics, such as the famous DOCTOR program with its simulated psychotherapist and an INSTANT program that enables parents and teachers to create a programming environ…
Data-Parallel Programming demonstrates that architecture-independent parallel programming is possible by describing in detail how programs written in a high-level SIMD programming language may be compiled and efficiently executed-on both shared-memory multiprocessors and distributed-memory multicomputers.MIMD computers are notoriously difficult to program. Data-Parallel Programming demonstrates…
"Difficult to learn and awkward to use, today's information systems often change our activities in ways that we do not need or want. The problem lies in the software development process. In this book John Carroll shows how a pervasive but underused element of design practice, the scenario, can transform information systems design.Traditional textbook approaches manage the complexity of the desi…
Emphasizing issues of computational efficiency, Michael Kearns and Umesh Vazirani introduce a number of central topics in computational learning theory for researchers and students in artificial intelligence, neural networks, theoretical computer science, and statistics.Computational learning theory is a new and rapidly expanding area of research that examines formal models of induction with th…
"When an application is built, an underlying data model is chosen to make that application effective. Frequently, other applications need the same data, only modeled differently. The solution of copying the underlying data and modeling is costly in terms of storage and makes data maintenance and evolution impossible. View mechanisms are a technique to model data differently for various applicat…
Complex communicating computer systems -- computers connected by data networks and in constant communication with their environments -- do not always behave as expected. This book introduces behavioral modeling, a rigorous approach to behavioral specification and verification of concurrent and distributed systems. It is among the very few techniques capable of modeling systems interaction at a …
"Emergence--the formation of global patterns from solely local interactions--is a frequent and fascinating theme in the scientific literature both popular and academic. In this book, Keith Downing undertakes a systematic investigation of the widespread (if often vague) claim that intelligence is an emergent phenomenon. Downing focuses on neural networks, both natural and artificial, and how the…
""Manipulation" refers to a variety of physical changes made to the world around us. Mechanics of Robotic Manipulation addresses one form of robotic manipulation, moving objects, and the various processes involved--grasping, carrying, pushing, dropping, throwing, and so on. Unlike most books on the subject, it focuses on manipulation rather than manipulators. This attention to processes rather …
The untold history of women and computing: how pioneering women succeeded in a field shaped by gender biases. Today, women earn a relatively low percentage of computer science degrees and hold proportionately few technical computing jobs. Meanwhile, the stereotype of the male “computer geek” seems to be everywhere in popular culture. Few people know that women were a significant presence…