A Plim Computer for the Internet of Things, in Computer

Total Page:16

File Type:pdf, Size:1020Kb

A Plim Computer for the Internet of Things, in Computer COVER FEATURE VLSI FOR THE INTERNET OF THINGS A PLiM Computer for the Internet of Things Mathias Soeken, EPFL Pierre-Emmanuel Gaillardon, University of Utah Saeideh Shirinzadeh, University of Bremen Rolf Drechsler, University of Bremen and German Research Center for Artificial Intelligence Giovanni De Micheli, EPFL Emerging applications are dramatically changing computer architecture requirements, with a shift toward big data that is processed using simple computations. A programmable logic-in-memory (PLiM) computer can allow memory cells to perform primitive logic operations and therefore compute without needing to communicate with a processing unit. he work of Hungarian-American mathemati- in today’s highly optimized and sophisticated memory cian John von Neumann uniquely influenced hierarchies. The driving assumption behind this innova- how we design computers. His “First Draft of tion has been that computation is complex and must be a Report on the EDVAC,” written in 1945 while fast, and therefore memory needs to be readily available. Tvon Neumann was commuting by train to Los Alamos, Memory hierarchies allow fast access to small amounts New Mexico, proposed a uniform memory that contains of data and require longer times to access the larger both data and instructions. Known today as the von memory located deeper in the hierarchy. Consequently, Neumann architecture, this key concept has been con- the fundamental assumption underlying today’s com- tinually improved over the past few decades, resulting puting architectures is only valid as long as computation COMPUTER 0018-9162/17/$33.00 © 2017 IEEE JUNE 2017 35 VLSI FOR THE INTERNET OF THINGS density, lower power, and higher per- formance.10 In addition to their mem- ory properties, RRAMs can perform primitive Boolean logic operations. To begin, let’s review the basic Boolean switching primitive offered by RRAMs (see Figure 1). A RRAM is a two-terminal device with an inter- nal resistive state that can be pro- grammed depending on the voltage difference between the top electrode (a) (b) (c) (d) T and the bottom electrode B. Tran- FIGURE 1. Intrinsic majority operations: (a) a schematic of a resistive RAM (RRAM) cell sition occurs whenever T and B are with its internal state Z and electrodes B and T; (b) state machine illustrating how Z assigned different voltage. If T = 0 and changes based on values for B and T; (c) transition relation for the state machine, result- B = 1 (that is, VTB < Vprog), the resulting ing in the RM3 operation; and (d) truth table for the transition relation. low- resistance state is Z = 0. If T = 1 and B = 0 (that is, VTB > Vprog), then Z = 1. Here, Vprog is the memory technology’s is dominant and not too much data is applications),3,4 build the PLiM com- programming voltage, which for sim- being processed. puter from these devices, and program plicity we assume is symmetric. The Today, the requirements of emerg- the PLiM computer. The underlying truth table in Figure 1d summarizes ing applications such as deep learn- RRAM device switches its internal this behavior. ing, data fusion, and the Internet of state based on its two terminals via By denoting Z as the current resis- Things (IoT) are a challenge for the von inversion (complementation) and a tance value and Z′ as the resistance Neumann architecture as the focus majority-of-three operation. Conse- value after assigning signals to T and shifts to large amounts of data that are quently, for in-memory computing, B, it is possible to express Z′ as processed using comparably simple this approach offers an assembly-level computations. At this point, improve- abstraction in terms of a natively imple- ZZ′ =∧()TB∨∧ZT()BT= BZ , (1) ments to the memory hierarchy can- mented majority and complement oper- not solve the problem, so a revolution- ator. Therefore, we can use innovations where 〈xyz〉 = xy ∨ xz ∨ yz is the Bool- ary change is necessary. In-memory in majority-based logic synthesis5–9 to ean three-input majority function computing is a promising candidate.1,2 program the PLiM computer. Finally, that evaluates to true, if and only if at With this approach, memory cells can because programs are data that are least two of its inputs are true. In the perform primitive logic operations executed directly in memory, we can special case of Equation 1, one oper- and can therefore compute without link applications by providing parts of and is negated, and for convenience, needing to communicate with a pro- the program’s instructions from dis- we define RM3(T, B, Z) = TBZ for a cessing unit. In addition, independent tributed devices. This innovative and three-input resistive majority. RM3 is memory cells can perform their com- new programming paradigm ideally universal and will be used as the PLiM’s putations in parallel. matches the capabilities of in-memory elementary computing operation. In this article, we propose a pro- computing in the IoT context. grammable logic-in-memory (PLiM) PLiM COMPUTER computer and demonstrate how it INTRINSIC MAJORITY The general philosophy underpin- can help implement IoT applications. OPERATIONS ning the PLiM architecture addresses We show how to implement a Bool- Among other types of emerging non- how to add computing capabilities ean majority operation with a single volatile memories, RRAMs are con- (through bit-level RM3 instructions) to resistive RAM (RRAM) memory device sidered a leading candidate to imple- a regular dense memory array. Extra (which can be used in industrial- scale ment memory arrays with higher hardware is necessary to obtain a 36 COMPUTER WWW.COMPUTER.ORG/COMPUTER computer’s abstraction without losing techniques were initially presented 12 clock the standard memory functionality. in earlier work. ) For the sake of con- reset enable lim Figure 2 shows the PLiM computer venience, we introduce the following rw enable architecture, which consists of a stan- commands, which are shorthand for rw PLiM data Memory array dard memory array with signals that several useful RM3 instructions. Given data address are wrapped with the PLiM controller. registers a, b, and z, we define address This controller is a lightweight syn- chronous block that controls the mem- › ZERO( ): ← RM3(0, 1, ) = 〈00 〉 ory array’s access bus to allow a compu- = 0 FIGURE 2. Programmable logic-in- 푧 푧 푧 푧 tation mode to run. The computation › ONE( ): ← RM3(1, 0, ) = 〈11 〉 = 1 memory (PLiM) computer. The architecture mode runs a sequential execution of › BUF( , ): ZERO( ; ← RM ( , 0, consists of a standard memory array and 푧 푧 푧 3 푧 a given set of instructions that repre- = 〈 10〉 = a lightweight controller for data access 푎 푧 푧) 푧 푎 푧) sent a program. The program is stored › NOT( , ): ZERO( ); ← RM (1, , and controlling whether the memory 푎 푎 3 on the memory array, and its output = 〈1a 0〉 = a behaves as a default memory or performs 푎 푧 푧 푧 푎 푧) updates the memory array itself. The › RM( , , ): ← RM3( , , in- memory computations. logic-in-memory (LiM) input controls 푎 푏 푧 푧 푎 푏 푧) the transition between the computa- In these commands, z is the modified tion and memory modes. register. Also, note that the commands PLiM revolves around one single ZERO, ONE, and RM require exactly one y y instruction: RM3(A, B, C). The instruc- RM3 instruction, whereas the other tion takes three operands (A, B, and Z), two require two instructions. 2 2 applies the RM majority operation with Next, we show how to use majority- x x 3 2 x 1 2 x 1 A as the top electrode and B as the bot- inverter graphs (MIGs)9 to translate 4 4 tom electrode, and updates the value of Boolean functions into a sequence of x1 x3 x1 x3 (a) x2 x2 Z accordingly. The single- instruction RM3 instructions that compute the scheme simplifies the architecture as it functions. The left side of Figure 3a y is directly associated with the memory’s illustrates the idea using a small MIG. intrinsic logic operation. It consists of two nodes and four pri- 6 The architecture’s source, destina- mary inputs x1, x2, x3, and x4. We want tion, and processing unit is the memory to compute the function of the single block itself. Performing the instruction primary output y. We consider primary 45 simply means loading the bit-level val- inputs to be environment variables that x 1 ues of A and B from memory and apply- cannot be modified by PLiM instruc- 3 ing them to Z. Also, the instruction itself tions. Because none of the primary is stored on the same memory block. inputs can be overridden, we need a 123 Hence, to execute an instruction, the free RRAM to which we can write the 0 x x x x x x 2 2 3 1 x 3 instruction is first loaded from memory, result in order to compute the output 1 1 2 the operands are then loaded from mem- of node 1. Also, we need to get rid of (b) ory, and the operands are finally applied one of the inverters, because the RM3 to the destination. (Additional details operation expects exactly one input FIGURE 3. Using majority-inverter graphs about the RM3 instruction encoding are to be inverted. The two commands— (MIGs) to translate Boolean functions into a 11 available in earlier work. ) NOT(x3, z1); RM(x1, x2, z1)— compute the sequence of RM3 instructions. (a) Rewriting value of node 1 and require three RM3 an MIG involves using inverter propagation, PLiM COMPILER instructions and one RRAM cell z1, which can lead to better starting points for We can now show how to compile which stores the node’s output.
Recommended publications
  • Group Developed Weighing Matrices∗
    AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 55 (2013), Pages 205–233 Group developed weighing matrices∗ K. T. Arasu Department of Mathematics & Statistics Wright State University 3640 Colonel Glenn Highway, Dayton, OH 45435 U.S.A. Jeffrey R. Hollon Department of Mathematics Sinclair Community College 444 W 3rd Street, Dayton, OH 45402 U.S.A. Abstract A weighing matrix is a square matrix whose entries are 1, 0 or −1,such that the matrix times its transpose is some integer multiple of the identity matrix. We examine the case where these matrices are said to be devel- oped by an abelian group. Through a combination of extending previous results and by giving explicit constructions we will answer the question of existence for 318 such matrices of order and weight both below 100. At the end, we are left with 98 open cases out of a possible 1,022. Further, some of the new results provide insight into the existence of matrices with larger weights and orders. 1 Introduction 1.1 Group Developed Weighing Matrices A weighing matrix W = W (n, k) is a square matrix, of order n, whose entries are in t the set wi,j ∈{−1, 0, +1}. This matrix satisfies WW = kIn, where t denotes the matrix transpose, k is a positive integer known as the weight, and In is the identity matrix of size n. Definition 1.1. Let G be a group of order n.Ann×n matrix A =(agh) indexed by the elements of the group G (such that g and h belong to G)issaidtobeG-developed if it satisfies the condition agh = ag+k,h+k for all g, h, k ∈ G.
    [Show full text]
  • Operating Manual R&S NRP-Z22
    Operating Manual Average Power Sensor R&S NRP-Z22 1137.7506.02 R&S NRP-Z23 1137.8002.02 R&S NRP-Z24 1137.8502.02 Test and Measurement 1137.7870.12-07- 1 Dear Customer, R&S® is a registered trademark of Rohde & Schwarz GmbH & Co. KG Trade names are trademarks of the owners. 1137.7870.12-07- 2 Basic Safety Instructions Always read through and comply with the following safety instructions! All plants and locations of the Rohde & Schwarz group of companies make every effort to keep the safety standards of our products up to date and to offer our customers the highest possible degree of safety. Our products and the auxiliary equipment they require are designed, built and tested in accordance with the safety standards that apply in each case. Compliance with these standards is continuously monitored by our quality assurance system. The product described here has been designed, built and tested in accordance with the EC Certificate of Conformity and has left the manufacturer’s plant in a condition fully complying with safety standards. To maintain this condition and to ensure safe operation, you must observe all instructions and warnings provided in this manual. If you have any questions regarding these safety instructions, the Rohde & Schwarz group of companies will be happy to answer them. Furthermore, it is your responsibility to use the product in an appropriate manner. This product is designed for use solely in industrial and laboratory environments or, if expressly permitted, also in the field and must not be used in any way that may cause personal injury or property damage.
    [Show full text]
  • Z1 Z2 Z4 Z5 Z6 Z7 Z3 Z8
    Illinois State Police Division of Criminal Investigation JO DAVIESS STEPHENSON WINNEBAGO B McHENRY LAKE DIVISION OF CRIMINAL INVESTIGATION - O O Colonel Mark R. Peyton Pecatonica 16 N E Chicago Lieutenant Colonel Chris Trame CARROLL OGLE Chief of Staff DE KALB KANE Elgin COOK Lieutenant Jonathan Edwards NORTH 2 Z1DU PAGE C WHITESIDE LEE 15 1 Z2 NORTH COMMAND - Sterling KENDALL WILL Major Michael Witt LA SALLE 5 Zone 1 - (Districts Chicago and 2) East Moline HENRY BUREAU Captain Matthew Gainer 7 17 Joliet ROCK ISLAND GRUNDY Zone 2 - (Districts 1, 7, 16) LaSalle MERCER Captain Christopher Endress KANKAKEE PUTNAM Z3 Zone 3 - (Districts 5, 17, 21) KNOX STARK Captain Richard Wilk H MARSHALL LIVINGSTON E WARREN Statewide Gaming Command IROQUOIS N PEORIA 6 Captain Sean Brannon D WOODFORD E Pontiac Ashkum CENTRAL R 8 Metamora S 21 O McLEAN N FULTON CENTRAL COMMAND - McDONOUGH HANCOCK TAZEWELL Captain Calvin Brown, Interim Macomb FORD VERMILION Zone 4 - (Districts 8, 9, 14, 20) 14 MASON CHAMPAIGN Captain Don Payton LOGAN DE WITT SCHUYLER Zone 5 - (Districts 6, 10) PIATT ADAMS Captain Jason Henderson MENARD Investigative Support Command CASS MACON Pesotum BROWN Captain Aaron Fullington Z4 10 SANGAMON Medicaid Fraud Control Bureau MORGAN DOUGLAS EDGAR PIKE 9 Z5 Captain William Langheim Pittsfield SCOTT MOULTRIE Springfield 20 CHRISTIAN COLES SHELBY GREENE MACOUPIN SOUTH COMMAND - CLARK Major William Sons C CUMBERLAND A MONTGOMERY L Zone 6 - (Districts 11, 18) H Litchfield 18 O Lieutenant Abigail Keller, Interim JERSEY FAYETTE EFFINGHAM JASPER U Zone 7 - (Districts 13, 22) N Effingham 12 CRAWFORD Z6 BOND Captain Nicholas Dill MADISON Zone 8 - (Districts 12, 19) CLAY Collinsville RICHLAND LAWRENCE Captain Ryan Shoemaker MARION 11 Special Operations Command ST.
    [Show full text]
  • Nonlinear Control of Underactuated Mechanical Systems with Application to Robotics and Aerospace Vehicles
    Nonlinear Control of Underactuated Mechanical Systems with Application to Robotics and Aerospace Vehicles by Reza Olfati-Saber Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical Engineering and Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY February 2001 © Massachusetts Institute of Technology 2001. All rights reserved. Author ................................................... Department of Electrical Engineering and Computer Science January 15, 2000 C ertified by.......................................................... Alexandre Megretski, Associate Professor of Electrical Engineering Thesis Supervisor Accepted by............................................ Arthur C. Smith Chairman, Department Committee on Graduate Students Nonlinear Control of Underactuated Mechanical Systems with Application to Robotics and Aerospace Vehicles by Reza Olfati-Saber Submitted to the Department of Electrical Engineering and Computer Science on January 15, 2000, in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Electrical Engineering and Computer Science Abstract This thesis is devoted to nonlinear control, reduction, and classification of underac- tuated mechanical systems. Underactuated systems are mechanical control systems with fewer controls than the number of configuration variables. Control of underactu- ated systems is currently an active field of research due to their broad applications in Robotics, Aerospace Vehicles, and Marine Vehicles. The examples of underactuated systems include flexible-link robots, nobile robots, walking robots, robots on mo- bile platforms, cars, locomotive systems, snake-type and swimming robots, acrobatic robots, aircraft, spacecraft, helicopters, satellites, surface vessels, and underwater ve- hicles. Based on recent surveys, control of general underactuated systems is a major open problem. Almost all real-life mechanical systems possess kinetic symmetry properties, i.e.
    [Show full text]
  • Konrad Zuse the Computer- My Life
    Konrad Zuse The Computer- My Life Konrad Zuse The Computer- My Life With Forewords byEL.Bauer and H. Zemanek Springer-Verlag Berlin Heidelberg GmbH Professor Dr. Ing. E. h. Dr. mult. rer. nat. h.c. Konrad Zuse 1m Haselgrund 21, D-36088 Hunfeld, Germany Editor: Dr. Hans Wossner, Springer-Verlag Heidelberg Translators: Patricia McKenna, New York J.Andrew Ross, Springer-Verlag Heidelberg Titl e of the original German edition: Der Computer - Mein Lebenswerk, 1993 © Springer-Verlag Berlin Heidelberg 1984, 1986, 1990, 1993 Computing Reviews Classification (1991) : K. 2, A. 0 With 68 Figures ISBN 978-3-642-08 151 -4 ISBN 978-3-662-02931-2 (eBook) DOI 10.1007/978-3-662-02931-2 Libary of Congress Cataloging-in-Publication Data . Zuse, Konr ad . (Computer. mein Lebensw erk . English) Th e computer, my life / Konrad Zuse;with for eword s bv F.L. Bauer and H. Zemanek. p. cm. Includes bibliographical references and index. I. Zuse, Konrad. 2. Computers -Germany - History . 3. Computer engineers - Germany - Biography. I. Titl e. TK7885.22.Z87A3 1993 62I.39'092-dc20 [B] 93-18574 This work is subject to copyright. All rights are reserved , whether the whole world or part for the mat erial is concerned , specifically the rights of translation, reprinting, reuse ofillustrati- ons, recitation, broadcasting , reproduction on microfilm or in any ot her way, and storage in data banks. Dupli cation of this publication or parts thereof is permitted only under the pro- visions of German Copyr ight Law of September 9, 1965, in its current version , and permissi- on for use must always be obtained from Springer-Verlag.
    [Show full text]
  • MVME6100 Single Board Computer Installation and Use P/N: 6806800D58E March 2009
    Embedded Computing for Business-Critical ContinuityTM MVME6100 Single Board Computer Installation and Use P/N: 6806800D58E March 2009 © 2009 Emerson All rights reserved. Trademarks Emerson, Business-Critical Continuity, Emerson Network Power and the Emerson Network Power logo are trademarks and service marks of Emerson Electric Co. © 2008 Emerson Electric Co. All other product or service names are the property of their respective owners. Intel® is a trademark or registered trademark of Intel Corporation or its subsidiaries in the United States and other countries. Java™ and all other Java-based marks are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Microsoft®, Windows® and Windows Me® are registered trademarks of Microsoft Corporation; and Windows XP™ is a trademark of Microsoft Corporation. PICMG®, CompactPCI®, AdvancedTCA™ and the PICMG, CompactPCI and AdvancedTCA logos are registered trademarks of the PCI Industrial Computer Manufacturers Group. UNIX® is a registered trademark of The Open Group in the United States and other countries. Notice While reasonable efforts have been made to assure the accuracy of this document, Emerson assumes no liability resulting from any omissions in this document, or from the use of the information obtained therein. Emerson reserves the right to revise this document and to make changes from time to time in the content hereof without obligation of Emerson to notify any person of such revision or changes. Electronic versions of this material may be read online, downloaded for personal use, or referenced in another document as a URL to a Emerson website. The text itself may not be published commercially in print or electronic form, edited, translated, or otherwise altered without the permission of Emerson, It is possible that this publication may contain reference to or information about Emerson products (machines and programs), programming, or services that are not available in your country.
    [Show full text]
  • The Use of Computer Competencies of Students in the Departments of Physical Education and Sport Teaching, and School Teaching
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL & SCIENCE EDUCATION 2016, VOL. 11, NO. 15, 8470-8490 OPEN ACCESS The Use of Computer Competencies of Students in the Departments of Physical Education and Sport Teaching, and School Teaching Ilyas Okana Gazi University, TURKEY ABSTRACT This study aims to reveal the levels of the use of computer, which is nowadays one of the most important technologies, of teacher candidate studying in the departments of Physical Education and Sport Teaching, and School teaching; also aims to research whether there is differences according to various criteria or not. In research, data were collected via the survey “Specifying The Use of Computer Competencies of Students in the Departments of Physical Education and Sport Teaching, and School Teaching” with researcher adapting this to Departments of Physical Education and Sport Teaching, and School Teaching. The sample of this study consists of 210 students studying in Gazi University Faculty of Education School Teaching and Physical Education and Sport Teaching Departments in 2014-2015 academic years. Statistical package program was used for research data. Statistic technics such as ANOVA for class variable, t-test for the other variables and mean standard deviation were used. As a result of analysis conducted, the use of computer competencies of students in the departments of physical education and sport teaching, and school teaching was researched and it was figured out that students who have computers at home or who benefits from the computers in school lab use many computer program menus meaningfully a lot at the level of p<0,05. Based on the research results, suggestions for using computer effectively in Physical Education and Sport classes were presented.
    [Show full text]
  • The Relay Computer of Carl Zeiss Jena
    Oprema – 2019AUG26 The Relay Computer of Carl Zeiss Jena Jürgen F. H. Winkler Friedrich Schiller University, Jena The Oprema (Optikrechenmaschine = computer for optical calculations) was a relay computer whose development was initiated by Herbert Kortum and which was designed and built by a team under the leadership of Wilhelm Kämmerer at Carl Zeiss Jena (CZJ) in 1954 and 1955. Basic experiments, de‐ sign and construction of machine‐1 were all done, partly concurrently, in the remarkably short time of about 14 months. Shortly after the electronic G 2 of Heinz Billing in Göttingen it was the 7th universal computer in Germa‐ ny and the 1st in the GDR. The Oprema consisted of two identical machines. One machine consisted of about 8,300 relays, 45,000 selenium rectifiers and 250 km cable. The main reason for the construction of the Oprema was the computational needs of CZJ, which was the leading company for optics and precision me‐ chanics in the GDR. During its lifetime (1955−1963) the Oprema was applied by CZJ and a number of other institutes and companies in the GDR. The paper presents new details of the Oprema project and of the arithmetic operations implemented in the Oprema. Additionally, it covers briefly the lives of the two protagonists, W. Kämmerer and H. Kortum, and draws some comparisons with other early projects, namely Colossus, ASCC/Mark 1 and ENIAC. Finally, it discusses the question, whether Kortum is a German com‐ puter pioneer. Pre-history in Jena (CZJ) and became a member of Kortum’s At the beginning of the 20th century, three people development lab3.
    [Show full text]
  • CSE331 : Computer Security Fundamentals Part I : Crypto (2)
    CSE331 : Computer Security Fundamentals Part I : Crypto (2) CSE331 - Part I Cryptography - Slides: Mark Stamp Chapter 3: Symmetric Key Crypto The chief forms of beauty are order and symmetry… ¾ Aristotle “You boil it in sawdust: you salt it in glue: You condense it with locusts and tape: Still keeping one principal object in view ¾ To preserve its symmetrical shape.” ¾ Lewis Carroll, The Hunting of the Snark CSE331 - Part I Cryptography - Slides: Mark Stamp Symmetric Key Crypto q Stream cipher ¾ generalize one-time pad o Except that key is relatively short o Key is stretched into a long keystream o Keystream is used just like a one-time pad q Block cipher ¾ generalized codebook o Block cipher key determines a codebook o Each key yields a different codebook o Employs both “confusion” and “diffusion” CSE331 - Part I Cryptography - Slides: Mark Stamp Stream Ciphers CSE331 - Part I Cryptography - Slides: Mark Stamp Stream Ciphers q Once upon a time, not so very long ago… stream ciphers were the king of crypto q Today, not as popular as block ciphers q We’ll discuss two stream ciphers: q A5/1 o Based on shift registers o Used in GSM mobile phone system q RC4 o Based on a changing lookup table o Used many places CSE331 - Part I Cryptography - Slides: Mark Stamp A5/1: Shift Registers q A5/1 uses 3 shift registers o X: 19 bits (x0,x1,x2, …,x18) o Y: 22 bits (y0,y1,y2, …,y21) o Z: 23 bits (z0,z1,z2, …,z22) CSE331 - Part I Cryptography - Slides: Mark Stamp A5/1: Keystream q At each iteration: m = maj(x8, y10, z10) o Examples: maj(0,1,0) = 0 and
    [Show full text]
  • The HEPGAME Project • a Little Bit of History • Original Targets
    The HEPGAME project J.A.M. Vermaseren • A little bit of history • Original targets of the project • Various failures • Success or failure? • Success • Where does this leave us? A little bit of history The HEPGAME project was born out of a sense that strategy in game theory and method- ology of computations, in particular solving IBP systems, have much in common. This was already pointed out in 2000 (60-th birthday of F.Yndurain, unpublished) and in Loops and Legs 2004 (”The rules of physics”). It was brought forward (and 1.732 MEuros awarded) in an ERC Advanced grant proposal in 2012 and the project could start on 1-July-2013. Because it is a 5 year project, the money will run out on 30-June-2018. Hence now seems the right moment to look at what has been done and in which direction it takes some of us. Before the project started I was in the fortunate condition of having Jan Kuipers as a postdoc to help me with Form. He is the one responsible for the initial implementations of polynomial facilities and expression optimization in Form (later upgraded and improved by Takahiro Ueda and Ben Ruijl). With him and the computer scientists Jaap van den Herik and Aske Plaat we designed the first algorithms for the expression simplification and put this as part of the HEPGAME objectives. Some of the people present at this workshop have directly benefitted from this work. Unfortunately Jan did not want to spend the rest of his life doing big calculations and hence he did not accept my offer to stay a few more years.
    [Show full text]
  • Groups with at Most Twelve Subgroups
    Groups With At Most Twelve Subgroups Michael C. Slattery Marquette University, Milwaukee WI 53201-1881 [email protected] July 9, 2020 In [2] I showed that the finite groups with a specified number of subgroups can always be described as a finite list of similarity classes. Neil Sloane suggested that I submit the corresponding sequence, the number of similarity classes with n subgroups, to his Online Encyclopedia of Integer Sequences [4]. I thought this would be a quick calculation until I discovered that my “example” case in the paper (n = 6) was wrong (as noted in [3]). I realized that producing a reliable count required a full proof. This note contains the proof behind my computation of the first 12 terms of the sequence. For completeness, we include a section of [2]: Now, we saw [above] that cyclic Sylow subgroups of G which are direct factors allow many non-isomorphic groups to have the same number of subgroups. [This lemma] tells us that these are precisely the cyclic Sylow subgroups which lie in the center of G. Consequently, if p1,...,pc are the primes which divide |G| such that a Sylow pi-subgroup is cyclic and central, then we can write G = P1 × P2 ×···× Pc × Oπ′ (G) where each Pi is a Sylow pi-subgroup, the set π = {p1,...,pc} and Oπ′ (G) is the largest normal subgroup of G with order not divisible by any prime in π. We e e will write G = O ′ (G). In other words, G is the unique subgroup of G left after arXiv:1607.01834v2 [math.GR] 7 Jul 2020 π factoring out the cyclic, central Sylow subgroups.
    [Show full text]
  • MVME55006E Single-Board Computer Installation and Use
    MVME55006E Single-Board Computer Installation and Use 6806800A37D March 2008 © Copyright 2008 Emerson All rights reserved. Trademarks Emerson, Business-Critical Continuity, Emerson Network Power and the Emerson Network Power logo are trademarks and service marks of Emerson Electric Co. © 2008 Emerson Electric Co. All other product or service names are the property of their respective owners. Intel® is a trademark or registered trademark of Intel Corporation or its subsidiaries in the United States and other countries. PICMG®, CompactPCI®, AdvancedTCA™ and the PICMG, CompactPCI and AdvancedTCA logos are registered trademarks of the PCI Industrial Computer Manufacturers Group. Notice While reasonable efforts have been made to assure the accuracy of this document, Emerson assumes no liability resulting from any omissions in this document, or from the use of the information obtained therein. Emerson reserves the right to revise this document and to make changes from time to time in the content hereof without obligation of Emerson to notify any person of such revision or changes. Electronic versions of this material may be read online, downloaded for personal use, or referenced in another document as a URL to a Emerson website. The text itself may not be published commercially in print or electronic form, edited, translated, or otherwise altered without the permission of Emerson, It is possible that this publication may contain reference to or information about Emerson products (machines and programs), programming, or services that are not available in your country. Such references or information must not be construed to mean that Emerson intends to announce such Emerson products, programming, or services in your country.
    [Show full text]