Data Structures and Algorithms
|
|
- Eustacia Oliver
- 6 years ago
- Views:
Transcription
1 Daa Srucures and Algorihms The maerial for his lecure is drawn, in ar, from The Pracice of Programming (Kernighan & Pike) Chaer 2 1 Goals of his Lecure Hel you learn (or refresh your memory) abou: Common daa srucures and algorihms Why? Shallow moivaion: Provide examles of oiner-relaed C code Why? Deeer moivaion: Common daa srucures and algorihms serve as high level building blocks A ower rogrammer: Rarely creaes rograms from scrach Ofen creaes rograms using high level building blocks 2 1
2 A Common Task Mainain a able of key/value airs Each key is a sring; each value is an in Unknown number of key-value airs For simliciy, allow dulicae keys (clien resonsibiliy) In Assignmen #, mus check for dulicae keys! Examles (suden name, grade) ( john smih, 8), ( jane doe, 9), ( bill clinon, 81) (baseball layer, number) ( Ruh, ), ( Gehrig, ), ( Manle, ) (variable name, value) ( maxlengh, 2000), ( i, ), ( j, -10) Daa Srucures and Algorihms Daa srucures Linked lis of key/value airs Hash able of key/value airs Algorihms Creae: Creae he daa srucure Add: Add a key/value air Search: Search for a key/value air, by key Free: Free he daa srucure 2
3 Daa Srucure #1: Linked Lis Daa srucure: Nodes; each conains key/value air and oiner o nex node "Manle" Algorihms: Creae: Allocae Table srucure o oin o firs node Add: Inser new node a fron of lis Search: Linear search hrough he lis Free: Free nodes while raversing; free Table srucure 5 Linked Lis: Daa Srucure sruc Node { cons char *key; in value; sruc Node *nex; ; sruc Table { sruc Node *firs; ; sruc Table sruc Node sruc Node 6
4 Linked Lis: Creae (1) sruc Table *Table_creae(void) { = (sruc Table*) malloc(sizeof(sruc Table)); ->firs = ; reurn ; = Table_creae(); Linked Lis: Creae (2) sruc Table *Table_creae(void) { = (sruc Table*) malloc(sizeof(sruc Table)); ->firs = ; reurn ; = Table_creae(); 8
5 Linked Lis: Add (1) void Table_add(sruc Table *, cons char *key, in value) { sruc Node * = (sruc Node*)malloc(sizeof(sruc Node)); ->key = key; ->value = value; ->nex = ->firs; ->firs = ; These are oiners o srings ha exis in he RODATA secion Table_add(,, ); Table_add(,, ); Table_add(, "Manle", ); 9 Linked Lis: Add (2) void Table_add(sruc Table *, cons char *key, in value) { sruc Node * = (sruc Node*)malloc(sizeof(sruc Node)); ->key = key; ->value = value; ->nex = ->firs; ->firs = ; Table_add(,, ); Table_add(,, ); Table_add(, "Manle", ); 10 5
6 Linked Lis: Add () void Table_add(sruc Table *, cons char *key, in value) { sruc Node * = (sruc Node*)malloc(sizeof(sruc Node)); ->key = key; ->value = value; ->nex = ->firs; ->firs = ; "Manle" Table_add(,, ); Table_add(,, ); Table_add(, "Manle", ); 11 Linked Lis: Add () void Table_add(sruc Table *, cons char *key, in value) { sruc Node * = (sruc Node*)malloc(sizeof(sruc Node)); ->key = key; ->value = value; ->nex = ->firs; ->firs = ; "Manle" Table_add(,, ); Table_add(,, ); Table_add(, "Manle", ); 12 6
7 Linked Lis: Add (5) void Table_add(sruc Table *, cons char *key, in value) { sruc Node * = (sruc Node*)malloc(sizeof(sruc Node)); ->key = key; ->value = value; ->nex = ->firs; ->firs = ; "Manle" Table_add(,, ); Table_add(,, ); Table_add(, "Manle", ); 1 Linked Lis: Search (1) in Table_search(sruc Table *, cons char *key, in *value) { sruc Node *; for ( = ->firs;!= ; = ->nex) if (srcm(->key, key) == 0) { *value = ->value; reurn 1; reurn 0; in value; in found; found = Table_search(,, &value); "Manle" 1
8 Linked Lis: Search (2) in Table_search(sruc Table *, cons char *key, in *value) { sruc Node *; for ( = ->firs;!= ; = ->nex) if (srcm(->key, key) == 0) { *value = ->value; reurn 1; reurn 0; in value; in found; found = Table_search(,, &value); "Manle" 15 Linked Lis: Search () in Table_search(sruc Table *, cons char *key, in *value) { sruc Node *; for ( = ->firs;!= ; = ->nex) if (srcm(->key, key) == 0) { *value = ->value; reurn 1; reurn 0; in value; in found; found = Table_search(,, &value); "Manle" 16 8
9 Linked Lis: Search () in Table_search(sruc Table *, cons char *key, in *value) { sruc Node *; for ( = ->firs;!= ; = ->nex) if (srcm(->key, key) == 0) { *value = ->value; reurn 1; reurn 0; in value; in found; found = Table_search(,, &value); "Manle" 1 Linked Lis: Search (5) in Table_search(sruc Table *, cons char *key, in *value) { sruc Node *; for ( = ->firs;!= ; = ->nex) if (srcm(->key, key) == 0) { *value = ->value; reurn 1; reurn 0; in value; in found; found = Table_search(,, &value); "Manle" 18 9
10 Linked Lis: Search (6) in Table_search(sruc Table *, cons char *key, in *value) { sruc Node *; for ( = ->firs;!= ; = ->nex) if (srcm(->key, key) == 0) { *value = ->value; reurn 1; reurn 0; 1 in value; in found; found = Table_search(,, &value); "Manle" 19 Linked Lis: Free (1) void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; for ( = ->firs;!= ; = nex) { nex = ->nex; free(); free(); Table_free(); "Manle" 20 10
11 Linked Lis: Free (2) void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; for ( = ->firs;!= ; = nex) { nex = ->nex; free(); free(); "Manle" Table_free(); 21 Linked Lis: Free () void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; for ( = ->firs;!= ; = nex) { nex = ->nex; free(); free(); "Manle" nex Table_free(); 22 11
12 Linked Lis: Free () void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; for ( = ->firs;!= ; = nex) { nex = ->nex; free(); free(); "Manle" nex Table_free(); 2 Linked Lis: Free (5) void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; for ( = ->firs;!= ; = nex) { nex = ->nex; free(); free(); "Manle" nex Table_free(); 2 12
13 Linked Lis: Free (6) void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; for ( = ->firs;!= ; = nex) { nex = ->nex; free(); free(); "Manle" nex Table_free(); 25 Linked Lis: Free () void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; for ( = ->firs;!= ; = nex) { nex = ->nex; free(); free(); Table_free(); "Manle" nex 26 1
14 Linked Lis: Free (8) void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; for ( = ->firs;!= ; = nex) { nex = ->nex; free(); free(); Table_free(); "Manle" nex 2 Linked Lis: Free (9) void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; for ( = ->firs;!= ; = nex) { nex = ->nex; free(); free() Table_free(); "Manle" nex 28 1
15 Linked Lis Performance Creae: Add: Search: Free: fas fas slow slow Wha are he asymoic run imes (big-oh noaion)? Would i be beer o kee he nodes sored by key? 29 Daa Srucure #2: Hash Table Fixed-size array where each elemen oins o a linked lis 0 ARRAYSIZE-1 sruc Node *array[arraysize]; Funcion mas each key o an array index For examle, for an ineger key h Hash funcion: i = h % ARRAYSIZE (mod funcion) Go o array elemen i, i.e., he linked lis hashab[i] Search for elemen, add elemen, remove elemen, ec. 0 15
16 Hash Table Examle Ineger keys, array of size 5 wih hash funcion h mod 5 16 % 5 is % 5 is % 5 is Revoluion 199 WW Civil 1 How Large an Array? Large enough ha average bucke size is 1 Shor buckes mean fas search Long buckes mean slow search Small enough o be memory efficien No an excessive number of elemens Forunaely, each array elemen is jus soring a oiner This is OK: 0 ARRAYSIZE
17 Wha Kind of Hash Funcion? Good a disribuing elemens across he array Disribue resuls over he range 0, 1,, ARRAYSIZE-1 Disribue resuls evenly o avoid very long buckes This is no so good: 0 ARRAYSIZE-1 Wha would be he wors ossible hash funcion? Hashing Sring Keys o Inegers Simle schemes donʼ disribue he keys evenly enough Number of characers, mod ARRAYSIZE Sum he ASCII values of all characers, mod ARRAYSIZE Hereʼs a reasonably good hash funcion Weighed sum of characers x i in he sring (Σ a i x i ) mod ARRAYSIZE Bes if a and ARRAYSIZE are relaively rime E.g., a = 65599, ARRAYSIZE = 102 1
18 Imlemening Hash Funcion Poenially exensive o comue a i for each value of i Comuing a i for each value of I Insead, do (((x[0] * x[1]) * x[2]) * x[]) * unsigned in hash(cons char *x) { in i; unsigned in h = 0U; for (i=0; x[i]!='\0'; i++) h = h * (unsigned char)x[i]; reurn h % 102; Can be more clever han his for owers of wo! (Described in Aendix) 5 Hash Table Examle Examle: ARRAYSIZE = Looku (and ener, if no resen) hese srings: he, ca, in, he, ha Hash able iniially emy. Firs word: he. hash( he ) = % = 1. Search he linked lis able[1] for he sring he ; no found
19 Hash Table Examle (con.) Examle: ARRAYSIZE = Looku (and ener, if no resen) hese srings: he, ca, in, he, ha Hash able iniially emy. Firs word: he. hash( he ) = % = 1. Search he linked lis able[1] for he sring he ; no found Now: able[1] = makelink(key, value, able[1]) he Hash Table Examle (con.) Second word: ca. hash( ca ) = % = 2. Search he linked lis able[2] for he sring ca ; no found Now: able[2] = makelink(key, value, able[2]) he 8 19
20 Hash Table Examle (con.) Third word: in. hash( in ) = % = 5. Search he linked lis able[5] for he sring in ; no found Now: able[5] = makelink(key, value, able[5]) he ca 9 Hash Table Examle (con.) Fourh word: he. hash( he ) = % = 1. Search he linked lis able[1] for he sring he ; found i! he in ca 0 20
21 Hash Table Examle (con.) Fourh word: ha. hash( ha ) = % = 2. Search he linked lis able[2] for he sring ha ; no found. Now, inser ha ino he linked lis able[2]. A beginning or end? Doesnʼ maer he in ca 1 Hash Table Examle (con.) Insering a he fron is easier, so add ha a he fron he in ha ca 2 21
22 Hash Table: Daa Srucure enum {BUCKET_COUNT = 102; sruc Node { cons char *key; in value; sruc Node *nex; ; sruc Table { sruc Node *array[bucket_count]; ; sruc Table sruc Node sruc Node Hash Table: Creae sruc Table *Table_creae(void) { = (sruc Table*)calloc(1, sizeof(sruc Table)); reurn ; = Table_creae();
23 Hash Table: Add (1) void Table_add(sruc Table *, cons char *key, in value) { sruc Node * = (sruc Node*)malloc(sizeof(sruc Node)); in h = hash(key); ->key = key; ->value = value; ->nex = ->array[h]; ->array[h] = ; Table_add(,, ); Table_add(,, ); Table_add(, "Manle", ); These are oiners o srings ha exis in he RODATA secion Preend ha Ruh hashed o 2 and Gehrig o 2 5 Hash Table: Add (2) void Table_add(sruc Table *, cons char *key, in value) { sruc Node * = (sruc Node*)malloc(sizeof(sruc Node)); in h = hash(key); ->key = key; ->value = value; ->nex = ->array[h]; ->array[h] = ; Table_add(,, ); Table_add(,, ); Table_add(, "Manle", );
24 Hash Table: Add () void Table_add(sruc Table *, cons char *key, in value) { sruc Node * = (sruc Node*)malloc(sizeof(sruc Node)); in h = hash(key); ->key = key; ->value = value; ->nex = ->array[h]; ->array[h] = ; Table_add(,, ); Table_add(,, ); Table_add(, "Manle", ); Preend ha Manle hashed o 806, and so h = 806 "Manle" Hash Table: Add () void Table_add(sruc Table *, cons char *key, in value) { sruc Node * = (sruc Node*)malloc(sizeof(sruc Node)); in h = hash(key); ->key = key; ->value = value; ->nex = ->array[h]; ->array[h] = ; Table_add(,, ); Table_add(,, ); Table_add(, "Manle", ); h = 806 "Manle" 8 2
25 Hash Table: Add (5) void Table_add(sruc Table *, cons char *key, in value) { sruc Node * = (sruc Node*)malloc(sizeof(sruc Node)); in h = hash(key); ->key = key; ->value = value; ->nex = ->array[h]; ->array[h] = ; Table_add(,, ); Table_add(,, ); Table_add(, "Manle", ); h = 806 "Manle" 9 Hash Table: Search (1) in Table_search(sruc Table *, cons char *key, in *value) { sruc Node *; in h = hash(key); for ( = ->array[h];!= ; = ->nex) if (srcm(->key, key) == 0) { *value = ->value; reurn 1; reurn 0; in value; in found; found = Table_search(,, &value); "Manle" 50 25
26 Hash Table: Search (2) in Table_search(sruc Table *, cons char *key, in *value) { sruc Node *; in h = hash(key); for ( = ->array[h];!= ; = ->nex) if (srcm(->key, key) == 0) { *value = ->value; reurn 1; reurn 0; in value; in found; found = Table_search(,, &value); Preend ha Gehrig hashed o 2, and so h = 2 "Manle" 51 Hash Table: Search () in Table_search(sruc Table *, cons char *key, in *value) { sruc Node *; in h = hash(key); for ( = ->array[h];!= ; = ->nex) if (srcm(->key, key) == 0) { *value = ->value; reurn 1; reurn 0; in value; in found; found = Table_search(,, &value); "Manle" h =
27 Hash Table: Search () in Table_search(sruc Table *, cons char *key, in *value) { sruc Node *; in h = hash(key); for ( = ->array[h];!= ; = ->nex) if (srcm(->key, key) == 0) { *value = ->value; reurn 1; reurn 0; in value; in found; found = Table_search(,, &value); "Manle" h = 2 5 Hash Table: Search (5) in Table_search(sruc Table *, cons char *key, in *value) { sruc Node *; in h = hash(key); for ( = ->array[h];!= ; = ->nex) if (srcm(->key, key) == 0) { *value = ->value; reurn 1; reurn 0; in value; in found; found = Table_search(,, &value); "Manle" h = 2 5 2
28 Hash Table: Free (1) void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; in b; for (b = 0; b < BUCKET_COUNT; b++) for ( = ->array[b];!= ; = nex) { nex = ->nex; free(); free(); Table_free(); "Manle" 55 Hash Table: Free (2) void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; in b; for (b = 0; b < BUCKET_COUNT; b++) for ( = ->array[b];!= ; = nex) { nex = ->nex; free(); free(); Table_free(); b = 0 "Manle" 56 28
29 Hash Table: Free () void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; in b; for (b = 0; b < BUCKET_COUNT; b++) for ( = ->array[b];!= ; = nex) { nex = ->nex; free(); free(); Table_free(); b = 0 "Manle" 5 Hash Table: Free () void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; in b; for (b = 0; b < BUCKET_COUNT; b++) for ( = ->array[b];!= ; = nex) { nex = ->nex; free(); free(); Table_free(); b = 1,, 2 "Manle" 58 29
30 Hash Table: Free (5) void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; in b; for (b = 0; b < BUCKET_COUNT; b++) for ( = ->array[b];!= ; = nex) { nex = ->nex; free(); free(); Table_free(); b = 2 "Manle" 59 Hash Table: Free (6) void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; in b; for (b = 0; b < BUCKET_COUNT; b++) for ( = ->array[b];!= ; = nex) { nex = ->nex; free(); free(); Table_free(); nex b = 2 "Manle" 60 0
31 Hash Table: Free () void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; in b; for (b = 0; b < BUCKET_COUNT; b++) for ( = ->array[b];!= ; = nex) { nex = ->nex; free(); free(); Table_free(); nex b = 2 "Manle" 61 Hash Table: Free (8) void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; in b; for (b = 0; b < BUCKET_COUNT; b++) for ( = ->array[b];!= ; = nex) { nex = ->nex; free(); free(); Table_free(); b = 2,, 2 b = 2,, 806 b = 80,, 102 "Manle" 62 1
32 Hash Table: Free (9) void Table_free(sruc Table *) { sruc Node *; sruc Node *nex; in b; for (b = 0; b < BUCKET_COUNT; b++) for ( = ->array[b];!= ; = nex) { nex = ->nex; free(); free(); Table_free(); b = 102 "Manle" 6 Hash Table Performance Creae: fas Add: fas Search: fas Free: slow Wha are he asymoic run imes (big-oh noaion)? Is hash able search always fas? 6 2
33 Key Ownershi Noe: Table_add() funcions conain his code: void Table_add(sruc Table *, cons char *key, in value) { sruc Node * = (sruc Node*)malloc(sizeof(sruc Node)); ->key = key; Caller asses key, which is a oiner o memory where a sring resides Table_add() funcion sores wihin he able he address where he sring resides 65 Key Ownershi (con.) Problem: Consider his calling code: sruc Table ; char k[100] = ; Table_add(, k, ); srcy(k, ); Via Table_add(), able conains memory address k Clien changes sring a memory address k Thus clien changes key wihin able Wha haens if he clien searches for Ruh? Wha haens if he clien searches for Gehrig? 66
34 Key Ownershi (con.) Soluion: Table_add() saves coy of given key void Table_add(sruc Table *, cons char *key, in value) { sruc Node * = (sruc Node*)malloc(sizeof(sruc Node)); ->key = (cons char*)malloc(srlen(key) + 1); srcy(->key, key); Why add 1? If clien changes sring a memory address k, daa srucure is no affeced Then he daa srucure owns he coy, ha is: The daa srucure is resonsible for freeing he memory in which he coy resides The Table_free() funcion mus free he coy 6 Summary Common daa srucures and associaed algorihms Linked lis fas inser, slow search Hash able Fas inser, (oenially) fas search Invaluable for soring key/value airs Very common Relaed issues Hashing algorihms Memory ownershi 68
35 Aendix Suid rogrammer ricks relaed o hash ables 69 Revisiing Hash Funcions Poenially exensive o comue mod c Involves division by c and keeing he remainder Easier when c is a ower of 2 (e.g., 16 = 2 ) An alernaive (by examle) 5 = % 16 is 5, he las four bis of he number Would like an easy way o isolae he las four bis 0 5
36 Recall: Biwise Oeraors in C Biwise AND (&) 5 & 15 & Mod on he chea! E.g., h = 5 & 15; Biwise OR ( ) Oneʼs comlemen (~) Turns 0 o 1, and 1 o 0 E.g., se las hree bis o 0 x = x & ~; A Faser Hash Funcion unsigned in hash(cons char *x) { in i; unsigned in h = 0U; for (i=0; x[i]!='\0'; i++) h = h * (unsigned char)x[i]; reurn h % 102; Previous version unsigned in hash(cons char *x) { in i; unsigned in h = 0U; for (i=0; x[i]!='\0'; i++) h = h * (unsigned char)x[i]; reurn h & 102; Wha haens if you misakenly wrie h & 102? Faser 2 6
37 Seeding U Key Comarisons Seeding u key comarisons For any non-rivial value comarison funcion Trick: sore full hash resul in srucure in Table_search(sruc Table *, cons char *key, in *value) { sruc Node *; in h = hash(key); /* No % in hash funcion */ for ( = ->array[h%102];!= ; = ->nex) if ((->hash == h) && srcm(->key, key) == 0) { *value = ->value; reurn 1; reurn 0; Why is his so much faser?
Data Structures and Algorithms. The material for this lecture is drawn, in part, from The Practice of Programming (Kernighan & Pike) Chapter 2
Daa Srucures and Algorihms The maerial for his lecure is drawn, in par, from The Pracice of Programming (Kernighan & Pike) Chaper 2 1 Moivaing Quoaion Every program depends on algorihms and daa srucures,
More informationCOMP26120: Algorithms and Imperative Programming
COMP26120 ecure C3 1/48 COMP26120: Algorihms and Imperaive Programming ecure C3: C - Recursive Daa Srucures Pee Jinks School of Compuer Science, Universiy of Mancheser Auumn 2011 COMP26120 ecure C3 2/48
More informationShortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley.
Shores Pah Algorihms Background Seing: Lecure I: Shores Pah Algorihms Dr Kieran T. Herle Deparmen of Compuer Science Universi College Cork Ocober 201 direced graph, real edge weighs Le he lengh of a pah
More informationPointer Analysis. Outline: What is pointer analysis Intraprocedural pointer analysis Interprocedural pointer analysis. Andersen and Steensgaard
Poiner anaysis Poiner Anaysis Ouine: Wha is oiner anaysis Inrarocedura oiner anaysis Inerrocedura oiner anaysis Andersen and Seensgaard Poiner and Aias Anaysis Aiases: wo exressions ha denoe he same memory
More informationHash Tables COS 217 1
Hash Tables COS 217 1 Goals of Today s Lecture Motivation for hash tables o Examples of (key, value) pairs o Limitations of using arrays o Example using a linked list o Inefficiency of using a linked list
More informationPART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR
. ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral
More informationCS 152 Computer Architecture and Engineering. Lecture 7 - Memory Hierarchy-II
CS 152 Compuer Archiecure and Engineering Lecure 7 - Memory Hierarchy-II Krse Asanovic Elecrical Engineering and Compuer Sciences Universiy of California a Berkeley hp://www.eecs.berkeley.edu/~krse hp://ins.eecs.berkeley.edu/~cs152
More informationMidterm Exam Announcements
Miderm Exam Noe: This was a challenging exam. CSCI 4: Principles o Programming Languages Lecure 1: Excepions Insrucor: Dan Barowy Miderm Exam Scores 18 16 14 12 10 needs improvemen 8 6 4 2 0 0-49 50-59
More informationSam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes.
8.F Baery Charging Task Sam wans o ake his MP3 player and his video game player on a car rip. An hour before hey plan o leave, he realized ha he forgo o charge he baeries las nigh. A ha poin, he plugged
More informationImplementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)
Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,
More informationLecture 18: Mix net Voting Systems
6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified
More informationUsing CANopen Slave Driver
CAN Bus User Manual Using CANopen Slave Driver V1. Table of Conens 1. SDO Communicaion... 1 2. PDO Communicaion... 1 3. TPDO Reading and RPDO Wriing... 2 4. RPDO Reading... 3 5. CANopen Communicaion Parameer
More informationWhy not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems
Simulaion Wha is simulaion? Simple synonym: imiaion We are ineresed in sudying a Insead of experimening wih he iself we experimen wih a model of he Experimen wih he Acual Ways o sudy a Sysem Experimen
More informationUX260 QUICK START GUIDE
UX260 QUICK START GUIDE Transferring Music Playing Music Blueooh Pairing Taking a Picure/ Recording a Video www.lgusa.com Geing o Know Your Phone Camera BACK SIDE Lef Sof Key Speakerphone Key Talk Key
More informationMARSS Reference Sheet
MARSS Reference Shee The defaul MARSS model (form="marxss") is wrien as follows: x = B x 1 + u + C c + w where w MVN( Q ) y = Z x + a + D d + v where v MVN( R ) x 1 MVN(π Λ) or x MVN(π Λ) c and d are inpus
More informationAssignment 2. Due Monday Feb. 12, 10:00pm.
Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how
More informationMotor Control. 5. Control. Motor Control. Motor Control
5. Conrol In his chaper we will do: Feedback Conrol On/Off Conroller PID Conroller Moor Conrol Why use conrol a all? Correc or wrong? Supplying a cerain volage / pulsewidh will make he moor spin a a cerain
More informationCENG 477 Introduction to Computer Graphics. Modeling Transformations
CENG 477 Inroducion o Compuer Graphics Modeling Transformaions Modeling Transformaions Model coordinaes o World coordinaes: Model coordinaes: All shapes wih heir local coordinaes and sies. world World
More information4. Minimax and planning problems
CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems
More informationNumerical Solution of ODE
Numerical Soluion of ODE Euler and Implici Euler resar; wih(deools): wih(plos): The package ploools conains more funcions for ploing, especially a funcion o draw a single line: wih(ploools): wih(linearalgebra):
More informationPointer Analysis. Pointer analysis. Pointer and Alias Analysis. Useful for what? Intraprocedural Points-to Analysis. Kinds of alias information
Poer Anasis Poer anasis Oue: Wha is oer anasis Inrarocedura oer anasis Inerrocedura oer anasis Andersen and Seensgaard Poer and Aias Anasis Aiases: wo eressions ha denoe he same memor ocaion. Aiases are
More informationImage segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding
Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same
More informationAnnouncements For The Logic of Boolean Connectives Truth Tables, Tautologies & Logical Truths. Outline. Introduction Truth Functions
Announcemens For 02.05.09 The Logic o Boolean Connecives Truh Tables, Tauologies & Logical Truhs 1 HW3 is due nex Tuesday William Sarr 02.05.09 William Sarr The Logic o Boolean Connecives (Phil 201.02)
More informationSOT: Compact Representation for Triangle and Tetrahedral Meshes
SOT: Compac Represenaion for Triangle and Terahedral Meshes Topraj Gurung and Jarek Rossignac School of Ineracive Compuing, College of Compuing, Georgia Insiue of Technology, Alana, GA ABSTRACT The Corner
More informationGauss-Jordan Algorithm
Gauss-Jordan Algorihm The Gauss-Jordan algorihm is a sep by sep procedure for solving a sysem of linear equaions which may conain any number of variables and any number of equaions. The algorihm is carried
More informationScheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012
EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule
More informationPrinceton University Computer Science 217: Introduction to Programming Systems. Data Structures
Princeton University Computer Science 217: Introduction to Programming Systems Data Structures 1 Goals of this Lecture Help you learn (or refresh your memory) about: Common data structures: linked lists
More informationA Matching Algorithm for Content-Based Image Retrieval
A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using
More informationparametric spline curves
arameric sline curves comuer grahics arameric curves 9 fabio ellacini curves used in many conexs fons animaion ahs shae modeling differen reresenaion imlici curves arameric curves mosly used comuer grahics
More informationEECS 487: Interactive Computer Graphics
EECS 487: Ineracive Compuer Graphics Lecure 7: B-splines curves Raional Bézier and NURBS Cubic Splines A represenaion of cubic spline consiss of: four conrol poins (why four?) hese are compleely user specified
More informationEfficient Computation of Parameterized Pointer Information for Interprocedural Analyses
Efficien Comuaion of Parameerized Poiner Informaion for Inerrocedural Analyses Donlin Lian and Mary Jean Harrold Collee of Comuin Georia Insiue of Technoloy Alana, GA 30332, USA {dlian,harrold}@cc.aech.edu
More informationtr_lisp.asc Page 1 McESE-FranzLISP: McMASTER EXPERT SYSTEM EXTENSION OF FranzLISP F. Franek Technical Report no TR-22/88
r_lisp.asc Page 1 McESE-FranzLISP: McMASTER EXPERT SYSTEM EXTENSION OF FranzLISP F. Franek Technical Repor no TR-22/88 Deparmen of Compuer Science and Sysems McMaser Universiy 1988 McESE-FranzLISP: McMASTER
More informationSchedule. Curves & Surfaces. Questions? Last Time: Today. Limitations of Polygonal Meshes. Acceleration Data Structures.
Schedule Curves & Surfaces Sunday Ocober 5 h, * 3-5 PM *, Room TBA: Review Session for Quiz 1 Exra Office Hours on Monday (NE43 Graphics Lab) Tuesday Ocober 7 h : Quiz 1: In class 1 hand-wrien 8.5x11 shee
More informationRay Tracing II. Improving Raytracing Speed. Improving Computational Complexity. Raytracing Computational Complexity
Ra Tracing II Iproving Raracing Speed Copuer Graphics Ra Tracing II 2005 Fabio Pellacini 1 Copuer Graphics Ra Tracing II 2005 Fabio Pellacini 2 Raracing Copuaional Coplei ra-scene inersecion is epensive
More informationNEWTON S SECOND LAW OF MOTION
Course and Secion Dae Names NEWTON S SECOND LAW OF MOTION The acceleraion of an objec is defined as he rae of change of elociy. If he elociy changes by an amoun in a ime, hen he aerage acceleraion during
More informationTHERMAL PHYSICS COMPUTER LAB #3 : Stability of Dry Air and Brunt-Vaisala Oscillations
THERMAL PHYSICS COMPUTER LAB #3 : Sabiliy of Dry Air and Brun-Vaisala Oscillaions Consider a parcel of dry air of volume V, emperaure T and densiy ρ. I displace he same volume V of surrounding air of emperaure
More informationNetwork management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);
QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is
More informationToday. Curves & Surfaces. Can We Disguise the Facets? Limitations of Polygonal Meshes. Better, but not always good enough
Today Curves & Surfaces Moivaion Limiaions of Polygonal Models Some Modeling Tools & Definiions Curves Surfaces / Paches Subdivision Surfaces Limiaions of Polygonal Meshes Can We Disguise he Faces? Planar
More informationChapter 8 LOCATION SERVICES
Disribued Compuing Group Chaper 8 LOCATION SERVICES Mobile Compuing Winer 2005 / 2006 Overview Mobile IP Moivaion Daa ransfer Encapsulaion Locaion Services & Rouing Classificaion of locaion services Home
More informationSpline Curves. Color Interpolation. Normal Interpolation. Last Time? Today. glshademodel (GL_SMOOTH); Adjacency Data Structures. Mesh Simplification
Las Time? Adjacency Daa Srucures Spline Curves Geomeric & opologic informaion Dynamic allocaion Efficiency of access Mesh Simplificaion edge collapse/verex spli geomorphs progressive ransmission view-dependen
More informationSimple Network Management Based on PHP and SNMP
Simple Nework Managemen Based on PHP and SNMP Krasimir Trichkov, Elisavea Trichkova bsrac: This paper aims o presen simple mehod for nework managemen based on SNMP - managemen of Cisco rouer. The paper
More informationMATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008
MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o
More informationChapter Six Chapter Six
Chaper Si Chaper Si 0 CHAPTER SIX ConcepTess and Answers and Commens for Secion.. Which of he following graphs (a) (d) could represen an aniderivaive of he funcion shown in Figure.? Figure. (a) (b) (c)
More informationQuantitative macro models feature an infinite number of periods A more realistic (?) view of time
INFINIE-HORIZON CONSUMPION-SAVINGS MODEL SEPEMBER, Inroducion BASICS Quaniaive macro models feaure an infinie number of periods A more realisic (?) view of ime Infinie number of periods A meaphor for many
More informationScattering at an Interface: Normal Incidence
Course Insrucor Dr. Raymond C. Rumpf Office: A 337 Phone: (915) 747 6958 Mail: rcrumpf@uep.edu 4347 Applied lecromagneics Topic 3f Scaering a an Inerface: Normal Incidence Scaering These Normal noes Incidence
More informationDiscrete Event Systems. Lecture 14: Discrete Control. Continuous System. Discrete Event System. Discrete Control Systems.
Lecure 14: Discree Conrol Discree Even Sysems [Chaper: Sequenial Conrol + These Slides] Discree Even Sysems Sae Machine-Based Formalisms Saechars Grafce Laboraory 2 Peri Nes Implemenaion No covered in
More informationMatlab5 5.3 symbolisches Lösen von DGLn
C:\Si5\Ingmah\symbmalab\DGLn_N4_2.doc, Seie /5 Prof. Dr. R. Kessler, Homepage: hp://www.home.hs-karlsruhe.de/~kero/ Malab5 5.3 symbolisches Lösen von DGLn % Beispiele aus Malab 4.3 Suden Ediion Handbuch
More informationTest - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version
Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing
More information4 Error Control. 4.1 Issues with Reliable Protocols
4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can
More informationLast Time: Curves & Surfaces. Today. Questions? Limitations of Polygonal Meshes. Can We Disguise the Facets?
Las Time: Curves & Surfaces Expeced value and variance Mone-Carlo in graphics Imporance sampling Sraified sampling Pah Tracing Irradiance Cache Phoon Mapping Quesions? Today Moivaion Limiaions of Polygonal
More informationHandling uncertainty in semantic information retrieval process
Handling uncerainy in semanic informaion rerieval process Chkiwa Mounira 1, Jedidi Anis 1 and Faiez Gargouri 1 1 Mulimedia, InfoRmaion sysems and Advanced Compuing Laboraory Sfax Universiy, Tunisia m.chkiwa@gmail.com,
More informationChapter 3 MEDIA ACCESS CONTROL
Chaper 3 MEDIA ACCESS CONTROL Overview Moivaion SDMA, FDMA, TDMA Aloha Adapive Aloha Backoff proocols Reservaion schemes Polling Disribued Compuing Group Mobile Compuing Summer 2003 Disribued Compuing
More informationCMPSC 274: Transac0on Processing Lecture #6: Concurrency Control Protocols
CMPSC 274: Transac0on Processing Lecure #6: Concurrency Conrol Proocols Divy Agrawal Deparmen of Compuer Science UC Sana Barbara 4.4.1 Timesamp Ordering 4.4.2 Serializa0on Graph Tes0ng 4.4.3 Op0mis0c Proocols
More informationCOSC 3213: Computer Networks I Chapter 6 Handout # 7
COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:
More informationPetri Nets for Object-Oriented Modeling
Peri Nes for Objec-Oriened Modeling Sefan Wi Absrac Ensuring he correcness of concurren rograms is difficul since common aroaches for rogram design do no rovide aroriae mehods This aer gives a brief inroducion
More informationMOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi:
MOBILE COMPUTING CSE 40814/60814 Fall 2015 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically
More informationMOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018
MOBILE COMPUTING CSE 40814/60814 Spring 2018 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically
More informationOutline. CS38 Introduction to Algorithms 5/8/2014. Network flow. Lecture 12 May 8, 2014
/8/0 Ouline CS8 Inroducion o Algorihm Lecure May 8, 0 Nework flow finihing capaciy-caling analyi Edmond-Karp, blocking-flow implemenaion uni-capaciy imple graph biparie maching edge-dijoin pah aignmen
More informationPiecewise Linear Models
6-6 Applied Operaions Research Piecewise Linear Models Deparmen of Mahemaics and Saisics The Universi of Melbourne This presenaion has been made in accordance wih he provisions of Par VB of he coprigh
More informationImproving Ranking of Search Engines Results Based on Power Links
IPASJ Inernaional Journal of Informaion Technology (IIJIT) Web Sie: hp://www.ipasj.org/iijit/iijit.hm A Publisher for Research Moivaion... Email: edioriiji@ipasj.org Volume 2, Issue 9, Sepember 2014 ISSN
More informationA non-stationary uniform tension controlled interpolating 4-point scheme reproducing conics
A non-saionary uniform ension conrolled inerpolaing 4-poin scheme reproducing conics C. Beccari a, G. Casciola b, L. Romani b, a Deparmen of Pure and Applied Mahemaics, Universiy of Padova, Via G. Belzoni
More information1 œ DRUM SET KEY. 8 Odd Meter Clave Conor Guilfoyle. Cowbell (neck) Cymbal. Hi-hat. Floor tom (shell) Clave block. Cowbell (mouth) Hi tom.
DRUM SET KEY Hi-ha Cmbal Clave block Cowbell (mouh) 0 Cowbell (neck) Floor om (shell) Hi om Mid om Snare Floor om Snare cross sick or clave block Bass drum Hi-ha wih foo 8 Odd Meer Clave Conor Guilfole
More informationThe Roots of Lisp paul graham
The Roos of Lisp paul graham Draf, January 18, 2002. In 1960, John McCarhy published a remarkable paper in which he did for programming somehing like wha Euclid did for geomery. 1 He showed how, given
More informationOptics and Light. Presentation
Opics and Ligh Presenaion Opics and Ligh Wha comes o mind when you hear he words opics and ligh? Wha is an opical illusion? Opical illusions can use color, ligh and paerns o creae images ha can be
More informationNRMI: Natural and Efficient Middleware
NRMI: Naural and Efficien Middleware Eli Tilevich and Yannis Smaragdakis Cener for Experimenal Research in Compuer Sysems (CERCS), College of Compuing, Georgia Tech {ilevich, yannis}@cc.gaech.edu Absrac
More informationBoyce - DiPrima 8.4, Multistep Methods
Boyce - DiPrima 8., Mulisep Mehods Secion 8., p. 67: Iniializaion In[1]:= In[]:= Impor "ColorNames.m" DiffEqs` Runga-Kua Mehod Implemen one sep of he Runge-Kua Mehod. In[]:= Clear y,, h, f ; eqn : y' f,
More informationRestorable Dynamic Quality of Service Routing
QOS ROUTING Resorable Dynamic Qualiy of Service Rouing Murali Kodialam and T. V. Lakshman, Lucen Technologies ABSTRACT The focus of qualiy-of-service rouing has been on he rouing of a single pah saisfying
More informationSCHED_DEADLINE (what it does and doesn't do, yet).
SCHED_DEADLINE (wha i does and doesn' do, ye). Juri Lelli Deparmen of Auomaic Conrol Lund Universiy (Sweden), May 5h 2014 TeCIP Insiue, Scuola Superiore San'Anna Area della Ricerca CNR, Via G. Moruzzi
More informationA pipeline polish string computer*
A pipeline polish sring compuer* by GERARD G. BAILLE and JEAN P. SCHOELLKOPF Co--,np'ueT ATcli-iecure Group Grenoble "Universiy, France ABSTRACT This paper describes a new compuer organizaion which allows
More informationDifficulty-aware Hybrid Search in Peer-to-Peer Networks
Difficuly-aware Hybrid Search in Peer-o-Peer Neworks Hanhua Chen, Hai Jin, Yunhao Liu, Lionel M. Ni School of Compuer Science and Technology Huazhong Univ. of Science and Technology {chenhanhua, hjin}@hus.edu.cn
More informationBI-TEMPORAL INDEXING
BI-TEMPORAL INDEXING Mirella M. Moro Uniersidade Federal do Rio Grande do Sul Poro Alegre, RS, Brazil hp://www.inf.ufrgs.br/~mirella/ Vassilis J. Tsoras Uniersiy of California, Rierside Rierside, CA 92521,
More informationDEFINITION OF THE LAPLACE TRANSFORM
74 CHAPER 7 HE LAPLACE RANSFORM 7 DEFINIION OF HE LAPLACE RANSFORM REVIEW MAERIAL Improper inegral wih infinie limi of inegraio Inegraion y par and parial fracion decompoiion INRODUCION In elemenary calculu
More informationC 1. Last Time. CSE 490/590 Computer Architecture. Cache I. Branch Delay Slots (expose control hazard to software)
CSE 490/590 Compuer Archiecure Cache I Seve Ko Compuer Sciences and Engineering Universiy a Buffalo Las Time Pipelining hazards Srucural hazards hazards Conrol hazards hazards Sall Bypass Conrol hazards
More informationAn Efficient Delivery Scheme for Coded Caching
201 27h Inernaional Teleraffic Congress An Efficien Delivery Scheme for Coded Caching Abinesh Ramakrishnan, Cedric Wesphal and Ahina Markopoulou Deparmen of Elecrical Engineering and Compuer Science, Universiy
More informationReal Time Integral-Based Structural Health Monitoring
Real Time Inegral-Based Srucural Healh Monioring The nd Inernaional Conference on Sensing Technology ICST 7 J. G. Chase, I. Singh-Leve, C. E. Hann, X. Chen Deparmen of Mechanical Engineering, Universiy
More informationTraditional Rendering (Ray Tracing and Radiosity)
Tradiional Rendering (Ray Tracing and Radiosiy) CS 517 Fall 2002 Compuer Science Cornell Universiy Bidirecional Reflecance (BRDF) λ direcional diffuse specular θ uniform diffuse τ σ BRDF Bidirecional Reflecance
More informationReal Time Contextual Summarization of Highly Dynamic Data Streams
Real Time Conexual Summarizaion of Highly Dynamic Daa Sreams Manoj K Agarwal Microsof Bing Search Technology Cener - India Hyderabad 500032, India agarwalm@microsof.com Krihi Ramamriham Dep. of Compuer
More informationCurves & Surfaces. Last Time? Today. Readings for Today (pick one) Limitations of Polygonal Meshes. Today. Adjacency Data Structures
Las Time? Adjacency Daa Srucures Geomeric & opologic informaion Dynamic allocaion Efficiency of access Curves & Surfaces Mesh Simplificaion edge collapse/verex spli geomorphs progressive ransmission view-dependen
More informationThe Impact of Product Development on the Lifecycle of Defects
The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes
More informationFully Dynamic Algorithm for Top-k Densest Subgraphs
Fully Dynamic Algorihm for Top-k Denses Subgraphs Muhammad Anis Uddin Nasir 1, Arisides Gionis 2, Gianmarco De Francisci Morales 3 Sarunas Girdzijauskas 4 Royal Insiue of Technology, Sweden Aalo Universiy,
More informationshared via CourseHero.com This study resource was Exam #1 for Computer Networks (CIS 6930) Fall 2003 >>> SOLUTIONS <<<
Exam #1 for Compuer Neworks (CIS 6930) Fall 2003 >>> SOLUTIONS
More informationDimmer time switch AlphaLux³ D / 27
Dimmer ime swich AlphaLux³ D2 426 26 / 27! Safey noes This produc should be insalled in line wih insallaion rules, preferably by a qualified elecrician. Incorrec insallaion and use can lead o risk of elecric
More informationTUTORING TEXTS IN MATHCAD
TUTORING TEXTS IN MATHCAD MIROSLAV DOLOZÍILEK and ANNA RYNDOVÁ Faculy of Mechanical Engineering, Brno Universiy of Technology Technická, 616 69 Brno, Czech Republic E-ail: irdo@fyzika.fe.vubr.cz Absrac
More informationOutline. EECS Components and Design Techniques for Digital Systems. Lec 06 Using FSMs Review: Typical Controller: state
Ouline EECS 5 - Componens and Design Techniques for Digial Sysems Lec 6 Using FSMs 9-3-7 Review FSMs Mapping o FPGAs Typical uses of FSMs Synchronous Seq. Circuis safe composiion Timing FSMs in verilog
More informationCoded Caching with Multiple File Requests
Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a
More informationProject #1 Math 285 Name:
Projec #1 Mah 85 Name: Solving Orinary Differenial Equaions by Maple: Sep 1: Iniialize he program: wih(deools): wih(pdeools): Sep : Define an ODE: (There are several ways of efining equaions, we sar wih
More informationRULES OF DIFFERENTIATION LESSON PLAN. C2 Topic Overview CALCULUS
CALCULUS C Topic Overview C RULES OF DIFFERENTIATION In pracice we o no carry ou iffereniaion from fir principle (a ecribe in Topic C Inroucion o Differeniaion). Inea we ue a e of rule ha allow u o obain
More informationConstant-Work-Space Algorithms for Shortest Paths in Trees and Simple Polygons
Journal of Graph Algorihms and Applicaions hp://jgaa.info/ vol. 15, no. 5, pp. 569 586 (2011) Consan-Work-Space Algorihms for Shores Pahs in Trees and Simple Polygons Tesuo Asano 1 Wolfgang Mulzer 2 Yajun
More informationSCHED_DEADLINE How to use it
TeCIP Insiue, Scuola Superiore San'Anna Area della Ricerca CNR, Via G. Moruzzi 1 56127 Pisa, Ialy SCHED_DEADLINE How o use i Juri Lelli Reis Lab SSSUP Pisa (Ialy), June 26h 2014 Basics and saus Ouline
More informationVoltair Version 2.5 Release Notes (January, 2018)
Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For
More informationIntroduction to Computer Graphics 10. Curves and Surfaces
Inroduion o Comuer Grahis. Curves and Surfaes I-Chen Lin, Assisan Professor Naional Chiao Tung Univ, Taiwan Tebook: E.Angel, Ineraive Comuer Grahis, 5 h Ed., Addison Wesley Ref: Hearn and aker, Comuer
More informationME 406 Assignment #1 Solutions
Assignmen#1Sol.nb 1 ME 406 Assignmen #1 Soluions PROBLEM 1 We define he funcion for Mahemaica. In[1]:= f@_d := Ep@D - 4 Sin@D (a) We use Plo o consruc he plo. In[2]:= Plo@f@D, 8, -5, 5
More informationLess Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks
Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research
More informationChapter 4 Sequential Instructions
Chaper 4 Sequenial Insrucions The sequenial insrucions of FBs-PLC shown in his chaper are also lised in secion 3.. Please refer o Chaper, "PLC Ladder diagram and he Coding rules of Mnemonic insrucion",
More informationBEST DYNAMICS NAMICS CRM A COMPILATION OF TECH-TIPS TO HELP YOUR BUSINESS SUCCEED WITH DYNAMICS CRM
DYNAMICS CR A Publicaion by elogic s fines Microsof Dynamics CRM Expers { ICS CRM BEST OF 2014 A COMPILATION OF TECH-TIPS TO HELP YOUR BUSINESS SUCCEED WITH DYNAMICS CRM NAMICS CRM { DYNAMICS M INTRODUCTION
More informationA Formalization of Ray Casting Optimization Techniques
A Formalizaion of Ray Casing Opimizaion Techniques J. Revelles, C. Ureña Dp. Lenguajes y Sisemas Informáicos, E.T.S.I. Informáica, Universiy of Granada, Spain e-mail: [jrevelle,almagro]@ugr.es URL: hp://giig.ugr.es
More informationTHE EQUIVALENCE OF MODELS OF TASKING + by Daniel M. Berry Brown University
THE EQUVALENCE OF MODELS OF TASKNG + by Daniel M. Berry Brown Universiy Absrac. A echnique for proving he equivalence of implemenaions of muli-asking programming languages is developed and applied o proving
More informationMB86297A Carmine Timing Analysis of the DDR Interface
Applicaion Noe MB86297A Carmine Timing Analysis of he DDR Inerface Fujisu Microelecronics Europe GmbH Hisory Dae Auhor Version Commen 05.02.2008 Anders Ramdahl 0.01 Firs draf 06.02.2008 Anders Ramdahl
More information3.2 Use Parallel Lines and
3. Use Parallel Lines and Transversals Goal Use angles formed by arallel lines and ransversals. Your Noes POSTULATE CORRESPONDING ANGLES POSTULATE If wo arallel lines are cu by a ransversal, hen he airs
More informationLearning in Games via Opponent Strategy Estimation and Policy Search
Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen
More information