Formal Semantics for PSL Modeling Layer and Application to the Verification of Transactional Models

Size: px
Start display at page:

Download "Formal Semantics for PSL Modeling Layer and Application to the Verification of Transactional Models"

Transcription

1 Forma Semantics for PSL Modeing Layer and Appication to the Verification of Transactiona Modes Luca FERRO, Laurence PIERRE TIMA (CNRS-GrenobeINP-UJF) 46 Av. Féix Viaet Grenobe cedex - France Emai: Luca.Ferro@imag.fr, Laurence.Pierre@imag.fr Abstract The IEEE standard PSL is now a commony accepted specification anguage for the Assertion-Based Verification (ABV) of compex systems. In addition to its Booean and Tempora ayers, it is syntacticay extended with the Modeing ayer that borrows the syntax of the HDL is which the PSL assertions are incuded, to manage auxiiary variabes. In this paper we propose a forma, operationa, semantics of PSL enriched with the Modeing ayer. Moreover we describe the impementation of this notion in our too for the dynamic ABV of SystemC TLM modes. Iustrative exampes are presented. I. INTRODUCTION Assertion-Based Verification (ABV) aims at guaranteeing that designs obey properties, usuay expressed under the form of ogico-tempora formuas (assertions) that capture the design intent [1], [2]. ABV aows to take advantage of advanced verification techniques and to benefit from a significant reduction in simuation debugging time [3]. The assertions can be checked using static (mode-checking) or dynamic (simuation-based) techniques. Languages ike the IEEE standards SVA [4] and PSL (Property Specification Language) [5] are typicay used to formaize them. The Booean ayer of PSL enabes to buid basic expressions commony used by the other ayers. The core of the anguage is the Tempora ayer, that gives the possibiity to describe compex tempora reations. The Modeing ayer is defined to augment what is possibe using PSL aone, in particuar it aows to manage auxiiary variabes (not present in the design) to express more eaborate properties. According to the anguage reference manua, the Booean and Modeing ayers borrow the syntax of the HDL is which the PSL assertions are incuded (for instance, we tak about VHDL or Veriog favors ), but no forma semantics is given for the Modeing ayer. However this feature can be very usefu in practice (e.g., for the expression of properties at the transactiona eve) and needs to be more ceary formaized. TLM (Transaction Leve Modeing) is distinctive of the SystemC anguage [6], which is in fact a ibrary of C++ casses for modeing circuits. TLM is much more abstract than RTL (Register Transfer Leve), it provides communication modes for compex data types between the components of the System on Chip (SoC). TLM is gaining acceptance, in particuar because the simuation of TLM modes is severa orders of magnitude faster, thus consideraby improving productivity in SoC design [7]. Therefore TLM specifications tend to become goden reference modes [8] and must be reiabe. In [9] we have presented a methodoogy that enabes the dynamic verification of tempora properties for TLM specifications: we check the vaidity of PSL assertions that express properties on communications i.e., properties associated with transactiona operations. A prototype too, caed ISIS, and experimenta resuts are featured in [10]. The contribution of this paper is twofod. First we propose a forma, operationa, semantics of PSL endowed with the Modeing ayer. Then we refine it to fit the transactiona eve, and we describe the impementation of this notion in our ISIS too. We depict its usefuness on some iustrative exampes. Deaing with additiona variabes is aso addressed for instance in [11], [12], but they mainy concentrate on the concept of oca variabes and the issues reated to their semantics in SVA. This context of SVA oca variabes is considered at the RT eve in [11], and the purpose is to generate hardware components for static verification. The use of oca variabes is aso addressed in [12]. The authors discuss the notion of scope of a variabe to overcome some drawbacks of the semantics of oca variabes in SVA, ike the fact that the union and intersection operators do not competey conform to the notions of set union and intersection. In this paper we focus on the notion of goba variabes. Since PSL [5] has not been given semantics for auxiiary variabes yet (neither goba nor oca), considering goba variabes (which is moreover the soe notion supported by the Modeing ayer) is a natura starting point. A. Overview of PSL II. FORMAL SEMANTICS The semantics of PSL properties [5] is defined with respect to finite or infinite execution traces, or words over the aphabet Σ=2 P {, } (P is a non-empty set of atomic propositions, and are such that, for every booean expression b, b and b). The ength of a trace v is denoted v, thei th evauation point over v is denoted v i 1, and v i.. indicates the suffix of v starting at v i. In this paper, we focus on properties of the Foundation Language (FL) cass of PSL, /DATE EDAA

2 which essentiay represents the inear tempora ogic. In the foowing, ϕ and ψ are FL formuas. Here is a short overview of the trace semantics as given in the anguage reference manua (see [5] for more detais): Booean expressions v = b v =0or v 0 b where is the satisfaction reation for booean expressions. Logica connectives v = ϕ v ϕ v = ϕ ψ v = ϕandv = ψ Next operator: the meaning of the next! operator is that the sub-property denoted by its operand shoud be verified from the next evauation point of the execution trace (the weak version next is simiar, except that the existence of a next evauation point is not mandatory): v = next! ϕ v > 1 and v 1.. = ϕ Strong Unti, unti! or U (cassicay, the weak unti operator unti does not impose the occurrence of ψ): v = [ϕuψ] k < v s.t. v k.. = ψand j <k,v j.. = ϕ As usua, the PSL formua aways ϕ means that ϕ must be verified on each evauation point of the trace. The strong next event! operator requires the satisfaction of ϕ the next time a booean expression b is verified: next event!(b)(ϕ) def = [ bub ϕ] B. Forma Semantics with the Modeing Layer The Modeing ayer aows to decare and give behavior to auxiiary signas and variabes. For the Veriog and VHDL favors, it consists of the synthesizabe subset of these anguages, whereas the SystemC favor consists of those decarations and statements which woud be ega in the context of the SystemC modue to which the PSL vunit is bound [13]. Due to the ack of forma framework, this ayer is sti rarey used and few exampes are avaiabe. Here is a very simpe exampe given in the Veriog favor: an additiona signa vaid_read_request is decared and receives the vaue of an expression evauated using signas of the design [13]. vunit modeing_exampe { wire vaid_read_request; assign vaid_read_request = read && read_en &&!busy; assert aways (vaid_read_request -> eventuay! data_vaid); } In this exampe, the additiona signa is used for the sake of readabiity but is not actuay mandatory. The Modeing ayer can aso be used to manage indispensabe new variabes (e.g., counters that sum vaues). Significant exampes wi be given in section IV. The reference manua does not give detais about the semantics of Modeing ayer constructs. It is commony admitted that the statements of the Modeing ayer shoud be evauated at each step of the evauation of the property. To give a forma semantics to an assertion ϕ augmented with a bock of statements m in the Modeing ayer, we have to formaize that the assignments of m perform side effects on variabes that can be used in the expression of ϕ. To that goa, we adopt an operationa semantics inspired from the one of [14], instead of a trace semantics ike the one given in section II-A. As in [14], we consider that the negation operator ony appears at the booean eve, which is coherent with the simpe subset of PSL used in the context of dynamic verification. In the foowing operationa rues, ϕ, ϕ, ψ and ψ denote FL formuas, b is a booean expression, DV denotes the set of a the variabes decared in the Modeing ayer, m is the bock of statements of the Modeing ayer, and ρ is the current environment (association of variabes of DV with their current vaues). ϕ m ρ is the interpretation of ϕ in which the variabes of DV are substituted by their vaues in ρ. Likein[14],a derivation is used: ϕ m ρ ϕ m ρ means that, in order to check if a word starting with the etter satisfies ϕ m ρ, one can check that ϕ m ρ is satisfied by the word without. Logica and (simiary for the ogica or): ϕ m ρ Next operators: ϕ m ρ ϕ ψ m ρ ψ m ρ ϕ ψ m ρ X!ϕ m ρ ϕ m ρ Xϕ m ρ ϕ m ρ ψ m ρ Unti operators (simiar rues for weak and strong versions): ϕ m ρ ϕuψ m ρ ϕ m ρ ψ m ρ ψ m ρ ψ (ϕ (ϕuψ)) m ρ Booean expressions: { b m T if ρ b ρ F otherwise where ρ b b [DV ρ(dv )] b [DV ρ(dv )] is b in which every identifier of DV has been substituted by its vaue in ρ. In these rues, ρ = m ρ which denotes the environment obtained after executing the statement bock m in the environment ρ and in the context of the atomic propositions of. In accordance with [14], iterativey appying these rues on aformuaφ over the etters of a word w, in an environment

3 ρ, is written φ w ρ where φ ɛ ρ = φ φ w ρ = φ w ρ where φ m ρ φ m ρ Then the satisfaction reation, with the initia environment ρ 0, is defined as foows: w φ ok(φ w ρ0 ) where ok cacuates whether a given formua has not been contradicted yet w.r.t. the sequence of etters that has aready been visited. We use the same function ok and we extend it simiary for weak and strong versions of the operators i.e., ok(f ) = fase ok(t ) = true ok(b) = true ok(ϕ ψ) = ok(ϕ) and ok(ψ) ok(ϕ ψ) = ok(ϕ) or ok(ψ) ok(xϕ) = true ok(x! ϕ) = true ok(ϕw ψ) = ok(ϕ) or ok(ψ) ok(ϕuψ) = ok(ϕ) or ok(ψ) Since the work of [14] ony considers weak operators, the notion of satisfaction above is sufficient. However PSL defines four eves of satisfaction for the dynamic verification context (where traces are finite); these eves are reevant as soon as strong operators are invoved. Hods and Hods strongy are two satisfaction reations (for simpe Hods, the property may not hod on any given extension of the trace). Both of them required that No bad states have been seen and A future obigations have been met. The Pending eve is defined as No bad states have been seen and Future obigations have not been met. Finay, Fais means A bad state has been seen. The ok function of [14] corresponds to the goa No bad states have been seen. Here we define a new function met that expresses the second goa A future obigations have been met. Combining the two functions enabes to define the Hods, Pending and Fais eves over the etters of a word w: Hods w,ρ0 (φ) = ok(φ w ρ0 ) and met(φ w ρ0 ) P ending w,ρ0 (φ) = ok(φ w ρ0 ) and met(φ w ρ0 ) Fais w,ρ0 (φ) = ok(φ w ρ0 ) The met function is defined as foows: met(f ) = true met(t ) = true met(b) = true met(ϕ ψ) = met(ϕ) and met(ψ) met(ϕ ψ) = (ok(ϕ) and met(ϕ)) or (ok(ψ) and met(ψ)) or met(ϕ) and met(ψ) met(xϕ) = true met(x! ϕ) = fase met(ϕw ψ) = true met(ϕuψ) = met(ϕ) and ok(ψ) and met(ψ) III. MODELING LAYER AND THE VERIFICATION OF TLM MODELS A. Overview of the Method and Too A method for the automatic construction of SystemC checkers (monitors) from PSL assertions, and for the observation of communication events, has been specified and impemented in a prototype too with a graphica user interface [9], [10]. The monitors are inked to the design under test through the observation mechanism, and it remains to run the SystemC simuator on this combination of modues. Any property vioation during simuation is reported by the monitors. The too now supports the decarations and statements of the Modeing ayer, on the basis of the semantics described in section II-B, sighty refined as expained in section III-C. Figure 1 gives a screenshot of the ISIS window that aows to capture the assertion. If decarations and statements of the Modeing ayer are present, they are interpreted according to the semantics: since the observation mechanism wi trigger an activation of the monitors at each step of the evauation of their assertions, we automaticay insert the Modeing ayer statements at the beginning of the monitoring functions (to evauate the expressions in the appropriate environment). Our monitors for strong operators are aso equipped with a pending output [9] that encodes the notions discussed in section II-B. The approaches proposed in [15], [16] and [17] concentrate on mode checking SystemC designs. Abstraction techniques are required to get tractabe modes, or ony imited (pieces of) designs can be processed. Simuation-oriented soutions are given in [18], [19] and [20]. With regard to these reated works, our methodoogy has the foowing main attractive features: the statements of the assertions can invove severa channes, and this group of channes can be heterogeneous (signas and TLM channes), it is reativey few intrusive in the SystemC code, which is augmented with mechanicay generated new casses, and undergoes few modifications in its decarative parts, it provides a high eve of automation: the monitors are automaticay generated, and the code is mechanicay instrumented with user-guidance through a GUI, it is highy efficient, both for the construction of the checkers and during instrumented simuation. Moreover, to our knowedge, none of the above-mentioned reated approaches offer soutions to support the Modeing ayer. Some commercia toos aso provide for introducing PSL assertions in SystemC designs. The too Cadence Incisive Unified Simuator supports TLM, but ony signas can be invoved in the assertions. Other toos ike Synopsys VCS ony accept RTL descriptions. B. Booean Layer - Conditions on the Communications At the synchronous RT eve, the observations that constitute the traces are made on the cock edges but here, observation points are reated to the communication actions [9].

4 Fig. 1. The ISIS Too - Capture of the Observed Communications and of the Assertions According to the PSL reference manua, the SystemC favor of the Booean ayer shoud aow the use of any SystemC booean expressions. Thus, atomic propositions are C++ booean expressions. We give the user the possibiity to use these atomic propositions to express conditions on the communications and, through the GUI, we aso give him the possibiity to seect the reevant communications for each property (see on the eft side of Figure 1). Being abe to identify the critica communication events in a given context is crucia. For instance, depending on his confidence in a channe, the user may prefer to activate the verifications when this channe is written or when it is read. From the set of seected communication operations, the too automaticay generates ad hoc booean functions, e.g., write_call() here for each seected channe/port, to check the occurrence of write actions. Hence f.write_call(), where f is an instance of one of those seected eements, can then be used in assertions to express the occurrence of a write action. More generay, name.fctname_call() denotes that the communication function fctname of the eement name has just been caed. We aso use name.fctname_call.p# to denote the parameter in position # of function fctname (0 is used for the return vaue). C. Modeing Layer and TLM At the transactiona eve, observations points are reated to the communication actions, and etters of the execution traces are more compex than at the RT eve. In particuar, they can invove the parameters of these communications. To take that aspect into consideration, we sighty modify the notion of etter: we consider that etters are no more made of atomic propositions, but rather made of pairs (id, vaue) where id can be the identifier of a variabe of the design or an identifier ike name.fctname_call.p# (see section III-B), and vaue is the corresponding current vaue. Moreover, such a vaue may be undefined at a given observation point if the corresponding communication action does not occur at that point. To take this aspect into account, we refine the previous semantics with the notion of undefined vaue (denoted ϑ beow). The operationa rue for booean expressions has to be modified accordingy. It becomes: b m ρ where ρ = m ρ and { T if ρ b F otherwise { fase if a pair (id, ϑ) Ib ρ b b otherwise I b is the set of identifiers present in the booean expression b, and b = b [DV ρ(dv )][Ib (I b )] denotes b in which a the identifiers of DV have been substituted by their vaue in ρ and a the identifiers of I b have been substituted by their vaue in. With regard to atomic propositions q, the origina PSL semantics states that q iff q [5]. It now becomes q iff q [DV ρ(dv )][Iq (I q)] = true. IV. APPLICATIONS AT THE TRANSACTIONAL LEVEL A. DMA Exampe Let us consider a simpe DMA exampe deivered with the first draft of the TLM 2.0 ibrary and pictured in Figure 2. A master programs the DMA through a memory-mapped router (which is a TLM communication channe) in order to perform transfers between two memories.

5 Fig. 2. DMA Exampe A property P1 of interest is: any time a source address is transferred to the DMA, a read access in the first memory eventuay occurs and the right address is used. The expression of this property requires the memorization of the address transferred to the DMA (which is the second parameter of the write operation), to be abe to check that this address is actuay used when the memory is read. To avoid atering the origina description, the Modeing ayer is mandatory. In the property beow, req_src_addr is the variabe that memorizes this vaue each time the source register of the DMA is overwritten (we reca that initiator_port.write_call.p2 denotes the second parameter of function write): // ---- Modeing ayer ---- int req_src_addr; int dma_src_reg = 0x4000+pv_dma::SRC_ADDR; if (initiator_port.write_call() && initiator_port.write_call.p1 == dma_src_reg) req_src_addr = initiator_port.write_call.p2; // ---- Assertion ---- //PROPERTY P1: assert ALWAYS ((initiator_port.write_call() && initiator_port.write_call.p1 == dma_src_reg) -> NEXT_EVENT!(mem1.read_CALL()) (mem1.read_call.p1 == req_src_addr)); Test coverage anaysis can aso easiy be performed by the introduction of counters in the Modeing ayer, for instance here to evauate the repartition of read/write operations in different sectors of the memories. For this exampe, we ran various simuations in which memory transfers are performed, data of ength 64 bytes are transferred (each atomic transfer carries 4 bytes i.e., 16 transfers are needed). For instance, the monitor for P1 is evauated 4.2 miion times (21 times for each transfer: 5 writings to the DMA + 16 read operations). In that case, the CPU time for simuation without monitoring is 4.97 seconds 1, and 5.54 seconds for the same simuation with the verification of property P1. It takes 6.14 seconds if we both perform the verification of P1 and check coverage. 1 On an Inte Core2 Duo (3 GHz) under Debian Linux, 2 GB memory B. Protoco over Fauty Channe This case study is a SystemC version of the protoco over fauty channe described in [21]. A sender sends messages to a receiver through a channe that can oose or dupicate messages. The receiver sends back acknowedgements through a simpe signa ackr; each acknowedgement is the number of the ast received message. Depending on the vaue of the acknowedgment signa, messages are re-emitted or not by the sender. According to [21], two properties are verified: we aways have ackr nb sent ackr+1, where ackr is the acknowegment sent by the receiver and nb sent is the number of the ast message sent by the sender (P2), the acknowegment sent by the receiver is aways equa to the ength of the actua data (number of different messages) it received (P3). Both of them require the Modeing ayer. These properties are stated as foows: int nb_sent = 0; if (ch.write_call()) nb_sent = (ch.write_call.p1).number; //PROPERTY P2: assert ALWAYS (ack.read_call() -> (ack.read_call.p0 <= nb_sent && nb_sent <= (ack.read_call.p0+1))) int nmsg = 0; int n; if (ch.read_call()) n = (ch.read_call.p1).number; if (n!= nmsg) nmsg++; // new message arrived //PROPERTY P3: assert ALWAYS (ack.read_call() -> (ack.read_call.p0 == nmsg)) In the simuations we reaized, the sender sends 4000 times a random number of messages (between 1 and 4000). The CPU time for simuation without monitoring is 8.97 seconds; seconds are needed for the same simuation with the verification of property P2, and seconds with the verification of property P3 (ony seconds are needed for the simuation with the verification of both properties together, because the observation time is factorized ). C. Motion-JPEG Patform Let us finish with a more eaborate exampe, a Motion-JPEG decoding patform described at the Transaction Accurate eve [22], see Figure 3. It embeds a configurabe number of processors (here we use one processor), a goba memory, a hardware semaphore RAM, and hardware terminas (TTY). The traffic generator takes its data from a MJPEG fie, and RAMDAC is the viewer. Among the properties that can be verified to check the reiabiity of the communication channe, the foowing one aso needs the Modeing ayer: the data that are written on the RAMDAC are exacty the ones that have been transmitted

6 Fig. 3. M-JPEG Patform [22] by the EU (P4). The expression of this property requires the memorization of the data that are transmitted by the EU, to be compared to the data written on the RAMDAC: unsigned int req_data; unsigned int written_data; if (eu.write_call()) req_data = eu.write_call.p2; if (rdac.write_call()) written_data = rdac.write_call.p2; //PROPERTY P4: assert ALWAYS (eu.write_call() -> NEXT_EVENT(rdac.write_CALL()) (req_data==written_data)); In this property, req_data is the variabe that memorizes the transmitted data; it is updated when eu executes its method write. For the sake of carity, we aso use the Modeing ayer to manage a variabe written_data that stores the data written on the RAMDAC. It is not mandatory because its vaue is checked at the same time it is known (a ca to the method write of the RAMDAC occurs), therefore rdac.write_call.p2 coud be used directy in the NEXT_EVENT expression. Simuations that correspond to 10 s of SystemC time require about s of CPU time without monitoring, and s with the verification of property P4. Finay it is worth mentioning that, for a the exampes, simuations have been performed with and without introducing bugs in the design. A the situations that ead to a vioation of the properties have been detected, the monitors are correct by construction. Using the soution deveoped in [23], we can aso produce test programs with a variety of nomina and corner cases. V. CONCLUSION The use of auxiiary variabes using the Modeing ayer of PSL is a crucia issue for the assertion-based verification of TLM specifications. To make it possibe, we have both given a forma semantics for PSL augmented with the Modeing ayer, and impemented an associated soution in our runtime verification too. The forma semantics goes beyond the transactiona eve and can be used in any context. This work is a first step towards improving our assertionbased verification technique at the transactiona eve. Supporting the notion of goba variabes is not sufficient in genera. For exampe, with the Motion-JPEG decoding patform, memorizing the written data into req_data each time new data are transmitted by the EU is sufficient here because the patform does not work for instance in a pipeined way. We are working on a soution for considering simutaneousy severa evauations of the assertion when severa data are processed concurrenty (using different, oca, variabes). REFERENCES [1] H. Foster, A. Kronik, and D. Lacey, Assertion-Based Design. Kuwer Academic Pub., [2] J. Horgan, Assertion Based Verification, EDACafe Weeky, weeky.php?articeid=209195, October [3] H. Foster, Appied Assertion-Based Verification: An Industry Perspective, Foundations and Trends in Eectronic Design Automation, vo. 3, no. 1, January [4] IEEE Std , IEEE Standard for System Veriog: Unified Hardware Design, Specification and Verification Language. IEEE, [5] IEEE Std , IEEE Standard for Property Specification Language (PSL). IEEE, [6] IEEE Std , IEEE Standard System C Language Reference Manua. IEEE, [7] W. Kingauf, M. Burton, R. Günze, and U. Goze, Why We Need Standards for Transaction-Leve Modeing, SOC Centra, Apri [8] R. Goering, Transaction modes offer new dea for EDA, EETimes, March [9] L. Pierre and L. Ferro, A Tractabe and Fast Method for Monitoring SystemC TLM Specifications, IEEE Transactions on Computers, vo. 57, no. 10, October [10] L. Ferro and L. Pierre, ISIS: Runtime Verification of TLM Patforms, in Proc. Forum on specification & Design Languages (FDL 09), September [11] J. Long and A. Seawright, Synthesizing SVA Loca Variabes for Forma Verification, in Proc. DAC 07, [12] C. Eisner and D. Fisman, Augmenting a reguar expression-based tempora ogic with oca variabes, in Proc. FMCAD 08, November [13], A Practica Introduction to PSL. Springer, [14] K. Caessen and J. Martensson, An Operationa Semantics for Weak PSL, in Proc. FMCAD 04, November [15] A. Habibi and S. Tahar, Design and Verification of SystemC Transaction Leve Modes, IEEE Transactions on VLSI Systems, vo. 14, no. 1, January [16] M. Moy, F. Maraninchi, and L. Maiet-Contoz, LusSy: an open too for the anaysis of systems-on-a-chip at the transaction eve, Design Automation for Embedded Systems, [17] D. Karsson, P. Ees, and Z. Peng, Forma Verification of SystemC Designs Using a Petri-Net Based Representation, in Proc. DATE 2006, [18] B. Niemann and C. Haubet, Assertion-Based Verification of Transaction Leve Modes, in Proc. ITG/GI/GMM Workshop, February [19] Y. Lahbib, Extension of Assertion-Based Verification Approaches for the Verification of SystemC SoC Modes, Ph.D. dissertation, University of Monastir (Tunisia), [20] W. Ecker, V. Esen, and M. Hu, Impementation of a Transaction Leve Assertion Framework in SystemC, in Proc. DATE 07, [21] K. Chandy and J. Misra, Parae Program Design: A Foundation. Addison-Wesey, [22] P. Gerin, X. Guérin, and F. Pétrot, Efficient impementation of native software simuation for MPSoC, in Proc. DATE 08, 2008, pp [23] L. Ferro, L. Pierre, Y. Ledru, and L. Du Bousquet, Generation of Test Programs for the Assertion-Based Verification of TLM Modes, in Proc. IEEE Internationa Design and Test Workshop (IDT 08), December This work is party supported by the French projects SFINCS (ANR) and SoCKET (FCE)

Dynamic Symbolic Execution of Distributed Concurrent Objects

Dynamic Symbolic Execution of Distributed Concurrent Objects Dynamic Symboic Execution of Distributed Concurrent Objects Andreas Griesmayer 1, Bernhard Aichernig 1,2, Einar Broch Johnsen 3, and Rudof Schatte 1,2 1 Internationa Institute for Software Technoogy, United

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

understood as processors that match AST patterns of the source language and translate them into patterns in the target language.

understood as processors that match AST patterns of the source language and translate them into patterns in the target language. A Basic Compier At a fundamenta eve compiers can be understood as processors that match AST patterns of the source anguage and transate them into patterns in the target anguage. Here we wi ook at a basic

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7 Functions Unit 6 Gaddis: 6.1-5,7-10,13,15-16 and 7.7 CS 1428 Spring 2018 Ji Seaman 6.1 Moduar Programming Moduar programming: breaking a program up into smaer, manageabe components (modues) Function: a

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Bottom-Up Parsing LR(1)

Bottom-Up Parsing LR(1) Bottom-Up Parsing LR(1) Previousy we have studied top-down or LL(1) parsing. The idea here was to start with the start symbo and keep expanding it unti the whoe input was read and matched. In bottom-up

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS

A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS Artificia Inteigence and Language Processing ]acques Cohen Editor A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS LESLIE LAMPORT Over the past few years, I have deveoped an approach to the forma specification

More information

C PTS 3.3, class 0.05 Three-phase Stationary Test System

C PTS 3.3, class 0.05 Three-phase Stationary Test System C PTS 3.3, cass 0.05 Three-phase Stationary Test System Three phase test system PTS 3.3 C The PTS 3.3 C portabe test system consists of an integrated three-phase current and votage source and a three-phase

More information

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina

More information

Outerjoins, Constraints, Triggers

Outerjoins, Constraints, Triggers Outerjoins, Constraints, Triggers Lecture #13 Autumn, 2001 Fa, 2001, LRX #13 Outerjoins, Constraints, Triggers HUST,Wuhan,China 358 Outerjoin R S = R S with danging tupes padded with nus and incuded in

More information

Enumeration of MSO Queries on Strings with Constant Delay and Logarithmic Updates

Enumeration of MSO Queries on Strings with Constant Delay and Logarithmic Updates Enumeration of MSO Queries on Strings with Constant Deay and Logarithmic Updates ABSTRACT Matthias Niewerth University of Bayreuth We consider the enumeration of MSO queries over strings under updates.

More information

Automatic Program Inversion using Symbolic Transducers

Automatic Program Inversion using Symbolic Transducers Automatic Program Inversion using Symboic Transducers Qinheping Hu University of Wisconsin-Madison qhu8@wisc.edu Loris D Antoni University of Wisconsin-Madison oris@cs.wisc.edu Abstract We propose a fuy-automated

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals

A Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation

More information

Infinity Connect Web App Customization Guide

Infinity Connect Web App Customization Guide Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded

More information

An Optimizing Compiler

An Optimizing Compiler An Optimizing Compier The big difference between interpreters and compiers is that compiers have the abiity to think about how to transate a source program into target code in the most effective way. Usuay

More information

May 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home]

May 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home] "Using Python": a Book Preview May 13, 1995 Mark Lutz Bouder, Coorado utz@kapre.com (303) 546-8848 [work] (303) 684-9565 [home] Introduction. This paper is a brief overview of the upcoming Python O'Reiy

More information

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.

More information

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Synchronization: Semaphore

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Synchronization: Semaphore CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Synchronization: Synchronization Needs Two synchronization needs Mutua excusion Whenever mutipe threads access a shared data, you need to worry

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement Internationa Laboratory Accreditation Cooperation The ILAC Mutua Recognition Arrangement Enhancing the acceptance of products and services across nationa borders Removing barriers to goba trade Accreditation

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

From i* to istar 2.0: An Evolving Social Modelling Language

From i* to istar 2.0: An Evolving Social Modelling Language From i* to istar 2.0: An Evoving Socia Modeing Language Lin Liu 1 Schoo of Software, Tsinghua University, Beijing, 100084, China iniu@tsinghua.edu.cn Abstract. Conceptua Modeing, as a thought too, heps

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration IrDA IrLAP Throughput Optimisation with Physica Layer onsideration Abstract Barker, P. & Boucouvaas, A.. Mutimedia ommunications Research Group Schoo of Design, Engineering & omputing Bournemouth University,

More information

(12) United States Patent

(12) United States Patent US006697794B1 (12) United States Patent (10) Patent N0.: Miby (45) Date of Patent: Feb. 24, 2004 (54) PROVDNG DATABASE SYSTEM NATVE 6,285,996 B1 * 9/2001 Jou et a1...... 707/2 OPERATONS FOR USER DEFNED

More information

Chapter 5 Combinational ATPG

Chapter 5 Combinational ATPG Chapter 5 Combinationa ATPG 2 Outine Introduction to ATPG ATPG for Combinationa Circuits Advanced ATPG Techniques 3 Input and Output of an ATPG ATPG (Automatic Test Pattern Generation) Generate a set of

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Industrial Process Control Trainers with Discovery software PROCON PROCESS CONTROL TRAINERS

Industrial Process Control Trainers with Discovery software PROCON PROCESS CONTROL TRAINERS SYSTEMS Edition 1 I 38S-1 PROCON PROCESS CONTROL TRAINERS Industria Process Contro Trainers with Discovery software Leve & Fow Contro Temperature Contro Pressure Contro SYSTEMS-1 1 Temperature Rig 38-600

More information

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code A Top-to-Bottom View: Energy Anaysis for Mobie Appication Source Code Xueiang Li John P. Gaagher Roskide University Emai: {xueiang, jpg}@ruc.dk arxiv:1510.04165v1 [cs.oh] 14 Oct 2015 Abstract Energy efficiency

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Lecture 4: Threads Announcement Project 0 Due Project 1 out Homework 1 due on Thursday Submit it to Gradescope onine 2 Processes Reca that

More information

Straight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4.

Straight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4. If/ese & switch Unit 3 Sections 4.1-6, 4.8-12, 4.14-15 CS 1428 Spring 2018 Ji Seaman Straight-ine code (or IPO: Input-Process-Output) So far a of our programs have foowed this basic format: Input some

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

AgreeYa Solutions. Site Administrator for SharePoint User Guide

AgreeYa Solutions. Site Administrator for SharePoint User Guide AgreeYa Soutions Site Administrator for SharePoint 5.2.4 User Guide 2017 2017 AgreeYa Soutions Inc. A rights reserved. This product is protected by U.S. and internationa copyright and inteectua property

More information

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator Pneumo-Mechanica Simuation of a 2 Dof Panar Manipuator Hermes GIBERTI, Simone CINQUEMANI Mechanica Engineering Department, Poitecnico di Miano, Campus Bovisa Sud, via La Masa 34, 2156, Miano, Itay ABSTRACT

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Bisimulation Reduction of Big Graphs on MapReduce

Bisimulation Reduction of Big Graphs on MapReduce Bisimuation Reduction of Big Graphs on MapReduce Yongming Luo 1 Yannick de Lange 1 George Fetcher 1 Pau De Bra 1 Jan Hidders 2 Yuqing Wu 3 1 Eindhoven University of Technoogy, The Netherands 2 Deft University

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1 Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Analysis of Random. Processes via And-Or Tree Evaluation. Michael Mitzenmachert M. Amin Shokrollahiz

Analysis of Random. Processes via And-Or Tree Evaluation. Michael Mitzenmachert M. Amin Shokrollahiz Anaysis of Random Processes via And-Or Tree Evauation Michae G. Luby* Michae Mitzenmachert M. Amin Shokroahiz Abstract distributions not considered by previous anayses. We introduce a new set of probabiistic

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Realization of GGF DAIS Data Service Interface for Grid Access to Data Streams

Realization of GGF DAIS Data Service Interface for Grid Access to Data Streams Reaization of GGF DAIS Data Interface for Grid Access to Data Streams Ying Liu, Beth Pae, Nithya Vijayakumar Indiana University Boomington, IN IU-CS TR 613 ABSTRACT As the computation power of hardware

More information

Quality Driven Web Services Composition

Quality Driven Web Services Composition Quaity Driven Web Services Composition Liangzhao Zeng University of New South Waes Sydney, Austraia zzhao@cseunsweduau Jayant Kaagnanam IBM TJ Watson Research Center New York, USA ayant@usibmcom Bouaem

More information

Chapter 5: Transactions in Federated Databases

Chapter 5: Transactions in Federated Databases Federated Databases Chapter 5: in Federated Databases Saes R&D Human Resources Kemens Böhm Distributed Data Management: in Federated Databases 1 Kemens Böhm Distributed Data Management: in Federated Databases

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

Concurrent programming: From theory to practice. Concurrent Algorithms 2016 Tudor David

Concurrent programming: From theory to practice. Concurrent Algorithms 2016 Tudor David oncurrent programming: From theory to practice oncurrent Agorithms 2016 Tudor David From theory to practice Theoretica (design) Practica (design) Practica (impementation) 2 From theory to practice Theoretica

More information

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node

More information

Insert the power cord into the AC input socket of your projector, as shown in Figure 1. Connect the other end of the power cord to an AC outlet.

Insert the power cord into the AC input socket of your projector, as shown in Figure 1. Connect the other end of the power cord to an AC outlet. Getting Started This chapter wi expain the set-up and connection procedures for your projector, incuding information pertaining to basic adjustments and interfacing with periphera equipment. Powering Up

More information

lnput/output (I/O) AND INTERFACING

lnput/output (I/O) AND INTERFACING CHAPTER 7 NPUT/OUTPUT (I/O) AND INTERFACING INTRODUCTION The input/output section, under the contro of the CPU s contro section, aows the computer to communicate with and/or contro other computers, periphera

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

Genetic Algorithms for Parallel Code Optimization

Genetic Algorithms for Parallel Code Optimization Genetic Agorithms for Parae Code Optimization Ender Özcan Dept. of Computer Engineering Yeditepe University Kayışdağı, İstanbu, Turkey Emai: eozcan@cse.yeditepe.edu.tr Abstract- Determining the optimum

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information