Fault tree conversion to binary decision diagrams

Size: px
Start display at page:

Download "Fault tree conversion to binary decision diagrams"

Transcription

1 Loughorough University Institutionl Repository Fult tree onversion to inry deision digrms This item ws sumitted to Loughorough University's Institutionl Repository y the/n uthor. Cittion: ANDREWS, J.D. nd REMENTYE, R., 25. Fult tree onversion to inry deision digrms. 23rd Interntionl System Sfety Conferene, August 22-26, 25, Sn Diego, Westin Hotel Additionl Informtion: This is onferene pper. It ws presented t 23rd Interntionl System Sfety Conferene, August 22-26, 25, Sn Diego, Westin Hotel. Metdt Reord: Pulisher: System Sfety Soiety Plese ite the pulished version.

2 This item ws sumitted to Loughorough s Institutionl Repository y the uthor nd is mde ville under the following Cretive Commons Liene onditions. For the full text of this liene, plese go to:

3 PROCEEDINGS OF THE 23rd INTERNATIONAL SYSTEM SAFETY CONFERENCE - 25 Fult Tree Conversion to Binry Deision Digrms J.D. Andrews; Deprtment of Aeronutil nd Automotive Engineering Loughorough University; Loughorough, Leiestershire, Englnd R. Remenyte; Deprtment of Aeronutil nd Automotive Engineering Loughorough University; Loughorough, Leiestershire, Englnd Keywords: Fult Tree Anlysis, Binry Deision Digrms Astrt Fult Tree Anlysis is ommonly used tehnique to predit the uses of speifi system filure mode nd to then determine the likelihood of this event. Over reent yers the Binry Deision Digrm (BDD) method hs een developed for the solution of the fult tree. It n e shown tht this pproh hs dvntges in terms of oth ury nd effiieny over the onventionl method of nlysis formulted in the 97 s. The BDD expresses the filure logi in disjoint form whih gives it n dvntge from the omputtionl viewpoint. Fult Trees, however, remin the etter wy to represent the system filure uslity. Therefore the usul wy of tking dvntge of the BDD struture is to onstrut fult tree nd then onvert this to BDD. It is on the fult tree onversion proess tht this pper will fous. In order to onstrut BDD the vriles whih represent the ourrene of the si events in the fult tree hve to e pled in n ordering. Depending on the ordering seleted n effiient representtion of the filure logi n e otined or if poor ordering is seleted less effiient nlysis will result. One the ordering is estlished one pproh is to utilise set of rules developed y Ruzy whih re repetedly pplied to generte the BDD. An lterntive pproh n e used wherey BDD onstruts for eh of the gte types re first formed nd then joined together s speified y the gtes in the fult tree. Some omments on the effetiveness of these pprohes will e provided. Introdution The inry deision digrm (BDD) method (ref. ) hs een developed s n lterntive to onventionl methods for performing qulittive nd quntittive nlysis of fult trees. This method ppers to e more effiient mens of nlysing system nd does not need to tke dvntge of the pproximtions used in the trditionl pproh of kineti tree theory (ref. 2). Rther thn nlysing the fult tree diretly the BDD method first onverts the fult tree to inry deision digrm, whih represents the Boolen eqution for the top event. However, prolems my our with the onversion proess of the fult tree to the BDD. If the ordering of the si events is not hosen suitly, the size of the finl BDD n grow exponentilly. It is not possile to identify n optimum sheme for produing BDDs for ll fult trees. In this pper n lterntive onversion method is presented where BDDs for eh of the gte types re formed nd then joined together ording to the type of the prent gte in the fult tree. The effetiveness of this pproh is ompred with Ruzy s method using different effiieny mesures, while working on the optimum onnetion tehnique. Binry Deision Digrms A BDD is direted yli grph, i.e. ll pths through the BDD re in one diretion nd no loops n exist. The BDD is omposed of terminl nd non-terminl verties (nodes) whih re onneted y rnhes. Terminl verties orrespond to the finl stte of the system, filure () or suess (), nd non-terminl verties orrespond to the si events of the fult tree. Eh non-terminl vertex hs rnh, whih represents si event ourrene, nd rnh, whih represents si event non-ourrene. The fult tree nd its equivlent BDD re presented in figure. The BDD enodes system filure logi funtion in disjoint form. Originlly pulished y the System Sfety Soiety, in the Proeedings of the 23rd Interntionl System Sfety Conferene, held t Sn Diego, USA, August 25

4 PROCEEDINGS OF THE 23rd INTERNATIONAL SYSTEM SAFETY CONFERENCE - 25 Top rnh root vertex rnh G G2 intermedite node terminl node ( + )( + ) = Top = + Figure Exmple of Binry Deision Digrm BDD Quntifition All pths through the digrm strt t the root vertex nd proeed to terminl vertex, whih mrks the end of the pth. Eh pth tht termintes in stte gives ut set of the fult tree, s tht prtiulr omintion of omponent filures whih, if they ll our, will result in system filure. Only verties tht lie on the rnhes of these pths re inluded in the ut sets. For exmple, in the BDD shown in figure there re two possile pths tht terminte in stte. These re:. 2.,, This gives the two orresponding ut sets:. {} 2. {, }. In this exmple the BDD is in its miniml form nd so genertes only miniml ut sets (ut sets with oth neessry nd suffiient elements). However, this is not lwys the se. In order to otin miniml ut sets the BDD hs to undergo minimistion proedure, introdued in referene, fter whih new BDD is reted tht enodes only the miniml ut sets of the fult tree. Sine pths through the BDD re disjoint (mutully exlusive), the proility of ourrene of the top event, Q SYS, n e expressed s the sum of the proilities of the disjoint pths through the BDD. Eh disjoint pth represents omintion of working nd filed omponents whih leds to system filure. Therefore, events lying on oth the nd rnhes re inluded in the proility lultion. The proility of system filure for the BDD shown in figure is: QSYS q + ( q ) qq = () Other proilisti properties of the system, suh s the unonditionl filure intensity nd omponent importne mesures, n lso e lulted (ref. 4).

5 PROCEEDINGS OF THE 23rd INTERNATIONAL SYSTEM SAFETY CONFERENCE - 25 BDD/FT Fetures Fult Tree Anlysis is the most widely used tool in system sfety nd reliility ssessment. This tehnique nlyses the usl reltionships etween omponent filures nd system filure. The fult tree itself provides visul representtion of engineering filure logi nd produes omplete desription of the uses of system filure. However, even for moderte sized prolems the lultion of miniml ut sets n e time onsuming tsk nd the system filure proility is lulted y pplying pproximtions. Rther thn nlysing the fult tree diretly the BDD method first onverts the fult tree to inry deision digrm. The BDDs re diffiult to onstrut diretly from the engineering system nd they do not provide ler doumenttion of the system filure uses. When the quntittive nlysis is performed, the BDD hs the dvntge tht, due to the struture of the logi eqution, ext proilities n e lulted. There re no requirements to lulte miniml ut sets s n intermedite phse. However, the qulittive nlysis of BDDs n e performed nd miniml ut sets otined (ref. 5). The BDD method hs een developed nd used to overome inury nd ineffiieny prolems with onventionl methods. It does however require n effetive method to onvert the fult tree struture into the BDD form. Two methods re now onsidered. Constrution method Ruzy A ommonly used method of onstruting BDDs ws developed y Ruzy (ref. ) nd proeeds y pplying n ifthen-else (ite) tehnique to eh of the gtes in the fult tree. The ite struture derives from the Shnnon s formul (ref. 3) suh tht if f ( x) is the Boolen eqution for the top event, then y pivoting out ny vrile X the Shnnon formul n e written s: ( x) Xf Xf2 f = + (2) where f nd f 2 re Boolen equtions, known s the residues of f, with X = nd X = respetively. The orresponding ite struture is ite( X, f, f2 ), whih mens tht if X fils then onsider f, else onsider f 2. Therefore, in the BDD struture f lies elow the rnh of the node enoding X nd f 2 lies elow the rnh. One vrile ordering hs een estlished, the following proedure n e implemented to onstrut the BDD. Let J nd H e two nodes in the BDD where J = ite( X, f, f2 ) nd G = ite( Y, g, g2 ).. if X < Y (i.e. X ppers efore Y in the vrile ordering) then J op > G = ite X, f < op > G f < op > G. (3) ( ) <, 2 2. if X = Y then J < op > G = ite X, f < op > g f < op > g. (4) ( ), 2 where < op > orresponds to Boolen opertion of the gtes in the fult tree. 2 An dvntge of the ite lgorithm is tht the method utomtilly uses su-node shring. This not only redues the omputer memory requirements, s eh ite struture is only stored one, ut it lso inreses the effiieny, sine one n ite struture hs een lulted the proess does not need to e repeted. The ite method n e demonstrted y n exmple in figure 2. The ordering < < d < represents simple top-down left-right trversl of the fult tree. Applying eqution 3 gives the expression for gtes G, G2 nd Top: G = + + d = ite = ite (,, ) + ite(,, ) + ite( d,, ) (,, ite(,, ite( d,, ))). (5)

6 PROCEEDINGS OF THE 23rd INTERNATIONAL SYSTEM SAFETY CONFERENCE - 25 G2 = + = ite Top = G G2 = ite (,, ite(,,) ). (,ite(,, ite(,,) ),ite(,, ite( d,ite(,,),))). (6) (7) Top G G2 d d Figure 2 BDD otined using the ite tehnique Constrution method 2 Component Connetion method The seond method onsidered (ref. 6) uses the oserved struture tht results when BDD is formed for n AND gte or n OR gte. In this wy BDDs re onstruted for fult trees initilly without onsidering when si events in the fult tree re duplited (repeted). The resulting BDD then undergoes simplifition to produe the finl struture for nlysis. This setion of the pper desries the onnetion nd simplifition rules, with some lterntive strtegies, for produing BDD for ny fult tree. The si event ordering, s required in Ruzy s method, does not neessrily need to e estlished euse the method n work without following ny predetermined ordering sheme for the whole system. However, efore the onstrution proess n e implemented seletion sheme hs to e speified whih will govern the wy in whih gte inputs, either si events or BDDs, re seleted nd omined. In the pproh presented gte inputs to ny prent gte re onsidered in left-right wy so tht this provides some ordering to onsider si events nd lso the BDD for sutree of the left-most gte is uilt efore onsidering the remining gte inputs. When ll BDDs, representing gte inputs of prent gte, hve een formed they re merged to otin the BDD of the prent gte. This ottom-up proess is over when the BDDs, representing gte inputs of the top-event, re omined. The following onnetion rules re used.. If two inputs in fult tree re inputs to n AND gte, their representing nodes on BDD re onneted to eh other through the rnh of the node. A similr sttement holds true for the OR gte, i.e. the nodes re onneted through the rnh. 2. If there re two BDDs, whih represent two gte inputs of prent gte, one of them is set to e the min BDD, ording to the rule of seletion. Then, ) If two BDDs re inputs to n AND gte, the seondry BDD is onneted to every terminl node of the min BDD. ) If two BDDs re inputs to n OR gte, the seondry BDD is onneted to every terminl node of the min BDD.

7 PROCEEDINGS OF THE 23rd INTERNATIONAL SYSTEM SAFETY CONFERENCE - 25 After every onneting opertion we need to hek for the repetition of si events on ny pth through the BDD. If there is t lest one repeted event, two simplifition rules will e pplied:. Eh pth strting t the node tht represents the first ourrene of repeted event in pth, nd proeeding to terminl vertex, must e djusted in order to void the ontrditory sttes of the repeted event in the BDD. The node, tht represents the seond ourrene of the event, needs to e repled y the events elow it on either its working rnh or filed rnh depending on the omponent stte s speified y its first ourrene in the pth. For exmple, if we trverse the BDD strting with the rnh of node, the seond pperne of tht node should e repled y the BDD struture elow the rnh of this seond node for onsisteny. 2. If the stte of the system is the sme regrdless of the si event ourrene or non-ourrene, the insignifint vertex must e removed. In other words, if the BDD strutures elow oth rnhes of the node re the sme, the node is irrelevnt nd needs to e repled y the struture elow either one of the rnhes. To demonstrte this method it hs een pplied to the fult tree illustrted in figure 2. The resulting proess is presented in figure 3. In this exmple the seletion sheme used is tht when omining BDDs representing inputs for ny gtes they re onsidered in left-right mnner nd the left-most BDD is set to e the min BDD to whih the other is joined. A left-right vrile ordering for every gte in fult tree is lso dopted nd the fult tree trversed in ottom-up mnner. First of ll, gtes G nd G2 re onstruted, shown in figure 3(i) nd figure 3(ii) respetively, uilding two BDDs, whih re oth OR hins. Then the top event ( AND gte) is onsidered. The left-most BDD (figure 3(i)) is seleted s the min BDD. Then the BDD, illustrted in figure 3(ii), is onneted to every ville rnh of the min BDD. The resulting BDD is presented in figure 3(iii). Finlly, the simplifition rules re pplied. The repeted event is removed from the pth F-F2-F6-F7 repling node F6 y the terminl node, sine the pth trverses the rnh of node F2, the first ourrene of the repeted event. In the sme wy the repeted event is removed from the pth F-F2-F3-F8-F9, repling node F8 y diret onnetion to node F9. The finl BDD is shown in figure 3(iv). No system-wide vrile ordering ws expliitly presented in this exmple, i.e. si events were onneted ording to the order tht they pper in the list of gte inputs. However, it is possile to pply defined ordering sheme for the nodes whih will e used in the onstrution method. In forming the BDD of prent gte the BDDs of its input events re merged together, one t time. In this exmple BDDs were seleted ording to the order tht gte inputs re listed, i.e. the BDD, presenting the left-most gte, is set to e the min BDD. Other seletion shemes n e used whih will, to some degree, ffet the effiieny of the proess. For exmple, BDDs n e ordered ording to the position of their root vertex in n ordering sheme defined for the si events or to minimise the numer of ville rnhes where onnetions will e mde. The effiieny of different strtegies n e nlysed ompring the numer of nodes in the finl BDD nd the proessing time. Both qulittive nd quntittive nlysis n e rried out on BDDs s in the first method. However, this method does not use su-node shring, therefore, there re some prts in the struture tht re identil. This might led to the ineffiient memory usge. For exmple, in figure 3(iv) there re two identil nodes F5 nd F9, whih re not duplited in Ruzy s method.

8 PROCEEDINGS OF THE 23rd INTERNATIONAL SYSTEM SAFETY CONFERENCE - 25 G: F G2: F4 F2 F5 d F3 (ii) F (i) F F4 F4 F2 F5 F6 F2 F5 d F3 F9 (iii) F7 d F3 F8 F9 (iv) Figure 3 BDD otined using the Component Connetion method Comprison of methods The performne of method for fult tree onversion to the BDD form will e dependent upon the struture of the fult tree. An indition of the merit of method n only e guged over lrge rnge of prolems. As omprison etween the two BDD onstrution methods presented they hve oth een pplied to lirry of 2 fult trees. The hrteristis of test fult trees re summrised in tle. The first olumn is lel to identify the exmple fult tree, then the next three olumns present the omplexity of fult tree in terms of the numer of gtes, the numer of si events nd the numer of repeted events. The lst olumn presents the numer of miniml ut sets. For eh of the two methods, wht re onsidered s effetive vrile ordering shemes nd gte omintions input seletion shemes hve een used. The vrile ordering tht ws pplied for si events is the modified top-down left-right pproh (ref. 7).

9 PROCEEDINGS OF THE 23rd INTERNATIONAL SYSTEM SAFETY CONFERENCE - 25 Numer of Numer of Numer of test FT gtes si events Numer of repeted events Numer of ut sets Tle Complexity of test fult trees The mesurements tht were hosen for the omprison of the two methods re the numer of nodes in the finl BDD nd the proessing time. The results otined y pplying the two methods to the fult trees in the lirry re shown in tle 2. Numer of test FT Numer of nodes Method Method 2 Method s frtion of Method 2 (%) Proessing time Method Method 2 Method s frtion of Method 2 (%) Tle 2 Comprison of two onstrution methods y the numer of nodes nd the proessing time The first onstrution method resulted in smller BDDs for ll the exmple fult trees. The proessing time ws lso shorter for lmost ll exmple fult trees, exept two exmples, (6) nd (7). Therefore, Ruzy s method hs ig dvntge over the Component Connetion method. This is due t lest prtly to its pility to use su-node shring. Conlusions This pper presents two lterntive tehniques y whih fult trees re onverted to BDDs. The first method is Ruzy s ite method, the seond is the Component Connetion method. Exmple fult trees hve een used nd the results for oth methods ompred. Proessing time nd numer of nodes were used s effiieny mesures while

10 PROCEEDINGS OF THE 23rd INTERNATIONAL SYSTEM SAFETY CONFERENCE - 25 working on wht were onsidered effiient onnetion tehniques for oth methods. It hs een shown tht the Component Connetion pproh hs high demnd for memory spe sine the identil prts in the BDD struture re repeted ut not shred. It is shown tht s generl fult tree to BDD onversion tehnique the method proposed y Ruzy performs est. If the Component Connetion method is to ompete with Ruzy s method then it must e ple of inorporting su-node shring. Referenes. Antoine Ruzy, New Algorithms for Fult Tree Anlysis, Reliility Engineering nd System Sfety, no. 4 (993): W.E. Vesely, A Time Dependent Methodology for Fult Tree Evlution, Nuler Design nd Engineering, no. 3 (97): Rndle E. Brynt, Grph-Bsed Algorithms for Boolen Funtion Mnipultion, IEEE Trns. Computers C- 35, no. 8 (986): R.M. Sinnmon, J.D. Andrews, Improved Aury in Quntittive Fult Tree Anlysis, Qulity nd Reliility Engineering Interntionl, no. 3 (997): R.M. Sinnmon, J.D. Andrews, Improved Effiieny in Qulittive Fult Tree Anlysis, Qulity nd Reliility Engineering Interntionl, no. 3 (997): Yun-Shun Wy, Der-Yu Hsi, A simple omponent-onnetion method for uilding inry deision digrms enoding fult tree, Reliility Engineering nd System Sfety, no. 7 (2): Kren A. Rey, Effiient Fult Tree Anlysis Using Binry Deision Digrms, Dotorl Thesis, Loughorough University (22). Biogrphy John D. Andrews, Deprtment of Aeronutil nd Automotive Engineering, Loughorough University, Loughorough, Leiestershire, LE 3TU, UK, telephone +44 () , fsimile +44 () , e-mil J.D.Andrews@loro..uk John Andrews is Professor of Systems Reliility in the Deprtment of Aeronutil nd Automotive Engineering. He joined Loughorough University in 989 hving previously gined nine yers industril reserh experiene with British Gs. His urrent reserh interests onern the ssessment of the sfety nd risk of potentilly hzrdous industril tivities. This reserh hs een hevily supported y industril funding. Over reent yers grnts hve een seured from BAE Systems, MOD, Rolls-Roye, ExxonMoil nd Behtel. Professor Andrews hs over one hundred journl/onferene pulitions long with jointly uthored ook Reliility nd Risk Assessment whih is now in its seond edition. Rs Remenyte, Deprtment of Aeronutil nd Automotive Engineering, Loughorough University, Loughorough, Leiestershire, LE 3TU, UK, telephone +44 () , fsimile +44 () , e-mil R.Remenyte@loro..uk Rs Remenyte is urrently studying for PhD t Loughorough University, hving previously ttined msters degree with honours in mthemtis t Kuns University of Tehnology in Lithuni. During the ourse of these studies she ttended Loughorough University s prt of the Sortes\Ersmus exhnge progrm, ompleting two modules of n industril mthemtil modelling ourse. Her urrent reserh studies re undertken s prt of the Risk nd Reliility reserh group in the Aeronutil nd Automotive Engineering Deprtment of Loughorough University.

CS 241 Week 4 Tutorial Solutions

CS 241 Week 4 Tutorial Solutions CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it

More information

CMPUT101 Introduction to Computing - Summer 2002

CMPUT101 Introduction to Computing - Summer 2002 CMPUT Introdution to Computing - Summer 22 %XLOGLQJ&RPSXWHU&LUFXLWV Chpter 4.4 3XUSRVH We hve looked t so fr how to uild logi gtes from trnsistors. Next we will look t how to uild iruits from logi gtes,

More information

Lesson 4.4. Euler Circuits and Paths. Explore This

Lesson 4.4. Euler Circuits and Paths. Explore This Lesson 4.4 Euler Ciruits nd Pths Now tht you re fmilir with some of the onepts of grphs nd the wy grphs onvey onnetions nd reltionships, it s time to egin exploring how they n e used to model mny different

More information

[SYLWAN., 158(6)]. ISI

[SYLWAN., 158(6)]. ISI The proposl of Improved Inext Isomorphi Grph Algorithm to Detet Design Ptterns Afnn Slem B-Brhem, M. Rizwn Jmeel Qureshi Fulty of Computing nd Informtion Tehnology, King Adulziz University, Jeddh, SAUDI

More information

Paradigm 5. Data Structure. Suffix trees. What is a suffix tree? Suffix tree. Simple applications. Simple applications. Algorithms

Paradigm 5. Data Structure. Suffix trees. What is a suffix tree? Suffix tree. Simple applications. Simple applications. Algorithms Prdigm. Dt Struture Known exmples: link tble, hep, Our leture: suffix tree Will involve mortize method tht will be stressed shortly in this ourse Suffix trees Wht is suffix tree? Simple pplitions History

More information

Duality in linear interval equations

Duality in linear interval equations Aville online t http://ijim.sriu..ir Int. J. Industril Mthemtis Vol. 1, No. 1 (2009) 41-45 Dulity in liner intervl equtions M. Movhedin, S. Slhshour, S. Hji Ghsemi, S. Khezerloo, M. Khezerloo, S. M. Khorsny

More information

[Prakash* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Prakash* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 [Prksh* et l 58: ugust 6] ISSN: 77-9655 I Vlue: Impt Ftor: 6 IJESRT INTERNTIONL JOURNL OF ENGINEERING SIENES & RESERH TEHNOLOGY SOME PROPERTIES ND THEOREM ON FUZZY SU-TRIDENT DISTNE Prveen Prksh* M Geeth

More information

COMP108 Algorithmic Foundations

COMP108 Algorithmic Foundations Grph Theory Prudene Wong http://www.s.liv..uk/~pwong/tehing/omp108/201617 How to Mesure 4L? 3L 5L 3L ontiner & 5L ontiner (without mrk) infinite supply of wter You n pour wter from one ontiner to nother

More information

Introduction to Algebra

Introduction to Algebra INTRODUCTORY ALGEBRA Mini-Leture 1.1 Introdution to Alger Evlute lgeri expressions y sustitution. Trnslte phrses to lgeri expressions. 1. Evlute the expressions when =, =, nd = 6. ) d) 5 10. Trnslte eh

More information

Greedy Algorithm. Algorithm Fall Semester

Greedy Algorithm. Algorithm Fall Semester Greey Algorithm Algorithm 0 Fll Semester Optimiztion prolems An optimiztion prolem is one in whih you wnt to fin, not just solution, ut the est solution A greey lgorithm sometimes works well for optimiztion

More information

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved.

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved. Chpter 9 Greey Tehnique Copyright 2007 Person Aison-Wesley. All rights reserve. Greey Tehnique Construts solution to n optimiztion prolem piee y piee through sequene of hoies tht re: fesile lolly optiml

More information

A METHOD FOR CHARACTERIZATION OF THREE-PHASE UNBALANCED DIPS FROM RECORDED VOLTAGE WAVESHAPES

A METHOD FOR CHARACTERIZATION OF THREE-PHASE UNBALANCED DIPS FROM RECORDED VOLTAGE WAVESHAPES A METHOD FOR CHARACTERIZATION OF THREE-PHASE UNBALANCED DIPS FROM RECORDED OLTAGE WAESHAPES M.H.J. Bollen, L.D. Zhng Dept. Eletri Power Engineering Chlmers University of Tehnology, Gothenurg, Sweden Astrt:

More information

Midterm Exam CSC October 2001

Midterm Exam CSC October 2001 Midterm Exm CSC 173 23 Otoer 2001 Diretions This exm hs 8 questions, severl of whih hve suprts. Eh question indites its point vlue. The totl is 100 points. Questions 5() nd 6() re optionl; they re not

More information

V = set of vertices (vertex / node) E = set of edges (v, w) (v, w in V)

V = set of vertices (vertex / node) E = set of edges (v, w) (v, w in V) Definitions G = (V, E) V = set of verties (vertex / noe) E = set of eges (v, w) (v, w in V) (v, w) orere => irete grph (igrph) (v, w) non-orere => unirete grph igrph: w is jent to v if there is n ege from

More information

CS553 Lecture Introduction to Data-flow Analysis 1

CS553 Lecture Introduction to Data-flow Analysis 1 ! Ide Introdution to Dt-flow nlysis!lst Time! Implementing Mrk nd Sweep GC!Tody! Control flow grphs! Liveness nlysis! Register llotion CS553 Leture Introdution to Dt-flow Anlysis 1 Dt-flow Anlysis! Dt-flow

More information

Final Exam Review F 06 M 236 Be sure to look over all of your tests, as well as over the activities you did in the activity book

Final Exam Review F 06 M 236 Be sure to look over all of your tests, as well as over the activities you did in the activity book inl xm Review 06 M 236 e sure to loo over ll of your tests, s well s over the tivities you did in the tivity oo 1 1. ind the mesures of the numered ngles nd justify your wor. Line j is prllel to line.

More information

INTEGRATED WORKFLOW ART DIRECTOR

INTEGRATED WORKFLOW ART DIRECTOR ART DIRECTOR Progrm Resoures INTEGRATED WORKFLOW PROGRAM PLANNING PHASE In this workflow phse proess, you ollorte with the Progrm Mnger, the Projet Mnger, nd the Art Speilist/ Imge Led to updte the resoures

More information

FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE

FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE 1 M.JothiLkshmi, M.S., M.Phil. 2 C.Theeendr, M.S., M.Phil. 3 M.K.Pvithr,

More information

Lecture 8: Graph-theoretic problems (again)

Lecture 8: Graph-theoretic problems (again) COMP36111: Advned Algorithms I Leture 8: Grph-theoreti prolems (gin) In Prtt-Hrtmnn Room KB2.38: emil: iprtt@s.mn..uk 2017 18 Reding for this leture: Sipser: Chpter 7. A grph is pir G = (V, E), where V

More information

Parallelization Optimization of System-Level Specification

Parallelization Optimization of System-Level Specification Prlleliztion Optimiztion of System-Level Speifition Luki i niel. Gjski enter for Emedded omputer Systems University of liforni Irvine, 92697, US {li, gjski} @es.ui.edu strt This pper introdues the prlleliztion

More information

UTMC APPLICATION NOTE UT1553B BCRT TO INTERFACE PSEUDO-DUAL-PORT RAM ARCHITECTURE INTRODUCTION ARBITRATION DETAILS DESIGN SELECTIONS

UTMC APPLICATION NOTE UT1553B BCRT TO INTERFACE PSEUDO-DUAL-PORT RAM ARCHITECTURE INTRODUCTION ARBITRATION DETAILS DESIGN SELECTIONS UTMC APPLICATION NOTE UT1553B BCRT TO 80186 INTERFACE INTRODUCTION The UTMC UT1553B BCRT is monolithi CMOS integrte iruit tht provies omprehensive Bus Controller n Remote Terminl funtions for MIL-STD-

More information

Outline. Motivation Background ARCH. Experiment Additional usages for Input-Depth. Regular Expression Matching DPI over Compressed HTTP

Outline. Motivation Background ARCH. Experiment Additional usages for Input-Depth. Regular Expression Matching DPI over Compressed HTTP ARCH This work ws supported y: The Europen Reserh Counil, The Isreli Centers of Reserh Exellene, The Neptune Consortium, nd Ntionl Siene Foundtion wrd CNS-119748 Outline Motivtion Bkground Regulr Expression

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

McAfee Web Gateway

McAfee Web Gateway Relese Notes Revision C MAfee We Gtewy 7.6.2.11 Contents Aout this relese Enhnement Resolved issues Instlltion instrutions Known issues Additionl informtion Find produt doumenttion Aout this relese This

More information

CS 551 Computer Graphics. Hidden Surface Elimination. Z-Buffering. Basic idea: Hidden Surface Removal

CS 551 Computer Graphics. Hidden Surface Elimination. Z-Buffering. Basic idea: Hidden Surface Removal CS 55 Computer Grphis Hidden Surfe Removl Hidden Surfe Elimintion Ojet preision lgorithms: determine whih ojets re in front of others Uses the Pinter s lgorithm drw visile surfes from k (frthest) to front

More information

Error Numbers of the Standard Function Block

Error Numbers of the Standard Function Block A.2.2 Numers of the Stndrd Funtion Blok evlution The result of the logi opertion RLO is set if n error ours while the stndrd funtion lok is eing proessed. This llows you to rnh to your own error evlution

More information

6.045J/18.400J: Automata, Computability and Complexity. Quiz 2: Solutions. Please write your name in the upper corner of each page.

6.045J/18.400J: Automata, Computability and Complexity. Quiz 2: Solutions. Please write your name in the upper corner of each page. 6045J/18400J: Automt, Computbility nd Complexity Mrh 30, 2005 Quiz 2: Solutions Prof Nny Lynh Vinod Vikuntnthn Plese write your nme in the upper orner of eh pge Problem Sore 1 2 3 4 5 6 Totl Q2-1 Problem

More information

Honors Thesis: Investigating the Algebraic Properties of Cayley Digraphs

Honors Thesis: Investigating the Algebraic Properties of Cayley Digraphs Honors Thesis: Investigting the Algebri Properties of Cyley Digrphs Alexis Byers, Wittenberg University Mthemtis Deprtment April 30, 2014 This pper utilizes Grph Theory to gin insight into the lgebri struture

More information

10.2 Graph Terminology and Special Types of Graphs

10.2 Graph Terminology and Special Types of Graphs 10.2 Grph Terminology n Speil Types of Grphs Definition 1. Two verties u n v in n unirete grph G re lle jent (or neighors) in G iff u n v re enpoints of n ege e of G. Suh n ege e is lle inient with the

More information

CS453 INTRODUCTION TO DATAFLOW ANALYSIS

CS453 INTRODUCTION TO DATAFLOW ANALYSIS CS453 INTRODUCTION TO DATAFLOW ANALYSIS CS453 Leture Register llotion using liveness nlysis 1 Introdution to Dt-flow nlysis Lst Time Register llotion for expression trees nd lol nd prm vrs Tody Register

More information

Photovoltaic Panel Modelling Using a Stochastic Approach in MATLAB &Simulink

Photovoltaic Panel Modelling Using a Stochastic Approach in MATLAB &Simulink hotovolti nel Modelling Using Stohsti Approh in MATLAB &Simulink KAREL ZALATILEK, JAN LEUCHTER eprtment of Eletril Engineering University of efene Kouniov 65, 61 City of Brno CZECH REUBLIC krelzpltilek@unoz,

More information

Distance Computation between Non-convex Polyhedra at Short Range Based on Discrete Voronoi Regions

Distance Computation between Non-convex Polyhedra at Short Range Based on Discrete Voronoi Regions Distne Computtion etween Non-onvex Polyhedr t Short Rnge Bsed on Disrete Voronoi Regions Ktsuki Kwhi nd Hiroms Suzuki Deprtment of Preision Mhinery Engineering, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku,

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

Lecture 13: Graphs I: Breadth First Search

Lecture 13: Graphs I: Breadth First Search Leture 13 Grphs I: BFS 6.006 Fll 2011 Leture 13: Grphs I: Bredth First Serh Leture Overview Applitions of Grph Serh Grph Representtions Bredth-First Serh Rell: Grph G = (V, E) V = set of verties (ritrry

More information

Lecture 12 : Topological Spaces

Lecture 12 : Topological Spaces Leture 12 : Topologil Spes 1 Topologil Spes Topology generlizes notion of distne nd loseness et. Definition 1.1. A topology on set X is olletion T of susets of X hving the following properties. 1. nd X

More information

An Approach to Filter the Test Data for Killing Multiple Mutants in Different Locations

An Approach to Filter the Test Data for Killing Multiple Mutants in Different Locations Interntionl Journl of Computer Theory nd Engineering, Vol. 5, No. 2, April 2013 An Approh to Filter the Test Dt for Killing Multiple Mutnts in Different Lotions Ngendr Prtp Singh, Rishi Mishr, Silesh Tiwri,

More information

IMAGE COMPRESSION USING HIRARCHICAL LINEAR POLYNOMIAL CODING

IMAGE COMPRESSION USING HIRARCHICAL LINEAR POLYNOMIAL CODING Rsh Al-Tmimi et l, Interntionl Journl of Computer Siene nd Mobile Computing, Vol.4 Issue.1, Jnury- 015, pg. 11-119 Avilble Online t www.ijsm.om Interntionl Journl of Computer Siene nd Mobile Computing

More information

Geometrical reasoning 1

Geometrical reasoning 1 MODULE 5 Geometril resoning 1 OBJECTIVES This module is for study y n individul teher or group of tehers. It: looks t pprohes to developing pupils visulistion nd geometril resoning skills; onsiders progression

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Pattern Matching. Pattern Matching. Pattern Matching. Review of Regular Expressions

Pattern Matching. Pattern Matching. Pattern Matching. Review of Regular Expressions Pttern Mthing Pttern Mthing Some of these leture slides hve een dpted from: lgorithms in C, Roert Sedgewik. Gol. Generlize string serhing to inompletely speified ptterns. pplitions. Test if string or its

More information

LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION

LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION Overview LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION 4.4.1.0 Due to the omplex nture of this updte, plese fmilirize yourself with these instrutions nd then ontt RGB Spetrum Tehnil

More information

Width and Bounding Box of Imprecise Points

Width and Bounding Box of Imprecise Points Width nd Bounding Box of Impreise Points Vhideh Keikh Mrten Löffler Ali Mohdes Zhed Rhmti Astrt In this pper we study the following prolem: we re given set L = {l 1,..., l n } of prllel line segments,

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Priniples nd Prdigms Christoph Dorn Distriuted Systems Group, Vienn University of Tehnology.dorn@infosys.tuwien..t http://www.infosys.tuwien..t/stff/dorn Slides dpted from Mrten vn Steen,

More information

Can Pythagoras Swim?

Can Pythagoras Swim? Overview Ativity ID: 8939 Mth Conepts Mterils Students will investigte reltionships etween sides of right tringles to understnd the Pythgoren theorem nd then use it to solve prolems. Students will simplify

More information

Package Contents. Wireless-G USB Network Adapter with SpeedBooster USB Cable Setup CD-ROM with User Guide (English only) Quick Installation

Package Contents. Wireless-G USB Network Adapter with SpeedBooster USB Cable Setup CD-ROM with User Guide (English only) Quick Installation A Division of Ciso Systems, In. Pkge Contents Wireless-G USB Network Adpter with SpeedBooster USB Cle Setup CD-ROM with User Guide (English only) Quik Instlltion 2,4 GHz 802.11g Wireless Model No. Model

More information

Triple/Quadruple Patterning Layout Decomposition via Novel Linear Programming and Iterative Rounding

Triple/Quadruple Patterning Layout Decomposition via Novel Linear Programming and Iterative Rounding Triple/Qudruple Ptterning Lyout Deomposition vi Novel Liner Progrmming nd Itertive Rounding Yio Lin, Xioqing Xu, Bei Yu, Ross Bldik nd Dvid Z. Pn ECE Dept., University of Texs t Austin, Austin, TX USA

More information

Problem Final Exam Set 2 Solutions

Problem Final Exam Set 2 Solutions CSE 5 5 Algoritms nd nd Progrms Prolem Finl Exm Set Solutions Jontn Turner Exm - //05 0/8/0. (5 points) Suppose you re implementing grp lgoritm tt uses ep s one of its primry dt strutures. Te lgoritm does

More information

Type Checking. Roadmap (Where are we?) Last lecture Context-sensitive analysis. This lecture Type checking. Symbol tables

Type Checking. Roadmap (Where are we?) Last lecture Context-sensitive analysis. This lecture Type checking. Symbol tables Type Cheking Rodmp (Where re we?) Lst leture Contet-sensitie nlysis Motition Attriute grmmrs Ad ho Synt-direted trnsltion This leture Type heking Type systems Using synt direted trnsltion Symol tles Leil

More information

SMALL SIZE EDGE-FED SIERPINSKI CARPET MICROSTRIP PATCH ANTENNAS

SMALL SIZE EDGE-FED SIERPINSKI CARPET MICROSTRIP PATCH ANTENNAS Progress In Eletromgnetis Reserh C, Vol. 3, 195 22, 28 SMALL SIZE EDGE-FED SIERPINSKI CARPET MICROSTRIP PATCH ANTENNAS W.-L. Chen nd G.-M. Wng Rdr Engineering Deprtment Missile Institute of Air Fore Engineering

More information

MITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts. Introduction to Matroids and Applications. Srikumar Ramalingam

MITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts. Introduction to Matroids and Applications. Srikumar Ramalingam Cmrige, Msshusetts Introution to Mtrois n Applitions Srikumr Rmlingm MERL mm//yy Liner Alger (,0,0) (0,,0) Liner inepenene in vetors: v, v2,..., For ll non-trivil we hve s v s v n s, s2,..., s n 2v2...

More information

Comparison between nmos Pass Transistor logic style vs. CMOS Complementary Cells*

Comparison between nmos Pass Transistor logic style vs. CMOS Complementary Cells* Comprison etween nmos Pss Trnsistor logi style vs. CMOS Complementry Cells* Rkesh Mehrotr, Mssoud Pedrm Xunwei Wu Dept. of E.E.-Systems Dept. of Eletroni Eng. University of Southern Cliforni Hngzhou University

More information

COMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE

COMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE 24 th Interntionl Conferene on Eletriity Distriution Glsgow, 12-15 June 2017 Pper 0615 COMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE Mihel SANKUR Dniel ARNOLD Lun SCHECTOR

More information

4.3 Balanced Trees. let us assume that we can manipulate them conveniently and see how they can be put together to form trees.

4.3 Balanced Trees. let us assume that we can manipulate them conveniently and see how they can be put together to form trees. 428 T FOU 4.3 Blned Trees T BT GOIT IN T VIOU setion work well for wide vriety of pplitions, ut they hve poor worst-se performne. s we hve noted, files lredy in order, files in reverse order, files with

More information

Smart Output Field Installation for M-Series and L-Series Converter

Smart Output Field Installation for M-Series and L-Series Converter Smrt Output Field Instlltion for M-Series nd L-Series Converter Instlltion Proedure -- See setion 5.0, Instlltion Proedure 1. Open the Housing nd Prepre for Instlltion 2. Plug the Rion Cle into the Min

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

CS 340, Fall 2016 Sep 29th Exam 1 Note: in all questions, the special symbol ɛ (epsilon) is used to indicate the empty string.

CS 340, Fall 2016 Sep 29th Exam 1 Note: in all questions, the special symbol ɛ (epsilon) is used to indicate the empty string. CS 340, Fll 2016 Sep 29th Exm 1 Nme: Note: in ll questions, the speil symol ɛ (epsilon) is used to indite the empty string. Question 1. [10 points] Speify regulr expression tht genertes the lnguge over

More information

Minimal Memory Abstractions

Minimal Memory Abstractions Miniml Memory Astrtions (As implemented for BioWre Corp ) Nthn Sturtevnt University of Alert GAMES Group Ferury, 7 Tlk Overview Prt I: Building Astrtions Minimizing memory requirements Performnes mesures

More information

Distributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems

Distributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems Distriuted Systems Priniples nd Prdigms Mrten vn Steen VU Amsterdm, Dept. Computer Siene steen@s.vu.nl Chpter 11: Distriuted File Systems Version: Deemer 10, 2012 2 / 14 Distriuted File Systems Distriuted

More information

Internet Routing. IP Packet Format. IP Fragmentation & Reassembly. Principles of Internet Routing. Computer Networks 9/29/2014.

Internet Routing. IP Packet Format. IP Fragmentation & Reassembly. Principles of Internet Routing. Computer Networks 9/29/2014. omputer Networks 9/29/2014 IP Pket Formt Internet Routing Ki Shen IP protool version numer heder length (words) for qulity of servie mx numer remining hops (deremented t eh router) upper lyer protool to

More information

A Fast Delay Analysis Algorithm for The Hybrid Structured Clock Network

A Fast Delay Analysis Algorithm for The Hybrid Structured Clock Network A Fst Dely Anlysis Algorithm for The Hyrid Strutured Clok Network Yi Zou 1, Yii Ci 1,Qing Zhou 1,Xinlong Hong 1, Sheldon X.-D. Tn 2 1 Deprtment of Computer Siene nd Tehnology, Tsinghu University, Beijing,

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Quadrilateral and Tetrahedral Mesh Stripification Using 2-Factor Partitioning of the Dual Graph

Quadrilateral and Tetrahedral Mesh Stripification Using 2-Factor Partitioning of the Dual Graph The Visul omputer mnusript No. (will e inserted y the editor) Plo Diz-Gutierrez M. Gopi Qudrilterl nd Tetrhedrl Mesh Stripifition Using 2-Ftor Prtitioning of the Dul Grph strt In order to find 2-ftor of

More information

COMMON FRACTIONS. or a / b = a b. , a is called the numerator, and b is called the denominator.

COMMON FRACTIONS. or a / b = a b. , a is called the numerator, and b is called the denominator. COMMON FRACTIONS BASIC DEFINITIONS * A frtion is n inite ivision. or / * In the frtion is lle the numertor n is lle the enomintor. * The whole is seprte into "" equl prts n we re onsiering "" of those

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

Graphs with at most two trees in a forest building process

Graphs with at most two trees in a forest building process Grphs with t most two trees in forest uilding process rxiv:802.0533v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order,

More information

To access your mailbox from inside your organization. For assistance, call:

To access your mailbox from inside your organization. For assistance, call: 2001 Ative Voie, In. All rights reserved. First edition 2001. Proteted y one or more of the following United Sttes ptents:,070,2;,3,90;,88,0;,33,102;,8,0;,81,0;,2,7;,1,0;,90,88;,01,11. Additionl U.S. nd

More information

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of

More information

McAfee Network Security Platform

McAfee Network Security Platform Pssive Fil-Open Kit Quik Strt Guide Revision D MAfee Network Seurity Pltform MAfee Network Seurity Pltform IPS Sensors, when deployed in-line, route ll inoming trffi through designted port pir. However,

More information

Lesson6: Modeling the Web as a graph Unit5: Linear Algebra for graphs

Lesson6: Modeling the Web as a graph Unit5: Linear Algebra for graphs Lesson6: Modeling the We s grph Unit5: Liner Alger for grphs Rene Pikhrdt Introdution to We Siene Prt 2 Emerging We Properties Rene Pikhrdt Institute CC-BY-SA-3. for We Siene nd Tehnologies Modeling the

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

GENG2140 Modelling and Computer Analysis for Engineers

GENG2140 Modelling and Computer Analysis for Engineers GENG4 Moelling n Computer Anlysis or Engineers Letures 9 & : Gussin qurture Crete y Grn Romn Joles, PhD Shool o Mehnil Engineering, UWA GENG4 Content Deinition o Gussin qurture Computtion o weights n points

More information

Additional Measurement Algorithms in the Overhauser Magnetometer POS-1

Additional Measurement Algorithms in the Overhauser Magnetometer POS-1 Additionl Mesurement Algorithms in the Overhuser Mgnetometer POS-1 O.V. Denisov, A.Y. Denisov, V.A. Spunov (QM Lortory of Url Stte Tehnil University, Mir 19, Ekterinurg, 620002, Russi) J.L. Rsson (Royl

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

PPS: User Manual. Krishnendu Chatterjee, Martin Chmelik, Raghav Gupta, and Ayush Kanodia

PPS: User Manual. Krishnendu Chatterjee, Martin Chmelik, Raghav Gupta, and Ayush Kanodia PPS: User Mnul Krishnendu Chtterjee, Mrtin Chmelik, Rghv Gupt, nd Ayush Knodi IST Austri (Institute of Science nd Technology Austri), Klosterneuurg, Austri In this section we descrie the tool fetures,

More information

Compilers. Topic 4. The Symbol Table and Block Structure PART II. Mick O Donnell: Alfonso Ortega:

Compilers. Topic 4. The Symbol Table and Block Structure PART II. Mick O Donnell: Alfonso Ortega: Compilers Topi 4 The ol Tle nd Blok Struture PART II Mik O Donnell: mihel.odonnell@um.es Alfonso Orteg: lfonso.orteg@um.es Topi 2: Blok Struture 2 1 ol tles with lok strutures Blok Struture Progrmming

More information

Lexical Analysis: Constructing a Scanner from Regular Expressions

Lexical Analysis: Constructing a Scanner from Regular Expressions Lexicl Anlysis: Constructing Scnner from Regulr Expressions Gol Show how to construct FA to recognize ny RE This Lecture Convert RE to n nondeterministic finite utomton (NFA) Use Thompson s construction

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING

SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING Chpter 17 SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING Frnk Eihinger Institute for Progrm Strutures nd Dt Orgniztion (IPD) Universit-t Krlsruhe (TH), Germny eihinger@ipd.uk.de Klemens B-ohm Institute for

More information

12/9/14. CS151 Fall 20124Lecture (almost there) 12/6. Graphs. Seven Bridges of Königsberg. Leonard Euler

12/9/14. CS151 Fall 20124Lecture (almost there) 12/6. Graphs. Seven Bridges of Königsberg. Leonard Euler CS5 Fll 04Leture (lmost there) /6 Seven Bridges of Königserg Grphs Prof. Tny Berger-Wolf Leonrd Euler 707-783 Is it possile to wlk with route tht rosses eh ridge e Seven Bridges of Königserg Forget unimportnt

More information

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011 CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

Calculus Differentiation

Calculus Differentiation //007 Clulus Differentition Jeffrey Seguritn person in rowot miles from the nerest point on strit shoreline wishes to reh house 6 miles frther down the shore. The person n row t rte of mi/hr nd wlk t rte

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Towards Unifying Advances in Twig Join Algorithms

Towards Unifying Advances in Twig Join Algorithms Pro. 21st Austrlsin Dtse Conferene (ADC 2010), Brisne, Austrli Towrds Unifying Advnes in Twig Join Algorithms Nils Grimsmo Truls A. Bjørklund Deprtment of Computer nd Informtion Siene Norwegin University

More information

Table-driven look-ahead lexical analysis

Table-driven look-ahead lexical analysis Tle-riven look-he lexil nlysis WUU YANG Computer n Informtion Siene Deprtment Ntionl Chio-Tung University, HsinChu, Tiwn, R.O.C. Astrt. Moern progrmming lnguges use regulr expressions to efine vli tokens.

More information

The Network Layer: Routing in the Internet. The Network Layer: Routing & Addressing Outline

The Network Layer: Routing in the Internet. The Network Layer: Routing & Addressing Outline CPSC 852 Internetworking The Network Lyer: Routing in the Internet Mihele Weigle Deprtment of Computer Siene Clemson University mweigle@s.lemson.edu http://www.s.lemson.edu/~mweigle/ourses/ps852 1 The

More information

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop

More information

Marek A. Perkowski, Malgorzata Chrzanowska-Jeske, and Yang Xu, Portland State University. Portland, OR Abstract

Marek A. Perkowski, Malgorzata Chrzanowska-Jeske, and Yang Xu, Portland State University. Portland, OR Abstract LATTICE DIAGRAMS USING REEDMULLER LOGIC Mrek A. Perkowski, Mlgorzt ChrznowskJeske, nd Yng Xu, Deprtment of Eletril Engineering Portlnd Stte University Portlnd, OR 9727 Astrt Universl Akers Arrys (UAA)

More information

A decision support system prototype for fuzzy multiple objective optimization

A decision support system prototype for fuzzy multiple objective optimization EUSFLAT - LFA A eision support system prototype for fuzzy multiple ojetive optimiztion Fengjie Wu Jie Lu n Gungqun Zhng Fulty of Informtion Tehnology University of Tehnology Syney Austrli E-mil: {fengjiewjieluzhngg}@it.uts.eu.u

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

c s ha2 c s Half Adder Figure 2: Full Adder Block Diagram

c s ha2 c s Half Adder Figure 2: Full Adder Block Diagram Adder Tk: Implement 2-it dder uing 1-it full dder nd 1-it hlf dder omponent (Figure 1) tht re onneted together in top-level module. Derie oth omponent in VHDL. Prepre two implementtion where VHDL omponent

More information

Incremental Design Debugging in a Logic Synthesis Environment

Incremental Design Debugging in a Logic Synthesis Environment Inrementl Design Deugging in Logi Synthesis Environment Andres Veneris Jing Brndon Liu University of Toronto Freesle Semiondutors Dept ECE nd CS High Performne Tools Group Toronto, ON M5S 3G4 Austin, TX

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

Distance vector protocol

Distance vector protocol istne vetor protool Irene Finohi finohi@i.unirom.it Routing Routing protool Gol: etermine goo pth (sequene of routers) thru network from soure to Grph strtion for routing lgorithms: grph noes re routers

More information

Agilent G3314AA BioConfirm Software

Agilent G3314AA BioConfirm Software Agilent G3314AA BioConfirm Softwre Quik Strt Guide Use this guide to instll nd get strted with the BioConfirm softwre. Wht is BioConfirm Softwre? Agilent G3314AA BioConfirm Softwre lets you onfirm the

More information

High-speed architectures for binary-tree based stream ciphers: Leviathan case study

High-speed architectures for binary-tree based stream ciphers: Leviathan case study High-speed rhitetures for inry-tree sed strem iphers: Levithn se study Astrt Rel-time pplitions suh s streming medi nd voie require enryption lgorithms tht do not propgte errors nd support fst enryption

More information

Single-Layer Trunk Routing Using 45-Degree Lines within Critical Areas for PCB Routing

Single-Layer Trunk Routing Using 45-Degree Lines within Critical Areas for PCB Routing SASIMI 2010 Proeedings (R3-8) Single-Lyer Trunk Routing Using 45-Degree Lines within Critil Ares for PCB Routing Kyosuke SHINODA Yukihide KOHIRA Atsushi TAKAHASHI Tokyo Institute of Tehnology Dept. of

More information