Hamming Distance, We Can Work with the Distances Instead of the % Conditional Probability

Total Page:16

File Type:pdf, Size:1020Kb

Hamming Distance, We Can Work with the Distances Instead of the % Conditional Probability Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong [email protected] 4. Mutual Information and Channel Capacity Office Hours: Check Google Calendar on the course website. Dr.Prapun’s Office: 6th floor of Sirindhralai building, 1 BKD Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong [email protected] Operational Channel Capacity 14 Channel Capacity [Section 4.2] “Operational”: max rate at which reliable communication is possible Channel Capacity Arbitrarily small error probability can be achieved. “Information”: [bpcu] [Section 4.3] Shannon [1948] shows that these two quantities are actually the same. 15 System Model for Section 3.4 Message Transmitter Information Source Channel Digital Source Encoder Encoder Modulator Transmitted Remove Add X: channelSignal input redundancy systematic redundancy EquivalentChannel Channel Recovered Decoded Message value Received Y: channelSignal output Source Channel Digital Destination Decoder Decoder (Detector)Demodulator Receiver In Chapter 3, we studied how to find the optimal decoder. Some results from Section 3.3-3.4 17 Under appropriate assumptions, minimum distance decoder is optimal. System Model for Section 3.5 Message Transmitter Information Source Channel Source Encoder Encoder Remove Add systematic X: channel input redundancy redundancy Equivalent Channel Recovered Decoded Message value Y: channel output Source Channel Destination Decoder Decoder (Detector) Receiver We then introduced the channel encoder box. [3.62] Block Encoding Channel X Encoder k bits k bits k bits n bits n bits n bits , code Code rate = [3.62] Block Encoding Channel X Encoder k bits k bits k bits n bits n bits n bits , code Code rate = Example: Repetition Code Channel X 1 0 1 111110000011111 Encoder 1bit 1bit 1bit 5 bits 5 bits 5 bits , code Code rate = [3.62] Block Encoding Channel X Encoder k bits n bits 2 possibilities Choose 2 from 2 possibilities to be [Figure 13] used as codewords. Codebook Repetition Code 22 Review: Channel Encoder and Decoder 2 possibilities Choose 2 from 2 possibilities to be used as codewords. Message (Data block) Channel Digital Encoder Modulator Transmitted k bits k bits k bits Signal Add n bits n bits n bits systematic redundancy 0 1-p 0 p Channel Binary Symmetric p 1 1-p 1 Channel with p < 0.5 Received Noise & Interference Signal Channel Digital Recovered Message Decoder Demodulator 23 minimum distance decoder Example: Repetition Code [Figure 14] Original Equivalent Channel: 0 1-p 0 p p 1 1-p 1 BSC with crossover probability p = 0.01 New (and Better) Equivalent Channel: 1-p Repetition 0 0 Majority 0 0 Code with p p Vote 1 1 n = 5 1 1-p 1 Use repetition code with n = 5 at the transmitter Use majority vote at the receiver 5 5 5 1 1 1 New BSC with 3 4 5 10 24 [From ECS315] 25 MATLAB close all; clear all; % ECS315 Example 6.58 % ECS452 Example 3.66 C = [0 0 0 0 0; 1 1 1 1 1]; % repetition code p = (1/100); PE_minDist(C,p) Code C is defined by putting all its (valid) codewords as its rows. For repetition >> PE_minDist_demo1 code, there are two codewords: 00..0 and 11..1. ans = 9.8506e-06 Crossover probability of the binary symmetric channel. 26 function PE = PE_minDist(C,p) MATLAB % Function PE_minDist_3 computes the error probability P(E) when code C % is used for transmission over BSC with crossover probability p. % Code C is defined by putting all its (valid) codewords as its rows. M = size(C,1); k = log2(M); n = size(C,2); % Generate all possible received vectors Y = dec2bin(0:2^n-1)-'0'; % Normally, we need to construct an extended Q matrix. However, because % each conditional probability in there is a decreasing function of the % Hamming distance, we can work with the distances instead of the % conditional probability. In particular, instead of selecting the max in % each column of the Q matrix, we consider min distance in each column. dmin = zeros(1,2^n); for j = 1:(2^n) % for each received vector y, y = Y(j,:); % find the minimum distance (the distance from y to the closest % codeword) d = sum(mod(bsxfun(@plus,y,C),2),2); dmin(j) = min(d); end % From the distances, calculate the conditional probabilities. % Note that we compute only the values that are to be selected (instead of % calculating the whole Q first). n1 = dmin; n0 = n-dmin; Qmax = (p.^n1).*((1-p).^n0); % Scale the conditional probabilities by the input probabilities and add % the values. Note that we assume equally likely input. PC = sum((1/M)*Qmax); PE = 1-PC; end 27 MATLAB 28 Example: Repetition Code Original Equivalent Channel: 0 1-p 0 p p 1 1-p 1 BSC with crossover probability p New (and Better) Equivalent Channel: 1-p Repetition 0 0 Majority 0 0 Code with p p Vote 1 1 n = 5 1 1-p 1 Use repetition code at the transmitter Use majority vote at the receiver New BSC with new crossover probability 29 MATLAB close all; clear all; 0.5 % ECS315 Example 6.58 0.45 % ECS452 Example 3.66 0.4 C = [0 0 0 0 0; 1 1 1 1 1]; 0.35 0.3 0.25 syms p; P(E) PE = PE_minDist(C,p) 0.2 pp = linspace(0,0.5,100); 0.15 0.1 PE = subs(PE,p,pp); 0.05 plot(pp,PE,'LineWidth',1.5) 0 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 xlabel('p') p ylabel('P(E)') grid on >> PE_minDist_demo2 PE = (p - 1)^5 + 10*p^2*(p - 1)^3 - 5*p*(p - 1)^4 + 1 30 Searching for the best encoder Now that we have MATLAB function PE_minDist, for specific values of n, k, we can try to search for the encoder that minimizes the error probability. Recall that, from Example 3.64, there are reasonable encoders. Even for small n and k, this is a large space to look at every possible cases. 31 Example: Repetition Code 0 1-p 0 0 0 Repetition p Majority p Vote Code 1 1 1 1-p 1 0.1 1 0.1 3 3 3 1 0.0280 2 3 5 5 5 5 1 1 0.0086 3 4 5 7 0.0027 9 8.9092 10 11 2.9571 10 32 Channel Capacity [Section 4.2] “Operational”: max rate at which reliable communication is possible Channel Capacity Arbitrarily small error probability can be achieved. “Information”: [bpcu] [Section 4.3] Shannon [1948] shows that these two quantities are actually the same. 33 Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong [email protected] 5. Channel Coding Office Hours: Check Google Calendar on the course website. Dr.Prapun’s Office: 6th floor of Sirindhralai building, 1 BKD Review: Channel Encoder and Decoder Message Transmitter S Information Source Channel Digital Source Encoder Encoder Modulator Transmitted Add X: channelSignal input systematic redundancy 0 1-p 0 p Channel p 1 1-p 1 Noise & Interference Recovered Message Receiver Received Y: channelSignal output Source Channel Digital Destination Decoder Decoder Demodulator 2 System Model for Chapter 5 Transmitter s Channel Digital Message Encoder Modulator Transmitted Add x: channelSignal input systematic redundancy 0 1-p 0 p Channel p 1 1-p 1 Received Noise & Interference Receiver y: channel output Signal Channel Digital Recovered Message Decoder Demodulator 3 Vector Notation 0,0: the zero vector ⋮ (the all-zero vector) : column vector ⋮ 1,1: the one vector (the all-one vector) : row vector ,,…,,… Subscripts represent element indices inside individual vectors. th and refer to the i elements inside the vectors and , respectively. When we have a list of vectors, we use superscripts in parentheses as indices of vectors. is a list of M column vectors is a list of M row vectors and refer to the ith vectors in the corresponding lists. 4 Harpoon a long, heavy spear attached to a rope, used for killing large fish or whales 5 Review: Channel Decoding Recall 1. The MAP decoder is the optimal decoder. 2. When the codewords are equally-likely, the ML decoder the same as the MAP decoder; hence it is also optimal. 3. When the crossover probability of the BSC p is < 0.5, ML decoder is the same as the minimum distance decoder. In this chapter, we assume the use of minimum distance decoder. arg min , Also, in this chapter, we will focus less on probabilistic analysis, but more on explicit codes. 6 Digital Communication Systems ECS 452 Asst. Prof. Dr. Prapun Suksompong [email protected] 5.1 Binary Linear Block Codes Office Hours: Check Google Calendar on the course website. Dr.Prapun’s Office: 6th floor of Sirindhralai building, 7 BKD Review: Block Encoding We mentioned the general form of channel coding over BSC. In particular, we looked at the general form of block codes. Block Encoder k bits k bits k bits n bits n bits n bits Code length “Dimension” of the code (n,k) codes: n-bit blocks are used to conveys k-info-bit blocks Assume n > k codewords “messages” Max. achievable rate Rate: . Recall that the capacity of BSC is 1 . For ∈ 0,1 , we also have ∈ 0,1 . Achievable rate is < 1. 8 System Model for Section 5.1 Transmitter s Channel Digital Message Encoder Modulator n bits Transmitted k bits Add x: channelSignal input systematic redundancy 0 1-p 0 p Channel p 1 1-p 1 Received Noise & Interference Receiver y: channel output Signal Recovered Message Channel Digital Decoder Demodulator k bits n bits 9 = the collection of all codewords for the code considered Each n-bit block is selected from .
Recommended publications
  • You and Your Research & the Elements of Style
    You and Your Research & The Elements of Style Philip Wadler University of Edinburgh Logic Mentoring Workshop Saarbrucken,¨ Monday 6 July 2020 Part I You and Your Research Richard W. Hamming, 1915–1998 • Los Alamos, 1945. • Bell Labs, 1946–1976. • Naval Postgraduate School, 1976–1998. • Turing Award, 1968. (Third time given.) • IEEE Hamming Medal, 1987. It’s not luck, it’s not brains, it’s courage Say to yourself, ‘Yes, I would like to do first-class work.’ Our society frowns on people who set out to do really good work. You’re not supposed to; luck is supposed to descend on you and you do great things by chance. Well, that’s a kind of dumb thing to say. ··· How about having lots of ‘brains?’ It sounds good. Most of you in this room probably have more than enough brains to do first-class work. But great work is something else than mere brains. ··· One of the characteristics of successful scientists is having courage. Once you get your courage up and believe that you can do important problems, then you can. If you think you can’t, almost surely you are not going to. — Richard Hamming, You and Your Research Develop reusable solutions How do I obey Newton’s rule? He said, ‘If I have seen further than others, it is because I’ve stood on the shoulders of giants.’ These days we stand on each other’s feet! Now if you are much of a mathematician you know that the effort to gen- eralize often means that the solution is simple.
    [Show full text]
  • History of Modern Applied Mathematics in Mathematics Education
    HISTORY OF MODERN APPLIED MATHEMATICS IN MATHEMATICS EDUCATION UFFE THOMAS JANKVISI [I] When conversations turn to using history of mathematics in in-issues, of mathematics. When using history as a tool to classrooms, the rnferent is typically the old, often antique, improve leaining or instruction, we may distinguish at least history of the discipline (e g, Calinger, 1996; Fauvel & van two different uses: history as a motivational or affective Maanen, 2000; Jahnke et al, 1996; Katz, 2000) [2] This tool, and histmy as a cognitive tool Together with history tendency might be expected, given that old mathematics is as a goal these two uses of histoty as a tool are used to struc­ often more closely related to school mathematics However, ture discussion of the educational benefits of choosing a there seem to be some clear advantages of including histo­ history of modern applied mathematics ries of more modern applied mathematics 01 histories of History as a goal 'in itself' does not refor to teaching his­ modem applications of mathematics [3] tory of mathematics per se, but using histo1y to surface One (justified) objection to integrating elements of the meta-aspects of the discipline Of course, in specific teach­ history of modetn applied mathematics is that it is often com­ ing situations, using histmy as a goal may have the positive plex and difficult While this may be so in most instances, it side effect of offering students insight into mathematical is worthwhile to search for cases where it isn't so I consider in-issues of a specific history But the impo1tant detail is three here.
    [Show full text]
  • Computing As Engineering
    Journal of Universal Computer Science, vol. 15, no. 8 (2009), 1642-1658 submitted: 14/3/09, accepted: 27/4/09, appeared: 28/4/09 © J.UCS Computing as Engineering Matti Tedre (Tumaini University, Iringa, Tanzania fi[email protected]) Abstract: Computing as a discipline is often characterized as a combination of three major traditions: theoretical, scientific, and engineering tradition. Although the three traditions are all considered equally necessary for modern computing, the engineering tradition is often considered to be useful but to lack intellectual depth. This article discusses the basic intellectual background of the engineering tradition of computing. The article depicts the engineering aims manifest in the academic field of computing, compares the engineering tradition with the other traditions of computing as a disci- pline, and presents some epistemological, ontological, and methodological views con- cerning the engineering tradition of computing. The article aims at giving the reader an overview of the engineering tradition in computing and of some open questions about the intellectual foundations and contributions of the engineering tradition in computing. Key Words: information technology, philosophy of computer science, philosophy of technology, computing, engineering Category: K.7, K.7.1, K.7.m 1 Introduction The juxtaposing of science and technology is perhaps nowhere else as marked as in the computing disciplines. The division of computing into its mathemat- ical/theoretical, scientific/empirical, and design/engineering traditions ([Weg- ner, 1976], [Denning et al., 1989]) has spurred fiery debates about the merits and shortcomings of each tradition. In those debates, the theoretical tradition leans on the recognition of mathematics and logic as the theoretical cornerstones of computing, the scientific tradition draws support from arguments from the philosophy of science, but the design/engineering tradition is usually only rec- ognized for its utility and not for its intellectual foundations.
    [Show full text]
  • OF the AMERICAN MATHEMATICAL SOCIETY 157 Notices February 2019 of the American Mathematical Society
    ISSN 0002-9920 (print) ISSN 1088-9477 (online) Notices ofof the American MathematicalMathematical Society February 2019 Volume 66, Number 2 THE NEXT INTRODUCING GENERATION FUND Photo by Steve Schneider/JMM Steve Photo by The Next Generation Fund is a new endowment at the AMS that exclusively supports programs for doctoral and postdoctoral scholars. It will assist rising mathematicians each year at modest but impactful levels, with funding for travel grants, collaboration support, mentoring, and more. Want to learn more? Visit www.ams.org/nextgen THANK YOU AMS Development Offi ce 401.455.4111 [email protected] A WORD FROM... Robin Wilson, Notices Associate Editor In this issue of the Notices, we reflect on the sacrifices and accomplishments made by generations of African Americans to the mathematical sciences. This year marks the 100th birthday of David Blackwell, who was born in Illinois in 1919 and went on to become the first Black professor at the University of California at Berkeley and one of America’s greatest statisticians. Six years after Blackwell was born, in 1925, Frank Elbert Cox was to become the first Black mathematician when he earned his PhD from Cornell University, and eighteen years later, in 1943, Euphemia Lofton Haynes would become the first Black woman to earn a mathematics PhD. By the late 1960s, there were close to 70 Black men and women with PhDs in mathematics. However, this first generation of Black mathematicians was forced to overcome many obstacles. As a Black researcher in America, segregation in the South and de facto segregation elsewhere provided little access to research universities and made it difficult to even participate in professional societies.
    [Show full text]
  • The Art of Proof
    Matthias Beck & Ross Geoghegan The Art Of Proof Basic Training For Deeper Mathematics August 8, 2011 Springer Great teachers introduced us to the arts of mathematics and writing: To Harald Kohl and Hartmut Stapf To the memory of Fr. Harry Lawlor, SJ and Fr. Joseph Veale, SJ Preface PEANUTS: c United Feature Syndicate, Inc. Reprinted with permission. We have written this book with several kinds of readers in mind: (a) Undergraduates who have taken courses such as calculus and linear algebra, but who are not yet prepared for upper-level mathematics courses. We cover mathematical topics that these students should know. The book also provides a bridge to the upper-level courses, since we discuss formalities and conventions in detail, including the axiomatic method and how to deal with proofs. (b) Mathematics teachers and teachers-in-training. We present here some of the foundations of mathematics that anyone teaching mathematics beyond the most elementary levels should know. (c) High-school students with an unusually strong interest in mathematics. Such students should find this book interesting and (we hope) unconventional. (d) Scientists and social scientists who have found that the mathematics they studied as undergraduates is not sufficient for their present needs. Typically, the problem here is not the absence of training in a particular technique, but rather a general feeling of insecurity about what is correct or incorrect in mathematics, a sense of material only partly understood. Scientists must be confident that they are using mathematics correctly: fallacious mathematics almost guarantees bad science. In so far as possible we try to “work in” the formal methods indirectly, as we take the reader through some interesting mathematics.
    [Show full text]
  • Naval Postgraduate School
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Faculty and Researcher Publications News Articles 2015-01-06 Iconic Researcher, Teacher Richard Hamming Maintains Lasting Legacy on Campus Stewart, Kenneth A. Monterey, California, Naval Postgraduate School http://hdl.handle.net/10945/44775 Naval Postgraduate School - Iconic Researcher, Teacher Richard Hamming Maintains Lasting Legacy on Campus Library Research Technology Services NPS Home About NPS Academics Administration Library Research Technology Services NPS Home About NPS Academics Administration Calendar | Directory SEARCH About NPS Academics Administration Library Research Technology Services Iconic Researcher, Teacher Richard Hamming Maintains Lasting Legacy on Campus NPS > About NPS > News Article By: Kenneth A. Stewart “The purpose of computing is insight, not numbers,” once noted renowned mathematician and former Naval Postgraduate School (NPS) Professor Richard W. Hamming. For the man who set aside a lifetime of groundbreaking discoveries for the love of teaching, at a self-imposed $1 per year salary, it would prove to be a prophetic statement indeed. Hamming held his final lecture at NPS in December of 1997, some 17 years ago, but his presence is as identifiable on campus as the vibrant red plaid sport coat he frequently donned to draw attention … “Because great ideas require an audience,” he would say. Hamming’s name is front and center each year, when the university honors its best teacher with the Richard W. Hamming Award for Teaching, and its top researcher with the Hamming Interdisciplinary Achievement Award.
    [Show full text]
  • Turing Award • John Von Neumann Medal • NAE, NAS, AAAS Fellow
    15-712: Advanced Operating Systems & Distributed Systems A Few Classics Prof. Phillip Gibbons Spring 2021, Lecture 2 Today’s Reminders / Announcements • Summaries are to be submitted via Canvas by class time • Announcements and Q&A are via Piazza (please enroll) • Office Hours: – Prof. Phil Gibbons: Fri 1-2 pm & by appointment – TA Jack Kosaian: Mon 1-2 pm – Zoom links: See canvas/Zoom 2 CS is a Fast Moving Field: Why Read/Discuss Old Papers? “Those who cannot remember the past are condemned to repeat it.” - George Santayana, The Life of Reason, Volume 1, 1905 See what breakthrough research ideas look like when first presented 3 The Rise of Worse is Better Richard Gabriel 1991 • MIT/Stanford style of design: “the right thing” – Simplicity in interface 1st, implementation 2nd – Correctness in all observable aspects required – Consistency – Completeness: cover as many important situations as is practical • Unix/C style: “worse is better” – Simplicity in implementation 1st, interface 2nd – Correctness, but simplicity trumps correctness – Consistency is nice to have – Completeness is lowest priority 4 Worse-is-better is Better for SW • Worse-is-better has better survival characteristics than the-right-thing • Unix and C are the ultimate computer viruses – Simple structures, easy to port, required few machine resources to run, provide 50-80% of what you want – Programmer conditioned to sacrifice some safety, convenience, and hassle to get good performance and modest resource use – First gain acceptance, condition users to expect less, later
    [Show full text]
  • A Debate on Teaching Computing Science
    Teaching Computing Science t the ACM Computer Science Conference last Strategic Defense Initiative. William Scherlis is February, Edsger Dijkstra gave an invited talk known for his articulate advocacy of formal methods called “On the Cruelty of Really Teaching in computer science. M. H. van Emden is known for Computing Science.” He challenged some of his contributions in programming languages and the basic assumptions on which our curricula philosophical insights into science. Jacques Cohen Aare based and provoked a lot of discussion. The edi- is known for his work with programming languages tors of Comwunications received several recommenda- and logic programming and is a member of the Edi- tions to publish his talk in these pages. His comments torial Panel of this magazine. Richard Hamming brought into the foreground some of the background received the Turing Award in 1968 and is well known of controversy that surrounds the issue of what be- for his work in communications and coding theory. longs in the core of a computer science curriculum. Richard M. Karp received the Turing Award in 1985 To give full airing to the controversy, we invited and is known for his contributions in the design of Dijkstra to engage in a debate with selected col- algorithms. Terry Winograd is well known for his leagues, each of whom would contribute a short early work in artificial intelligence and recent work critique of his position, with Dijkstra himself making in the principles of design. a closing statement. He graciously accepted this offer. I am grateful to these people for participating in We invited people from a variety of specialties, this debate and to Professor Dijkstra for creating the backgrounds, and interpretations to provide their opening.
    [Show full text]
  • Alan Mathison Turing and the Turing Award Winners
    Alan Turing and the Turing Award Winners A Short Journey Through the History of Computer TítuloScience do capítulo Luis Lamb, 22 June 2012 Slides by Luis C. Lamb Alan Mathison Turing A.M. Turing, 1951 Turing by Stephen Kettle, 2007 by Slides by Luis C. Lamb Assumptions • I assume knowlege of Computing as a Science. • I shall not talk about computing before Turing: Leibniz, Babbage, Boole, Gödel... • I shall not detail theorems or algorithms. • I shall apologize for omissions at the end of this presentation. • Comprehensive information about Turing can be found at http://www.mathcomp.leeds.ac.uk/turing2012/ • The full version of this talk is available upon request. Slides by Luis C. Lamb Alan Mathison Turing § Born 23 June 1912: 2 Warrington Crescent, Maida Vale, London W9 Google maps Slides by Luis C. Lamb Alan Mathison Turing: short biography • 1922: Attends Hazlehurst Preparatory School • ’26: Sherborne School Dorset • ’31: King’s College Cambridge, Maths (graduates in ‘34). • ’35: Elected to Fellowship of King’s College Cambridge • ’36: Publishes “On Computable Numbers, with an Application to the Entscheindungsproblem”, Journal of the London Math. Soc. • ’38: PhD Princeton (viva on 21 June) : “Systems of Logic Based on Ordinals”, supervised by Alonzo Church. • Letter to Philipp Hall: “I hope Hitler will not have invaded England before I come back.” • ’39 Joins Bletchley Park: designs the “Bombe”. • ’40: First Bombes are fully operational • ’41: Breaks the German Naval Enigma. • ’42-44: Several contibutions to war effort on codebreaking; secure speech devices; computing. • ’45: Automatic Computing Engine (ACE) Computer. Slides by Luis C.
    [Show full text]
  • Richard Hamming. the Art of Doing SCIENCE and Engineering: Learning to Learn
    858 BIBLIOGRAPHY [69] Richard Hamming. The Art of Doing SCIENCE and Engineering: Learning to Learn. Gordon and Breach Science Publishers, 1997. [70] Seif Haridi and Sverker Janson. Kernel Andorra Prolog and its computation model. In 7th International Conference on Logic Programming, pages 31– 48. The MIT Press, June 1990. [71] Seif Haridi, Peter Van Roy, Per Brand, Michael Mehl, Ralf Scheidhauer, and Gert Smolka. Efficient logic variables for distributed computing. ACM Transactions on Programming Languages and Systems, May 1999. [72] Seif Haridi, Peter Van Roy, Per Brand, and Christian Schulte. Program- ming languages for distributed applications. New Generation Computing, 16(3):223–261, May 1998. [73] Seif Haridi, Peter Van Roy, and Gert Smolka. An overview of the design of Distributed Oz. In the 2nd International Symposium on Parallel Symbolic Computation (PASCO 97). ACM, July 1997. [74] Martin Henz. Objects for Concurrent Constraint Programming.Interna- tionale Series in Engineering and Computer Science. Kluwer Academic Pub- lishers, Boston, MA, USA, 1997. [75] Martin Henz. Objects for Concurrent Constraint Programming, volume 426 of The Kluwer International Series in Engineering and Computer Science. Kluwer Academic Publishers, Boston, November 1997. [76] Martin Henz. Objects in Oz. Doctoral dissertation, Saarland University, Saarbr¨ucken, Germany, May 1997. [77] Martin Henz and Leif Kornstaedt. The Oz notation. Technical re- port, DFKI and Saarland University, December 1999. Available at http://www.mozart-oz.org/. [78] Martin Henz, Tobias M¨uller, and Ka Boon Ng. Figaro: Yet another con- straint programming library. In Workshop on Parallelism and Implementa- tion Technology for Constraint Logic Programming, International Confer- ence on Logic Programming (ICLP 99), 1999.
    [Show full text]
  • Know Your Discipline: Teaching the Philosophy of Computer Science
    Journal of Information Technology Education Volume 6, 2007 Know Your Discipline: Teaching the Philosophy of Computer Science Matti Tedre University of Joensuu, Dept. of Computer Science and Statistics Joensuu, Finland [email protected] Executive Summary The diversity and interdisciplinarity of computer science and the multiplicity of its uses in other sciences make it hard to define computer science and to prescribe how computer science should be carried out. The diversity of computer science also causes friction between computer scien- tists from different branches. Computer science curricula, as they stand, have been criticized for being unable to offer computer scientists proper methodological training or a deep understanding of different research traditions. At the Department of Computer Science and Statistics at the Uni- versity of Joensuu we decided to include in our curriculum a course that offers our students an awareness of epistemological and methodological issues in computer science, and we wanted to design the course to be meaningful for practicing computer scientists. In this article the needs and aims of our course on the philosophy of computer science are discussed, and the structure and arrangements—the whys, whats, and hows—of that course are explained. The course, which is given entirely on-line, was designed for advanced graduate or postgraduate computer science students from two Finnish universities: the University of Joensuu and the Uni- versity of Kuopio. The course has four relatively broad themes, and all those themes are tied to the students’ everyday work or their own research topics. I have prepared course readings about each of those four themes.
    [Show full text]
  • Download Chapter 170KB
    Memorial Tributes: Volume 10 120 Copyright National Academy of Sciences. All rights reserved. Memorial Tributes: Volume 10 RICHARD W.HAMMING 121 RICHARD W.HAMMING 1915–1998 BY HERSCHEL H.LOOMIS AND DAVID S.POTTER RICHARD WESLEY HAMMING, senior lecturer at the U.S. Naval Postgraduate School, died January 7, 1998, of a heart attack in Monterey, California. Dick was born February 11, 1915, in Chicago, Illinois. His father was Dutch and ran away from home at age sixteen to fight in the Boer War. His mother’s lineage goes back to the Mayflower. Dick went to one of the two public boys’ high schools in Chicago. The family moved only once while he was growing up— to within two blocks of their first apartment. Dick attended three junior colleges (two of those closed because of financial difficulties in the Depression.) It had been his intention to become an engineer, but his only scholarship offer came from the University of Chicago, which at that time did not offer an engineering degree. As a result he switched to mathematics, a decision he never regretted, and he received a B.S. degree in 1937. He then went to the University of Nebraska where he earned an M.A. degree in 1939, and followed that with a Ph.D. degree in mathematics from the University of Illinois in June 1942. He met Wanda Little when she was sixteen and he twenty-one, introduced by a friend who knew they both liked to dance. Dick at this time lived at home, commuted to the University of Chicago, and studied on the “El.” Wanda was then attending the only girls’ high school in Chicago.
    [Show full text]