768 Result(s)
-
Chapter
Conclusion
This book has discussed microprocessor programming to the limits of what is practicable without discussing specific microprocessors, all of which have their own instruction sets, their own mnemonic codes, asse...
-
Chapter
Ammonia Reserve Batteries
A range of these batteries is supplied by Honeywell, who state that with the increased acceptance of lithium-based systems in the reserve battery field, the development of the ammonia battery has been allowed ...
-
Chapter
Appendix
Conversion of decimal to binary
-
Chapter
Types of electronic memory
The human memory is the faculty which enables us to store information and recall it when required. Our memories can store information from all our senses; we can visualise past images, remember smells, imagine...
-
Chapter
Text interface
Before looking at the text display system consider how text video signals can be interfaced to a television receiver, as shown in figure 3.4.
-
Chapter
Introduction
Part 3 described how codewords stored in the RAM were read and presented to the character generator at the correct time in order to produce a page of text on a CRTscreen.
-
Chapter
Introduction
Viewdata, like Teletext, uses a modified domestic television receiver to receive information transmitted from a distant computer and then display it as a page of 24rows of 40 alpha-graphic characters.
-
Chapter
Exercise answers
-
Chapter
Character rounding
Alpha-numeric characters produced as described in this book would look coarse. To overcome this, a technique known as character rounding is adopted. One method of achieving this is described in Appendix 3, on ...
-
Chapter
Complete text system
Figure 4.1 is a block diagram of a complete system. The unshaded blocks have already been described in Part 3 and are concerned with reading codewords from the RAM at the correct time to form the text on the scre...
-
Chapter
Teletext system
For Teletext, the codewords are transmitted in serial form, one bit at a time.
-
Chapter
Introduction
Listening to electronics technicians discussing their work must, to the layman, be like listening to a foreign language; a circuit diagram must appear to him like a strange sort of street map. In the case of t...
-
Chapter
Erratum
-
Chapter and Conference Paper
Protocol design for an automated highway system
-
Chapter and Conference Paper
Logic synthesis and design verification
-
Chapter and Conference Paper
Computer-hindered verification (humans can do it too)
-
Chapter and Conference Paper
A verifier and timing analyser for simple imperative programs
-
Chapter and Conference Paper
Modular abstractions for verifying real-time distributed systems
-
Chapter and Conference Paper
Tableau recycling
In this paper we improve a model checking algorithm based on the tableau method of Stirling and Walker. The algorithm proves whether a property expressed in the modal mu-calculus holds for a state in a finite ...
-
Chapter and Conference Paper
A verification procedure via invariant for extended communicating finite-state machines
This paper presents a method for verifying safety property of a communication protocol modeled as two extended communicating finite-state machines with two unbounded FIFO channels connecting them. In this meth...