As the reader of this book probably already knows, I have devoted a great deal of time to the topic which is, rather unfortunately, named rent seeking. Rent seeking, the use of resources in actually lowering total product although benefiting some minority, is, unfortunately, a major activity of most governments. As a result of this, I have stumbled on a puzzle. The rent-seeking activity found in major societies is immense, but the industry devoted to producing it is nowhere near as immense. In Washington the rent-seeking industry is a very conspicuous part of the landscape. On the other hand,...
As the reader of this book probably already knows, I have devoted a great deal of time to the topic which is, rather unfortunately, named rent seeking...
Over the last 20 years there have been a large number of technical advances and changes in the field of educational and psychological testing. According to Anne Anastasi, The decade of the 1980's has been a period of unusual advances in, psychological testing. Technological progress, theoretical sophistication, and increasing pro fessional responsibility are all evident in the fast-moving events in this field (A. Anastasi, Psychological Testing, Sixth Edition. New York: Macmillan, 1988). On the psychometric front, advances in topics such as item response theory, criterion-referenced...
Over the last 20 years there have been a large number of technical advances and changes in the field of educational and psychological testing. Accordi...
A manipulator, or 'robot', consists of a series of bodies (links) connected by joints to form a spatial mechanism. Usually the links are connected serially to form an open chain. The joints are either revolute (rotary) or prismatic (telescopic), various combinations of the two giving a wide va riety of possible configurations. Motive power is provided by pneumatic, hydraulic or electrical actuation of the joints. The robot arm is distinguished from other active spatial mechanisms by its reprogrammability. Therefore, the controller is integral to any de scription of the arm. In contrast with...
A manipulator, or 'robot', consists of a series of bodies (links) connected by joints to form a spatial mechanism. Usually the links are connected ser...
It is common to assert that utility investors are compensated in the allowed rate of return for the risk of large disallowances, such as arise for investments found imprudent or not used and useful'. However, this book develops a new theory of asymmetric regulatory risk that shows that infallible estimates of the cost of capital are sure to provide downward-biased estimates of the necessary allowed rates of return in the presence of such regulatory risks. The book uses the new theory of regulatory risk to understand recent developments in the risk of natural gas pipelines and other regulated...
It is common to assert that utility investors are compensated in the allowed rate of return for the risk of large disallowances, such as arise for inv...
BY H. KOPETZ A real-time computer system must provide the intended service in two di mensions: the functional (value) dimension and the temporal dimension. The verification of a real-time system implementation is thus necessarily more com plex than the verification of a non-real-time system which has to be checked in the value dimension only. Since the formal verification techniques of temporal properties have not yet matured to the point where these techniques can be used in practical system development, systematic design and testing are the only alternatives for the development of...
BY H. KOPETZ A real-time computer system must provide the intended service in two di mensions: the functional (value) dimension and the temporal dimen...
Designing VLSI systems represents a challenging task. It is a transfonnation among different specifications corresponding to different levels of design: abstraction, behavioral, stntctural and physical. The behavioral level describes the functionality of the design. It consists of two components; static and dynamic. The static component describes operations, whereas the dynamic component describes sequencing and timing. The structural level contains infonnation about components, control and connectivity. The physical level describes the constraints that should be imposed on the floor plan,...
Designing VLSI systems represents a challenging task. It is a transfonnation among different specifications corresponding to different levels of desig...
Automatic transformation of a sequential program into a parallel form is a subject that presents a great intellectual challenge and promises a great practical award. There is a tremendous investment in existing sequential programs, and scientists and engineers continue to write their application programs in sequential languages (primarily in Fortran). The demand for higher speedups increases. The job of a restructuring compiler is to discover the dependence structure and the characteristics of the given machine. Much attention has been focused on the Fortran do loop. This is where...
Automatic transformation of a sequential program into a parallel form is a subject that presents a great intellectual challenge and promises a great p...
Introduction to Convolutional Codes with Applications is an introduction to the basic concepts of convolutional codes, their structure and classification, various error correction and decoding techniques for convolutionally encoded data, and some of the most common applications. The definition and representations, distance properties, and important classes of convolutional codes are also discussed in detail. The book provides the first comprehensive description of table-driven correction and decoding of convolutionally encoded data. Complete examples of Viterbi, sequential, and...
Introduction to Convolutional Codes with Applications is an introduction to the basic concepts of convolutional codes, their structure and cl...
Foundations of Dependable Computing: Models and Frameworks forDependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and analysis methods necessary to design, validate and analyze dependable systems. A companion to this book (published by Kluwer), subtitled Paradigmsfor Dependable Applications, presents a variety of specific approaches...
Foundations of Dependable Computing: Models and Frameworks forDependable Systems presents two comprehensive frameworks for reasonin...
Symbolic Boolean manipulation using binary decision diagrams (BDDs) has been successfully applied to a wide variety of tasks, particularly in very large scale integration (VLSI) computer-aided design (CAD). The concept of decision graphs as an abstract representation of Boolean functions dates back to the early work by Lee and Akers. In the last ten years, BDDs have found widespread use as a concrete data structure for symbolic Boolean manipulation. With BDDs, functions can be constructed, manipulated, and compared by simple and efficient graph algorithms. Since Boolean functions can...
Symbolic Boolean manipulation using binary decision diagrams (BDDs) has been successfully applied to a wide variety of tasks, particularly in very lar...