Code Design for Dependable Systems: Theory and Practical Application / Edition 1

Hardcover (Print)
Buy New
Buy New from BN.com
$180.44
Used and New from Other Sellers
Used and New from Other Sellers
from $122.26
Usually ships in 1-2 business days
(Save 43%)
Other sellers (Hardcover)
  • All (7) from $122.26   
  • New (5) from $171.63   
  • Used (2) from $122.26   

Overview

Theoretical and practical tools to master matrix code design strategy and technique

Error correcting and detecting codes are essential to improving system reliability and have popularly been applied to computer systems and communication systems. Coding theory has been studied mainly using the code generator polynomials; hence, the codes are sometimes called polynomial codes. On the other hand, the codes designed by parity check matrices are referred to in this book as matrix codes. This timely book focuses on the design theory for matrix codes and their practical applications for the improvement of system reliability. As the author effectively demonstrates, matrix codes are far more flexible than polynomial codes, as they are capable of expressing various types of code functions.

In contrast to other coding theory publications, this one does not burden its readers with unnecessary polynomial algebra, but rather focuses on the essentials needed to understand and take full advantage of matrix code constructions and designs. Readers are presented with a full array of theoretical and practical tools to master the fine points of matrix code design strategy and technique:
* Code designs are presented in relation to practical applications, such as high-speed semiconductor memories, mass memories of disks and tapes, logic circuits and systems, data entry systems, and distributed storage systems
* New classes of matrix codes, such as error locating codes, spotty byte error control codes, and unequal error control codes, are introduced along with their applications
* A new parallel decoding algorithm of the burst error control codes is demonstrated

In addition to the treatment of matrix codes, the author provides readers with a general overview of the latest developments and advances in the field of code design. Examples, figures, and exercises are fully provided in each chapter to illustrate concepts and engage the reader in designing actual code and solving real problems. The matrix codes presented with practical parameter settings will be very useful for practicing engineers and researchers. References lead to additional material so readers can explore advanced topics in depth.

Engineers, researchers, and designers involved in dependable system design and code design research will find the unique focus and perspective of this practical guide and reference helpful in finding solutions to many key industry problems. It also can serve as a coursebook for graduate and advanced undergraduate students.

Read More Show Less

Product Details

  • ISBN-13: 9780471756187
  • Publisher: Wiley
  • Publication date: 6/30/2006
  • Edition number: 1
  • Pages: 720
  • Product dimensions: 7.13 (w) x 10.12 (h) x 1.61 (d)

Meet the Author

EIJI FUJIWARA, PhD, is Professor at the Tokyo Institute of Technology. His research interests include design theory for error control codes, dependable systems, and error tolerant data compression.

Read More Show Less

Table of Contents

Preface.

1. Introduction.

1.1 Faults and Failures.

1.2 Error Models.

1.3 Error Recovery Techniques for Dependable Systems.

1.4 Code Design Process for Dependable Systems.

References.

2. Mathematical Background and Matrix Codes.

2.1 Introduction to Algebra.

2.2 Linear Codes.

2.3 Basic Matrix Codes.

Exercises.

References.

3. Design Techniques for Matrix Codes.

3.1 Minimum-Weight & Equal-Weight-Row Codes.

3.2 Odd-Weight-Column Codes.

3.3 Even-Weight-Row Codes.

3.4 Odd-Weight-Row Codes.

3.5 Rotational Codes.

Exercises.

References.

4. Codes for High-Speed Memories I: Bit Error Control Codes.

4.1 Modified Hamming SEC-DED Codes.

4.2 Modified Double-Bit Error Correcting BCH Codes.

4.3 On-Chip ECCs.

Exercises.

References.

5. Codes for High-Speed Memories II: Byte Error Control Codes.

5.1 Single-Byte Error Correcting (SbEC) Codes.

5.2 Single-Byte Error Correcting and Double-Byte Error Detecting (SbEC-DbED) Codes.

5.3 Single-Byte Error Correcting and Single p-Byte within a Block Error Detecting (SbEC-Spb=BED) Codes.

Exercises.

References.

6. Codes for High-Speed Memories III: Bit / Byte Error Control Codes.

6.1 Single-Byte / Burst Error Detecting SEC-DED Codes.

6.2 Single-Byte Error Correcting and Double-Bit Error Detecting (SbEC-DED) Codes.

6.3 Single-Byte Error Correcting and Double-Bit Error Correcting (SbEC-DEC) Codes.

6.4 Single-Byte Error Correcting and Single-Byte Plus Single-Bit Error Detecting (SbEC-(SbþS)ED) Codes.

Exercises.

References.

7. Codes for High-Speed Memories IV: Spotty Byte Error Control Codes.

7.1 Spotty Byte Errors.

7.2 Single Spotty Byte Error Correcting (St=bEC) Codes.

7.3 Single Spotty Byte Error Correcting and Single-Byte Error Detecting (St=bEC-SbED) Codes.

7.4 Single Spotty Byte Error Correcting and Double Spotty Byte Error Detecting (St=bEC-Dt=bED) Codes.

7.5 A General Class of Spotty Byte Error Control Codes.

Exercises.

References.

8. Paralled Decoding for Burst / Byte Error Control Codes.

8.1 Parallel Decoding Burst Error Control Codes.

8.2 Parallel Decoding Cyclic Burst Error Correcting Codes.

8.3 Transient Behavior of Parallel Encoder / Decoder Circuits of Error Control Codes.

Exercises.

References.

9. Codes for Error Location: Error Locating Codes.

9.1 Error Location of Faulty Packages and Faulty Chips.

9.2 Block Error Locating (Sb=pbEL) Codes.

9.3 Single-Bit Error Correcting and Single-Block Error Locating (SEC-Sb=pbEL) Codes.

9.4 Single-Bit Error Correcting and Single-Byte Error Locating (SEC-Se=bEL) Codes.

9.5 Burst Error Locating Codes.

9.6 Code Conditions for Error Locating Codes.

10. Codes for Unequal Error Control / Protection (UEC / UEP).

10.1 Error Models for UEC Codes and UEP Codes.

10.2 Fixed-Byte Error Control UEC Codes.

10.3 Burst Error Control UEC / UEP Codes.

10.4 Application of the UEC / UEP Codes.

Exercises.

References.

11. Codes for Mass Memories.

11.1 Tape Memory Codes.

11.2 Magnetic Disk Memory Codes.

11.3 Optical Disk Memory Codes.

Exercises.

References.

12. Coding for Logic and System Design.

12.1 Self-checking Concept.

12.2 Self-testing Checkers.

12.3 Self-checking ALU.

12.4 Self-checking Design for Computer Systems.

Exercises.

References.

13. Codes for Data Entry Systems.

13.1 M-Ary Asymmetric Errors in Data Entry Systems.

13.2 M-Ary Asymmetric Symbol Error Correcting Codes.

13.3 Nonsystematic M-Ary Asymmetric Error Correcting Codes with Deletion / Insertion / Adjacent-Symbol-Transposition Error Correction Capabilities.

13.4 Codes for Two-Dimentional Matrix Symbols.

Exercises.

References.

14. Codes for Multiple / Distributed Storage Systems.

14.1 MDS Array Codes Tolerating Multiple-Disk Failures.

14.2 Codes for Distributed Storage Systems.

Exercises.

References.

Index.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)