Telecommunications Board. Embedded, Everywhere: A research agenda for networked Systems of Embedded Computers. National Academy

نویسنده

  • Patricia Hersh
چکیده

We study the quotient complex ∆(B lm)/S l ≀ Sm as a means of deducing facts about the ring k[x 1 ,. .. , x lm ] S l ≀Sm. It is shown in [He] that ∆(B lm)/S l ≀ Sm is shellable when l = 2, implying Cohen-Macaulayness of k[x 1 ,. .. , x 2m ] S 2 ≀Sm for any field k. We now confirm for all pairs (l, m) with l > 2 and m > 1 that ∆(B lm)/S l ≀ Sm is not Cohen-Macaulay over Z Z/2Z Z, but it is Cohen-Macaulay over fields of characteristic p > m (independent of l). This yields corresponding characteristic-dependent results for k[x 1 ,. .. , x lm ] S l ≀Sm. We also prove that ∆(B lm)/S l ≀ Sm and the links of many of its faces are collapsible, and we give a partitioning for ∆(B lm)/S l ≀ Sm.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EECS UC Berkeley Center for Hybrid and Embedded Software Systems - 2009 Prospectus - C February , 2009 hess

hess Letter from the Directors CHESS was founded in 2002 to build foundational theories and practical tools for systems that combine computation, networking, and physical dynamics. The US National Science Foundation (NSF) provided the seed funding for the fi rst fi ve years under the Information Technology Research (ITR) program. CHESS is now thriving, with a rich portfolio of funded research p...

متن کامل

Side channel parameter characteristics of code injection attacks

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

متن کامل

Embedded Software — An Agenda for Research

Embedded software is that which resides in devices that are not first-and-foremost computers. It is pervasive, appearing in vehicles, telephones, pagers, audio equipment, aircraft, appliances, toys, security systems, games, PDAs, medical diagnostics, weapons, pacemakers, television sets, video production equipment, network switches, printers, scanners, climate control systems, manufacturing sys...

متن کامل

The Opportunities Afforded by Embedded Computer Systems for Monitoring and Control of Industrial Processes in Less-Industrialised Countries (TECHNICAL NOTE)

The dramatic changes in integrated-circuit technology over the last two decades have been of great benefit to countries such as Zimbabwe. High volume production of VLSI chips has produced a supply of intelligent, versatile electronic processing devices at very low cost. In particular the facilities of the microcontroller have steadily developed to the accompaniment of a reduction in price. Sinc...

متن کامل

Embedded Sensor Networks

An embedded sensor network is a network of embedded computers placed in the physical world that interacts with the environment. These embedded computers, or sensor nodes, are often physically small, relatively inexpensive computers, each with some set of sensors or actuators. These sensor nodes are deployed in situ, physically placed in the environment near the objects they are sensing. Sensor ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001