Coordinating Activities in Collaborative Environments: A High Level Petri Nets Based Approach

Size: px
Start display at page:

Download "Coordinating Activities in Collaborative Environments: A High Level Petri Nets Based Approach"

Transcription

1 Coordinting Activities in Collortive Environments: A High Level Petri Nets Bsed Approch Alerto B. Rposo, Léo P. Mglhães nd Ivn L. M. Ricrte Stte University of Cmpins (UNICAMP) School of Electricl nd Computer Engineering (FEEC) Deprtment of Computer Engineering nd Industril Automtion (DCA) CP Cmpins, SP, Brzil {lerto, leopini, ricrte}@dc.fee.unicmp.r ABSTRACT The coordintion of interdependencies mong ctivities in collortive environments is very importnt nd difficult tsk. In this pper we present set of coordintion mechnisms for the specifiction nd control of interction mong collortive ctivities. To model these mechnisms, we use high level Petri nets, which hve proven to e n dequte pproch to evlute the ehvior of computer supported collortive system efore its implementtion. Keywords: Coordintion, Collortive Environments, Petri Nets, Computer Supported Coopertive Work, Multiuser Interction. 1. INTRODUCTION Some ctivities involving multiple individuls do not require forml plnning. Activities ssocited to the socil reltions re generlly well coordinted y the socil protocol, which is chrcterized y the sence of ny coordintion mechnism mong ctivities, trusting the prticipnts ilities to medite interctions. Exmples of computer supported ctivities of this kind re the chts nd videoconferences. On the other hnd, ctivities relted to coopertive work (not socil reltions) require sophisticted coordintion mechnisms to void tht prticipnts get involved in conflicting or repetitive tsks. This pper focuses on the coordintion of ctivities in computer supported collortive environments, defining set of interdependencies tht frequently occur mong collortive tsks nd presenting coordintion mechnisms for these dependencies. The ide is to seprte ctivities (tsks) from dependencies (controlled y the coordintion mechnisms), enling the use of different coordintion policies in the sme collortive environment, y chnging only the coordintion mechnisms. Moreover, the coordintion mechnisms cn e reused in other collortive environments. This pper is orgnized s follows. In the next section we introduce high level Petri nets, which is the tool we use to model the coordintion mechnisms. Then, in Section 3, we mke rief overview of works relted to coordintion in Computer Supported Coopertive Work. In Section 4 the dependencies nd coordintion mechnisms re presented, nd in Section 5 n exmple of use of the mechnisms is shown. The conclusions nd future work re discussed in Section HIGH LEVEL PETRI NETS Petri nets (PNs) re modeling tool pplicle to vriety of fields nd systems, specilly suitle for systems with concurrent events. Murt [11] presents very good introduction to the theme. Formlly, PN is defined s 5-tuple (P, T, F, w, M 0 ), where: P = {P 1,..., P m } is finite set of plces; T = {t 1,..., t n } is finite set of trnsitions; F (P T) (P T) is set of rcs; w: F {1, 2,...} is weight function; M 0 : P {0, 1, 2,...} is the initil mrking; with (P T) = nd (P T). In PN model, sttes re ssocited to plces nd tokens, nd events to trnsitions. A trnsition t is sid to e enled if ech input plce P i t is mrked with t lest w(p i, t) tokens, where w(p i, t) is the weight of the rc etween P i nd t. Once enled, trnsition will fire when its ssocited event occurs. Firing trnsition t, w(p i, t) tokens re removed from ech input plce P i nd w(t, P o ) tokens re dded to ech output plce P o t. Here, t nd t mens, respectively, the set of input nd output plces of trnsition t. A useful nottion for PNs is the grphicl nottion, where circles represent plces, rectngles represent trnsitions, dots represent tokens nd rrows represent the rcs, with weights ove. By definition, n unleled rc hs weight 1. In ddition to the sic PN model, severl extensions ppers in the literture. In this pper we use three of them: inhiitor rcs, nets with time nd high level nets.

2 An inhiitor rc connects plce P with trnsition t nd enles t only if P hs no tokens. In the grphicl nottion, inhiitor rcs re represented with circle on the edge. One wy to include the notion of time in PNs is to ssocite it with trnsitions firing. In this cse, tokens re removed from input plces of trnsition nd some time lter (firing time) re dded to the output plces. This kind of non-instntneous firing is clled firing with token reservtion. High level PNs include, mong other types, predicte/trnsition nets nd colored PNs [4]. The most importnt chrcteristic of high level PN is the distinction of tokens (clled colored tokens). The rcs hve lels defining vriles (or constnts) tht dictte how mny nd which kind of tokens will e removed from or dded to the plces. The sme vrile ppering in the incoming nd outgoing rcs of trnsition denotes the sme token type. A trnsition is enled if there is t lest one possiility of consistent sustitution of vriles into typed tokens. In the exmple of Figure 1, trnsition is enled ecuse there re two tokens of type in P1, eing possile to sustitute vrile <x> for type. After the firing of, P1 remins with token nd P2 receives token of type. P1 2<x> <x> P2 mechnism were developed. One of the most representtive system of tht genertion ws the Coordintor [13], which hs een developed sed on linguistic theories nd whose gol ws to help emil communiction. Since tht time, there hs een exmples of the use of PNs to coordinte ctivities in collortive environments [6], [9]. In the 90 s, systems hve een constructed with more flexile nd ccessile coordintion mechnisms. Inspired y coordintion lnguges [8], which proposed the seprtion of computtion from coordintion for multi-threded pplictions, some collortive systems seprtes the implementtion of coordintion components from their other prts. This llows more flexiility in the use of coordintion policies. COCA (Collortive Ojects Coordintion Architecture) [10] nd Trellis [7] re exmples of systems of this kind. The Trellis, in prticulr, uses vrition of PNs in server to specify interction protocols for group of collortive clients. Our work is more generic thn those presented ove. We define set of interdependencies mong tsks nd ssocited coordintion mechnisms (modeled y high level PNs) tht cn e used in workflows, multiuser interction, virtul environments, etc. The min gol is not to implement closed system, ut to provide set of mechnisms to enle the collortive system designer to preview nd test its ehvior efore implementing it, detecting possile prolems. Figure 1: Exmple of high level PN. Besides their modeling cpilities, PNs hve lso strong theoreticl support for nlysis nd numer of simultion techniques. There re three kinds of nlysis pplicle to PN model; verifiction, vlidtion nd performnce nlysis [2]. The verifiction nlysis is used to gurntee tht the net is correctly defined. It is verified whether the net hs dedlocks, whether there re ded trnsitions, whether it reches ny undesired stte, mong others. In the vlidtion nlysis, it is checked whether the model works s expected. Tests re mde vi itertive simultions of fictitious cses to ensure tht the model trets them correctly. Finlly, the performnce nlysis evlutes the cpcity of the system to chieve requisites such s verge witing time, throughput times, resource use, nd so on. 3. RELATED WORK In spite of their recognized importnce, coordintion mechnisms hve not een included in the first collortive systems. Only in the second hlf of the 80 s the first systems with some kind of coordintion 4. COORDINATION MODELS This work intends to provide mechnisms to mnge interdependencies mong collortive tsks nd gurntee tht these dependencies will not e violted. The ide is tht the designer of collortive environment e concerned only with the definition of tsks nd their interdependencies, nd not with the mngement of those dependencies. In the proposed schem, n environment is modeled in two distinct levels, workflow nd coordintion. In the workflow level, the tsks nd their interdependencies re defined. In the coordintion level, interdependent tsks re expnded nd the dequte coordintion mechnisms re inserted mong them. During the pssge from the workflow to the coordintion level, ech tsk which hs n interdependency with nother is expnded ccording to the model of Figure 2 [1]. The five plces ssocited to the expnded tsks represent the interfce with the resource mnger nd the gent tht executes the tsks. Plce indictes to the resource mnger tht the tsk needs resource. After the ssignment of the resource, the mnger puts token in plce ssigned_ to continue the tsk. Plces

3 strt_tsks nd finish_tsks indictes, respectively, the eginning nd the end of the tsk. Finlly, relese_ indictes to the resource mnger tht the tsk hs finished nd the resource is ville gin. Figure 2: An expnded tsk in the coordintion level. The min gol of our work is to construct the coordintion level from the workflow level, ecuse once the interdependencies re defined, the expnsion of tsks ccording to the model of Figure 2 nd the insertion of coordintion mechnisms cn e utomted. The interdependencies presented elow re divided into two clsses: temporl nd resource mngement. Temporl Dependencies Temporl dependencies estlish the execution order of tsks. Coordintion mechnisms ssocited to this kind of dependency hve strt_tsks s input plce nd finish_tsks s output plce (Figure 2). The proposed mechnisms re sed on temporl reltions defined in clssic pper of temporl logic [3]. In this pper, set of primitive nd mutully exclusive reltions etween time intervls is defined. We dpted these reltions for the definition of temporl dependencies etween tsks in collortive environments, dding couple of new reltions nd few vritions of those originlly proposed. The following temporl dependencies re defined. Tsk input_ plces t P1 t P2 ti P3 tf P4 tc ssigned_ strt_tsks finish_tsks relese_ output_ plces tsk 1 equls tsk 2: oth tsks must e executed simultneously. tsk 1 strts tsk 2: Allen s originl definition estlishes tht oth tsks must strt together nd tsk 1 must finish efore tsk 2 (we clled this reltion strtsa). We lso relxed the second prt of the definition, creting vrition of the reltion in which it does not mtter which tsk finishes efore (strtsb). tsk 1 finishes tsk 2: the originl definition estlishes tht oth tsks must finish together, ut tsk 1 hs to strt fter tsk2 (finishesa). As in the previous cse, we creted new dependency relxing the restriction on which tsk must strt efore (finishesb). tsk 2 fter tsk 1: tsk 2 my only e executed fter the execution of tsk 1. Two vritions re possile for this reltion. In the first one (ftera) ech execution of tsk 1 enles single execution of tsk 2. In the second vrition, severl executions of tsk 2 re enled fter single execution of tsk 1. tsk 1 efore tsk 2: from the temporl logic point of view, this dependency cn e seen s the opposite of the previous one, ut it genertes totlly different coordintion mechnism. Essentilly, the difference is ecuse in this cse, the restriction occurs in the execution of tsk 1, which my not e executed nymore if tsk 2 hs lredy een executed. Here, tsk 2 does not wit for the execution of tsk 1, which ws the cse for tsk 2 fter tsk 1. tsk 1 meets tsk 2: tsk 2 strts immeditely fter the end of tsk 1. tsk 1 overlps tsk 2: the originl definition estlishes tht tsk 2 must strt efore the end of tsk 1, which must finish efore tsk 2 (overlpsa). Relxing the restriction tht tsk 1 must finish first, we defined vrition of this reltion (overlpsb). tsk 2 during tsk 1: two vritions re possile. In the first one (duringa), tsk 2 cn e executed only once during the execution of tsk 1. In the second one (duringb), tsk 2 cn e executed severl times. Since the gol of the coordintion mechnisms is to del with reltions tht sometimes elongs to complex procedures, it is interesting to dd mechnisms to void frequent dedlocks. One of such mechnisms is the use of s. We defined two kinds of s. In the first one (A), n lterntive tsk is defined if the originl one does not strt fter certin witing time. The other kind of (B) returns the tokens to the input plces of the tsk fter witing time, enling the following of lterntive pths tht do not execute the locked tsk. Resource Mngement Dependencies Coordintion mechnisms for resource mngement re complementry to those presented in the previous section nd cn e used in prllel to them. This kind of coordintion mechnism dels with the distriution of mong the tsks, nd hve nd relese_ s input plces nd ssigned_ s output plce (Figure 2). We define three sic mechnisms for resource mngement: Shring: limited numer of needs to e shred mong severl tsks. Simultneity: resource is ville only if certin numer of tsks requests it simultneously. Voltility: indictes whether, fter the use, the resource is ville gin. We hve lso defined composite mechnisms from the sic ones discussed ove. For exmple, shring M + voltility N indictes tht up to M tsks my shre the resource, which cn e used N times only. Differently from temporl dependencies, resource mngement dependencies re not inry reltions. It is

4 possile, for instnce, tht more thn two tsks shre resource. Moreover, ech of the ove mechnisms requires prmeter indicting the numer of to e shred, the numer of tsks tht must request resource simultneously, or the numer of times resource cn e used (voltility). A Lnguge for the Definition of Interdependencies In order to define the interdependencies mong tsks, we hve creted lnguge tht descries, one t ech line, ll the dependencies of collortive environment. The interdependencies re defined ccording to the following syntx <dependency nme> [prmeters] <tsk1 nme> <tsk2 nme> [ <tskn nme> ] [s], where prmeters re needed for resource mngement dependencies nd the list of s is optionl. Modeling Coordintion Mechnisms using High Level Petri Nets Initilly, we hve modeled coordintion mechnisms for ll dependencies discussed ove using ordinry PNs [12]. However, typicl prolem in the use of ordinry PNs is the stte explosion, which cn occur in our context when the numer of interdependencies increses. High level PNs reduce this prolem ecuse they generte simpler models, with less plces nd trnsitions. Therefore, we remodeled them using high level PNs. To illustrte one of the coordintion mechnisms, Figure 3 shows the mechnism for simultneity 2 ( resource is ville only if two tsks request it simultneously). In the figure, the rcs with expression <x>+<y> ensure tht two different tsks (tokens of different colors) which re requesting the (tokens r) re going to receive them if they re ville in plce Pn. Tsk 1 i1 t_1 P1_1 t_1 P2_1 ti_1 P3_1 tf_1 P4_1 tc_1 O1 <x> + <y> <x> + <y> ssigned_ <x> + <y> relesed_ Pn t2 i2 O2 t_2 P1_2 t_2 P2_2 ti_2 P3_2 tf_2 P4_2 tc_2 Tsk 2 Figure 3: Coordintion mechnism for simultneity EXAMPLE To illustrte the use of the coordintion mechnisms, we present n exmple descriing typicl sitution in multiuser interction. In our hypotheticl environment, two users interct y mens of whiteord. The workflow level of this environment is shown in Figure 4. As cn e seen in the model, ech user cn enter the whiteord, then write on it severl times efore leving it. The following interdependencies ppers in the model. The whiteord is ville only if oth uses request it simultneously (simultneity 2); only one user my write on the whiteord t ech time (shring resource, e.g., pen); nd when user A leves the whiteord, user B must follow him/her (meets). Using the lnguge for the definition of interdependencies, the following file is written for the exmple ove: sim 2 entera enterb time_outb time_outb div 1 writea writeb time_outb time_outb meets levea leveb The model of the coordintion level for this exmple is shown in Figure 5. At first glnce, this model my seem complicte, ut it is highly modulr nd esily uilt from the model of Figure 4, y expnding interdependent tsks (open rectngles in Figure 4) nd inserting the predefined coordintion mechnisms.

5 User A entera w ritea levea ia oa Simultneity 2 Mutul exclusion Meets ib ob enterb w riteb leveb User B Figure4: Workflow level of the exmple. User A entera w ritea levea ia oa <x>+<y> <x>+<y> ssigned_ relese_ <x>+<y> t2 Pn r r <x> <x> r ssigned_ <x> relese_ strt_ tsks + tska R finish_ tsks R tskb Simultneity 2 Pn t2 Mutul Exclusion Meets ib ob enterb writeb leveb User B Figure 5: Coordintion level of the exmple. It is necessry to oserve tht interdependent tsks of Figure 5 re not expnded exctly ccording to the model of Figure 2. The reson is tht in the cse of temporl dependencies, only plces strt_tsks nd finish_tsks re used, nd in the cse of resource mngement dependencies, only, ssigned_ nd relese_ re used. Therefore, we used simplified versions of the model.

6 The coordintion level model of the environment cn e simulted nd nlyzed with ny tool tht supports high level PNs (see [5] for list of PN simultion tools). Verifiction nd vlidtion nlysis indicted tht our exmples hs eight finl sttes. Seven of them cn e eliminted y the correct use of s (i.e., with dequte witing times). The eightieth finl stte is the correct one (tokens in oa nd ob). Performnce nlysis could e relized, for instnce, to mesure verge witing times of n user, given the rtes with which the other requests the. Finlly, it is necessry to reinforce tht the exmple represents just hypotheticl sitution. We did not stress ll detils for the modeled scenrio. Its min gol ws to show how the coordintion mechnisms cn e used in prcticl sitution. 6. CONCLUSION The coordintion of interdependent ctivities in collortive environments is prolem tht should e ddressed to ensure the effectiveness of the coopertion. The seprtion etween ctivities nd dependencies, nd the utiliztion of reusle coordintion mechnisms re steps towrds this gol. Petri nets, due to their support for modeling, simultion nd nlysis, hve proven to e powerful tool for verifying the correctness nd vlidting the effectiveness of collortive environments efore their ctul implementtion [2], [12]. Furthermore, the hierrchicl description of PNs showed n pproprite wy to define the coordintion structure in different strction levels (workflow nd coordintion levels). In prticulr, high level PNs lso reduces the prolem of stte explosion. The set of interdependencies presented in this pper does not clim to e complete. It would e very difficult to estlish frmework of ll possile interdependencies. For tht reson, we opted for n extensile pproch. When new kind of interdependency rises, corresponding coordintion mechnism cn e modeled nd esily inserted etween corresponding tsks. One of the next steps of this work is to utomte the pssge from the workflow to the coordintion level of models in high level PN simultion tool. We hve lredy done this for ordinry PN models [12]. Due to their generlity, the presented coordintion mechnisms re dequte to wide rnge of collortive systems, from interorgniztionl workflows to virtul environments. Presently, we re implementing the mechnisms to e used in the development of collortive virtul environments. The coordintion of ctivities will fcilitte the use of this kind of environment for the reliztion of tsks tht cnnot e controlled y the socil protocol. 7. REFERENCES [1] W. M. P. vn der Alst. Modelling nd nlysing workflow using Petri-net sed pproch. Proc. 2 nd Workshop on Computer-Supported Coopertive Work, Petri nets nd relted formlisms, pp [2] W. M. P. vn der Alst. The Appliction of Petri Nets to Workflow Mngement. The Journl of Circuits, Systems nd Computers, 8(1): [3] J. F. Allen. Towrds Generl Theory of Action nd Time. Artificil Intelligence, 23: [4] W. Bruer, W. Reisig nd G. Rozenerg (Eds.). Petri Nets: Centrl Models nd Their Properties Advnces in Petri Nets Lecture Notes in Computer Science, 254. Springer-Verlg, [5] CPN Group, Univ. of Arhus, Denmrk. The World of Petri Nets Tools on the We < [6] F. De Cindio, G. De Michelis nd C. Simone. The Communiction Disciplines of CHAOS. In Concurrency nd Nets, pp Springer- Verlg, [7] R. Furut nd P. D. Stotts. Interpreted Collortion Protocols nd their use in Groupwre Prototyping. Proc. of the Conf. on Computer Supported Coopertive Work (CSCW 94), pp [8] D. Gelernter nd N. Crriero. Coordintion Lnguges nd their Significnce. Communictions of the ACM, 35(2): Ferury [9] A. W. Holt. Coordintion Technology nd Petri Nets. In G. Rozenerg (Ed.). Advnces in Petri Nets, pp Lecture Notes in Computer Science, 222. Springer-Verlg, [10] D. Li nd R. Muntz. COCA: Collortive Ojects Coordintion Architecture. Proc. of the Conf. on Computer Supported Coopertive Work (CSCW 98), pp [11] T. Murt. Petri Nets: properties, nlysis nd pplictions. Proc. of the IEEE, 77(4): [12] A. B. Rposo, L. P. Mglhães nd I. L. M. Ricrte. Petri Nets Bsed Coordintion Mechnisms for Multi-Workflow Environments. To e pulished in the Int. J. of Computer Systems Science & Engineering, Septemer [13] T. Winogrd nd F. Flores. Understnding Computers nd Cognition: A New Foundtion for Design. Alex, Acknowledgements: The first uthor is sponsored y FAPESP (Foundtion for Reserch Support of the Stte of São Pulo), process numer 96/ We lso would like to thnk DCA FEEC Unicmp for the support grnted to this reserch.

7

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011 CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

Integration of a Scenario Service in a Multimedia Messaging System

Integration of a Scenario Service in a Multimedia Messaging System Integrtion of Scenrio Service in Multimedi Messging System Brigitte KERVELLA, Vlérie GAY nd Eric HORLAIT Université Pierre et Mrie CURIE, Institut Blise PASCAL, Lortoire MASI 4, plce Jussieu, 75252 PARIS

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop

More information

Jae-yoon Jung, Wonchang Hur, Hoontae Kim, and Suk-Ho Kang

Jae-yoon Jung, Wonchang Hur, Hoontae Kim, and Suk-Ho Kang Business Process Choreogrphy for B2B Collortion Je-yoon Jung, Wonchng Hur, Hoonte Kim, nd Suk-Ho Kng Deprtment of Industril Engineering, Seoul Ntionl University, Seoul, 151-742, Repulic of Kore Astrcts

More information

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph

More information

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08 CS412/413 Introduction to Compilers Tim Teitelum Lecture 4: Lexicl Anlyzers 28 Jn 08 Outline DFA stte minimiztion Lexicl nlyzers Automting lexicl nlysis Jlex lexicl nlyzer genertor CS 412/413 Spring 2008

More information

A Formalism for Functionality Preserving System Level Transformations

A Formalism for Functionality Preserving System Level Transformations A Formlism for Functionlity Preserving System Level Trnsformtions Smr Abdi Dniel Gjski Center for Embedded Computer Systems UC Irvine Center for Embedded Computer Systems UC Irvine Irvine, CA 92697 Irvine,

More information

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of

More information

View, evaluate, and publish assignments using the Assignment dropbox.

View, evaluate, and publish assignments using the Assignment dropbox. Blckord Lerning System CE 6 Mnging Assignments Competencies After reding this document, you will e le to: Crete ssignments using the Assignment tool. View, evlute, nd pulish ssignments using the Assignment

More information

TO REGULAR EXPRESSIONS

TO REGULAR EXPRESSIONS Suject :- Computer Science Course Nme :- Theory Of Computtion DA TO REGULAR EXPRESSIONS Report Sumitted y:- Ajy Singh Meen 07000505 jysmeen@cse.iit.c.in BASIC DEINITIONS DA:- A finite stte mchine where

More information

2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE

2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE 2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE Antoni Wolski nd Jri Veijlinen Technicl Reserch Centre of Finlnd Lortory for Informtion Processing Lehtisrentie

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Lexical analysis, scanners. Construction of a scanner

Lexical analysis, scanners. Construction of a scanner Lexicl nlysis scnners (NB. Pges 4-5 re for those who need to refresh their knowledge of DFAs nd NFAs. These re not presented during the lectures) Construction of scnner Tools: stte utomt nd trnsition digrms.

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

OUTPUT DELIVERY SYSTEM

OUTPUT DELIVERY SYSTEM Differences in ODS formtting for HTML with Proc Print nd Proc Report Lur L. M. Thornton, USDA-ARS, Animl Improvement Progrms Lortory, Beltsville, MD ABSTRACT While Proc Print is terrific tool for dt checking

More information

Automatically deriving choreography-conforming systems of services

Automatically deriving choreography-conforming systems of services Automticlly deriving choreogrphy-conforming systems of services Gregorio Díz Dept. de Sistems Informáticos Universidd de Cstill-L Mnch 02071. Alcete, Spin gregorio.diz@uclm.es Ismel Rodríguez Dept. Sist.

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

cisc1110 fall 2010 lecture VI.2 call by value function parameters another call by value example:

cisc1110 fall 2010 lecture VI.2 call by value function parameters another call by value example: cisc1110 fll 2010 lecture VI.2 cll y vlue function prmeters more on functions more on cll y vlue nd cll y reference pssing strings to functions returning strings from functions vrile scope glol vriles

More information

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results 1 L 1 - Counter A project is collection mechnism for n HDL design under specifiction or test. Projects in ModelSim ese interction nd re useful for orgnizing files nd specifying simultion settings. The

More information

Agilent Mass Hunter Software

Agilent Mass Hunter Software Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss

More information

ARCHITECTURES FOR TESTING DISTRIBUTED SYSTEMS

ARCHITECTURES FOR TESTING DISTRIBUTED SYSTEMS 1 ARCHITECTURES FOR TESTING DISTRIBUTED SYSTEMS Andres Ulrich, Hrtmut König Siemens AG, Corporte Technology, ZT SE 1, 81739 München, Germny E-mil: ndres.ulrich@mchp.siemens.de BTU Cottus, Deprtment of

More information

CS 241 Week 4 Tutorial Solutions

CS 241 Week 4 Tutorial Solutions CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Inference of node replacement graph grammars

Inference of node replacement graph grammars Glley Proof 22/6/27; :6 File: id293.tex; BOKCTP/Hin p. Intelligent Dt Anlysis (27) 24 IOS Press Inference of node replcement grph grmmrs Jcek P. Kukluk, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Lexical Analysis. Amitabha Sanyal. (www.cse.iitb.ac.in/ as) Department of Computer Science and Engineering, Indian Institute of Technology, Bombay

Lexical Analysis. Amitabha Sanyal. (www.cse.iitb.ac.in/ as) Department of Computer Science and Engineering, Indian Institute of Technology, Bombay Lexicl Anlysis Amith Snyl (www.cse.iit.c.in/ s) Deprtment of Computer Science nd Engineering, Indin Institute of Technology, Bomy Septemer 27 College of Engineering, Pune Lexicl Anlysis: 2/6 Recp The input

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

An Event Structuring Approach to Real-Time Design Peter Gorm Larsen Abstract IFAD { Institute of Applied Computer Science Munkebjergvnget 17, DK-5230

An Event Structuring Approach to Real-Time Design Peter Gorm Larsen Abstract IFAD { Institute of Applied Computer Science Munkebjergvnget 17, DK-5230 An Event Structuring Approch to Rel-Time Design Peter Gorm Lrsen Astrct IFAD { Institute of Applied Computer Science Munkeergvnget 17, DK-5230 Odense M, Denmrk E-mil: peter@ifd.dk In the development of

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

box Boxes and Arrows 3 true 7.59 'X' An object is drawn as a box that contains its data members, for example:

box Boxes and Arrows 3 true 7.59 'X' An object is drawn as a box that contains its data members, for example: Boxes nd Arrows There re two kinds of vriles in Jv: those tht store primitive vlues nd those tht store references. Primitive vlues re vlues of type long, int, short, chr, yte, oolen, doule, nd flot. References

More information

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley AI Adjcent Fields Philosophy: Logic, methods of resoning Mind s physicl system Foundtions of lerning, lnguge, rtionlity Mthemtics Forml representtion nd proof Algorithms, computtion, (un)decidility, (in)trctility

More information

CSE 401 Midterm Exam 11/5/10 Sample Solution

CSE 401 Midterm Exam 11/5/10 Sample Solution Question 1. egulr expressions (20 points) In the Ad Progrmming lnguge n integer constnt contins one or more digits, but it my lso contin embedded underscores. Any underscores must be preceded nd followed

More information

Languages. L((a (b)(c))*) = { ε,a,bc,aa,abc,bca,... } εw = wε = w. εabba = abbaε = abba. (a (b)(c)) *

Languages. L((a (b)(c))*) = { ε,a,bc,aa,abc,bca,... } εw = wε = w. εabba = abbaε = abba. (a (b)(c)) * Pln for Tody nd Beginning Next week Interpreter nd Compiler Structure, or Softwre Architecture Overview of Progrmming Assignments The MeggyJv compiler we will e uilding. Regulr Expressions Finite Stte

More information

Registering as an HPE Reseller

Registering as an HPE Reseller Registering s n HPE Reseller Quick Reference Guide for new Prtners Mrch 2019 Registering s new Reseller prtner There re four min steps to register on the Prtner Redy Portl s new Reseller prtner: Appliction

More information

A Scalable and Reliable Mobile Agent Computation Model

A Scalable and Reliable Mobile Agent Computation Model A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper

More information

CS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata

CS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata CS 432 Fll 2017 Mike Lm, Professor (c)* Regulr Expressions nd Finite Automt Compiltion Current focus "Bck end" Source code Tokens Syntx tree Mchine code chr dt[20]; int min() { flot x = 42.0; return 7;

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Registering as a HPE Reseller. Quick Reference Guide for new Partners in Asia Pacific

Registering as a HPE Reseller. Quick Reference Guide for new Partners in Asia Pacific Registering s HPE Reseller Quick Reference Guide for new Prtners in Asi Pcific Registering s new Reseller prtner There re five min steps to e new Reseller prtner. Crete your Appliction Copyright 2017 Hewlett

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

Hypergraph Representation of Diagrams in Diagram Editors

Hypergraph Representation of Diagrams in Diagram Editors Hypergrph Representtion of Digrms in Digrm Editors Mrk Mins Lehrstuhl für Progrmmiersprchen Universität Erlngen-Nürnerg Mrtensstr. 3, 91058 Erlngen, Germny emil: mins@informtik.uni-erlngen.de Astrct When

More information

Reducing a DFA to a Minimal DFA

Reducing a DFA to a Minimal DFA Lexicl Anlysis - Prt 4 Reducing DFA to Miniml DFA Input: DFA IN Assume DFA IN never gets stuck (dd ded stte if necessry) Output: DFA MIN An equivlent DFA with the minimum numer of sttes. Hrry H. Porter,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

Computer-Aided Multiscale Modelling for Chemical Process Engineering

Computer-Aided Multiscale Modelling for Chemical Process Engineering 17 th Europen Symposium on Computer Aided Process Engineesing ESCAPE17 V. Plesu nd P.S. Agchi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Computer-Aided Multiscle Modelling for Chemicl Process

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

Lexical Analysis: Constructing a Scanner from Regular Expressions

Lexical Analysis: Constructing a Scanner from Regular Expressions Lexicl Anlysis: Constructing Scnner from Regulr Expressions Gol Show how to construct FA to recognize ny RE This Lecture Convert RE to n nondeterministic finite utomton (NFA) Use Thompson s construction

More information

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1 vcloud Director Service Provider Admin Portl Guide vcloud Director 9. vcloud Director Service Provider Admin Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/

More information

Graphs with at most two trees in a forest building process

Graphs with at most two trees in a forest building process Grphs with t most two trees in forest uilding process rxiv:802.0533v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order,

More information

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona Implementing utomt Sc 5 ompilers nd Systems Softwre : Lexicl nlysis II Deprtment of omputer Science University of rizon collerg@gmil.com opyright c 009 hristin ollerg NFs nd DFs cn e hrd-coded using this

More information

Philosophy Of Creating Macros In Accumark CAD System

Philosophy Of Creating Macros In Accumark CAD System Philosophy Of Creting Mcros In Accumrk CAD System Mrie Nejedl Astrct: - The rticle discusses promising method of creting documenttion in design preprtion of clothing production using the "Mcro" module.

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes by disks: volume prt ii 6 6 Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem 6) nd the ccumultion process is to determine so-clled volumes

More information

M-Historian and M-Trend

M-Historian and M-Trend Product Bulletin Issue Dte June 18, 2004 M-Historin nd The M-Historin mnges the collection nd rchiving of trend dt, nd enles the presenttion of rchived trend dt in the ssocited softwre component. M-Historin

More information

Mathematics Background

Mathematics Background For more roust techer experience, plese visit Techer Plce t mthdshord.com/cmp3 Mthemtics Bckground Extending Understnding of Two-Dimensionl Geometry In Grde 6, re nd perimeter were introduced to develop

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

vcloud Director Tenant Portal Guide vcloud Director 9.0

vcloud Director Tenant Portal Guide vcloud Director 9.0 vcloud Director Tennt Portl Guide vcloud Director 9.0 vcloud Director Tennt Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre We site t: https://docs.vmwre.com/ The VMwre We

More information

Grade 7/8 Math Circles Geometric Arithmetic October 31, 2012

Grade 7/8 Math Circles Geometric Arithmetic October 31, 2012 Fculty of Mthemtics Wterloo, Ontrio N2L 3G1 Grde 7/8 Mth Circles Geometric Arithmetic Octoer 31, 2012 Centre for Eduction in Mthemtics nd Computing Ancient Greece hs given irth to some of the most importnt

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

2014 Haskell January Test Regular Expressions and Finite Automata

2014 Haskell January Test Regular Expressions and Finite Automata 0 Hskell Jnury Test Regulr Expressions nd Finite Automt This test comprises four prts nd the mximum mrk is 5. Prts I, II nd III re worth 3 of the 5 mrks vilble. The 0 Hskell Progrmming Prize will be wrded

More information

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona CSc 453 Compilers nd Systems Softwre 4 : Lexicl Anlysis II Deprtment of Computer Science University of Arizon collerg@gmil.com Copyright c 2009 Christin Collerg Implementing Automt NFAs nd DFAs cn e hrd-coded

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers? 1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem Announcements Project : erch It s live! Due 9/. trt erly nd sk questions. It s longer thn most! Need prtner? Come up fter clss or try Pizz ections: cn go to ny, ut hve priority in your own C 88: Artificil

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

An Expressive Hybrid Model for the Composition of Cardinal Directions

An Expressive Hybrid Model for the Composition of Cardinal Directions An Expressive Hyrid Model for the Composition of Crdinl Directions Ah Lin Kor nd Brndon Bennett School of Computing, University of Leeds, Leeds LS2 9JT, UK e-mil:{lin,brndon}@comp.leeds.c.uk Astrct In

More information

Misrepresentation of Preferences

Misrepresentation of Preferences Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 Introduction to EsyMP Multi PC Projection 5 EsyMP Multi PC Projection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters

More information

Epson iprojection Operation Guide (Windows/Mac)

Epson iprojection Operation Guide (Windows/Mac) Epson iprojection Opertion Guide (Windows/Mc) Contents 2 Introduction to Epson iprojection 5 Epson iprojection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters nd Projection

More information

Geometrical tile design for complex neighborhoods

Geometrical tile design for complex neighborhoods COMPUTATIONAL NEUROSCIENCE ORIGINAL RESEARCH ARTICLE pulished: 23 Novemer 2009 doi: 103389/neuro100202009 Geometricl tile design for complex neighorhoods Eugen Czeizler* nd Lil Kri Deprtment of Computer

More information

Lily Yen and Mogens Hansen

Lily Yen and Mogens Hansen SKOLID / SKOLID No. 8 Lily Yen nd Mogens Hnsen Skolid hs joined Mthemticl Myhem which is eing reformtted s stnd-lone mthemtics journl for high school students. Solutions to prolems tht ppered in the lst

More information

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute

More information