Turing's Universal Machine

Total Page:16

File Type:pdf, Size:1020Kb

Turing's Universal Machine Appendix Turing’s Universal Machine This appendix gives the complete table for the universal Turing machine U. There were a number of errors in Turing’s original paper, as pointed out by Emil Post and Donald Davies.1 These errors have been corrected in the tables below. A.1 General Purpose m-functions The tape of the universal machine uses the convention of alternating F-squares and E-squares, described in Sect. 4.5, where the E-squares are used to mark, or label, symbols on the preceding F-squares. The leftmost point of the portion of the tape used in the computation is identified by means of the symbol e placed in a pair of adjacent squares. f(C, B,α): find The m-function f(C, B,α) finds the leftmost occurrence on the tape of the symbol α, and then moves to m-configuration C. If there is no occurrence of α on the tape, the machine moves to m-configuration B. m-config. symbol operations final m-config. e L f1(C, B,α) f(C, B,α) e not L f(C, B,α) ⎧ ⎨ α C f1(C, B,α) ⎩ not αR f1(C, B,α) None R f (C, B,α) ⎧ 2 ⎨ α C f2(C, B,α) ⎩ not αR f1(C, B,α) None R B 1See Post (1947) and Davies (2004). Davies describes Turing’s “impatience” when these errors were pointed out, remembering that he “made it clear that I was wasting my time and his by my worthless endeavors”. M. Priestley, A Science of Operations, History of Computing, 307 DOI 10.1007/978-1-84882-555-0, © Springer-Verlag London Limited 2011 308 Turing’s Universal Machine e(C, B,α): erase The m-function e(C, B,α)erases the leftmost occurrence on the tape of the symbol α, and then moves to m-configuration C. If there is no occurrence of α on the tape, the machine moves to m-configuration B. m-config. symbol operations final m-config. e(C, B,α) f(e1(C, B,α),B,α) e1(C, B,α) E C e(B,α): erase all The m-function e(B,α) erases all occurrences on the tape of the symbol α, and then moves to m-configuration B. m-config. symbol operations final m-config. e(B,α) e(e(B,α),B,α) pe(C,β): print at end The m-function pe(C,β) prints the symbol β at the end of the sequence of symbols on the tape, and then moves to m-configuration C. m-config. symbol operations final m-config. pe(C,β) f(pe1(C,β),C, )e Any R,R pe (C,β) pe (C,β) 1 1 None Pβ C pe(C,β)moves to the start of the tape, and then pe1(C,β)searches for the first blank F-square before printing β. A variant of this m-function prints two symbols at the end of the tape: m-config. symbol operations final m-config. pe2(C,α,β) pe(pe(C,β),α) l(C): move left The m-function l(C) performs the basic operation L, and then moves to m-configuration C. m-config. symbol operations final m-config. l(C)LC f(C, B,α): find and move left The m-function f(C, B,α) finds the leftmost oc- currence on the tape of the symbol α, moves one square to the left, and then moves to m-configuration C. If there is no occurrence of α on the tape, the machine moves to m-configuration B. m-config. symbol operations final m-config. f(C, B,α) f(l(C), B,α) c(C, B,α): copy The m-function c(C, B,α)finds the leftmost symbol on the tape marked with the symbol α, copies it to the end of the tape, and then moves to m- configuration C. If there is no symbol marked with α on the tape, the machine moves to m-configuration B. m-config. symbol operations final m-config. c(C, B,α) f (c1(C), B,α) c1(C)β pe(C,β) A.1 General Purpose m-functions 309 ce(C, B,α): copy and erase The m-function c(C, B,α)finds the leftmost symbol on the tape marked with the symbol α, copies the symbol to the end of the tape, and then erases the symbol and moves to m-configuration C. If there is no symbol marked with α on the tape, the machine moves to m-configuration B. m-config. symbol operations final m-config. ce(C, B,α) c(e(C, B,α),B,α) ce(B,α): copy and erase all The m-function ce(B,α)copies all symbols marked with α to the end of the tape, erases them, and then moves to m-configuration B. m-config. symbol operations final m-config. ce(B,α) ce(ce(B,α),B,α) The table for the universal machine uses a variant of this m-function which will copy and erase symbols marked with five different symbols. This can be defined in terms of ce(C, B,α)as follows: m-config. symbol operations final m-config. ce5(B,α,β,γ,δ,ε) ce(ce(ce(ce(ce(B,ε),δ),γ),β),α) cp(C, U, G,α,β): compare The m-function cp(C, U, G,α,β) compares the first symbol on the tape marked with α and the first symbol marked with β. If there are no symbols marked with α or β, the machine moves to m-configuration G;if both exist, and the marked symbols are the same, it moves to m-configuration C; otherwise, it moves to m-configuration U. m-config. symbol operations final m-config. cp(C, U, G,α,β) f (cp1(C, U,β),f(U, G,β),α) cp (C, U,β) γ f(cp (C, U,γ),U,β) 1 2 γ C cp (C, U,γ) 2 not γ U cpe(C, U, G,α,β): compare and erase The m-function cpe(C, U, G,α,β) does the same as cp(C, U, G,α,β), but if symbols marked with α and β exist and are the same, the α and β are erased. m-config. symbol operations final m-config. cpe(C, U, G,α,β) cp(e(e(C, C,β),C,α),U, G,α,β) cpe(U, G,α,β): compare and erase all The m-function cpe(U, G,α,β)compares the sequences of symbols on the tape marked with α and β. So long as they are the same, the αs and βs are erased. If the sequences are identical, the machine moves to m-configur ation G when all the marks have been removed; it moves to m-configur- ation U when a difference is detected. m-config. symbol operations final m-config. cpe(U, G,α,β) cpe(cpe(U, G,α,β),U, G,α,β) 310 Turing’s Universal Machine q(C): find end of tape The m-function q(C) moves to the end of the tape, identi- fied by two consecutive blank squares, and then moves to m-configuration C. m-config. symbol operations final m-config. Any R q(C) q(C) None R q (C) 1 Any R q(C) q (C) 1 None C q(C,α): find last The m-function q(C,α) finds the last occurrence of α on the tape, and then moves to m-configuration C. m-config. symbol operations final m-config. q(C,α) q(q (C,α)) 1 α C q1(C,α) not αL q1(C,α) If there is no occurrence of α on the tape, the machine will endlessly search left- wards, moving beyond the beginning of tape markers. e(C): erase marks The m-function e(C) erases all marks from the tape, and then moves to m-configuration C. m-config. symbol operations final m-config. e R e1(C) e(C) e not L e(C) Any R,E,R e (C) e (C) 1 1 None R C A.2 The Contents of the Tape It is assumed that an enumeration q1,...,qm is given of the m-configurations used in the table of T , the machine to be simulated, along with an enumeration S0,...,Sn of the symbols which can appear on its tape. S0 is a ‘blank’ symbol, which is thought of as appearing in empty squares; S1 is the digit 0 and S2 the digit 1. The table of T is assumed to have been reduced to standard form, consisting of a number of instructions each of which has one of the following forms: qiSj SkLqm, qiSj SkRqm, qiSj SkNqm. Each instruction has five components: a configuration, consisting of the initial m- configuration and the symbol in the scanned square, the symbol that will be written in the scanned square (this will be the blank symbol S0 if the existing symbol is to be erased), the move that the machine will make, and the final m-configuration. A.2 The Contents of the Tape 311 Coding Instructions The table of T is written on the tape of U as a standard description; this is an encoding of its standard form using a limited set of symbols, namely ;, A, C, D, L, R and N.Them-configuration qi is coded by a D followed by a sequence of iAs, and the symbol Si by a D followed by a sequence of iCs.
Recommended publications
  • Elementary Functions: Towards Automatically Generated, Efficient
    Elementary functions : towards automatically generated, efficient, and vectorizable implementations Hugues De Lassus Saint-Genies To cite this version: Hugues De Lassus Saint-Genies. Elementary functions : towards automatically generated, efficient, and vectorizable implementations. Other [cs.OH]. Université de Perpignan, 2018. English. NNT : 2018PERP0010. tel-01841424 HAL Id: tel-01841424 https://tel.archives-ouvertes.fr/tel-01841424 Submitted on 17 Jul 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Délivré par l’Université de Perpignan Via Domitia Préparée au sein de l’école doctorale 305 – Énergie et Environnement Et de l’unité de recherche DALI – LIRMM – CNRS UMR 5506 Spécialité: Informatique Présentée par Hugues de Lassus Saint-Geniès [email protected] Elementary functions: towards automatically generated, efficient, and vectorizable implementations Version soumise aux rapporteurs. Jury composé de : M. Florent de Dinechin Pr. INSA Lyon Rapporteur Mme Fabienne Jézéquel MC, HDR UParis 2 Rapporteur M. Marc Daumas Pr. UPVD Examinateur M. Lionel Lacassagne Pr. UParis 6 Examinateur M. Daniel Menard Pr. INSA Rennes Examinateur M. Éric Petit Ph.D. Intel Examinateur M. David Defour MC, HDR UPVD Directeur M. Guillaume Revy MC UPVD Codirecteur À la mémoire de ma grand-mère Françoise Lapergue et de Jos Perrot, marin-pêcheur bigouden.
    [Show full text]
  • A Politico-Social History of Algolt (With a Chronology in the Form of a Log Book)
    A Politico-Social History of Algolt (With a Chronology in the Form of a Log Book) R. w. BEMER Introduction This is an admittedly fragmentary chronicle of events in the develop­ ment of the algorithmic language ALGOL. Nevertheless, it seems perti­ nent, while we await the advent of a technical and conceptual history, to outline the matrix of forces which shaped that history in a political and social sense. Perhaps the author's role is only that of recorder of visible events, rather than the complex interplay of ideas which have made ALGOL the force it is in the computational world. It is true, as Professor Ershov stated in his review of a draft of the present work, that "the reading of this history, rich in curious details, nevertheless does not enable the beginner to understand why ALGOL, with a history that would seem more disappointing than triumphant, changed the face of current programming". I can only state that the time scale and my own lesser competence do not allow the tracing of conceptual development in requisite detail. Books are sure to follow in this area, particularly one by Knuth. A further defect in the present work is the relatively lesser availability of European input to the log, although I could claim better access than many in the U.S.A. This is regrettable in view of the relatively stronger support given to ALGOL in Europe. Perhaps this calmer acceptance had the effect of reducing the number of significant entries for a log such as this. Following a brief view of the pattern of events come the entries of the chronology, or log, numbered for reference in the text.
    [Show full text]
  • Reconfigurable Embedded Control Systems: Problems and Solutions
    RECONFIGURABLE EMBEDDED CONTROL SYSTEMS: PROBLEMS AND SOLUTIONS By Dr.rer.nat.Habil. Mohamed Khalgui ⃝c Copyright by Dr.rer.nat.Habil. Mohamed Khalgui, 2012 v Martin Luther University, Germany Research Manuscript for Habilitation Diploma in Computer Science 1. Reviewer: Prof.Dr. Hans-Michael Hanisch, Martin Luther University, Germany, 2. Reviewer: Prof.Dr. Georg Frey, Saarland University, Germany, 3. Reviewer: Prof.Dr. Wolf Zimmermann, Martin Luther University, Germany, Day of the defense: Monday January 23rd 2012, Table of Contents Table of Contents vi English Abstract x German Abstract xi English Keywords xii German Keywords xiii Acknowledgements xiv Dedicate xv 1 General Introduction 1 2 Embedded Architectures: Overview on Hardware and Operating Systems 3 2.1 Embedded Hardware Components . 3 2.1.1 Microcontrollers . 3 2.1.2 Digital Signal Processors (DSP): . 4 2.1.3 System on Chip (SoC): . 5 2.1.4 Programmable Logic Controllers (PLC): . 6 2.2 Real-Time Embedded Operating Systems (RTOS) . 8 2.2.1 QNX . 9 2.2.2 RTLinux . 9 2.2.3 VxWorks . 9 2.2.4 Windows CE . 10 2.3 Known Embedded Software Solutions . 11 2.3.1 Simple Control Loop . 12 2.3.2 Interrupt Controlled System . 12 2.3.3 Cooperative Multitasking . 12 2.3.4 Preemptive Multitasking or Multi-Threading . 12 2.3.5 Microkernels . 13 2.3.6 Monolithic Kernels . 13 2.3.7 Additional Software Components: . 13 2.4 Conclusion . 14 3 Embedded Systems: Overview on Software Components 15 3.1 Basic Concepts of Components . 15 3.2 Architecture Description Languages . 17 3.2.1 Acme Language .
    [Show full text]
  • YANLI: a Powerful Natural Language Front-End Tool
    AI Magazine Volume 8 Number 1 (1987) (© AAAI) John C. Glasgow I1 YANLI: A Powerful Natural Language Front-End Tool An important issue in achieving acceptance of computer sys- Since first proposed by Woods (1970), ATNs have be- tems used by the nonprogramming community is the ability come a popular method of defining grammars for natural to communicate with these systems in natural language. Of- language parsing programs. This popularity is due to the ten, a great deal of time in the design of any such system is flexibility with which ATNs can be applied to hierarchically devoted to the natural language front end. An obvious way to describable phenomenon and to their power, which is that of simplify this task is to provide a portable natural language a universal Turing machine. As discussed later, a grammar front-end tool or facility that is sophisticated enough to allow in the form of an ATN (written in LISP) is more informative for a reasonable variety of input; allows modification; and, than a grammar in Backus-Naur notation. As an example, yet, is easy to use. This paper describes such a tool that is the first few lines of a grammar for an English sentence writ- based on augmented transition networks (ATNs). It allows ten in Backus-Naur notation might look like the following: for user input to be in sentence or nonsentence form or both, provides a detailed parse tree that the user can access, and sentence : := [subject] predicate also provides the facility to generate responses and save in- subject ::= noun-group formation.
    [Show full text]
  • 195907-08.Pdf
    IS LEMETER \GNETICS " IPPORTS IE WEIGHT ONE ~/ ./ )UNG .EPHANT s a jaster, more reliable memory, too! LLY TEST t we hope it attracts your ention to the thorough "ee-stage inspection and testing len every TELEMETER MAGNETICS ~mory product - from core to ray to buffers and memory systems. .C·l!r~.····~ ')1 r·,1 :!~:rIGS arufac'c;re: th" :-;)em;~r)' sy:;te;' complete from core pro- du~;t i::: irin.c: t ~is':,j ... and because TElEf~ETER MAGr'lETIGS tests FlU cal ;~e tnat milch :;ur~i when you specify memory ",'!;ar 'lJ':\::~~ mernar! "y~tems to satisfy practically any :;)t)figuf?t:on. linns :-;f :1:'''-' Hl to 1,~:;;O,OOU bits are COlllmon.,. memories can be iiiuil ~,il' :i, a:j:jitic;n, n.~! offers you :\ selection of memory up:t~, ":ili! r:vr.ie tirnl?s of ;,1 microsecond:;, 6 to 8 microseconds, ilnd 3 microseconds. i::', IIII'll/un s(uclt JUT [i.':cti or:ic circu in TEU:W::n:R f,li'IGNH!GS menlOl y systems employ solid state elements a '20-lIIir'f"()s(,(,()lId "ystem 20 Jf! UfJld., ui 2'2 liI',,\ I'll!'!! ilrc on n!il;,-in (>W;'j tor com~~3ctness anti mainten'lf]ce ease, I' .7 , / (':'! .' ,I .r ) / f '/ • ,'f ,. r' t ,.' f ( ,r .... I I j • ~ ~. / i "'(" ( ,: r I .~ • I i j' I ' { i I [ • / (~ '. \ ,\fulIu/ul'lur l '/'. ,,!, 1PORTAlH JOB OPPORTUNITIES liJ\11tW,ilffii j itJit:Il": l,~ill( ,1i(~i'tllijH !~'fu.;liT:USdjll\Ji~t !!lDH tfUfjjlF~l~ !!i~'(~:iij»; TELEMETER MAGNETICS Inc.
    [Show full text]
  • Turing's Influence on Programming — Book Extract from “The Dawn of Software Engineering: from Turing to Dijkstra”
    Turing's Influence on Programming | Book extract from \The Dawn of Software Engineering: from Turing to Dijkstra" Edgar G. Daylight∗ Eindhoven University of Technology, The Netherlands [email protected] Abstract Turing's involvement with computer building was popularized in the 1970s and later. Most notable are the books by Brian Randell (1973), Andrew Hodges (1983), and Martin Davis (2000). A central question is whether John von Neumann was influenced by Turing's 1936 paper when he helped build the EDVAC machine, even though he never cited Turing's work. This question remains unsettled up till this day. As remarked by Charles Petzold, one standard history barely mentions Turing, while the other, written by a logician, makes Turing a key player. Contrast these observations then with the fact that Turing's 1936 paper was cited and heavily discussed in 1959 among computer programmers. In 1966, the first Turing award was given to a programmer, not a computer builder, as were several subsequent Turing awards. An historical investigation of Turing's influence on computing, presented here, shows that Turing's 1936 notion of universality became increasingly relevant among programmers during the 1950s. The central thesis of this paper states that Turing's in- fluence was felt more in programming after his death than in computer building during the 1940s. 1 Introduction Many people today are led to believe that Turing is the father of the computer, the father of our digital society, as also the following praise for Martin Davis's bestseller The Universal Computer: The Road from Leibniz to Turing1 suggests: At last, a book about the origin of the computer that goes to the heart of the story: the human struggle for logic and truth.
    [Show full text]
  • Internet Engineering Jan Nikodem, Ph.D. Software Engineering
    Internet Engineering Jan Nikodem, Ph.D. Software Engineering Theengineering paradigm Software Engineering Lecture 3 The term "software crisis" was coined at the first NATO Software Engineering Conference in 1968 by: Friedrich. L. Bauer Nationality;German, mathematician, theoretical physicist, Technical University of Munich Friedrich L. Bauer 1924 3/24 The term "software crisis" was coined at the first NATO Software Engineering Conference in 1968 by: Peter Naur Nationality;Dutch, astronomer, Regnecentralen, Niels Bohr Institute, Technical University of Denmark, University of Copenhagen. Peter Naur 1928 4/24 Whatshouldbe ourresponse to software crisis which provided with too little quality, too late deliver and over budget? Nationality;Dutch, astronomer, Regnecentralen, Niels Bohr Institute, Technical University of Denmark, University of Copenhagen. Peter Naur 1928 5/24 Software should following an engineering paradigm NATO conference in Garmisch-Partenkirchen, 1968 Peter Naur 1928 6/24 The hope is that the progress in hardware will cure all software ills. The Oberon System User Guide and Programmer's Manual. ACM Press Nationality;Swiss, electrical engineer, computer scientist ETH Zürich, IBM Zürich Research Laboratory, Institute for Media Communications Martin Reiser 7/24 However, a critical observer may notethat software manages to outgrow hardware in size and sluggishness. The Oberon System User Guide and Programmer's Manual. ACM Press Nationality;Swiss, electrical engineer, computer scientist ETH Zürich, IBM Zürich Research Laboratory, Institute for Media Communications Martin Reiser 8/24 Wirth's computing adage Software is getting slower more rapidly than hardware becomes faster. Nationality;Swiss, electronic engineer, computer scientist ETH Zürich, University of California, Berkeley, Stanford University University of Zurich. Xerox PARC.
    [Show full text]
  • Church-Turing Thesis: Every Function F: {0,1}* -> {0,1}* Which Is "Effectively Computable" Is Computable by a Turing Machine
    Church-Turing Thesis: Every function f: {0,1}* -> {0,1}* which is "effectively computable" is computable by a Turing Machine. Observation: Every Turing Machine (equivalently, every python program, or evey program in your favorite language) M can be encoded by a finite binary string #M. Moreover, our encoding guarantees #M != #M' whenever M and M' are different Turing Machines (different programs). Recall: Every finite binary string can be thought of as a natural number written in binary, and vice versa. Therefore, we can think of #M as a natural number. E.g. If #M = 1057, then we are talking about the 1057th Turing Machine, or 1057th python program. Intuitive takeaway: At most, there are as many different Turing Machines (Programs) as there are natural numbers. We will now show that some (in fact most) decision problems f: {0,1}* -> {0,1} are not computable by a TM (python program). If a decision problem is not comptuable a TM/program then we say it is "undecidable". Theorem: There are functions from {0,1}* to {0,1} which are not computable by a Turing Machine (We say, undecidable). Corollary: Assuming the CT thesis, there are functions which are not "effectively computable". Proof of Theorem: - Recall that we can think of instead of of {0,1}* - "How many" functions f: -> {0,1} are there? - We can think of each each such function f as an infinite binary string - For each x in (0,1), we can write its binary expansion as an infinite binary string to the right of a decimal point - The string to the right of the decimal point can be interpreted as a function f_x from natural numbers to {0,1} -- f_x(i) = ith bit of x to the right of the decimal point - In other words: for each x in (0,1) we get a different function f_x from natural numbers to {0,1}, so there are at least as many decision problems as there are numbers in (0,1).
    [Show full text]
  • Computers Friday, February 12, 2021 11:00 AM
    1 Introduction: Computers Friday, February 12, 2021 11:00 AM Welcome! CMSC 240 - Principles of Computer Organization Class website: https://cs.brynmawr.edu/Courses/cs240/Spring2021/ What is a computer? A device with • A processor (CPU - Central Processing Unit) • Storage/memory (RAM, Disk, USB Stick) • A keyboard • A mouse • A monitor • A printer Not all computers have all of the above. Except the CPU and memory. Japan's Fugaku Supercomputer is one of the world's fastest computer as of Summer 2020. Performance is over 400 petaflops (over a million times faster than the desktop shown on the right). Question: What was the first ever computer? 240 Lectures Page 1 1 Computers - Old & New Friday, February 12, 2021 11:00 AM The Difference Engine #2: A Mechanical Computer ENIAC Electronic Numerical Integrator and Computer February 15, 1946. ENIAC Day is this week! https://eniacday.org/ Check it out. Question: What is the difference between the ENIAC, the Apple Mac, the Iphone, and the Fugaku??? 240 Lectures Page 2 1 Turing Machines Friday, February 12, 2021 11:00 AM 1937: Alan M. Turing Turing Machine [A mathematical abstraction of mechanical computation.] Turing Machines for adding and multiplying Universal Turing Machine Church-Turing Thesis (tl;dr) Anything that can be computed can be computed by a Turing machine. Key Idea: A computer is essentially a Turing Machine. A computer is a universal computing device. 240 Lectures Page 3 1 Put on Watch List… Friday, February 12, 2021 8:55 AM 240 Lectures Page 4 1 von Neumann Architecture Friday, February 12, 2021 11:00 AM John von Neumann, 1945 Stored Program Computers Aka von Neumann Architecture Most computers today are based on this architecture.
    [Show full text]
  • Universal Turing Machine
    15-251 Great Theoretical Ideas in Computer Science Lecture 21 - Dan Kilgallin Turing Machines Goals Describe the nature of computation Mathematically formalize the behavior of a program running on a computer system Compare the capabilities of different programming languages Turing Machines What can we do to make a DFA better? Idea: Give it some memory! How much memory? Infinite! What kind of memory? Sequential access (e. g. CD, hard drive) or RAM? An infinite amount of RAM requires remembering really big numbers and needlessly complicates proofs Turing Machines: Definition A Turing Machine consists of A DFA to store the machine state, called the controller An array that is infinitely long in both directions, called the tape A pointer to some particular cell in the array, called the head Operation The head begins at cell 0 on the tape The DFA begins in some initial state Symbols from some alphabet are written on a finite portion of the tape, beginning at cell 1 Operation At each step, the machine uses as input: The state of the controller The symbol written on the cell which the head is at Using this, the machine will: Transition to some state in the DFA (possibly the same state) Write some symbol (possibly the same symbol) on the tape Move the head left or right one cell Two Flavors! The machine will stop computation if the DFA enters one of a pre-defined set of "halting" states A "decision" machine will, if it reaches a halting state, output either "Yes" or "No" (i.e. there are "accepting" and "rejecting" halt states) A "function" machine will, if it reaches a halting state, have some string of symbols written on the tape.
    [Show full text]
  • Saskia Lourens Writing His-1
    UvA-DARE (Digital Academic Repository) Writing history : national identity in André Brink's post-apartheid fiction Lourens, S.T. Publication date 2009 Document Version Final published version Link to publication Citation for published version (APA): Lourens, S. T. (2009). Writing history : national identity in André Brink's post-apartheid fiction. General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:30 Sep 2021 WRITING HISTORY: NATIONAL IDENTITY IN ANDRÉ BRINK’S POST-APARTHEID FICTION ACADEMISCH PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit van Amsterdam op gezag van de Rector Magnificus prof. dr. D. C. van den Boom ten overstaan van een door het college voor promoties ingestelde commissie, in het openbaar te verdedigen in de Aula der Universiteit op woensdag 28 oktober 2009, te 10:00 uur door Saskia Theodora Lourens geboren te Port Elizabeth, Zuid Afrika 1 Promotiecommissie Promotor: prof.
    [Show full text]
  • Boolean Matrix in the Matrix Equation (19)
    General Disclaimer One or more of the Following Statements may affect this Document This document has been reproduced from the best copy furnished by the organizational source. It is being released in the interest of making available as much information as possible. This document may contain data, which exceeds the sheet parameters. It was furnished in this condition by the organizational source and is the best copy available. This document may contain tone-on-tone or color graphs, charts and/or pictures, which have been reproduced in black and white. This document is paginated as submitted by the original source. Portions of this document are not fully legible due to the historical nature of some of the material. However, it is the best reproduction available from the original submission. Produced by the NASA Center for Aerospace Information (CASI) C f I l 1 ^o } Technical Report 69-86 March 1969 Design Automation by the Computer Design Language by Yaohan Cho Professor fr N he computer time used was supported by the National Aeronautics and Space Administration under Grant NsO 398 to the Computer Science Center of the University of Maryland. /i Abstract A Computer Design Language (CDL) has been developed for facilitating design automation of digital computers. When the functional organizatl.on and sequential operation of a digital computer are conceived and specified by the CDL, this d CDL description is called a Macro design. The macro design is highly descriptive in computer elements. it describes precisely and concisely what the computer is expected to do functionally step by step.
    [Show full text]