An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

Size: px
Start display at page:

Download "An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization"

Transcription

1 An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction Systems Group e mil: jeroen@ics.ele.tue.nl Abstrct In this pper we introduce the first divide nd conquer lgorithm tht is cpble of exct hzrd free logic minimiztion in constructive wy. We compre our lgorithm with the method of Dill/Nowick, which ws the only known method for exct hzrd free minimiztion. We show tht our lgorithm is much fster thn the method proposed by Dill/Nowick by voiding significnt prt of the serch spce. We rgue tht the proposed lgorithm is promising frmework for the development of efficient heuristic lgorithms. Introduction One of the bottlenecks of synchronous design is the logic synthesis step. During this step it is often required tht the logic expressions to be generted re free of hzrds for given set of trnsitions under the unbounded wire dely model []. This is e.g. the cse during the synthesis of Asynchronous Burst Mode Mchines. It hs been shown tht these mchines cn successfully be used to implement lrge synchronous designs [4]. Until recently hzrd free logic expressions hd to be designed by hnd, since no lgorithm ws known to generte them. The first lgorithm cpble of generting hzrd free logic expressions ws proposed by Dill/Nowick []. This lgorithm is cpble of generting n exct pl bsed solution. It uses n exct two level minimizer, like espresso [5], to generte ll prime implicnts. A filter is pplied to ll these prime implicnts to render them dynmic hzrd free (dhf). A miniml selection is mde of the fittest implicnts to generte n exct miniml solution in terms of the number of prime implicnts. Since there cn be n exponentil number of prime implicnts, this method is only pplicble to reltively smll exmples. In this pper we propose new exct divide nd conquer lgorithm, similr to the one used in espresso, tht is cpble of generting hzrd free logic expressions in constructive wy. Tht is, we directly generte hzrd free logic without the need of posteriori fixing. Not only is this very importnt from theoreticl point of view, since we believe it is the first in its kind, it is lso importnt from prcticl point of view since by some modifictions the lgorithm is cpble of generting both exct nd heuristic solutions. We show tht this lgorithm cn void prt of the serch spce nd therefore is much fster thn Dill/Nowick s method for lrger exmples. In this pper we focus on single output functions. Single output minimiztion is n importnt opertion during multi level logic synthesis nd the described lgorithms cn be pplied in tht field. We lso outline the modifictions necessry to llow the described lgorithms to operte on multiple output functions; due to lck of spce detils re omitted. 2 Bckground A binry vlued input, binry vlued output function cn be described by f : B n B {*} where B {0, }. Here, str indictes the prt of the function belonging to the don t cre set. The offset of f is denoted s R. A cube S is non empty Crtesin product spce S S 2 S n, where S i B. A minterm is cube where S i. An implicnt is cube tht hs no intersection with the offset. A prime implicnt is n implicnt tht is not covered by ny other implicnt. Given function f, the gol of 2 level minimiztion is to find miniml selection of prime implicnts such tht the on set of this function is completely covered. Let function f be expressed over the input vribles x x n. f xi is clled cofctor of function f with respect to input vrible x i. It is defined s: f xi f (x,..., x i,..., x n ). The negtive cofctor, f xi is defined s: f xi f (x,..., x i 0,..., x n ). A function is sid to be unte in vrible x i if f xi f xi or f xi f xi. In the first cse the function is positive unte in x i, in the ltter cse, the function is sid to be negtive unte in x i. A function is unte if it is unte in ech vrible. 3 A new divide nd conquer technique In this section we introduce new divide nd conquer lgorithm, the threewy method, tht is cpble of clculting ll prime implicnts. We introduce this lgorithm becuse it cn be converted to generte the set of ll dhf prime implicnts,

2 which, to the best knowledge of the uthors, is not possible with e.g. the lgorithm used by espresso. Furthermore, we show tht this lgorithm is cpble of voiding significnt prt of the serch spce by only generting contributing dhf prime implicnts. We strt by introducing the problem of hzrd free logic minimiztion. 3. Hzrd free logic minimiztion Hzrd free logic is bsed on the dynmic hzrd free (dhf) implementtion of set of trnsitions. A trnsition is tuple defined s: I, O where I D n nd O D m. D is given by: D {0,,, }. A trnsition cube [] is cube notted s [A, B], where A nd B re minterms tht indicte the strting point nd end point of trnsition in the input spce. The trnsition cube is the smllest cube tht covers both A nd B. Hzrd free logic considers ech trnsition individully: ech trnsition is implemented free from hzrds. At the strt of ech trnsition, the logic implementing the behvior of the trnsition is ssumed to be stble. Hzrds cn be sttic or dynmic []. Sttic hzrds cn be voided by demnding tht the trnsition cube is covered by n implicnt in the solution. Such trnsition cube is clled required cube. Dynmic hzrds re tken cre off by so clled privileged cubes. A privileged cube is trnsition cube with n nnotted strting point. It is formlly denoted s: p (p c, p s ), where p c is clled the body of the privileged cube nd p s is clled the strting point. All implicnts in dhf solution re only llowed to intersect privileged cube when the strting point is lso included. Otherwise the intersection is sid to be illegl. An implicnt tht does not illeglly intersect ny privileged cube is clled dhf implicnt. A dhf prime implicnt is not covered by ny other dhf implicnt. A miniml dhf solution consists of miniml selection of dhf prime implicnts tht covers ll required cubes []. Exmple Consider circuit with 4 inputs nd output tht is supposed to implement the following trnsitions free from dynmic hzrds: {< 000,>, < 0, >, <,0>, <, >, < 0, >, < 00,0>, <00 0, >}. The order of the input vribles in these trnsitions is bcd. Furthermore we ssume tht the circuit implementing ll trnsitions is stble t the strt of ech trnsition. In figure Krnugh mp is depicted showing ll the trnsitions nd the on/offset tht cn be derived from this set of trnsitions. An empty entry corresponds with don t cre entry. If we use 2 level minimizer, like espresso, to generte miniml set of prime implicnts tht covers the depicted onset, the solution would be: 0, 00. This solution is hzrdous, which cn be shown by exmining trnsition < 0, >. In this trnsition, input vribles b nd d turn on. Suppose input vrible b turns on before input vrible d. d Figure : Krnugh mp for given set of trnsitions We cn observe tht cube 00 will turn off. Cube 0 will turn on, so we hve term tkeover tht cn give rise to sttic hzrd: the output might temporrily turn off. This hzrd cn be voided by demnding tht the solution covers the smllest cube tht covers both the strting point of the trnsition nd the minterm entered by turning b on. Since solution must cover this cube, it is clled required cube. Here, the required cube is: 00. Let us dd this required cube to the solution. Now let us exmine if we hve successfully removed ll hzrdous situtions for the given trnsition. Agin, we ssume tht input vrible b is the first to turn on. Becuse of the dded required cube, the output will remin t one. Now input vrible d switches on. Both the dded required cube nd cube 0 will turn off in tht cse. However the behvior of this cube might be observed fter the required cube itself hs turned off. In fct, the behvior of cube 0 going on might be observed fter the required cube hs turned off, due to our unbounded wire dely model. This might led to dynmic hzrd: fter the output hs turned off, glitch representing the behvior of cube 0 might be observed. This dynmic hzrd cn be voided by demnding tht during trnsition fter which the output will turn off, no cube cn temporrily turn on. A cube my turn on, or it my turn off, but not both. This constrint is met by tking into ccount set of privileged cubes. The body of privileged cube is equl to the trnsition cube tht covers the trnsition. A privileged cube lso hs n nnotted strting point, corresponding to the strting point of the trnsition. A set of implicnts is sid to be dhf if the intersection of ech implicnt with the body of privileged cube lso contins the strting point of tht privileged cube. If this is not the cse, the implicnt is sid to intersect privileged cube illeglly. This cn led to dynmic hzrd. In this exmple, the privileged cube necessry to void dynmic hzrd during trnsition < 0, > is ( p c = 0, p s = 000). Observe tht prime implicnt 0 intersects the body of this privileged cube, but does not cover the strting point. Therefore this prime is not dynmic hzrd free. For this exmple correct miniml hzrd free 0 c b

3 R bd d cd F d bcd bd bc d c b R R R R 0 0 bd cd bd cd d d bd d bc bcd bd Figure 2: Exmple of the threewy method solution consists of three dhf prime implicnts nmely: 0, 00, The threewy method In the threewy method for binry vlued functions, the set of ll prime implicnts is clculted by supplying the method the offset of function f. Serching the set of ll prime implicnts becomes equl to serching ll mximl cubes tht do not intersect the offset. If we consider vrible with respect to cube, we cn discern three cses: the vrible is 0, or (don t cre). The min ide behind the threewy method is to divide the originl problem of clculting ll prime implicnts into the three sub problems of clculting the set of prime implicnts in which selected vrible hs one of these vlues. Hence the nme threewy method. For exmple, one of the sub problems is to generte the set of prime implicnts for which the selected vrible is equl to. The bsic ide of the method is depicted in figure 2. The ide to prtition the problem of clculting the set of ll prime implicnts into three sub problems is not new, it ws lso used by Coudert to implement n efficient implicit 2 level minimizer [3]. In the exmple in figure 2, vrible is used to reduce the originl problem of finding ll prime implicnts into the three sub problems of finding the prime implicnts for which vrible hs one of the three possible vlues. These three vlues re represented by three edges. The set of primes for which is equl to 0 cn never intersect with tht prt of the offset where is equl to. Therefore in order to clculte the set of primes for which is 0, the zero edge for future references, we only need to clculte the set of mximl cubes tht hve no intersection with the negtive cofctored offset, since we bstrct from vrible. This is expressed s R. For the one edge, the offset becomes R. For the don t cre edge, the offset becomes R R. This is becuse for ny prime for which vrible is don t cre, n intersection with R or R implies n intersection with R itself nd vicevers. The new sub problems re reduced: the crdinlity of the support set is decresed. The originl problem cn be divided into new sub problems repetedly until the offset becomes empty or equl to the universe cube. In the first cse, the set of primes becomes equl to the universe cube, since this is the mximl cube tht does not intersect the empty offset. In the second cse the set of primes is empty. The selection of edges tken, i.e. the pth, determines the ssignment of the vribles of the prime. For the given exmple in figure 2, the offset is given by R bd d cd, the cofctors re R bd d nd R bd cd. By repeting the splitting process, the set of primes not intersecting R cn be clculted. This set turns out to be equl to Primes bd. Similrly the set of primes not intersecting R is equl to Primes d bc. Also it turns out tht the set of primes not intersecting R R is equl to Primes bcd. Combining these primes results in: Primes Primes Primes Primes = bd d bc bcd. Figure 3 gives generl overview of the proposed threewy method: R 0 R R R R Figure 3: Generl threewy model The primes generted by the zero or one edge cn be covered by the primes generted by the don t cre edge. Therefore single cube continment (SCC) filtering hs to be performed, to remove ll covered cubes, while merging the solutions of the sub problems into the solution of the originl problem. This is expressed s: Primes SCC( Primes Primes Primes )

4 We will now prove tht the proposed method genertes ll prime implicnts. In order to do so, we need the following lemm: Lemm Ech cube hs n unique pth in the serch tree. No two different cubes follow the sme pth in the serch tree since this would imply tht for ech input vrible they re ssigned the sme vlues. Theorem Ech cube generted by the threewy method is n implicnt. Proof: We only generte cube when the offset becomes empty. Certin pths exist in the serch tree fter which the offset becomes empty. By lemm ech pth corresponds to unique cube. Following pth is equl to clculting the cofctor of the offset with respect to this cube. Since this cofctor is empty, the cube must be n implicnt. Theorem 2 Ech implicnt generted by the threewy method is prime. Proof: Suppose prime implicnt d covers n implicnt c generted by the threewy method. Since d does not intersect the offset, the cofctor of the offset w.r.t. d is empty. Therefore, following the pth tht belongs to d leds us to lef node where the offset is empty. So d is creted. Implicnt c might lso be creted, but due to the SCC filter, it is removed. Theorem 3 The threewy method will generte ll prime implicnts. Proof: Suppose prime d is missing. Agin we cn follow its pth nd observe tht the offset gin will be empty. Therefore d will be generted. Theorem 4 If the offset is unte in vrible, then the threewy method cn be reduced to twowy method. Proof: The primes generted by Primes or Primes cn be covered completely by the primes of Primes. This hppens when the offset, nd therefore lso the onset is unte in certin vrible. If the offset is unte in vrible then R R or R R. In tht cse R R R or R R R. Therefore the primes generted by the zero (one ) edge will be covered completely by the primes generted by the don t cre edge. Therefore the threewy method becomes twowy method. We cn use this observtion to significntly reduce the serch spce by selecting unte vribles s soon s possible. 3.3 Generting ll dhf prime implicnts with the dhf threewy method Here, we propose modifictions tht will llow the threewy method to generte the set of ll dhf prime implicnts. This is ccomplished by keeping trck of the set of privileged cubes during the process of splitting the originl problem of clculting ll dhf primes. The problem of clculting the set of ll prime implicnts is trnsformed into one of clculting ll dhf prime implicnts. For the sub problems we now wnt to clculte the set of ll dhf primes for which the splitting vrible ssumes vlues zero, one or don t cre. Let us exmine the set of dhf prime implicnts for which vrible is equl to. Since vrible is equl to for ny prime clculted by the edge, ny privileged cube tht hs strting point for which is equl to 0, will be intersected illeglly when its body is intersected. To void this intersection we must dd the cofctored body, p c of ech of these privileged cubes to the offset of the edge. This wy, we cn gurntee tht the set of primes generted by the edge will not intersect these privileged cubes illeglly. However, the primes still might intersect those privileged cubes tht hve strting point for which vrible is equl to one or don t cre. Therefore, we must keep trck of these privileged cubes by pssing them on. Resuming, the offset nd set of privileged cubes tht re pssed on to the edge re expressed s: P p p s R R p c p s We represent the set of privileged cubes nd the Offset pssed on to the edge by dding subscript. We now consider the cse where the splitting vrible is equl to don t cre: we follow the don t cre edge. We cn not determine which subset of the set of privileged cubes will lwys be intersected illeglly. Therefore we must consider the set of ll co fctored privileged cubes. This is expressed s: P 2 P P The offset is expressed s: R 2 R R A subscript of 2 represents the sets tht re pssed on to the don t cre edge. Note tht P 2 is not equl to P 0 P. In figure 4 the generl model of the dhf threewy method is depicted. (R, P) 0 (R 0, P 0 ) (R 2, P 2 ) (R, P ) Figure 4: Generl model of the dhf threewy method Theorem 5 The set of implicnts generted by the dhf threewy method is dynmic hzrd free. Proof: By contrdiction. Suppose the method genertes n implicnt c tht illeglly intersects privileged cube p. We now strt to follow the pth belonging to c. After n edge, p cn still be vilble, in cofctored form, or it is removed during the process of clculting the set of privileged cubes tht must be pssed on. In the ltter cse, the cofctored form

5 of p s is empty in which cse the cofctored body of p, p c is dded to the offset. This would mke n illegl intersection of c with p impossible. Since c is supposed to intersect privileged cube p illeglly, p must remin in the trnsported set of privileged cubes. We cn pply this story in recursive wy until the offset becomes empty. Here c is being creted nd it is equl to the universe cube. However, since c is equl to the universe cube, it cnnot intersect p illeglly, becuse the strting point is included in the intersection. Therefore c is dhf implicnt. Theorem 6 The set of implicnts generted by the dhf threewy method is dhf prime. Proof: Suppose d is dhf implicnt tht covers dhf implicnt c generted by the threewy method. Now let s follow the pth belonging to d. The threewy method didn t generte d, mening tht when we trce d we end up t lef node where the offset is not empty. We ssume tht d does not intersect the originl offset. The offset, intersected by d, therefore is due to the body of t lest one privileged cube tht hs been dded to the offset. This implies tht d will t lest illeglly intersect one privileged cube. Therefore d cnnot be dhf prime implicnt. Theorem 7 The set of dhf primes generted by the dhf threewy method is complete. Proof: The threewy method genertes ll prime implicnts. The dhf threewy method genertes dhf prime implicnts. Suppose dhf prime c is missing from the set generted. If we follow the pth belonging to this prime we will discover tht t the node where c should hve been creted, the offset is not empty. Therefore c is not vlid: it intersects the originl offset or it intersects privileged cube illeglly. The set of dhf primes is complete. Agin we cn reduce the threewy method to t most twowy method if the offset is unte in t lest one vrible. However, in the dhf threewy method this constrint is not enough. The set of privileged cubes must lso be tken into ccount since these privileged cubes cn eventully contribute to the offset in the process of clculting the set of dhf primes for one of the sub problems. Therefore, we cn only skip the 0 () edge if P 2 is equl to P 0 (P ) nd R 2 R 0 (R 2 R ). 3.4 Generting contributing (useful) dhf prime implicnts The dhf threewy method is cpble of generting ll dhf prime implicnts. However, mny of these dhf primes will never contribute to vlid solution becuse they only cover the don t cre set or becuse they only prtilly cover some required cubes. The threewy method for binry functions cn be modified to void the genertion of these primes. This is possible becuse the solutions of sub problems do not interct to generte the solution of the originl problem, s is the cse in the unte recursive prdigm used in espresso. This mens tht if we know tht n edge will not generte set of contributing/useful primes, we cn just discrd tht edge. It will hve no influence on the other primes being generted. In order to detect edges tht will not generte contributing primes we lso must keep trck of the set of required cubes. The ide is to refrin from clculting the primes belonging to certin edge when the set of required cubes is empty. In figure 5 the modifictions necessry to the dhf threewy method re depicted. (R, P, Q) 0 (R 0, P 0, Q 0 ) (R 2, P 2, Q 2 ) (R, P, Q ) Figure 5: Generl model to generte contributing dhf primes Here Q is used to represent the set of required cubes. We lredy know how to clculte sets R k nd P k. Wht remins to be nswered is how to determine sets Q k. Let us strt by exmining the edge. We only wnt to propgte those required cubes in Q for which vrible lso is equl to. All other required cubes re only prtilly covered, or not covered t ll. So we cn express Q s: Q q q q A similr expression exists for Q 0. For the don t cre edge we must propgte ll, cofctored, required cubes. So we cn express Q 2 s: Q 2 Q Q 3.5 Multiple output functions In this section we will discuss in n outline how the described threewy method cn be modified to tke into ccount multiple output functions. In order to do so, we hve extended the threewy method to be ble to del with multiple vlued functions. All output vribles cn be combined into one multi vlued vrible with crdinlity equl to the number of outputs [5]. This multi vlued vrible cn be used to split the originl problem into three new sub problems, just like binry vrible. This is done by prtitioning this multi vlued vrible into two prtitions. For the 0 nd edge the offset simply become equl to the offset cofctored to the pproprite prtition. This, however, is not the cse for the don t cre edge. It turns out tht the offset for the don t cre edge is equl to the combined sets of both cofctors of the offset, where the originl multiple vlued vrible is split into two new multiple vlued vribles. Ech new multiple vlued vrible corresponds to one of

6 the prtitions of the originl multiple vlued vrible. Due to lck of spce we will not discuss the specific detils nor the modifictions necessry to modify this method to llow it to generte the set of ll dhf prime implicnts. It will be the subject of future pper. 4 Results nd Conclusions We hve implemented the described threewy method nd compred it with Dill/Nowick s method []. In order to do so, we used the two level minimizer espresso to generte the set of ll prime implicnts. These primes re then rendered free from hzrds by Dill/Nowick s hzrd removl lgorithm. In Tble the results re depicted. All benchmrk circuits in the first column re derived from well known Asynchronous Burst Mode Mchines nd represent the biggest single output exmples vilble. The number of inputs nd the number of cubes of ech circuit re shown in the second column. In the third column the number of primes generted by espresso nd the runtime in seconds re given. A dsh ( ) indictes tht the runtime ws too smll to mesure with much ccurcy (less thn 0. [s]). The fourth column shows the number of dhf prime implicnts generted by Dill/Nowick s lgorithm, which uses the results generted by espresso, nd the runtimes. The fifth column represents the results by our threewy method when it is used to generte ll dhf prime implicnts. The number of primes in the fifth column therefore must be equl to the number of primes in the fourth column. Agin, the runtimes re lso represented. The sixth column represents the number of primes nd the runtime by the threewy method when it only produces the set of contributing dhf prime implicnts. The lst column represents the smllest solution, in terms of dhf primes, possible. This solution ws obtined by solving unte covering problem, where the minimum number of dhf primes ws selected tht covers ll required cubes. All benchmrk runs were performed on HP9000/K260 system. Espresso nd the threewy method Tble : results prototype were both compiled with the sme compiler options. From tble it cn be observed tht the runtimes of the threewy method re comprble with the runtimes of espresso, when the times spend in the column hzrd filter re dded. However, the runtimes of the threewy method re significntly reduced when it is llowed to only generte the set of contributing prime implicnts. This is cused by the significnt reduction of the serch spce nd of the number of primes clculted. In this pper we hve presented wht we believe is the first constructive exct method tht is cpble of clculting the set of ll dhf prime implicnts. We hve shown tht this method cn esily be enhnced to generte only the set of useful primes. This significntly reduces the solution serch spce nd hence the runtimes necessry. The proposed method cn lso be extended to del with multiple output functions. To cope with lrger prcticl problem instnces, it is lso importnt to serch for efficient heuristic methods [2], especilly when deling with multiple output functions. In future pper we will show tht the threewy method lso provides good bsis for developing efficient heuristic methods. References [] Steven M. Nowick, Dvil L. Dill, Exct Two Level Minimiztion of Hzrd Free Logic with Multiple Input Chnges, ICCAD 92, pp [2] Michel Theobld, Steven M. Nowick, To Wu, Espresso HF: A Heuristic Hzrd Free Minimizer for Two Level Logic, DAC 96, pp [3] Olivier Coudert, Two level logic minimiztion: n overview, Integrtion the VLSI journl, Vol. 7 No. 2, 994, pp [4] K.Y. Yun, Synthesis of Asynchronous Controllers For Heterogeneous systems, Stnford University, 994, Ph.D. Thesis [5] R. Rudell, A Sngiovnni vincentelli, Multiple Vlued Minimiztion for PLA Optimiztion, IEEE Trnsctions on computer ided design, Vol. CAD 6, No. 5, September 987 Nme I/C Espresso Hzrd Filter dhf threewy Contrib Minimize sbuf send ctl.s.pl 6/50 8/ 0/ 0/ 4/ 3 isend bm.s.pl 9/9 0/ 0/ 0/ 0/ 3 pe send ifc.s.pl 8/59 7/ 7/ 7/ 2/ 6 isend.s.pl 8/67 27/ 27/ 27/ 7/ 4 p2.s.pl 3/59 40/ 40/ 40/ 20/ 4 pscsi.s.pl 4/4 73/0.0 79/ 79/0.40 7/ p.s.pl 20/ / /0. 527/.3 69/ cche ctrl.s.pl 2/ /.2 543/ /.40 95/ scsi.s.pl 8/92 958/ / /3.7 44/0.6 4

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Introduction to Computer Engineering EECS 203 dickrp/eecs203/ CMOS transmission gate (TG) TG example

Introduction to Computer Engineering EECS 203  dickrp/eecs203/ CMOS transmission gate (TG) TG example Introduction to Computer Engineering EECS 23 http://ziyng.eecs.northwestern.edu/ dickrp/eecs23/ CMOS trnsmission gte TG Instructor: Robert Dick Office: L477 Tech Emil: dickrp@northwestern.edu Phone: 847

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

Digital Design. Chapter 6: Optimizations and Tradeoffs

Digital Design. Chapter 6: Optimizations and Tradeoffs Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012 Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.

More information

CS201 Discussion 10 DRAWTREE + TRIES

CS201 Discussion 10 DRAWTREE + TRIES CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

Section 3.1: Sequences and Series

Section 3.1: Sequences and Series Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

1 Quad-Edge Construction Operators

1 Quad-Edge Construction Operators CS48: Computer Grphics Hndout # Geometric Modeling Originl Hndout #5 Stnford University Tuesdy, 8 December 99 Originl Lecture #5: 9 November 99 Topics: Mnipultions with Qud-Edge Dt Structures Scribe: Mike

More information

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers Wht do ll those bits men now? bits (...) Number Systems nd Arithmetic or Computers go to elementry school instruction R-formt I-formt... integer dt number text chrs... floting point signed unsigned single

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

EECS 281: Homework #4 Due: Thursday, October 7, 2004

EECS 281: Homework #4 Due: Thursday, October 7, 2004 EECS 28: Homework #4 Due: Thursdy, October 7, 24 Nme: Emil:. Convert the 24-bit number x44243 to mime bse64: QUJD First, set is to brek 8-bit blocks into 6-bit blocks, nd then convert: x44243 b b 6 2 9

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Improper Integrals. October 4, 2017

Improper Integrals. October 4, 2017 Improper Integrls October 4, 7 Introduction We hve seen how to clculte definite integrl when the it is rel number. However, there re times when we re interested to compute the integrl sy for emple 3. Here

More information

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

Fall 2018 Midterm 1 October 11, ˆ You may not ask questions about the exam except for language clarifications.

Fall 2018 Midterm 1 October 11, ˆ You may not ask questions about the exam except for language clarifications. 15-112 Fll 2018 Midterm 1 October 11, 2018 Nme: Andrew ID: Recittion Section: ˆ You my not use ny books, notes, extr pper, or electronic devices during this exm. There should be nothing on your desk or

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes by disks: volume prt ii 6 6 Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem 6) nd the ccumultion process is to determine so-clled volumes

More information

Intermediate Information Structures

Intermediate Information Structures CPSC 335 Intermedite Informtion Structures LECTURE 13 Suffix Trees Jon Rokne Computer Science University of Clgry Cnd Modified from CMSC 423 - Todd Trengen UMD upd Preprocessing Strings We will look t

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

Misrepresentation of Preferences

Misrepresentation of Preferences Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

Notes for Graph Theory

Notes for Graph Theory Notes for Grph Theory These re notes I wrote up for my grph theory clss in 06. They contin most of the topics typiclly found in grph theory course. There re proofs of lot of the results, ut not of everything.

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information

Introduction to Integration

Introduction to Integration Introduction to Integrtion Definite integrls of piecewise constnt functions A constnt function is function of the form Integrtion is two things t the sme time: A form of summtion. The opposite of differentition.

More information

Approximation by NURBS with free knots

Approximation by NURBS with free knots pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

Epson Projector Content Manager Operation Guide

Epson Projector Content Manager Operation Guide Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time

More information

Questions About Numbers. Number Systems and Arithmetic. Introduction to Binary Numbers. Negative Numbers?

Questions About Numbers. Number Systems and Arithmetic. Introduction to Binary Numbers. Negative Numbers? Questions About Numbers Number Systems nd Arithmetic or Computers go to elementry school How do you represent negtive numbers? frctions? relly lrge numbers? relly smll numbers? How do you do rithmetic?

More information

Companion Mathematica Notebook for "What is The 'Equal Weight View'?"

Companion Mathematica Notebook for What is The 'Equal Weight View'? Compnion Mthemtic Notebook for "Wht is The 'Equl Weight View'?" Dvid Jehle & Brnden Fitelson July 9 The methods used in this notebook re specil cses of more generl decision procedure

More information

such that the S i cover S, or equivalently S

such that the S i cover S, or equivalently S MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i

More information

Subtracting Fractions

Subtracting Fractions Lerning Enhncement Tem Model Answers: Adding nd Subtrcting Frctions Adding nd Subtrcting Frctions study guide. When the frctions both hve the sme denomintor (bottom) you cn do them using just simple dding

More information

PNC NC code PROGRAMMER'S MANUAL

PNC NC code PROGRAMMER'S MANUAL PNC-3200 NC code PROGRAMMER'S MANUAL Thnk you very much for purchsing the PNC-3200. To ensure correct nd sfe usge with full understnding of this product's performnce, plese be sure to red through this

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

Functor (1A) Young Won Lim 8/2/17

Functor (1A) Young Won Lim 8/2/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

pdfapilot Server 2 Manual

pdfapilot Server 2 Manual pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:

More information

arxiv:cs.cg/ v1 18 Oct 2005

arxiv:cs.cg/ v1 18 Oct 2005 A Pir of Trees without Simultneous Geometric Embedding in the Plne rxiv:cs.cg/0510053 v1 18 Oct 2005 Mrtin Kutz Mx-Plnck-Institut für Informtik, Srbrücken, Germny mkutz@mpi-inf.mpg.de October 19, 2005

More information

Chapter 2 Sensitivity Analysis: Differential Calculus of Models

Chapter 2 Sensitivity Analysis: Differential Calculus of Models Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls

More information

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe CSCI 0 fel Ferreir d Silv rfsilv@isi.edu Slides dpted from: Mrk edekopp nd Dvid Kempe LOG STUCTUED MEGE TEES Series Summtion eview Let n = + + + + k $ = #%& #. Wht is n? n = k+ - Wht is log () + log ()

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Step-Voltage Regulator Model Test System

Step-Voltage Regulator Model Test System IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node

More information

CS481: Bioinformatics Algorithms

CS481: Bioinformatics Algorithms CS481: Bioinformtics Algorithms Cn Alkn EA509 clkn@cs.ilkent.edu.tr http://www.cs.ilkent.edu.tr/~clkn/teching/cs481/ EXACT STRING MATCHING Fingerprint ide Assume: We cn compute fingerprint f(p) of P in

More information

Functor (1A) Young Won Lim 10/5/17

Functor (1A) Young Won Lim 10/5/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples EURSIP Journl on pplied Signl Processing 2003:6, 54 529 c 2003 Hindwi Publishing orportion Memory-Optimized Softwre Synthesis from tflow Progrm Grphs withlrgesizetsmples Hyunok Oh The School of Electricl

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers Wht do ll those bits men now? bits (...) Number Systems nd Arithmetic or Computers go to elementry school instruction R-formt I-formt... integer dt number text chrs... floting point signed unsigned single

More information

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl

More information

CSCI 446: Artificial Intelligence

CSCI 446: Artificial Intelligence CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

arxiv: v1 [cs.cg] 9 Dec 2016

arxiv: v1 [cs.cg] 9 Dec 2016 Some Counterexmples for Comptible Tringultions rxiv:62.0486v [cs.cg] 9 Dec 206 Cody Brnson Dwn Chndler 2 Qio Chen 3 Christin Chung 4 Andrew Coccimiglio 5 Sen L 6 Lily Li 7 Aïn Linn 8 Ann Lubiw 9 Clre Lyle

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

Integration. September 28, 2017

Integration. September 28, 2017 Integrtion September 8, 7 Introduction We hve lerned in previous chpter on how to do the differentition. It is conventionl in mthemtics tht we re supposed to lern bout the integrtion s well. As you my

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

Eliminating left recursion grammar transformation. The transformed expression grammar

Eliminating left recursion grammar transformation. The transformed expression grammar Eliminting left recursion grmmr trnsformtion Originl! rnsformed! 0 0! 0 α β α α α α α α α α β he two grmmrs generte the sme lnguge, but the one on the right genertes the rst, nd then string of s, using

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

cell 1 cell 2 cell 3 cell 4 a a

cell 1 cell 2 cell 3 cell 4 a a Frequency Assignment for Cellulr Mobile Systems Using Constrint Stisfction Techniques Mkoto Yokooy nd Ktsutoshi Hirymz y NTT Communiction Science Lbortories -4 Hikridi, Seik-cho, Sorku-gun, Kyoto 69-037

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

COMBINATORIAL PATTERN MATCHING

COMBINATORIAL PATTERN MATCHING COMBINATORIAL PATTERN MATCHING Genomic Repets Exmple of repets: ATGGTCTAGGTCCTAGTGGTC Motivtion to find them: Genomic rerrngements re often ssocited with repets Trce evolutionry secrets Mny tumors re chrcterized

More information

Math 464 Fall 2012 Notes on Marginal and Conditional Densities October 18, 2012

Math 464 Fall 2012 Notes on Marginal and Conditional Densities October 18, 2012 Mth 464 Fll 2012 Notes on Mrginl nd Conditionl Densities klin@mth.rizon.edu October 18, 2012 Mrginl densities. Suppose you hve 3 continuous rndom vribles X, Y, nd Z, with joint density f(x,y,z. The mrginl

More information

Very sad code. Abstraction, List, & Cons. CS61A Lecture 7. Happier Code. Goals. Constructors. Constructors 6/29/2011. Selectors.

Very sad code. Abstraction, List, & Cons. CS61A Lecture 7. Happier Code. Goals. Constructors. Constructors 6/29/2011. Selectors. 6/9/ Abstrction, List, & Cons CS6A Lecture 7-6-9 Colleen Lewis Very sd code (define (totl hnd) (if (empty? hnd) (+ (butlst (lst hnd)) (totl (butlst hnd))))) STk> (totl (h c d)) 7 STk> (totl (h ks d)) ;;;EEEK!

More information

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association 9. CISC - Curriculum & Instruction Steering Committee The Winning EQUATION A HIGH QUALITY MATHEMATICS PROFESSIONAL DEVELOPMENT PROGRAM FOR TEACHERS IN GRADES THROUGH ALGEBRA II STRAND: NUMBER SENSE: Rtionl

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

Address Register Assignment for Reducing Code Size

Address Register Assignment for Reducing Code Size Address Register Assignment for Reducing Code Size M. Kndemir 1, M.J. Irwin 1, G. Chen 1, nd J. Rmnujm 2 1 CSE Deprtment Pennsylvni Stte University University Prk, PA 16802 {kndemir,mji,guilchen}@cse.psu.edu

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

Position Heaps: A Simple and Dynamic Text Indexing Data Structure

Position Heaps: A Simple and Dynamic Text Indexing Data Structure Position Heps: A Simple nd Dynmic Text Indexing Dt Structure Andrzej Ehrenfeucht, Ross M. McConnell, Niss Osheim, Sung-Whn Woo Dept. of Computer Science, 40 UCB, University of Colordo t Boulder, Boulder,

More information

Ray surface intersections

Ray surface intersections Ry surfce intersections Some primitives Finite primitives: polygons spheres, cylinders, cones prts of generl qudrics Infinite primitives: plnes infinite cylinders nd cones generl qudrics A finite primitive

More information

Scanner Termination. Multi Character Lookahead. to its physical end. Most parsers require an end of file token. Lex and Jlex automatically create an

Scanner Termination. Multi Character Lookahead. to its physical end. Most parsers require an end of file token. Lex and Jlex automatically create an Scnner Termintion A scnner reds input chrcters nd prtitions them into tokens. Wht hppens when the end of the input file is reched? It my be useful to crete n Eof pseudo-chrcter when this occurs. In Jv,

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

ISG: Itemset based Subgraph Mining

ISG: Itemset based Subgraph Mining ISG: Itemset bsed Subgrph Mining by Lini Thoms, Stynryn R Vlluri, Kmlkr Krlplem Report No: IIIT/TR/2009/179 Centre for Dt Engineering Interntionl Institute of Informtion Technology Hyderbd - 500 032, INDIA

More information

Semistructured Data Management Part 2 - Graph Databases

Semistructured Data Management Part 2 - Graph Databases Semistructured Dt Mngement Prt 2 - Grph Dtbses 2003/4, Krl Aberer, EPFL-SSC, Lbortoire de systèmes d'informtions réprtis Semi-structured Dt - 1 1 Tody's Questions 1. Schems for Semi-structured Dt 2. Grph

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information