6.012 - Microelectronic Devices and Circuits - Fall 2005
Lecture 7-2
Key questions
What is the big deal about the metal-oxide-semiconductor
structure?
What do the electrostatics of the MOS structure look
like at zero bias?
How do the electrostatics of
Theory of Parallel Hardware
Massachusetts Institute of Technology
Charles Leiserson, Michael Bender, Bradley Kuszmaul
March 4, 2004
6.896
Handout 7
Solution Set 3
Due: In class on Wednesday, February 25. Starred problems are optional.
Problem 3-1. Show ho
6.858 Lecture 13
Kerberos
Administrivia%
Quiz review!today!(Actual quiz next Wednesday.
Post your final project idea by tomorrow.
Kerberos setting:%
Distributed architecture, evolved from a single timeDsharing system.
Many servers providing!services: re
6.012 - Microelectronic Devices and Circuits - Fall 2005
Lecture 9-2
Key questions
How can carrier inversion be exploited to make a transistor?
How does a MOSFET work?
How does one construct a simple rst-order model for
the current-voltage characterist
Typical Communication Classes
Old days (1980s): Teach analog and digital communications in
separate classes
Today: Most communication classes focus mainly on digital
Networking was sometimes taught as a graduate class, but most people
did not see much use
Information content of a random variable
(how much information is in the data?)
Random variable X
Outcome of a random experiment
Discrete R.V. takes on values from a nite set of possible outcomes
PMF: P(X = y) = Px(y)
How much information is contained in
Sampling
Given a continuous time waveform, can we represent it using
discrete samples?
How often should we sample?
Can we reproduce the original waveform?
Eytan Modiano
Slide 2
The Fourier Transform
Frequency representation of signals
Denition:
X( f
6.012 - Microelectronic Devices and Circuits - Fall 2005
Lecture 10-2
Key questions
How does the MOSFET work in saturation?
Does the pinch-o point represent a block to current
ow?
How come the MOSFET current still increases a bit
with VDS in saturation
6.858 Lecture 12
TCP/IP security
Threat model for network security:
Adversary can intercept / modify network traffic.
Adversary can send packets.
Adversary has full control of their own machines.
Adversary can participate in protocols (usually).
o Oft
Sampling
Sampling provides a discrete-time representation of a continuous
waveform
Sample points are real-valued numbers
In order to transmit over a digital system we must rst convert into
discrete valued numbers
Quantization
levels
Q3
Q2
Q1
Sample
Theory of Parallel Hardware
Massachusetts Institute of Technology
Charles Leiserson, Michael Bender, Bradley Kuszmaul
April 23, 2004
6.896
Handout 16
Solution Set 7
Due: In class on Wednesday, April 7. Starred problems are optional.
Problem 7-1. Show that
6.012 - Microelectronic Devices and Circuits - Fall 2005
Lecture 8-2
Key questions
Is there more than one regime of operation of the MOS
structure under bias?
What does carrier inversion mean and what is the
big deal about it?
How does the carrier inve
Theory of Parallel Hardware
Massachusetts Institute of Technology
Charles Leiserson, Michael Bender, Bradley Kuszmaul
May 10, 2004
6.896
Handout 20
Solution Set 10
Due: In class on Wednesday, May 5. Starred problems are optional.
Problem 10-1. Use any dra
Terminology and Perspective
Inference = getting new expressions from old
Not limited to deductive (sound) inference.
Knowledge Representation Technologies:
rules, frames, logic, semantic nets, etc.
6.871 - Lecture 13
3
What Is a KR?
1) Its a surrogate.
6.830 Fall 2008, Quiz 2
I
Page 2 of 11
Short nswer
1. [4 points]: List two reasons why a column-oriented design is advantageous in a data warehouse
environment.
(Write your answer in the spaces below.)
. Data warehouse workloads involve large scans of a f