13.1 DECISION ANALYSIS WITH DECISION TREES AND TABLES (CONDITION-ACTION ANALYSIS)
|
|
- Miranda Cunningham
- 6 years ago
- Views:
Transcription
1 Obligatory Reading Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie alzert, Kapitel über Entscheidungstabellen Ghezzi 6.3 Decision-table based testing Pfleeger 4.4, 5.6 3) (ondition-action and Event-ondition-Action Analysis) Prof. Dr. U. Aßmann Technische Universität Dresden Institut für Software- und Multimediatechnik Gruppe Softwaretechnologie Version -.2, Structured decisions: decision diagrams and decision tables) 2. inary decision diagrams (DD) And Ordered DD 3. Event-ondition Action Design 4. Model hecking 2 Goal Event-condition-action- (EA-)based design relies on condition analysis Understand how to describe the control-flow of methods and procedures by decision analysis Understand that several views on a decision tree exist (tables, DD, ODD) Understand that model checking is a technology with future ondition-action-analysis can also be employed for requirements analysis 3. DEISION ANALYSIS WITH DEISION TREES AND TALES (ONDITION-ATION ANALYSIS) 3 4
2 A House-Selling Expert System (ondition-action Analysis) Ok, I do not like bungalows, but my wife does not like that the car stands in free space in winter. Hmm... I rather would like to have the half double house... ut we need anyway 2 floors, because I need this space for my hobbies. My wife also would like a garden. Is necessary when complex, intertwined decisions should be made that should result in actions Decision trees and tables collect actions based on conditions A simple form of event-condition-action (EA) rules However, without events, only conditions How does the system analyze the customers requirements and derive appropriate proposals? Which conditions provoke which actions? 5 6 Decision Trees Decision Trees with ode Actions Decisions can be analyzed with a decision tree A trie (Präfixbaum) is a tree which has an edge marking Every path in the trie assembles a word from a language of the marking A trie on l = {,} is called decision tree Paths denote sequences of decisions (a set of vectors over l). A path corresponds to a vector over l A set of actions, each for one sequence of decisions Sequences of decisions can be represented in a path in the decision tree A A2 A3 A4 A5 The action may be code The inner nodes of same tree layer correspond to a condition E[i] Then, a Trie is isomorphic to an If-then- cascade if (E) then // case E === true if (E) then if(e2) then A5 A4 // case E === false if (E) then if(e2) then if (E3) then A3 A2 A A A2 A3 A4 A5 E E E2 E3 7 8
3 Decision Tables How to onstruct A Decision Table onditions and actions can be entered in a table ) Elaborate decisions oolean cross product 2) Elaborate actions 3) Enter into table 4) onstruct a cross boolean product as upper right quadrant (set of boolean vectors) Multiple choice quadrant 5) onstruct a multiple choice quadrant (lower right) by associating actions to boolean vectors 6) onsolidate E E oalesce yes/no to doesn t matter Introduce Else rule A A2 A A2 9 What Students Should Do to Professors After Exams ommon olumns an e Folded 2
4 Or Abbreviated to Else Action (onsolidated Decision Table) Applications of Decision Tables and Trees Deciding (decision management) omplex case distinctions (more than 2 decisions) ASE tools can generate code automatically Requirements analysis Describing the behavior of methods Describing business rules efore programming if-cascades, better make first a nice decision tree or table onfiguration management Decisions correspond here to configuration variants Processor=i486? System=linux? Same application as #ifdefs in preprocessor Formal design methods 3 4 Truth Tables oolean decision tables are truth tables ondition E Yes Yes No No ondition E Yes No Yes No Value of F = X X Value of F = X X 3.2 NORMALIZING ONTROL FLOW WITH NORMALIZED DD E E F Yes Yes Yes No No Yes No No 5 6
5 DDs (inary Decision Diagrams) DDs (inary Decision Diagrams) Are dags that result by merging the same subtrees into one (common subtree elimination) If the action is just a boolean value boolean functions f: l n --> l can be represented The decisions E[i] are regarded as boolean variables E E E2 E3 E E E2 E3 A A2 A3 7 8 ODDs (Ordered inary Decision Diagrams) omplex DD Problem: for one boolean function there are many DD Idea: introduce a standardized order for the variables Result: orderd binary decision diagrams In all ODD holds for all children u of parents v ord(u) > ord(v). For one order of variables there is one normal form ODD (canonical ODD) Leads to efficient comparison algorithm of boolean functions: compareooleanfunction() = { Fix variable order for two DD Transform both DD into ODD ompare both ODD syntactically } 9 2
6 If-cascades, DD and ODD if A then if then if then true false if then false true if then if then false true if then true false A A A A Variable order is [A,,] 2 22 Normalizing Wild Procedures: Normalized If-Structures with ODD There is only one canonical ODD for one order Develop normalized and factorized if-structures with it:. Elaborate arbitrary decision tree 2. hoose a variable order 3. Transform to ODD 4. Transform to If structure 5. Factor out common subtrees by subprograms Reengineering Structuring of legacy procedures onfiguration management Development of canonical versions of preprocessor nestings Help to master large systems Applications 23 24
7 Event-ondition-Action Design Decision analysis is invoked when events occur Event-condition-action (EA) rules Which conditions provoke which actions, given some events? 3.3 EVENT-ONDITION- ATION ASED DESIGN (EA) EA An event-condition-action (EA) system listens on channel(s) for events, analyses a condition, and executes an action Statecharts, EA rules, Tür Petri Nets ondition analysis can be done by DD Verification by model checking öffnen() schließen() verriegeln() entriegeln() entriegeln(), schließen()/ beep() öffnen(), verriegeln(), entriegeln()/ - öffnen()/ - geschlosse n offen <<Steuerungsmachine>> verriegel n/ amp.rote slichtan () entriegel n/ amp.grün eslichta n() schließe n/ amp.gelb eslichta n() abgesperrt öffnen, schließen, verriegeln / MODEL HEKING LARGE STATE SPAES 27 28
8 Representation of Mathematical Structures in DD and ODD Model hecking on DD Several mathematical data types can be represented with DD/ ODD: Sets, partial orders and lattices (e.g., in Z, VDM, SETL) Represent subsets of a set in the powerset lattice of the set Map the powerset lattice to a boolean algebra (theorem of Stone) Use a DD to encode the sets Uniform efficient representation in space and time Functions over finite domains of size n Associate to every element a vector from l k, where k = ld n ode sets with sets of such vectors Map again to boolean algebra Relations and graphs (also state machines) Interprete the elements of the relation (the edges) as sets of ordered k- tuples Represent as in the case of sets DD and ODD are very compact representation for state machines, boolean functions, and predicate logic (modal logic) uild a basis for checking state transition systems with modal logic (model checking) System is modeled as a state transition system and encoded as ODD Features of the system (predicates, logic formulas) are encoded as ODD, too Then, a model checker compares the ODDs and checks whether a feature holds in a state Effectively, the model checker only compares normalized representations of boolean functions, the ODD 29 3 The Use of Model hecking The End: What Have We Learned State spaces up to 2**2 can be handled Model checking checks whether features hold in states of large state spaces Used in hardware verification Proving circuits correct Software verification Safety-critical systems Minimization of boolean circuits Very important technique for verification of safety-critical hard- and software Decision analysis (ondition-action analysis) is an important analysis to describe requirements, to describe complex behavior of a procedure The control-flow of a procedure can be normalized with a DD and ODD onditions in large state spaces can be encoded in ODD and efficiently checked oolean functions, decision trees, relations, graphs, automata can be encoded in ODD 3 32
Transformational Design with
Fakultät Informatik, Institut für Software- und Multimediatechnik, Lehrstuhl für Softwaretechnologie Transformational Design with Model-Driven Architecture () Prof. Dr. U. Aßmann Technische Universität
More information23. Action-Oriented Design Methods
Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - Softwaretechnologie II 23. Action-Oriented Design Methods Prof. Dr. Uwe Aßmann Technische Universität
More information21) Functional and Modular Design
Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - 21) Functional and Modular Design Prof. Dr. U. Aßmann Technische Universität Dresden Institut für Software-
More information21) Functional and Modular Design
Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - 21) Functional and Modular Design Prof. Dr. U. Aßmann Technische Universität Dresden Institut für Software-
More informationAction-Oriented Design Methods
Action-Oriented Design Methods Prof. Dr. U. Aßmann Technische Universität Dresden Institut für Software- und Multimediatechnik Gruppe Softwaretechnologie http://www-st.inf.tu-dresden.de Softwaretechnologie
More informationAdvanced Object-Oriented Analysis Concepts
Advanced Object-Oriented Analysis Concepts Prof. Dr. U. Aßmann Technische Universität Dresden Institut für Software- und Multimediatechnik Gruppe Softwaretechnologie http://www-st.inf.tu-dresden.de Version
More information34. Interprocedural Program Analysis with PAG
34. Interprocedural Program Analysis with PAG Prof. Dr. rer. nat. Uwe Aßmann Institut für Software- und Multimediatechnik Lehrstuhl Softwaretechnologie Fakultät für Informatik TU Dresden http://st.inf.tu-dresden.de
More informationStatic Program Analysis
Static Program Analysis Lecture 1: Introduction to Program Analysis Thomas Noll Lehrstuhl für Informatik 2 (Software Modeling and Verification) noll@cs.rwth-aachen.de http://moves.rwth-aachen.de/teaching/ws-1415/spa/
More information1. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which:
P R O B L E M S Finite Autom ata. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which: a) Are a multiple of three in length. b) End with the string
More informationOverview. Discrete Event Systems - Verification of Finite Automata. What can finite automata be used for? What can finite automata be used for?
Computer Engineering and Networks Overview Discrete Event Systems - Verification of Finite Automata Lothar Thiele Introduction Binary Decision Diagrams Representation of Boolean Functions Comparing two
More informationPart II Black-Box Composition Systems 20. Finding UML Business Components in a Component-Based Development Process
Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - CBSE Part II Black-Box Composition Systems 20. Finding UML Business Components in a Component-Based Development
More informationSolutions to Problem Set 5
Massachusetts Institute of Technology 6.042J/18.062J, Fall 02: Mathematics for Computer Science Professor Albert Meyer and Dr. Radhika Nagpal Solutions to Problem Set 5 Problem 1. You are given two buckets,
More informationQualitätssicherung von Software (SWQS)
Qualitätssicherung von Software (SWQS) Prof. Dr. Holger Schlingloff Humboldt-Universität zu Berlin und Fraunhofer FOKUS 28.5.2013: Modellprüfung II - BDDs Folie 2 Existenzgründer gesucht! Folie 3 Fragen
More informationModel Checking I Binary Decision Diagrams
/42 Model Checking I Binary Decision Diagrams Edmund M. Clarke, Jr. School of Computer Science Carnegie Mellon University Pittsburgh, PA 523 2/42 Binary Decision Diagrams Ordered binary decision diagrams
More information9/19/12. Why Study Discrete Math? What is discrete? Sets (Rosen, Chapter 2) can be described by discrete math TOPICS
What is discrete? Sets (Rosen, Chapter 2) TOPICS Discrete math Set Definition Set Operations Tuples Consisting of distinct or unconnected elements, not continuous (calculus) Helps us in Computer Science
More information2. Modelling Dynamic Behavior with Petri Nets
Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - 2. Modelling Dynamic Behavior with Petri Nets Lecturer: Dr. Sebastian Götz Prof. Dr. U. Aßmann Technische
More informationCompiler Construction
Compiler Construction Lecture 2: Lexical Analysis I (Introduction) Thomas Noll Lehrstuhl für Informatik 2 (Software Modeling and Verification) noll@cs.rwth-aachen.de http://moves.rwth-aachen.de/teaching/ss-14/cc14/
More informationExercises on Semantics of Programming Languages
Technische Universität Wien SS 2014 Fakultät für Informatik Repetition sheet Assist. Prof. Florian Zuleger Tuesday, 8 April 2014 Assist. Prof. Georg Weissenbacher Univ. Prof. Agata Ciabattoni Moritz Sinn,
More information12. Finding Components with Metadata in Component Repositories
Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - CBSE 12. Finding Components with Metadata in Component Repositories Lecturer: Dr. Sebastian Götz Prof.
More informationContents. Chapter 1 SPECIFYING SYNTAX 1
Contents Chapter 1 SPECIFYING SYNTAX 1 1.1 GRAMMARS AND BNF 2 Context-Free Grammars 4 Context-Sensitive Grammars 8 Exercises 8 1.2 THE PROGRAMMING LANGUAGE WREN 10 Ambiguity 12 Context Constraints in Wren
More informationEECS 219C: Formal Methods Binary Decision Diagrams (BDDs) Sanjit A. Seshia EECS, UC Berkeley
EECS 219C: Formal Methods Binary Decision Diagrams (BDDs) Sanjit A. Seshia EECS, UC Berkeley Boolean Function Representations Syntactic: e.g.: CNF, DNF (SOP), Circuit Semantic: e.g.: Truth table, Binary
More informationLTCS Report. Concept Descriptions with Set Constraints and Cardinality Constraints. Franz Baader. LTCS-Report 17-02
Technische Universität Dresden Institute for Theoretical Computer Science Chair for Automata Theory LTCS Report Concept Descriptions with Set Constraints and Cardinality Constraints Franz Baader LTCS-Report
More informationFlat (Draft) Pasqualino Titto Assini 27 th of May 2016
Flat (Draft) Pasqualino Titto Assini (tittoassini@gmail.com) 27 th of May 206 Contents What is Flat?...................................... Design Goals...................................... Design Non-Goals...................................
More informationRelational Database: The Relational Data Model; Operations on Database Relations
Relational Database: The Relational Data Model; Operations on Database Relations Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Overview
More informationMotivation. CS389L: Automated Logical Reasoning. Lecture 5: Binary Decision Diagrams. Historical Context. Binary Decision Trees
Motivation CS389L: Automated Logical Reasoning Lecture 5: Binary Decision Diagrams Işıl Dillig Previous lectures: How to determine satisfiability of propositional formulas Sometimes need to efficiently
More informationCopyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley. Chapter 6 Outline. Unary Relational Operations: SELECT and
Chapter 6 The Relational Algebra and Relational Calculus Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 6 Outline Unary Relational Operations: SELECT and PROJECT Relational
More informationBoolean Representations and Combinatorial Equivalence
Chapter 2 Boolean Representations and Combinatorial Equivalence This chapter introduces different representations of Boolean functions. It then discusses the applications of these representations for proving
More informationFormal Verification Methods 2: Symbolic Simulation
Formal Verification Methods 2: Symbolic Simulation John Harrison Intel Corporation Marktoberdorf 2003 Thu 3st July 2003 (:25 2:0) 0 Summary Simulation Symbolic and ternary simulation BDDs Quaternary lattice
More informationProgram verification. Generalities about software Verification Model Checking. September 20, 2016
Program verification Generalities about software Verification Model Checking Laure Gonnord David Monniaux September 20, 2016 1 / 43 The teaching staff Laure Gonnord, associate professor, LIP laboratory,
More informationPropositional Calculus. CS 270: Mathematical Foundations of Computer Science Jeremy Johnson
Propositional Calculus CS 270: Mathematical Foundations of Computer Science Jeremy Johnson Propositional Calculus Objective: To provide students with the concepts and techniques from propositional calculus
More informationCS357 Lecture: BDD basics. David Dill
CS357 Lecture: BDD basics David Dill BDDs (Boolean/binary decision diagrams) BDDs are a very successful representation for Boolean functions. A BDD represents a Boolean function on variables x, x 2,...
More information10.1 Big Objects, Business Objects, and UML Components
II Black-Box Composition Systems 10. Finding Business s in a -Based Development Process Literature J. Cheesman, J. Daniels. UML s. Addison-Wesley. 1. The UML component model 2. Business component model
More informationSoftwarearchitekturen der Zukunft
Softwarearchitekturen der Zukunft Prof. Dr. Uwe Aßmann Technische Universität Dresden Institut für Software- und Multimediatechnologie 1 A Staged Architecture from Nature 2 3 Web Programming Considered
More informationObject-Oriented Development - Use-Case Realization Analysis
Object-Oriented Development - Use-Case Realization Analysis Prof. Dr. U. Aßmann Technische Universität Dresden Institut für Software- und Multimediatechnik Gruppe Softwaretechnologie http://www-st.inf.tu-dresden.de
More informationLogik für Informatiker Logic for computer scientists
Logik für Informatiker for computer scientists WiSe 2011/12 Overview Motivation Why is logic needed in computer science? The LPL book and software Scheinkriterien Why is logic needed in computer science?
More informationLecture 7 Logic Simplification
Lecture 7 Logic Simplification Simplification Using oolean lgebra simplified oolean expression uses the fewest gates possible to implement a given expression. +(+)+(+) Simplification Using oolean lgebra
More information1KOd17RMoURxjn2 CSE 20 DISCRETE MATH Fall
CSE 20 https://goo.gl/forms/1o 1KOd17RMoURxjn2 DISCRETE MATH Fall 2017 http://cseweb.ucsd.edu/classes/fa17/cse20-ab/ Today's learning goals Explain the steps in a proof by mathematical and/or structural
More informationCSC 501 Semantics of Programming Languages
CSC 501 Semantics of Programming Languages Subtitle: An Introduction to Formal Methods. Instructor: Dr. Lutz Hamel Email: hamel@cs.uri.edu Office: Tyler, Rm 251 Books There are no required books in this
More information31. ArchJava A Lightweight Java Extension for Architecture Provided and Required Ports and Services
Fakultät Informatik - Institut Software- und Multimediatechnik - Softwaretechnologie Prof. Aßmann - CBSE 31. ArchJava A Lightweight Java Extension for Architecture Provided and Required Ports and Services
More informationDynamic Logic David Harel, The Weizmann Institute Dexter Kozen, Cornell University Jerzy Tiuryn, University of Warsaw The MIT Press, Cambridge, Massac
Dynamic Logic David Harel, The Weizmann Institute Dexter Kozen, Cornell University Jerzy Tiuryn, University of Warsaw The MIT Press, Cambridge, Massachusetts, 2000 Among the many approaches to formal reasoning
More informationFunctional programming with Common Lisp
Functional programming with Common Lisp Dr. C. Constantinides Department of Computer Science and Software Engineering Concordia University Montreal, Canada August 11, 2016 1 / 81 Expressions and functions
More informationV Advanced Data Structures
V Advanced Data Structures B-Trees Fibonacci Heaps 18 B-Trees B-trees are similar to RBTs, but they are better at minimizing disk I/O operations Many database systems use B-trees, or variants of them,
More informationFoundations of Computer Science Spring Mathematical Preliminaries
Foundations of Computer Science Spring 2017 Equivalence Relation, Recursive Definition, and Mathematical Induction Mathematical Preliminaries Mohammad Ashiqur Rahman Department of Computer Science College
More informationResearch Collection. Formal background and algorithms. Other Conference Item. ETH Library. Author(s): Biere, Armin. Publication Date: 2001
Research Collection Other Conference Item Formal background and algorithms Author(s): Biere, Armin Publication Date: 2001 Permanent Link: https://doi.org/10.3929/ethz-a-004239730 Rights / License: In Copyright
More informationSymbolic Trajectory Evaluation - A Survey
Automated Verification Symbolic Trajectory Evaluation - A Survey by Mihaela Gheorghiu Department of Computer Science University of Toronto Instructor: Prof. Marsha Chechik January 3, 24 Motivation Simulation
More informationDetecting Logical Errors in SQL Queries
Detecting Logical Errors in SQL Queries Stefan Brass Christian Goldberg Martin-Luther-Universität Halle-Wittenberg, Institut für Informatik, Von-Seckendorff-Platz 1, D-06099 Halle (Saale), Germany (brass
More information52. Staged Software Architectures with Staged Composition
52. Staged Software Architectures with Staged Composition Prof. Dr. Uwe Aßmann Technische Universität Dresden Institut für Software- und Multimediatechnologie Version 14-1.0, 12.07.14 1) Web programming
More informationL4: Binary Decision Diagrams. Reading material
L4: Binary Decision Diagrams de Micheli pp. 75-85 Reading material R. Bryant, Graph-ased algorithms for Boolean function manipulation, IEEE Transactions on computers, C-35, No 8, August 1986; can e downloaded
More informationAn Evolution of Mathematical Tools
An Evolution of Mathematical Tools From Conceptualization to Formalization Here's what we do when we build a formal model (or do a computation): 0. Identify a collection of objects/events in the real world.
More informationFinite Model Generation for Isabelle/HOL Using a SAT Solver
Finite Model Generation for / Using a SAT Solver Tjark Weber webertj@in.tum.de Technische Universität München Winterhütte, März 2004 Finite Model Generation for / p.1/21 is a generic proof assistant: Highly
More information2B 52 AB CA 3E A1 +29 A B C. CS120 Fall 2018 Final Prep and super secret quiz 9
S2 Fall 28 Final Prep and super secret quiz 9 ) onvert 8-bit (2-digit) 2 s complement hex values: 4-29 inary: Hex: x29 2) onvert 8-bit 2 s complement hex to decimal: x3 inary: xe5 Decimal: 58 Note 3*6+
More informationFormal Verification. Lecture 7: Introduction to Binary Decision Diagrams (BDDs)
Formal Verification Lecture 7: Introduction to Binary Decision Diagrams (BDDs) Jacques Fleuriot jdf@inf.ac.uk Diagrams from Huth & Ryan, 2nd Ed. Recap Previously: CTL and LTL Model Checking algorithms
More informationModel checking pushdown systems
Model checking pushdown systems R. Ramanujam Institute of Mathematical Sciences, Chennai jam@imsc.res.in Update Meeting, IIT-Guwahati, 4 July 2006 p. 1 Sources of unboundedness Data manipulation: integers,
More informationPropositional Calculus. Math Foundations of Computer Science
Propositional Calculus Math Foundations of Computer Science Propositional Calculus Objective: To provide students with the concepts and techniques from propositional calculus so that they can use it to
More informationTo illustrate what is intended the following are three write ups by students. Diagonalization
General guidelines: You may work with other people, as long as you write up your solution in your own words and understand everything you turn in. Make sure to justify your answers they should be clear
More information3. Finding Components in Component Repositories
3. Finding Components in Component Repositories 1. Component Search with Metadata 2. Searching and Browsing with Faceted Classication 3. Faceted Component Stores 4. Searching by Conformance to Protocols
More information3. Finding Components in Component Repositories Component Search. Obligatory Literature. References
3. Finding Components in Component Repositories 1. Component Search with Metadata 2. Searching and Browsing with Faceted Classication 3. Faceted Component Stores 4. Searching by Conformance to Protocols
More informationChapter 3. Semantics. Topics. Introduction. Introduction. Introduction. Introduction
Topics Chapter 3 Semantics Introduction Static Semantics Attribute Grammars Dynamic Semantics Operational Semantics Axiomatic Semantics Denotational Semantics 2 Introduction Introduction Language implementors
More informationStatic Program Analysis
Static Program Analysis Thomas Noll Software Modeling and Verification Group RWTH Aachen University https://moves.rwth-aachen.de/teaching/ss-18/spa/ Preliminaries Outline of Lecture 1 Preliminaries Introduction
More informationBinary Decision Diagrams
Logic and roof Hilary 2016 James Worrell Binary Decision Diagrams A propositional formula is determined up to logical equivalence by its truth table. If the formula has n variables then its truth table
More informationRewriting. Andreas Rümpel Faculty of Computer Science Technische Universität Dresden Dresden, Germany.
Rewriting Andreas Rümpel Faculty of Computer Science Technische Universität Dresden Dresden, Germany s9843882@inf.tu-dresden.de ABSTRACT This is an overview paper regarding the common technologies of rewriting.
More informationLower Bound on Comparison-based Sorting
Lower Bound on Comparison-based Sorting Different sorting algorithms may have different time complexity, how to know whether the running time of an algorithm is best possible? We know of several sorting
More informationV Advanced Data Structures
V Advanced Data Structures B-Trees Fibonacci Heaps 18 B-Trees B-trees are similar to RBTs, but they are better at minimizing disk I/O operations Many database systems use B-trees, or variants of them,
More informationPart II Black-Box Composition Systems 10. Business Components in a Component-Based Development Process
Part II Black-Box Composition Systems 10. Business Components in a Component-Based Development Process 1. Business component model of the Cheesman/ Daniels process 2. Identifying business components Prof.
More informationFrom Types to Sets in Isabelle/HOL
From Types to Sets in Isabelle/HOL Extented Abstract Ondřej Kunčar 1 and Andrei Popescu 1,2 1 Fakultät für Informatik, Technische Universität München, Germany 2 Institute of Mathematics Simion Stoilow
More informationCHAPTER 10 GRAPHS AND TREES. Alessandro Artale UniBZ - artale/
CHAPTER 10 GRAPHS AND TREES Alessandro Artale UniBZ - http://www.inf.unibz.it/ artale/ SECTION 10.5 Trees Copyright Cengage Learning. All rights reserved. Trees In mathematics, a tree is a connected graph
More information1 Abstract Data Types (11 Points)
Legi-Nr.:... 1 Abstract Data Types (11 Points) In this task you will write an abstract data type for a simple tree structure that stores integers in its nodes and whose nodes always have either no children
More informationLecture Notes on Binary Decision Diagrams
Lecture Notes on Binary Decision Diagrams 15-122: Principles of Imperative Computation William Lovas Notes by Frank Pfenning Lecture 25 April 21, 2011 1 Introduction In this lecture we revisit the important
More informationCompiler Construction I
TECHNISCHE UNIVERSITÄT MÜNCHEN FAKULTÄT FÜR INFORMATIK Compiler Construction I Dr. Michael Petter SoSe 2015 1 / 58 Organizing Master or Bachelor in the 6th Semester with 5 ECTS Prerequisites Informatik
More informationHigher-Order Logic. Specification and Verification with Higher-Order Logic
Higher-Order Logic Specification and Verification with Higher-Order Logic Arnd Poetzsch-Heffter (Slides by Jens Brandt) Software Technology Group Fachbereich Informatik Technische Universität Kaiserslautern
More informationFundamental Algorithms
Technische Universität München Fakultät für Informatik Lehrstuhl für Effiziente Algorithmen Dmytro Chibisov Sandeep Sadanandan Winter Semester 7/ Solution Sheet 5 November, 7 Fundamental Algorithms Problem
More informationObjectives: 1. Design procedure. 2. Fundamental circuits. 1. Design procedure
Objectives: 1. Design procedure. 2. undamental circuits. 1. Design procedure Design procedure has five steps: o Specification. o ormulation. o Optimization. o Technology mapping. o Verification. Specification:
More informationCSC Discrete Math I, Spring Sets
CSC 125 - Discrete Math I, Spring 2017 Sets Sets A set is well-defined, unordered collection of objects The objects in a set are called the elements, or members, of the set A set is said to contain its
More informationDigital Circuits ECS 371
Digital Circuits ECS 37 Dr. Prapun Suksompong prapun@siit.tu.ac.th Lecture 7 Office Hours: KD 36-7 Monday 9:-:3, :3-3:3 Tuesday :3-:3 Announcement HW2 posted on the course web site Chapter 4: Write down
More informationTest Case Generation According to the Binary Search Strategy
Test Case Generation According to the Binary Search Strategy Sami Beydeda and Volker Gruhn University of Leipzig Department of Computer Science Chair of Applied Telematics / e-business Klostergasse 3 04109
More informationDiscrete Mathematics Lecture 4. Harper Langston New York University
Discrete Mathematics Lecture 4 Harper Langston New York University Sequences Sequence is a set of (usually infinite number of) ordered elements: a 1, a 2,, a n, Each individual element a k is called a
More informationCompiler Construction I
TECHNISCHE UNIVERSITÄT MÜNCHEN FAKULTÄT FÜR INFORMATIK Compiler Construction I Dr. Michael Petter, Dr. Axel Simon SoSe 2014 1 / 59 Organizing Master or Bachelor in the 6th Semester with 5 ECTS Prerequisites
More informationTo prove something about all Boolean expressions, we will need the following induction principle: Axiom 7.1 (Induction over Boolean expressions):
CS 70 Discrete Mathematics for CS Fall 2003 Wagner Lecture 7 This lecture returns to the topic of propositional logic. Whereas in Lecture 1 we studied this topic as a way of understanding proper reasoning
More informationLECTURE 8: SETS. Software Engineering Mike Wooldridge
LECTURE 8: SETS Mike Wooldridge 1 What is a Set? The concept of a set is used throughout mathematics; its formal definition matches closely our intuitive understanding of the word. Definition: A set is
More informationBehavior models and verification Lecture 6
Behavior models and verification Lecture 6 http://d3s.mff.cuni.cz Jan Kofroň, František Plášil Model checking For a Kripke structure M = (S, I, R, L) over AP and a (state based) temporal logic formula
More informationModel-driven Multi-Quality Auto-Tuning of Robotic Applications
Fakultät Informatik Institut für Software- und Multimediatechnik Lehrstuhl für Softwaretechnologie Model-driven Multi-Quality Auto-Tuning of Robotic Applications MORSE 2015 Christian Piechnick, Sebastian
More informationQuestion Bank. 10CS63:Compiler Design
Question Bank 10CS63:Compiler Design 1.Determine whether the following regular expressions define the same language? (ab)* and a*b* 2.List the properties of an operator grammar 3. Is macro processing a
More informationIntermediate Code Generation
Intermediate Code Generation In the analysis-synthesis model of a compiler, the front end analyzes a source program and creates an intermediate representation, from which the back end generates target
More informationStrand Algebras for DNA Computing
Strand Algebras for DNA omputing Microsoft Research DNA 15 onference Fayetteville, 2009-06-10 http://lucacardelli.name How Process Algebra fits in DNA omputing Electronics has electrons o All electrons
More informationComputer Science 1 Ah
UNIVERSITY OF EDINBURGH course CS0077 COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS Computer Science 1 Ah Resit Examination Specimen Solutions Date: Monday 1st September 2003 Time: 09:30 11:00
More information23. Framework Documentation
23. Framework Documentation Prof. Uwe Aßmann TU Dresden Institut für Software und Multimediatechnik Lehrstuhl Softwaretechnologie 11-1.0, 23.12.11 Design Patterns and Frameworks, Prof. Uwe Aßmann 1 References
More informationPraktikum Ingenieurmäßige Software-Entwicklung
Universität Karlsruhe (TH) Forschungsuniversität gegründet 1825 Praktikum Ingenieurmäßige Software-Entwicklung Palladio Component Model Part V (PCM) Prof. Dr. R. H. Reussner (reussner@ipd.uka.de) Lehrstuhl
More informationQuery optimization. Elena Baralis, Silvia Chiusano Politecnico di Torino. DBMS Architecture D B M G. Database Management Systems. Pag.
Database Management Systems DBMS Architecture SQL INSTRUCTION OPTIMIZER MANAGEMENT OF ACCESS METHODS CONCURRENCY CONTROL BUFFER MANAGER RELIABILITY MANAGEMENT Index Files Data Files System Catalog DATABASE
More informationPropositional Calculus: Boolean Algebra and Simplification. CS 270: Mathematical Foundations of Computer Science Jeremy Johnson
Propositional Calculus: Boolean Algebra and Simplification CS 270: Mathematical Foundations of Computer Science Jeremy Johnson Propositional Calculus Topics Motivation: Simplifying Conditional Expressions
More informationContent beyond Syllabus. Parity checker and generator
Class : SE Div: B Subject : Logic Design Content beyond Syllabus Parity checker and generator What is parity bit? The parity generating technique is one of the most widely used error detection techniques
More informationCHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science
CHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science Entrance Examination, 5 May 23 This question paper has 4 printed sides. Part A has questions of 3 marks each. Part B has 7 questions
More informationSTUDENT NUMBER: MATH Final Exam. Lakehead University. April 13, Dr. Adam Van Tuyl
Page 1 of 13 NAME: STUDENT NUMBER: MATH 1281 - Final Exam Lakehead University April 13, 2011 Dr. Adam Van Tuyl Instructions: Answer all questions in the space provided. If you need more room, answer on
More informationMATHEMATICAL STRUCTURES FOR COMPUTER SCIENCE
MATHEMATICAL STRUCTURES FOR COMPUTER SCIENCE A Modern Approach to Discrete Mathematics SIXTH EDITION Judith L. Gersting University of Hawaii at Hilo W. H. Freeman and Company New York Preface Note to the
More informationCSCI.6962/4962 Software Verification Fundamental Proof Methods in Computer Science (Arkoudas and Musser) Chapter p. 1/27
CSCI.6962/4962 Software Verification Fundamental Proof Methods in Computer Science (Arkoudas and Musser) Chapter 2.1-2.7 p. 1/27 CSCI.6962/4962 Software Verification Fundamental Proof Methods in Computer
More informationProgram Verification & Testing; Review of Propositional Logic
8/24: p.1, solved; 9/20: p.5 Program Verification & Testing; Review of Propositional Logic CS 536: Science of Programming, Fall 2018 A. Why Course guidelines are important. Active learning is the style
More informationApplications of Formal Verification
Applications of Formal Verification Model Checking: Introduction to PROMELA Prof. Dr. Bernhard Beckert Dr. Vladimir Klebanov SS 2010 KIT INSTITUT FÜR THEORETISCHE INFORMATIK KIT University of the State
More informationChapter 8: Data Abstractions
Chapter 8: Data Abstractions Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Presentation files modified by Farn Wang Copyright 28 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
More informationApplications of Formal Verification
Applications of Formal Verification Model Checking: Introduction to PROMELA Prof. Dr. Bernhard Beckert Dr. Vladimir Klebanov SS 2012 KIT INSTITUT FÜR THEORETISCHE INFORMATIK KIT University of the State
More informationLecture 1: Examples, connectedness, paths and cycles
Lecture 1: Examples, connectedness, paths and cycles Anders Johansson 2011-10-22 lör Outline The course plan Examples and applications of graphs Relations The definition of graphs as relations Connectedness,
More informationTechnische Universität München Zentrum Mathematik
Technische Universität München Zentrum Mathematik Prof. r. r. Jürgen Richter-ebert, ernhard Werner Projective eometry SS 8 https://www-m.ma.tum.de/bin/view/lehre/ss8/pss8/webome Solutions for Worksheet
More information