Short-Circuits on FPGAs caused by Partial Runtime Reconfiguration
|
|
- Brandon Floyd
- 5 years ago
- Views:
Transcription
1 2010 International Conerence on Field Prorammable Loic and Applications Short-Circuits on FPGAs caused by Partial Runtime Reconiuration Christian Beckho Dirk Koch and Jim Torresen Department o Inormatics, University o Oslo, Norway {koch, jimtoer}@ii.uio.no Abstract In this paper, we show how short-circuits on FPGAs can be caused by partial runtime reconiuration. Short-circuit can even occur on FPGAs that do not oer any tristate resources just by usin o the shel vendor tools without any bitstream manipulation. The duration o the here presented short-circuits ranes rom short spikes up to persistent short-circuits that remain active durin runtime. Short-circuits will result in increased current consumption and can thus harm the system and must thereore be prevented. An alorithm is derived that detects whether coniuration data will cause short-circuits. We implemented this alorithm in a bitstream scanner that can also be used in systems at runtime. I. INTRODUCTION In typical system on chip desins, multiple modules are connected to a shared bus. On older FPGAs, buses could be implemented with internal tristate buers. Then, modules may only drive their outputs to the bus, i ranted by an arbiter. I the bus is not ranted to the module, the modules output is hih impedance. I the tristate drivers o two modules drive dierent loic values to the bus at the same time, a short-circuit occurs. Such short-circuits result in a current increase that may locally drop the supply voltae levels which may then increase propaation delays, chane sinal states, or heat up the device. Furthermore, the current can be orders o manitude hiher when operatin under shortcircuit conditions. This has thereore stron impact on the reliability o the FPGA that can be aected by eects such as electron miration. Throuhout this paper, we will point out that present FPGA architectures are vulnerable to shortcircuits. To overcome this issue, we present techniques or detectin and preventin short-circuits that can be directly provided by the FPGA-based system itsel. The possibility o connectin multiple drivers to the same wire resource o the FPGA abric was examined in [1]. In that work, the shared column eature o the Altera Flex 8000 amily was used to enerate short-circuits. The shared column eature allows multiple loic cells to drive a shared column interconnect wire resource via pass transistors. In recent FPGAs such as Spartan-3 routin resources are not shared, as sinle driver wires turned to be out more beneicial [2]. Latest FPGAs rom the vendor Xilinx oer tristate buers only or the external I/O pins while the on-chip routin resources are completely unidirectional. Despite the absence o tristate buers, short-circuits in the routin abric o recent Xilinx FPGAs like Spartan-3 still may occur. Here, the multiplexer based implementation o switch matrices allows to connect more than one driver to a wire at the same time. Shortcircuits can lead to unexpected system behavior and oer therewith a possibility to attack systems which use partial runtime reconiuration. This paper will outline the ormat o coniuration data bitstreams in Section II. Next, in Section III, we will reveal inormation about the coniuration data that coniures the switch matrices and show in Section IV how a coniuration can lead to dierent classes o short-circuits. In Section V, we will discuss the impact o short-circuits while Section VI outlines possibilities o preventin short circuits. Section VII will inally conclude this paper. II. CONFIGUATION DATA FORMAT OF VIRTEX-II AND SPARTAN-3 FPGAS The unctionality o FPGAs is controlled by a coniuration bitstream, oranized as a number o consecutive rames. Each rame is one bit wide and coniures parts o the resources available in a column that spans over the ull heiht o an FPGA. Only several rames rouped toether coniure a whole column o e.. coniurable loic blocks, block rams or I/O tiles. For coniuration, irstly a rame is written sequentially into a rame buer reister called rame data input reister. In a second step, the same rame is written rom the rame buer reister into the coniuration SRAM cells o the FPGA abric while concurrently the next rame is written to the rame buer reister. Hence, coniuration is done in a pipelined and consecutive manner. The coniuration memory is oranized in rames as well and rames are the smallest atomic piece o coniuration data that can be written to or read rom coniuration memory. The rame order in bitstreams is outlined in [3] and depicted in Fiure 1. However, detailed inormation e.., on how to coniure a particular routin or loic resource inside a coniurable loic block is omitted in the documentation. In case o Xilinx Virtex-II FPGAs, the irst rames o a bitstream coniure lobal clock resources. These rames are ollowed by rames that coniure the I/O tiles on the very let o the FPGA. Aterwards, the bitstream contains rames that coniure columns o coniurable loic blocks (CLBs), whereas each o these rames contains coniuration data or the I/O tiles on the bottom and top o the FPGA. Ater that, rames or the I/O tiles on the very riht o the FPGA succeed ollowed irstly by rames coniurin the block ram (BRAM) and inally by rames coniurin the BRAM interconnections. The coniuration data or Spartan-3 FPGAs is basically the same but with a dierent number o rames or the particular resources. In this work, rames or coniurable loic blocks are o particular interest. For Virtex-II FPGAs, one column o coniurable loic blocks is coniured by 22 consecutive rames. As illustrated in Fiure 2, each rame starts with twelve bytes coniurin parts o the top I/O tile ollowed /10 $ IEEE DOI /FPL
2 by h 10 bytes o data coniurin parts o each coniurable loic block in the column. Here, h reers to the heiht o the FPGA iven in terms o coniurable loic blocks per column. The rame is closed by aain twelve bytes or coniurin parts o the bottom I/O tile. A column o coniurable loic blocks is completely coniured ater writin 22 rames. A switch matrix o a Virtex-II CLB is based on rouhly 300 coniurable multiplexers that can select rom about 450 dierent inputs. The set o inputs and outputs are not disjoint, i.e., some multiplexer outputs are also connected to the switch matrix as inputs. Each multiplexer is controlled by an exclusive set o coniuration bits and dierent multiplexers do not share the same coniuration bits. The bitstream ormat is identical or each CLB o the FPGA abric and the coniuration data is strictly separated in dedicated data items or each CLB. Respectively, the same holds or the coniuration o block RAMs. While all Virtex-II FPGAs provide an identical switch matrix layout or all devices o the Virtex-II amily, we ound that the available routin resources dier amon the devices o the Spartan-3 amily. The lion s share o the rame data o a CLB coniures the multiplexer settins o the switch matrix and only a small portion o data is used or lookup table unctions and slice internal multiplexer settins [5]. III. SWITCH MATRIX ENCODING For each switch matrix output, a multiplexer controls which input is connected to the output. Settin the select sinals or a multiplexer is achieved by settin the correspondin coniuration bits within one or several rames 1. In depth analysis o bitstreams revealed that two multiplexers never share common coniuration bits and that coniuration bits or one multiplexer miht be spread over several rames. The number o coniuration bits or a particular switch matrix multiplexer varies accordin to its number o inputs. Most 1 These coniuration bits are not documented or present Xilinx FPGAs. However, this inormation has been automatically obtained by eneratin test desins or all switch matrix multiplexers that have been sequentially coniured to all possible input combinations. These permutations are provided by Xilinx via device descriptions in a proprietary lanuae, called Xilinx Desin Lanuae [6]. The resultin bitstreams have been analyzed with the command line tool bitscan, which is included in the ReCoBus-Builder tool suite [7]. As a result, all switch matrix encodins have been enerated and made accessible via an API, which has similarities with JBits [8]. As opposed to JBits, our API can optionally provide detailed inormation about the switch matrix multiplexer encodins within the coniuration bitstream. Global Clock Resource rame Global Clock Resource rame Global Clock Resource rame Global Clock Resource rame 26 rames CLB rame CLB rame CLB rame BRAM rame BRAM rame BRAM Interconnect rame BRAM Interconnect rame n 22 rames 26 rames m 86 rames Fi. 1. Frame order within the coniuration bitstreams o Xilinx Virtex-II FPGAs [3]. The coniuration data or the loic, block RAMs, and the block RAM routin is separated in dedicated sections o the bitstream. CLB y h CLB x IO Tiles Coniurable Loic Block h times 10 bytes h times 10 bytes h times 10 bytes h times 10 bytes 22 rames Fi. 2. Xilinx Virtex-II FPGA example with 25 CLBs surrounded by I/O tiles. The inner columns consist o 22 coniuration rames, while each rame contains 12 + h 10 + o data (see [4] or more details on the structure o Xilinx coniuration bitstreams). h times 10 bytes Fi. 3. A multiplexer with c r = 3 4 = 12 inputs controlled by two 1-hot codes as select sinals. The upper let input is connected to the output. multiplexer settins or Virtex-II FPGAs are coded usin a 2-hot codin scheme (a one 2-code is a binary code with exactly two bits set to one, e ), while only a ew multiplexers use 1-hot or 3-hot codes. For Spartan-3 FPGAs, all multiplexers are coded with 1-hot or 3-hot codes, while only the clock input multiplexers or slices are coded by a 2-hot code. The coniuration bits or a multiplexer with a 2-hot encoded select sinal can be divided into two disjoint roups c and r, so that the 2-hot code results in two 1-hot codes. It is assumed that the switch matrix multiplexers in Xilinx Virtex-II and Spartan-3 FPGAs are implemented with pass transistors that are directly controlled by coniuration SRAM cells. See [9] or more details on the implementation o FPGA switch matrices. A switch matrix multiplexer and the correspondin coniuration memory cells are illustrated in Fiure 3. That multiplexer is coniured by seven coniuration bits m 1 to m 7 that are divided into two disjoint roups c and r. The three coniuration bits in roup c select a particular column, while the our coniuration bits in roup r select a row to connect exactly one column input to the output. Not shown in the iure is a level restorer that keeps the output on a loic 1 -level, i no input is connected. The two roups c and r can be automatically extracted rom the dierent encodins or the multiplexers with the help o raph alorithms. For the ollowin, let us assume a 597
3 input mux coniuration bits (XDL name) index m 1 m 2 m 3 m 4 m 5 m 6 m 5 m 6 NetS6MID NetN2MID NetE6END NetE2END NetS2MID NetS2END NetW6END NetN6MID NetX NetN2END NetY NetN6END NetS6END NetE2END TABLE I EXAMPLE OF THE BITSTREAM ENCODING OF A DOUBLE LINE WITHIN A SPARTAN-3 SWITCH MATRIX. EACH ROW DENOTES A PARTICULAR MULTIPLEXER ENCODING THAT IS SET BY {m 1,..., m 6 }. Fi. 4. a) Coniuration bit raph or the switch matrix multiplexer example in Fiure 3. b) correspondin inverted coniuration bit raph that contains two cliques denotin the coniuration bit roups or controllin the multiplexer. c) Coniuration bit raph or the switch matrix multiplexer example in Fiure 3 assumin that the upper riht input is not used. d) correspondin inverted coniuration bit raph with additional third clique. multiplexer with n inputs that is controlled by m coniuration bits. For each coniuration bit m i a node m i is inserted into an undirected coniuration bit raph. Two dierent nodes m j and m k are adjacent i and only i both coniuration bits m j and m k are equal to one in one o the 2-hot codes. In other words, an ede in the coniuration bit raph corresponds to one particular multiplexer settin. Note that a coniuration bit raph or 2-hot codes is always bipartite with two independent sets o nodes c and r. Let c and r be the number o elements in c and r. I and only i c r = n, the coniuration bit raph is a complete bipartite raph whose inverted raph contains two cliques representin c and r. See Fiure 4 a) and b) or a complete bipartite coniuration bit raph and its inverted raph with two cliques c and r. In case c r > n, then c r n possible inputs remain unused. In this case, additional cliques will be ound in the inverted coniuration bit raph. However, these additional cliques do not correspond to new coniuration bit roups, as the additional cliques contain only nodes that belon also to other cliques, which can be easily identiied. An incomplete coniuration bit raph and the correspondin inverted raph containin an additional third clique is depicted in Fiure 4 c) and d). The here presented alorithm also works or 3-hot codes which are widely used in the encodin o switch matrix multiplexers on Spartan-3 devices. Here, the alorithm commonly detects three cliques which reer to the coniuration bit roups c, r1 and r2. Let us take the switch matrix encodin in Table I o a Spartan double line as a reerence. Then, the correspondin coniuration bit raph and the inverted coniuration bit raph can be derived as illustrated in Fiure 5. As can be Fi. 5. a) Coniuration bit raph or the 3-hot switch matrix multiplexer encodin in Table I. b) correspondin inverted coniuration bit raph that contains three cliques denotin the three coniuration bit roups or the multiplexer (a stand alone node does not match the ormal deinition o a clique in raph theory, but is anyhow here considered as a clique.). seen, there exist three cliques (and consequently three coniuration bit roups), where two cliques contain only one bit. This indicates the use o inverters inside the FPGA to decode these two cliques into the required 1-hot encodins or the two coniuration roups. The inverted coniuration bit raph can be directly translated into a correspondin multiplexer circuit that is depicted in Fiure 6. When considerin the inverted values o the coniuration bits m 5 and m 6, then this results in the two internal coniuration bit roups {m 5, m 5 } and {m 6, m 6 } that are each 1-hot encoded. Note that simple inverters have been ound as the only used variant to decode the state o coniuration SRAM-cells into control sinals or switch matrix pass transistors on Xilinx Spartan-3 FPGAs. In this section, we have summarized properties o the coniuration bitstream encodin and how this properties can be identiied usin coniuration bit raphs. IV. SHORT-CIRCUITS CAUSED BY RECONFIGURATION In this section, we reveal how short-circuits may occur by writin new coniuration data to the FPGA. Short-circuits may harm the sinal interity in other parts o the FPGA by voltae drops or may cause increased power consumption or the overall device as outlined in Section V. This miht lead to unexpected behavior which is extremely diicult to 598
4 Fi. 6. Physical implementation o the 14 input switch matrix multiplexer denoted in Table I. The hihlihted input is connected to the output. Exceptionally, here r1 and r2 are not ormal 1-hot codes but only rom the decodin point o view. The depicted multiplexer implements the codin in Table I. The two struck out inputs are unused, as there are no encodins with {m 1 = 1, m 5 = 0, m 6 = 0} or {m 1 = 1, m 5 = 0, m 6 = 1}. debu. Thereore, short-circuits should be prevented. Shortcircuits can be classiied into three roups accordin to their duration: 1) Lon-term short-circuits can occur any time durin operation o a module and may result rom sinle event upsets or corrupted coniuration data. 2) Medium-term short-circuits can happen when overwritin one coniuration with another one without an intermediate clear step 3) Short-term short-circuits are current spikes in a time rane below a nanosecond. The ollowin three subsections discuss these roups in more detail. A. Lon-Term Short-Circuits There are two possible reasons that may result in a shortcircuit when coniurin a switch matrix multiplexer: 1) at least two hots in c or 2) at least one hot c and at least two bits hot in r. I one o these conditions holds, two multiplexer inputs are connected to the output at the same time. I both o the inputs drive the same loical value, no short-circuit will be caused. Only i the two inputs drive dierent values, a shortcircuit will occur as depicted in Fiure 7. In case o a 1-hot Fi. 7. A multiplexer with an invalid 2-hot code in roup c that causes a short-circuit as the two selected inputs drive each a dierent value. code in roup c and a 2-hot code in roup r a short-circuit may occur as well. Let us start with the assumption that the probability or an input to drive a loical one is p, while the probability to drive a loical zero is 1 p (unused inputs will always drive a loical one and we can hence assume a hiher probability or an input to drive a loical one instead o drivin a loical zero). Let us also assume that the values driven by the dierent inputs are statistically independent. In the event o a k-hot roup c and a l-hot code in roup r, then k l inputs o the multiplexer are connected to the output. No short-circuit will occur, i all the connected inputs drive the same value. The probability p nsc that all inputs drive the same value, either a loical one or a loical zero, and thus no short-circuit occurs is iven in the ollowin equation: p nsc = p k l }{{} + (1 p) k l }{{}. (1) only loical ones only loical zeros I k = l = 1, exactly one input is connected to the output, hence the probability p nsc is equal to one. I not all inputs drive the same value and k l > 1, a short-circuit occurs with the probability p sc = 1 p nsc. Short-circuits caused by erroneous coniuration data will persist durin runtime and are thereore classiied as lon-term short-circuits. B. Medium-Term Short-Circuits Fiure 8 reveals how a medium-term short-circuit is caused by overwritin a coniuration c 1 with c 2. An existin coniuration c 1 in the coniuration memory can be directly overwritten with a new coniuration c 2. As mentioned above, overwritin the existin coniuration c 1 occurs rame wise. Let us assume between the two coniurations c 1 and c 2 the input connected to any iven output o chanes. Then, the 1- hot codes or roup c or roup r or the iven output o also chane. Let us assume that without loss o enerality only the 1- hot code in roup c chanes, while all bits in roup r remain unchaned. Let coniuration bit m j be set in c 1 and coniuration bit m i be set in c 2, with m i, m j c. Further, we assume that coniuration bit m i resides in a rame while m j resides in rame and that rame will be written beore rame. Writin rame o coniuration c 2 to coniuration memory while coniuration c 1 is still active results in a 2-hot code in roup c, as now coniuration bit m i is set to one while coniuration bit m j is also set to one. That may cause a short-circuit as mentioned above. The 2-hot code remains until by writin rame the coniuration bit m j o coniuration c 1 is set back to zero. Short-circuits that remain active between writin two or more dierent rames to coniuration memory are classiied as medium-term short-circuits. Note that the order in which rames are written to coniuration memory is arbitrary. Hence, an inappropriate rame order may increase the expected duration o medium-term short-circuits. But note that reorderin the rame order durin coniuration or omittin a shortcircuit in one multiplexer may cause a short-circuit in another multiplexer that is also coniured by rame and. C. Short-Term Short-Circuits In the above example m i and m j reside in two dierent rames and. Now let us assume that coniuration bit m i and m j reside in the same rame both in coniuration c 1 599
5 a) Two coniurations b) t 1 : Coni. c 1 is active Coni. c 1 Coni. c 2 m i=0 m j=1 m i=1 c) t 2 : Writin rame o coniuration c 2 coniuration memory m i=1 m j=1 invalid 2-hot code m j=0 coniuration memory m i=0 m j=1 valid 1-hot code d) t 3 :Writin rame o coniuration c 2 coniuration memory m i=1 m j=0 valid 1-hot code current consumption [ma] coniuration overwritin writin on blanked area time Fi. 9. Overwritin an existin module coniuration with a new module (coniuration overwritin) causes short-term and medium-term short-circuits that result in increased current consumption as compared to coniurin a blanked reion (writin on blanked area). Fi. 8. a) Coniuration c 1 and c 2 dier both in coniuration bit m i and m j, with m i, m j c. b) At t 1 coniuration c 1 is active. c) At t 2, rame o c 1 is overwritten with rame o c 2. The resultin 2-hot code in c may cause a short-circuit. d) The short-circuit remains active until rame o coniuration c 2 is written to coniuration memory at t 3. and c 2. Althouh within one clock cycle a complete rame is written rom a rame buer reister to coniuration memory, not all bits o coniuration memory will be written at exactly the same time. Let t 1 be the time when coniuration bit m i and the time t 2 when coniuration bit m j is written rom the rame buer reister to coniuration memory. I t 1 < t 2 or the time period δ = t 2 t 1 a 2-hot in c code can cause a shortcircuit. As δ is expected to be very low, these short-circuits are classiied as short-term short-circuits. Note that short-term and medium-term short-circuits may even occur when overwritin an existin coniuration with a coniuration that has a correct checksum and passed the desin rule check by vendor tools. V. IMPACT OF SHORT-CIRCUITS ON POWER CONSUMPTION For determinin the impact o partial reconiuration on the power consumption, a test system has been implemented usin the XUPV2P board rom Diilent. A 100 mω shunt resistor was used to measure the supply current to the board. For the XC2VP30 FPGA o that board, a system was implemented usin ReCoBus-Builder [7] that provides a reconiurable area and a separated static reion that contains the interace loic or the reconiurable modules. Fiure 9 reveals two traces that have been captured when writin the partial coniuration o a video module to the device. One trace illustrates the situation when the module is written on a blanked reion within the reconiurable area while the other trace depicts the case when the video module is overwritin another module that is already located at the taret position o the video module. The heiht o the reconiurable area and the partial module was 67% o the total heiht o the FPGA (in terms o CLBs). Note that the reconiurable area was connected to a separate clock net that was switched o durin reconiuration. Despite the act that the two traces are not only resultin rom the reconiuration process alone but on the total power consumption o the board, a material increase in the power consumption can be identiied when not coniurin on a blanked reconiurable area. Fi. 10. Short-circuit test macro or the hihlihted LUT input multiplexer ( ) within the center CLB. The macro allows to set all inputs o the taret multiplexer to tunable states while additionally allowin to sense chanes to this state by placin dedicated paths that contain one taret input each. For urther investiatin the impact o a short-circuit on the power consumption, dedicated test desins have been implemented usin Xilinx low level tools. This allows in particular to control the directed usae o FPGA resources which is not possible when usin a conventional HDL low. Fiure 10 depicts a macro in the FPGA editor that was used to test the impact o short-circuits in look-up table input multiplexers The current increase depends not only on invalidatin the coniuration bitstream, but also on the state o the inputs that are connected to the switch multiplexers. This state was manually determined or each particular examined resource. The results are summarized in Table II. The maximum extra (static) current that could be drawn via a sinle switch matrix multiplexer was 7.9 ma. This value is by ar beyond normal operation conditions i we have to consider that one CLB has eiht LUTs with our input multiplexers each and that (dependin on the device) an FPGA may posses thousands o CLBs. Consequently, somebody miht think to provide an FPGA virus as a partial module that may draw multiple amperes and that miht potentially permanently damae the device. VI. PREVENTING SHORT-CIRCUITS Medium-term and short-term short-circuits can only occur when an existin coniuration in the coniuration memory 600
6 resource # con. bits # Mux inputs extra current LUT input ma Double line ma Clock input ma TABLE II MAXIMUM CURRENT INCREASE FOUND ON A SPARTAN-3 FPGA WHEN INVALIDATING A SINGLE SWITCH MATRIX MULTIPLEXER. is overwritten, e.. when a new module shall be coniured to a module slot that contains a module already. In order to prevent short-circuits, beore coniurin the new module, the user has to coniure the module slot such that it only contains the communication inrastructure that connects the module with the static part but not any other loic or routin. This coniuration scheme can be enorced by a coniuration driver that rejects write accesses to any unblanked coniuration memory reion. Partially reconiurable systems based on the ReCoBus communication inrastructure can be desined or open system use, so that third party developers provide a module as a bitstream that the user can link into the already existin system [7]. These third party modules could (intentionally, in case o a virus) cause lon-term short-circuits. This can be detected as described in the ollowin. A. A bitstream scanner or detectin possible short-circuits Currently, the ReCoBus-Builder tool chain provides a sotware implementation o a bitstream scanner that can detect lon-term short-circuits. This is possible by testin or each switch matrix multiplexer i the correspondin coniuration is valid or not. In addition, the bitstream scanner can veriy i the third party module contains the required ReCoBus communication inrastructure. Note that it is impossible to prevent short-term and medium-term short-circuits at synthesis, as the later context o the bitstream in the partial system is unknown. A hardware implementation o the bitstream scanner would have to keep track or both roups r and c o all multiplexers i within a roup there is a hot bit already. I an erroneous rame contains a second hot bit or any roup, the bitstream scanner would rejected the rame. Note that scannin or short circuits in 3-hot coded multiplexers like the one depicted in Fiure 5, the scanner has only to keep track whether in roup c there is more than one bit set. This would siniicantly reduce the hardware overhead. Note that coniuration data can also be chaned by sinle event upsets, both in the coniuration memory and in an ochip memory that is used or storin coniuration data. In the second case, a bitstream scanner could detect erroneous coniuration data. In both cases, checksum sel-test o coniuration data would not help to prevent short-circuits as the CRC violation is only detected ater writin the coniuration. Note that it is trivial to manipulate a coniuration bitstream that will still pass the built-in CRC check, hence CRC checks can not detect viruses. Short-circuits in FPGAs can also be used to attack a system. Three levels o system attacks are iven in [1]: While Level 0 attacks use short-circuits to produce instability, Level 1 attacks violate a bus protocols and Level 2 obey the bus protocol and use valid bus transactions to trier harmul system tasks. The classiication o short-circuits accordin to their duration in this paper stands orthoonal to Level 0 attacks in [1]. Note that our bitstream scanner can be used to prevent Level 0 attacks. However Level, 1 and Level 2 attacks can only be detected by source code analysis or by simulation. To orce the placer and the router to implement a module in a iven area, Xilinx provides so called area constraints. However, the area constraints in current Xilinx releases contain a limitation. While the placer obeys the area constraints, the router will violate the area constraints as the loic utilization rows (this even holds when usin the Xilinx PR-Patch [10]). Routin paths rom neihborin module slots that cross the module boundary complicate blankin a module slot, as theses routin paths may not be interrupted durin blankin. Blocker macros that are part o the ReCoBus-Builder tool chain prevent routin violation and thereore acilitate blankin a module slot. VII. CONCLUSION In this paper we showed how short-circuits can be caused by coniuration at runtime. Short-circuits can be classiied accordin to their duration and lead to and increased current consumption. However, the ReCoBus-Builder tool chain oers a sotware implementation o a bitstream scanner, that detects short-circuits. In uture work, we will present a hardware implementation o a bitstream scanner and examine shortcircuits on newer FPGAs. ACKNOWLEDGMENT This work is supported in part by the Norweian Research Council under rant V30 REFERENCES [1] Ilija Hadzic and Sanjay Udani and Jonathan M. Smith, FPGA Viruses, in FPL, 1999, pp [2] G. Lemieux, E. Lee, M. Tom, and A. Yu, Directional and Sinle- Driver Wires in FPGA Interconnect, in IEEE International Conerence on Field-Prorammable Technoloy (FPT), [3] Xilinx Inc., Virtex-II Pro and Virtex-II Pro X FPGA User Guide, November [4] Dirk Koch, Architectures, Methods and Tools or Distributed Run-time Reconiurable FPGA-based Systems, Ph.D. dissertation, University o Erlanen-Nurember, [5] A. Sinh and M. Marek-Sadowska, FPGA Interconnect Plannin, in SLIP 02: Proceedins o the 2002 International Workshop On System- Level Interconnect Prediction. New York, NY, USA: ACM, 2002, pp [6] Xilinx Inc., The Xilinx Desin Lanuae, July [7] D. Koch, C. Beckho, and J. Teich, ReCoBus-Builder a Novel Tool and Technique to Build Statically and Dynamically Reconiurable Systems or FPGAs, in Proceedins o International Conerence on Field-Prorammable Loic and Applications (FPL 08), Heidelber, Germany, Sep. 2008, pp [8] Xilinx Inc., JBits 3.0 SDK or Virtex-II. [9] D. Lewis, E. Ahmed, G. Baeckler, V. Betz, M. Boureault, D. Cashman, D. Galloway, M. Hutton, C. Lane, A. Lee, P. Leventis, S. Marquardt, C. McClintock, K. Padalia, B. Pedersen, G. Powell, B. Ratchev, S. Reddy, J. Schleicher, K. Stevens, R. Yuan, R. Cli, and J. Rose, The Stratix II loic and routin architecture, in FPGA 05: Proceedins o the 2005 ACM/SIGDA 13th international symposium on Fieldprorammable ate arrays. New York, NY, USA: ACM, 2005, pp [10] Xilinx Inc., Partial Reconiuration User Guide, March
Relation: A relation is simply a set of ordered pairs.
Relations: UNIT 5: FUNCTIONS STUDY SHEET Relation: A relation is simply a set o ordered pairs. The irst elements in the ordered pairs (the -values), orm the domain. The second elements in the ordered pairs
More informationCarolina Bachenheimer-Schaefer, Thorsten Reibel, Jürgen Schilder & Ilija Zivadinovic Global Application and Solution Team
APRIL 2017 Webinar KNX DALI-Gateway DG/S x.64.1.1 BU EPBP GPG Building Automation Carolina Bachenheimer-Schaefer, Thorsten Reibel, Jürgen Schilder & Ilija Zivadinovic Global Application and Solution Team
More informationArtificial Intelligence Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras
(Refer Slide Time: 00:26) Artificial Intelligence Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 06 State Space Search Intro So, today
More informationAPRIL 2017 KNX DALI-Gateways DG/S x BU EPBP GPG Building Automation. Thorsten Reibel, Training & Qualification
APRIL 2017 KNX DALI-Gateways DG/S x.64.1.1 BU EPBP GPG Building Automation Thorsten Reibel, Training & Qualification Agenda New Generation DALI-Gateways DG/S x.64.1.1 Features DALI Assortment today New
More informationOverview of the ATLAS Fast Tracker (FTK) (daughter of the very successful CDF SVT) July 24, 2008 M. Shochet 1
Overview of the ATLAS Fast Tracker (FTK) (daughter of the very successful CDF SVT) July 24, 2008 M. Shochet 1 What is it for? At the LHC design accelerator intensity: New phenomena: 0.05 Hz Total interaction
More informationE32-DE-IDM-32. Opto-Isolated I/O Board
-COMP-0027 Revision: 1 December 2005 Contact Author Institut de RadioAstronomie Millimétrique E32-DE-IDM-32 Opto-Isolated I/O Board Owner Francis Morel(morel@iram.fr) Keywords: Approved by: Date: Signature:
More informationA New Parameter for Maintaining Consistency in an Agent's Knowledge Base Using Truth Maintenance System
A New Parameter for Maintaining Consistency in an Agent's Knowledge Base Using Truth Maintenance System Qutaibah Althebyan, Henry Hexmoor Department of Computer Science and Computer Engineering University
More informationTSM ASSESSMENT PROTOCOL
TSM ASSESSMENT PROTOCOL A Tool for Assessin Tailins Manaement Performance Introduction Launched in 2004, Towards Sustainable Minin (TSM) is an initiative of The Minin Association of Canada desined to enhance
More informationDALI power line communication
DALI power line communication Content Functionality and advantages How does it work? Applications Installation Technical parameters About us DALI PLC Content Functionality and advantages Device which allows
More informationEdexcel GCSE Religious Studies
Resources Guide Edexcel GCSE Reliious Studies Presentin our own resources for the new 2009 GCSE specification Great Support: Better results Edexcel GCSE Reliious Studies Presentin our own resources for
More informationCausation and Free Will
Causation and Free Will T L Hurst Revised: 17th August 2011 Abstract This paper looks at the main philosophic positions on free will. It suggests that the arguments for causal determinism being compatible
More informationAlgebraic, Exponential, and Logarithmic Functions
Alebraic, Eponential, and Loarithmic Functions Chapter : Functions and Mathematical Models Chapter : Properties o Elementar Functions Chapter : Fittin Functions to Data Chapter : Polnomial and Rational
More informationGateways DALIK v Programming manual
Gateways DALIK v1.4.3 Programming manual Index 1 GENERAL DESCRIPTION... 3 2 TECHNICAL INFORMATION... 4 3 PROGRAMMING... 5 3.1 APPLICATION PROGRAM INFORMATION... 5 3.2 INDIVIDUAL ADDRESS ASSIGMENT... 6
More information1. Show that f is a bijective
3 Functions 4 SECTION C Inverse Functions B the end o this section ou will be able to show that a given unction is bijective ind the inverse unction You need to know our work on injections and surjections
More informationNavigating Registers in Placement for Clock Network Minimization
12.2 Naviatin Reisters in Placement for Clock Network Minimization Yonqian Lu a, C. N. Sze b, Xianlon Hon a, Qian Zhou a, Yici Cai a, Lian Huan a, Jian Hu b a Dept. of Computer Science an Technoloy Tsinhua
More informationModule 6: Inverse Functions
Haberman MTH c Section I: Sets and Functions Module 6: Inverse Functions EXAMPLE: Consider the unction n ( ), which is graphed in Figure below Figure : Graph o n( ) Since n is a unction, each input corresponds
More information1. Introduction Formal deductive logic Overview
1. Introduction 1.1. Formal deductive logic 1.1.0. Overview In this course we will study reasoning, but we will study only certain aspects of reasoning and study them only from one perspective. The special
More informationThe nature of consciousness underlying existence William C. Treurniet and Paul Hamden, July, 2018
!1 The nature of consciousness underlying existence William C. Treurniet and Paul Hamden, July, 2018 Summary. During conversations with beings from the Zeta race, they expressed their understanding of
More informationOrder your FREE Evaluation Pack. Edexcel GCSE Religious Studies. Order your FREE Evaluation Pack. Want to know more?
Order your FREE Evaluation Pack Our GCSE Reliious Studies Evaluation Pack includes Unit 1A: Reliion and Life Christianity and Islam Student Book and accompanyin support material. Simply complete and return
More informationINTERMEDIATE LOGIC Glossary of key terms
1 GLOSSARY INTERMEDIATE LOGIC BY JAMES B. NANCE INTERMEDIATE LOGIC Glossary of key terms This glossary includes terms that are defined in the text in the lesson and on the page noted. It does not include
More informationTorah Code Cluster Probabilities
Torah Code Cluster Probabilities Robert M. Haralick Computer Science Graduate Center City University of New York 365 Fifth Avenue New York, NY 006 haralick@netscape.net Introduction In this note we analyze
More informationGesture recognition with Kinect. Joakim Larsson
Gesture recognition with Kinect Joakim Larsson Outline Task description Kinect description AdaBoost Building a database Evaluation Task Description The task was to implement gesture detection for some
More informationAPAS assistant flexible production assistant
APAS assistant flexible production assistant 2 I APAS assistant APAS assistant I 3 Flexible automation for the smart factory of the future APAS family your partner on the path to tomorrow s production
More informationBigdata High Availability Quorum Design
Bigdata High Availability Quorum Design Bigdata High Availability Quorum Design... 1 Introduction... 2 Overview... 2 Shared nothing... 3 Shared disk... 3 Quorum Dynamics... 4 Write pipeline... 5 Voting...
More informationIntroduction to Statistical Hypothesis Testing Prof. Arun K Tangirala Department of Chemical Engineering Indian Institute of Technology, Madras
Introduction to Statistical Hypothesis Testing Prof. Arun K Tangirala Department of Chemical Engineering Indian Institute of Technology, Madras Lecture 09 Basics of Hypothesis Testing Hello friends, welcome
More informationDPaxos: Managing Data Closer to Users for Low-Latency and Mobile Applications
DPaxos: Managing Data Closer to Users for Low-Latency and Mobile Applications ABSTRACT Faisal Nawab University of California, Santa Cruz Santa Cruz, CA fnawab@ucsc.edu In this paper, we propose Dynamic
More informationUnit 5: Inverse Functions
Haberman MTH Section I: Functions and Their Graphs Unit 5: Inverse Functions EXAMPLE: Consider the unction n( ), which is graphed in Figure Figure : Graph o n( ) Since n is a unction, each input corresponds
More informationA Discussion on Kaplan s and Frege s Theories of Demonstratives
Volume III (2016) A Discussion on Kaplan s and Frege s Theories of Demonstratives Ronald Heisser Massachusetts Institute of Technology Abstract In this paper I claim that Kaplan s argument of the Fregean
More informationABB STOTZ-KONTAKT GmbH ABB i-bus KNX DGN/S DALI Gateway for emergency lighting
STO/GM December 2011 ABB STOTZ-KONTAKT GmbH ABB i-bus KNX DGN/S 1.16.1 DALI Gateway for emergency lighting STO/G - Slide 1 DALI Gateway Emergency Lighting DGN/S 1.16.1 DALI Standard EN 62386-100 Normal
More informationRecursive Mergesort. CSE 589 Applied Algorithms Spring Merging Pattern of Recursive Mergesort. Mergesort Call Tree. Reorder the Merging Steps
Recursive Mergesort CSE 589 Applied Algorithms Spring 1999 Cache Performance Mergesort Heapsort A[1n] is to be sorted; B[1n] is an auxiliary array; Mergesort(i,j) {sorts the subarray A[ij] } if i < j then
More informationThe AEG is requested to: Provide guidance on the recommendations presented in paragraphs of the issues paper.
SNA/M1.17/5.1 11th Meeting of the Advisory Expert Group on National Accounts, 5-7 December 2017, New York, USA Agenda item: 5.1 Islamic finance in the national accounts Introduction The 10 th meeting of
More informationPredictive Coding. CSE 390 Introduction to Data Compression Fall Entropy. Bad and Good Prediction. Which Context to Use? PPM
Predictive Coding CSE 390 Introduction to Data Compression Fall 2004 Predictive Coding (PPM, JBIG, Differencing, Move-To-Front) Burrows-Wheeler Transform (bzip2) The next symbol can be statistically predicted
More informationPROSPECTIVE TEACHERS UNDERSTANDING OF PROOF: WHAT IF THE TRUTH SET OF AN OPEN SENTENCE IS BROADER THAN THAT COVERED BY THE PROOF?
PROSPECTIVE TEACHERS UNDERSTANDING OF PROOF: WHAT IF THE TRUTH SET OF AN OPEN SENTENCE IS BROADER THAN THAT COVERED BY THE PROOF? Andreas J. Stylianides*, Gabriel J. Stylianides*, & George N. Philippou**
More informationYou. Sharing Jesus. WHAT IS CONNECT US? IMPRESSIVE RESULTS. Dear Concerned Christians and Church Leaders,
You. Sharing Jesus. Dear Concerned Christians and Church Leaders, DO YOU LOVE AMERICA AND AMERICANS? DO YOU WANT THE GOOD NEWS TO BLESS THEIR LIVES? DO YOU WANT TO FIND SPIRITUAL SEEKERS IN YOUR COMMUNITY?
More informationBank Chains Process in SAP
Applies to: SAP ERP 6.0. For more information, visit the Enterprise Resource Planning homepage. Summary Sometimes, the vendor cannot be directly into its bank account by the organizations. They would have
More informationHOW TO USE OUR APP. A brief guide to using the urbi app on any smartphone. How to use our app on any smartphone
HOW TO USE OUR APP A brief guide to using the urbi app on any smartphone How to use our app on any smartphone Summary Download the app.. How to register... The urbi app. The main menu Buying an access
More informationAppendix 1. Towers Watson Report. UMC Call to Action Vital Congregations Research Project Findings Report for Steering Team
Appendix 1 1 Towers Watson Report UMC Call to Action Vital Congregations Research Project Findings Report for Steering Team CALL TO ACTION, page 45 of 248 UMC Call to Action: Vital Congregations Research
More informationDigital Logic Lecture 5 Boolean Algebra and Logic Gates Part I
Digital Logic Lecture 5 Boolean Algebra and Logic Gates Part I By Ghada Al-Mashaqbeh The Hashemite University Computer Engineering Department Outline Introduction. Boolean variables and truth tables. Fundamental
More informationAugust Parish Life Survey. Saint Benedict Parish Johnstown, Pennsylvania
August 2018 Parish Life Survey Saint Benedict Parish Johnstown, Pennsylvania Center for Applied Research in the Apostolate Georgetown University Washington, DC Parish Life Survey Saint Benedict Parish
More informationAUTOMATION. Presents DALI
Presents DALI What is DALI? DALI is an acronym and stands for Digital Addressable Lighting Interface. This means that each DALI device (ballast, sensor, luminaire etc) receives its individual DALI address
More informationUNDERSTANDING UNBELIEF Public Engagement Call for Proposals Information Sheet
UNDERSTANDING UNBELIEF Public Engagement Call for Proposals Information Sheet Through a generous grant from the John Templeton Foundation, the University of Kent is pleased to announce a funding stream
More informationSyllabus for PRM 553 Ministry in the Urban Setting 3.0 Credit Hours Spring 2015
I. COURSE DESCRIPTION Syllabus for PRM 553 Ministry in the Urban Setting 3.0 Credit Hours Spring 2015 A study of the church and parachurch ministries in the urban/suburban context. Examines several types
More informationWho wrote the Letter to the Hebrews? Data mining for detection of text authorship
Who wrote the Letter to the? Data mining for detection of text authorship Madeleine Sabordo a, Shong Y. Chai a, Matthew J. Berryman a, and Derek Abbott a a Centre for Biomedical Engineering and School
More informationOutline. Uninformed Search. Problem-solving by searching. Requirements for searching. Problem-solving by searching Uninformed search techniques
Outline Uninformed Search Problem-solving by searching Uninformed search techniques Russell & Norvig, chapter 3 ECE457 Applied Artificial Intelligence Fall 2007 Lecture #2 ECE457 Applied Artificial Intelligence
More informationQuorums. Christian Plattner, Gustavo Alonso Exercises for Verteilte Systeme WS05/06 Swiss Federal Institute of Technology (ETH), Zürich
Quorums Christian Plattner, Gustavo Alonso Exercises for Verteilte Systeme WS05/06 Swiss Federal Institute of Technology (ETH), Zürich {plattner,alonso}@inf.ethz.ch 20.01.2006 Setting: A Replicated Database
More informationSyllabus for PRM 767 The Preacher as Evangelist 3 Credit Hours Fall 2015
I. COURSE DESCRIPTION Syllabus for PRM 767 The Preacher as Evangelist 3 Credit Hours Fall 2015 A study of the content, methods, and procedures used in evangelistic preaching and the dynamics of the revival
More informationGetting the Word of God to Catholics has become a major problem in areas where the
Center or Applied Research in the Apostolate Summary. Georgetown University Report. Washington, D.C. Serving Dioceses, Parishes and Religious Communities Since 1964 Summer 2002 For additional inormation
More informationSix Sigma Prof. Dr. T. P. Bagchi Department of Management Indian Institute of Technology, Kharagpur. Lecture No. # 18 Acceptance Sampling
Six Sigma Prof. Dr. T. P. Bagchi Department of Management Indian Institute of Technology, Kharagpur Lecture No. # 18 Acceptance Sampling Good afternoon, we begin today we continue with our session on Six
More informationEE-100 Engineering Laboratory Module1: PCB
EE-100 Engineering Laboratory Module1: PCB Dr. Ing. Ahmad Kamal Nasir [Office Hours] Tuesday (1000-1100) Friday (1000-1100) Room 9-345A (EE Dept. Right Wing) 24 Jan 2016 Dr. -Ing. Ahmad Kamal Nasir 1 Module
More informationPerformance Analysis with Vampir
Performance Analysis with Vampir Bert Wesarg Technische Universität Dresden Outline Part I: Welcome to the Vampir Tool Suite Mission Event trace visualization Vampir & VampirServer The Vampir displays
More informationQuorum Website Terms of Use
Quorum Website Terms of Use Quorum Analytics Inc. ( Quorum"), has created this website (the "Website" or the "Site") to provide an online analytical tool that Subscribers can use to generate Derived Analytics
More informationMISSOURI S FRAMEWORK FOR CURRICULAR DEVELOPMENT IN MATH TOPIC I: PROBLEM SOLVING
Prentice Hall Mathematics:,, 2004 Missouri s Framework for Curricular Development in Mathematics (Grades 9-12) TOPIC I: PROBLEM SOLVING 1. Problem-solving strategies such as organizing data, drawing a
More informationArtificial Intelligence Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras
(Refer Slide Time: 00:14) Artificial Intelligence Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 35 Goal Stack Planning Sussman's Anomaly
More informationLuminosity, Reliability, and the Sorites
Philosophy and Phenomenological Research Vol. LXXXI No. 3, November 2010 2010 Philosophy and Phenomenological Research, LLC Luminosity, Reliability, and the Sorites STEWART COHEN University of Arizona
More informationCorporate Team Training Session # 2 June 8 / 10
3 rd Annual Great Corporate Debate Corporate Team Training Session # 2 June 8 / 10 Stephen Buchanan Education Consulting Outline of Session # 2 Persuasion topics Great Corporate Debate Review Contest,
More informationJews For Yeshua. Time Line 2
Jews For Yeshua www.jewsforyeshua.com To the Torah & the Testimony I anyone does not speak according to these words It is because they have no light in them. Yesh yahu (Isaiah) 8:20; Revelation 12:17;
More information2.1 Review. 2.2 Inference and justifications
Applied Logic Lecture 2: Evidence Semantics for Intuitionistic Propositional Logic Formal logic and evidence CS 4860 Fall 2012 Tuesday, August 28, 2012 2.1 Review The purpose of logic is to make reasoning
More informationThe Fixed Hebrew Calendar
The Fixed Hebrew Calendar Moshe Lerman moshe.lerman@cremejvm.com June, 2017 קול גלגל המתגלגל ממטה למעלה 0. Introduction The present paper is an extension of a paper entitled Gauss Formula for the Julian
More informationCorporate Team Training Session # 2 May 30 / June 1
5 th Annual Great Corporate Debate Corporate Team Training Session # 2 May 30 / June 1 Stephen Buchanan Education Consulting Outline of Session # 2 Great Corporate Debate Review Contest, Rules, Judges
More informationInformalizing Formal Logic
Informalizing Formal Logic Antonis Kakas Department of Computer Science, University of Cyprus, Cyprus antonis@ucy.ac.cy Abstract. This paper discusses how the basic notions of formal logic can be expressed
More informationWelcome to the Church Planting Pipeline!
Welcome to the Church Planting Pipeline! We are so excited to come alongside you as you identify and train the next generation of missionaries sitting in your congregation. You and your church have the
More informationChapter 8 - Sentential Truth Tables and Argument Forms
Logic: A Brief Introduction Ronald L. Hall Stetson University Chapter 8 - Sentential ruth ables and Argument orms 8.1 Introduction he truth-value of a given truth-functional compound proposition depends
More informationConfirmation Ministry Parent Handbook. We believe we are Confident, Compassionate and Committed children of God.
Confirmation Ministry Parent Handbook We believe we are Confident, Compassionate and Committed children of God. 2018-2019 Visit our Website! Servant of Christ Lutheran Church 740 East Hayden Lake Road
More informationISO/IEC JTC/1 SC/2 WG/2 N2474. Xerox Research Center Europe. 25 April 2002, marked revisions 17 May 2002
ISO/IEC JTC/1 SC/2 WG/2 N2474 2002-05-17 Proposal to Modify the Encoding of Deseret Alphabet in Unicode Kenneth R. Beesley Xerox Research Center Europe Ken.Beesley@xrce.xerox.com 25 April 2002, marked
More informationIntroducing Our New Faculty
Dr. Isidoro Talavera Franklin University, Philosophy Ph.D. in Philosophy - Vanderbilt University M.A. in Philosophy - Vanderbilt University M.A. in Philosophy - University of Missouri M.S.E. in Math Education
More informationStout s teleological theory of action
Stout s teleological theory of action Jeff Speaks November 26, 2004 1 The possibility of externalist explanations of action................ 2 1.1 The distinction between externalist and internalist explanations
More informationProbability Distributions TEACHER NOTES MATH NSPIRED
Math Objectives Students will compare the distribution of a discrete sample space to distributions of randomly selected outcomes from that sample space. Students will identify the structure that emerges
More informationSyllabus for PRM 660- Practical Theology for Charismatic Ministry 3 Credit Hours July 8-12, 2013
I. COURSE DESCRIPTION Syllabus for PRM 660- Practical Theology for Charismatic Ministry 3 Credit Hours July 8-12, 2013 A course designed to help implement the promises of God and to build the Kingdom of
More informationBI 541 Eschatology. Fall 2015 Syllabus Brother Gary Spaeth. I. Course Description
I. Course Description BI 541 Eschatology Fall 2015 Syllabus Brother Gary Spaeth This course concentrates on the prophecies of God s Word for the future. Students are taught a pre-tribulation rapture position
More informationDALI Expander. Datasheet. Expander with Power Supply. device for simple DALI circuit expansion with integrated Bus power supply
DALI Expander Datasheet Expander with Power Supply device for simple DALI circuit expansion with integrated Bus power supply Art. Nr. 89453847 Art. Nr. 89453847-HS DALI Expander DALI Expander Expander
More informationAcademic language paragraph frames
Paragraph Frame for Scaffolding Comparing Academic language paragraph frames and are similar in several ways. They both. They also. Furthermore, each Because of these similarities, we can However, and
More informationNetwork Analysis of the Four Gospels and the Catechism of the Catholic Church
Network Analysis of the Four Gospels and the Catechism of the Catholic Church Hajime Murai and Akifumi Tokosumi Department of Value and Decision Science, Tokyo Institute of Technology 2-12-1, Ookayama,
More informationXerox Research Center Europe. 25 April at the earliest opportunity to include four additional characters,
Proposal to Modify the Encoding of Deseret Alphabet in Unicode Kenneth R. Beesley Xerox Research Center Europe Ken.Beesley@xrce.xerox.com 25 April 2002 1 Summary It is proposed that the encoding of Deseret
More informationAboutness and Justification
For a symposium on Imogen Dickie s book Fixing Reference to be published in Philosophy and Phenomenological Research. Aboutness and Justification Dilip Ninan dilip.ninan@tufts.edu September 2016 Al believes
More informationMITOCW ocw f99-lec18_300k
MITOCW ocw-18.06-f99-lec18_300k OK, this lecture is like the beginning of the second half of this is to prove. this course because up to now we paid a lot of attention to rectangular matrices. Now, concentrating
More informationSample Fundamental Skills Exercises
Sample Fundamental Skills Exercises Formative exercises: About every other week throughout the semester, I provide students with formative exercises that help students build their understanding of both
More informationArtificial Intelligence: Valid Arguments and Proof Systems. Prof. Deepak Khemani. Department of Computer Science and Engineering
Artificial Intelligence: Valid Arguments and Proof Systems Prof. Deepak Khemani Department of Computer Science and Engineering Indian Institute of Technology, Madras Module 02 Lecture - 03 So in the last
More informationPayment Card Industry (PCI) Qualified Integrators and Resellers
Payment Card Industry (PCI) Qualified Integrators and Resellers Program Guide Version 1.1 November 2014 Document Changes Date Version Description August 2012 1.0 Initial release of the PCI Qualified Integrators
More informationBalancing Authority Ace Limit (BAAL) Proof-of-Concept BAAL Field Trial
Balancing Authority Ace Limit (BAAL) Proof-of-Concept BAAL Field Trial Overview The Reliability-based Control Standard Drafting Team and the Balancing Area Control Standard Drafting Team were combined
More informationREMNANT, RESTORATION, AND REVOLUTION
Page-1 REMNANT, RESTORATION, AND REVOLUTION John Painter April 12 th, 2006 Augmented September 24 th, 2009 TABLE OF CONTENTS. REMNANT, RESTORATION, AND REVOLUTION... 1 TABLE OF CONTENTS... 1 GOING OUTSIDE
More informationA Model for Small Groups at Scarborough Community Alliance Church
A Model for Small Groups at Scarborough Community Alliance Church Rev. Dr. Timothy Quek Senior Pastor Scarborough Community Alliance Church October 2012 A Model for Small Groups at SCommAC Page 1 Preamble
More informationThe synoptic problem and statistics
The synoptic problem and statistics Andris Abakuks September 2006 In New Testament studies, the gospels of Matthew, Mark and Luke are known as the synoptic gospels. Especially when their texts are laid
More informationCSSS/SOC/STAT 321 Case-Based Statistics I. Introduction to Probability
CSSS/SOC/STAT 321 Case-Based Statistics I Introduction to Probability Christopher Adolph Department of Political Science and Center for Statistics and the Social Sciences University of Washington, Seattle
More informationNational Incubator for Community-Based Jewish Teen Education Initiatives Qualitative Research on Jewish Teens Fall 2014-Winter 2015
National Incubator for Community-Based Jewish Teen Education Initiatives Qualitative Research on Jewish Teens From Theory to Outcomes: Jewish Teen Education and Engagement Outcomes Background and Executive
More informationFinding Faith in Life. Online Director s Manual
Discover! Finding Faith in Life Online Director s Manual Discover! Finding Faith in Life Contents Welcome... 3 Program Highlights... 4 Program Components... 6 Understanding the Components...11 Key Elements
More informationAsking the Right Questions: A Guide to Critical Thinking M. Neil Browne and Stuart Keeley
Asking the Right Questions: A Guide to Critical Thinking M. Neil Browne and Stuart Keeley A Decision Making and Support Systems Perspective by Richard Day M. Neil Browne and Stuart Keeley look to change
More informationDoes law have to be effective in order for it to be valid?
University of Birmingham Birmingham Law School Jurisprudence 2007-08 Assessed Essay (Second Round) Does law have to be effective in order for it to be valid? It is important to consider the terms valid
More informationPORNOGRAPHY USE AND SUBSTANCE ABUSE PROGRAM Administration Guide
PORNOGRAPHY USE AND SUBSTANCE ABUSE PROGRAM Administration Guide There could be nothing so exquisite and so bitter as were my pains. Yea, and again I say unto you,... that on the other hand, there can
More informationReport on the Digital Tripitaka Koreana 2001
Report on the Digital Tripitaka Koreana 2001 In Sub Hur The Research Institute of Tripitakak Koreana, Korea 1. Introduction Since releasing TK 2000, many users reported the difficulty in its installation.
More informationPOLICY MANUAL CHURCH PLANTING COMMISSION (CPC) Evangelical Congregational Church
POLICY MANUAL CHURCH PLANTING COMMISSION (CPC) Evangelical Congregational Church We recognize that Church Multiplication doesn t just happen. We also recognize that it takes the work of God to change lives
More informationVisual Analytics Based Authorship Discrimination Using Gaussian Mixture Models and Self Organising Maps: Application on Quran and Hadith
Visual Analytics Based Authorship Discrimination Using Gaussian Mixture Models and Self Organising Maps: Application on Quran and Hadith Halim Sayoud (&) USTHB University, Algiers, Algeria halim.sayoud@uni.de,
More informationThe synoptic problem and statistics
The synoptic problem and statistics In New Testament studies, the gospels of Matthew, Mark and Luke are known as the synoptic gospels. They contain much common material, and this is particularly clear
More informationSummary of Registration Changes
Summary of Registration Changes The registration changes summarized below are effective September 1, 2017. Please thoroughly review the supporting information in the appendixes and share with your staff
More information1 Introduction. Cambridge University Press Epistemic Game Theory: Reasoning and Choice Andrés Perea Excerpt More information
1 Introduction One thing I learned from Pop was to try to think as people around you think. And on that basis, anything s possible. Al Pacino alias Michael Corleone in The Godfather Part II What is this
More informationThis report is organized in four sections. The first section discusses the sample design. The next
2 This report is organized in four sections. The first section discusses the sample design. The next section describes data collection and fielding. The final two sections address weighting procedures
More informationInterview of Wesley Chu
Interviewed by: James L. Pelkey Recorded February 18, 1988 Westwood, CA CHM Reference number: X5671.2010 2010 James L. Pelkey/Computer History Museum James Pelkey: As I may have mentioned to you, when
More informationMessage from Laurie Reyon to Module 1 Whale & Dolphin Energy Light Medicine Participants:
Message from Laurie Reyon to Module 1 Whale & Dolphin Energy Light Medicine Participants: Module 2 Outline and Information Including Requirements for becoming a Certified Practitioner Please know that
More informationSummary Findings National Survey of American Jews
erstein ane strate ic comm uni cat ions To: From: J Street Jim Gerstein Date: July 16, 2008 Summary Findins National Survey of American Jews J Street s national survey of 800 American Jews 1 reveals a
More informationWhy Computers are not Intelligent: An Argument. Richard Oxenberg
1 Why Computers are not Intelligent: An Argument Richard Oxenberg I. Two Positions The strong AI advocate who wants to defend the position that the human mind is like a computer often waffles between two
More informationMeditation 07 March 2018
Meditation 07 March 2018 Back to our regularly scheduled programming. A reader asked about meditation, a subject about which I'm barely qualified to even ask; I know the word, but only. Great information
More information