Algorithms writing WRITING FOR COMPUTER SCIENCE ALGORITHMS XUE, LEI

Size: px
Start display at page:

Download "Algorithms writing WRITING FOR COMPUTER SCIENCE ALGORITHMS XUE, LEI"

Transcription

1 Algorithms writing WRITING FOR COMPUTER SCIENCE ALGORITHMS XUE, LEI

2 Why is the algorithm so important? Algorithm is always the core contribution in many papers in computer science; These algorithms are often the product of moths of hard work; An algorithm is usually submitted based on a great detail of discussion, barnstorming, prototyping, testing, analysis, and debate over details. 2

3 How to describe algorithms in a paper? 3

4 Presentation of a algorithm a. It provides a new or better way to compute a result. b. In order to explain a complex process. c. In order to show it is feasible to compute a result, regardless of the cost, or to show that a problem is decidable. A formal demonstration of correctness Performance An experimental validation. When such demonstrations are absent, the reason for the absence should be clear. 4

5 What a reader would expect to find? a. The steps that make up the algorithm. b. The input and output, and the internal data structures used by the algorithm. c. The scope of application of the algorithm and its limitations. d. The properties that will allow demonstration of correctness (i.e., preconditions, postconditions, and loop invariants). e. A demonstration of correctness. f. A complexity analysis, for both space and time requirements. g. Experiments confirming the theoretical results. 5

6 Formalisms a. List style, the algorithm is broken down into a series of numbered or named steps and loops involving several steps are represented by "go to step X" statements. b. Pseudocode, the algorithm is presented as if written in a block-structured language and each line is numbered. c. Prosecode, number each step, never break a loop over several steps, use subnumbering for the parts of a step, and include explanatory text. d. Literate code, the detail of the algorithm is introduced gradually, intermingled with discussion of the underlying ideas and perhaps with the asymptotic analysis and proof of correctness e. Flowcharts should not be used to describe algorithms. (Because of lack of modularity, promotion of the use of goto statements, lack of space for explanatory text, insufficient space for complex conditions, and inability to clearly represent algorithms of any complexity.) 6

7 List style Advantage: There is no restriction on the amount of text used to describe a step (although a step should be a single activity), so there is room for a clear statement of each step and for remarks on its properties. Disadvantage: The control structure is often obscure and it is too easy for the discussion to bury the algorithm. 7

8 Pseudocode Advantage: The structure of the algorithm is immediately obvious. Disadvantage: Each statement is forced by formatting considerations to be fairly terse It is not easy to include detailed comments. 8

9 Prosecode Advantage: The specification of the algorithm is direct and clear. The assignment symbol " is a good choice because it is unambiguous, in contrast to symbols such as "=". Disadvantage: The prosecode style of presentation is only effective when the concepts underlying the algorithm have been discussed before the algorithm is given. 9

10 Literate code This example is incomplete, most algorithms worth presenting need a substantial explanation that can't be condensed into a page or two. 10

11 Notation Mathematical notation is preferable to programming notation for presentation of algorithms. Mathematics provides many handy conventions and symbols that can be used in description of algorithms, including set notation, subscripts and superscripts, and symbols. It was once common to include the text of a program in a paper, in addition to a description of the algorithm it embodies. This 11

12 Environment of algorithms Specify the types of all variables, other than trivial items such as counters; Describe data structures carefully. Be consistent. 12

13 Performance of algorithms a. Basic of evaluation. The basis of evaluation should be made explicit. Where algorithms are being compared, specify not only the environment but also the criteria used for comparison. b. Processing time. Time (or speed) over some given input is one of the principal resources used by algorithms; others are memory, disk space, and disk and network traffic. c. Memory requirements. You should take care to specify how your algorithms use memory. d. Disk and network traffic. Disk costs have two components, the time to fetch the first bit of requested data (seek and latency time) and the time required to transmit the requested data (at a transfer rate). e. Applicability. Algorithms can be compared not only with regard to their resource requirements, but with regard to functionality. f. Asymptotic complexity. 13

14 Thanks!

Hardware versus software

Hardware versus software Logic 1 Hardware versus software 2 In hardware such as chip design or architecture, designs are usually proven to be correct using proof tools In software, a program is very rarely proved correct Why?

More information

Checklist for Requirements Specification Reviews

Checklist for Requirements Specification Reviews Checklist for Requirements Specification Reviews Organization and Completeness o Are all internal cross-references to other requirements correct? o Are all requirements written at a consistent and appropriate

More information

CSC Advanced Object Oriented Programming, Spring Specification

CSC Advanced Object Oriented Programming, Spring Specification CSC 520 - Advanced Object Oriented Programming, Spring 2018 Specification Specification A specification is an unambiguous description of the way the components of the software system should be used and

More information

CS 161 Computer Security

CS 161 Computer Security Wagner Spring 2014 CS 161 Computer Security 1/27 Reasoning About Code Often functions make certain assumptions about their arguments, and it is the caller s responsibility to make sure those assumptions

More information

ITC213: STRUCTURED PROGRAMMING. Bhaskar Shrestha National College of Computer Studies Tribhuvan University

ITC213: STRUCTURED PROGRAMMING. Bhaskar Shrestha National College of Computer Studies Tribhuvan University ITC213: STRUCTURED PROGRAMMING Bhaskar Shrestha National College of Computer Studies Tribhuvan University Lecture 03: Program Development Life Cycle Readings: Not Covered in Textbook Program Development

More information

JPred-P 2. Josh Choi, Michael Welch {joshchoi,

JPred-P 2. Josh Choi, Michael Welch {joshchoi, JPred-P 2 Josh Choi, Michael Welch {joshchoi, mjwelch}@cs.ucla.edu 1. Introduction Precondition and postcondition checking on methods aids the development process by explicitly notifying the programmer

More information

https://asd-pa.perfplusk12.com/admin/admin_curric_maps_display.aspx?m=5507&c=618&mo=18917&t=191&sy=2012&bl...

https://asd-pa.perfplusk12.com/admin/admin_curric_maps_display.aspx?m=5507&c=618&mo=18917&t=191&sy=2012&bl... Page 1 of 13 Units: - All - Teacher: ProgIIIJavaI, CORE Course: ProgIIIJavaI Year: 2012-13 Intro to Java How is data stored by a computer system? What does a compiler do? What are the advantages of using

More information

Assignment Semester 2 IT Skills(WBL version) CE

Assignment Semester 2 IT Skills(WBL version) CE Staffordshire University Assignment Semester 2 IT Skills(WBL version) CE00891 1 Hand In Date Part one 12th March 2010 Demonstration of Part two week commencing 3 rd May 2010 Contents Your Task is to do

More information

Algorithms 1 / 24. Algorithms Sequential Search

Algorithms 1 / 24. Algorithms Sequential Search Algorithm: a well-ordered collection of unambiguous and effectively computable operations, that, when executed, produces a result in a finite amount of time. 1 / 24 Algorithm: a well-ordered collection

More information

Techniques for the unambiguous specification of software

Techniques for the unambiguous specification of software Formal Techniques for the unambiguous of software Objectives To explain why formal techniques help discover problems in system requirements To describe the use of algebraic techniques for interface To

More information

Module 2 Communication Switching. Version 1 ECE, IIT Kharagpur

Module 2 Communication Switching. Version 1 ECE, IIT Kharagpur Module 2 Communication Switching Lesson 4 Connectionless And Connection Oriented Packet Switching LESSON OBJECTIVE General This lesson is intended to give the reader the understanding of two important

More information

Semantic Analysis Type Checking

Semantic Analysis Type Checking Semantic Analysis Type Checking Maryam Siahbani CMPT 379 * Slides are modified version of Schwarz s compiler course at Stanford 4/8/2016 1 Type Checking Type errors arise when operations are performed

More information

CPSC 121: Models of Computation Assignment #5

CPSC 121: Models of Computation Assignment #5 CPSC 2: Models of Computation Assignment #5 Due: Monday, November 27, 27 at 4:pm Total Marks: 27 Submission Instructions-- read carefully We strongly recommend that assignments be done in groups of 2.

More information

Formal Foundations of Software Engineering

Formal Foundations of Software Engineering Formal Foundations of Software Engineering http://d3s.mff.cuni.cz Martin Nečaský Pavel Parízek CHARLES UNIVERSITY IN PRAGUE faculty of mathematics and physics Goals of the course Show methods and tools

More information

CS : Programming for Non-majors, Summer 2007 Programming Project #2: Census Due by 12:00pm (noon) Wednesday June

CS : Programming for Non-majors, Summer 2007 Programming Project #2: Census Due by 12:00pm (noon) Wednesday June CS 1313 010: Programming for Non-majors, Summer 2007 Programming Project #2: Census Due by 12:00pm (noon) Wednesday June 20 2007 This second assignment will introduce you to designing, developing, testing

More information

Introduction. Introduction. Description of Algorithms. Peaks. Algorithms and Data Structures Peaks Algorithm 1 Algorithm 2 Algorithm 3

Introduction. Introduction. Description of Algorithms. Peaks. Algorithms and Data Structures Peaks Algorithm 1 Algorithm 2 Algorithm 3 Philip Bille Algorithms and Data Structures Algorithmic problem. Precisely defined relation between input and output. Algorithm. Method to solve an algorithm problem. Discrete and unambiguous steps. Mathematical

More information

III. Check if the divisors add up to the number. Now we may consider each of these tasks separately, assuming the others will be taken care of

III. Check if the divisors add up to the number. Now we may consider each of these tasks separately, assuming the others will be taken care of Top-Down Design 1 Top-Down Design: A solution method where the problem is broken down into smaller sub-problems, which in turn are broken down into smaller subproblems, continuing until each sub-problem

More information

Steps to program development

Steps to program development Automate processes - Programming Concepts and Design Steps to program development A computer program is a set of formal instructions, which the computer executes in order to carry out some designated task.

More information

For example, let's say that we have the following functional specification:

For example, let's say that we have the following functional specification: FRAME IT: THE NUTS AND BOLTS OF RAD Marty Brown, CommScope, Inc., Claremont, NC INTRODUCTION The road to finishing a quality application does not have to be a long and confusing one. With the advent of

More information

Goal of the course: The goal is to learn to design and analyze an algorithm. More specifically, you will learn:

Goal of the course: The goal is to learn to design and analyze an algorithm. More specifically, you will learn: CS341 Algorithms 1. Introduction Goal of the course: The goal is to learn to design and analyze an algorithm. More specifically, you will learn: Well-known algorithms; Skills to analyze the correctness

More information

1. In waterfall model, output of one phase is input to next phase. True or false.

1. In waterfall model, output of one phase is input to next phase. True or false. 1. In waterfall model, output of one phase is input to next phase. True or false. a) True b) False ANSWER: a) True Comment: The output of requirement gathering is creation of URS (User requirement specification)

More information

Chapter 9. Introduction to High-Level Language Programming. INVITATION TO Computer Science

Chapter 9. Introduction to High-Level Language Programming. INVITATION TO Computer Science Chapter 9 Introduction to High-Level Language Programming INVITATION TO Computer Science 1 Objectives After studying this chapter, students will be able to: Explain the advantages of high-level programming

More information

SNS COLLEGE OF ENGINEERING,

SNS COLLEGE OF ENGINEERING, SNS COLLEGE OF ENGINEERING, COIMBATORE Department of Computer Science and Engineering QUESTION BANK(PART A) GE8151 - PROBLEM SOLVING AND PYTHON PROGRAMMING TWO MARKS UNIT-I 1. What is computer? Computers

More information

2. Introduction to UML & Discussion of Related S.E.

2. Introduction to UML & Discussion of Related S.E. 2. Introduction to UML & Discussion of Related S.E. 2. Introduction to UML...1 2.1 Context of UML...2 2.1.1 A classical view of specification & design, & how they are related...2 2.1.2 Examples of requirement

More information

Chapter 3. Describing Syntax and Semantics

Chapter 3. Describing Syntax and Semantics Chapter 3 Describing Syntax and Semantics Chapter 3 Topics Introduction The General Problem of Describing Syntax Formal Methods of Describing Syntax Attribute Grammars Describing the Meanings of Programs:

More information

When Brunel s ship the SS Great Britain was launched into the River Thames, it made such a splash that several spectators on the opposite bank were

When Brunel s ship the SS Great Britain was launched into the River Thames, it made such a splash that several spectators on the opposite bank were C. A. R. Hoare Emeritus Professor of Computing at the University of Oxford and is now a senior researcher at Microsoft Research in Cambridge, England. He received the 1980 ACM Turing Award for his fundamental

More information

12/30/2013 S. NALINI,AP/CSE

12/30/2013 S. NALINI,AP/CSE 12/30/2013 S. NALINI,AP/CSE 1 UNIT I ITERATIVE AND RECURSIVE ALGORITHMS Iterative Algorithms: Measures of Progress and Loop Invariants-Paradigm Shift: Sequence of Actions versus Sequence of Assertions-

More information

Checking Program Properties with ESC/Java

Checking Program Properties with ESC/Java Checking Program Properties with ESC/Java 17-654/17-765 Analysis of Software Artifacts Jonathan Aldrich 1 ESC/Java A checker for Java programs Finds null pointers, array dereferences Checks Hoare logic

More information

PLD Semester Exam Study Guide Dec. 2018

PLD Semester Exam Study Guide Dec. 2018 Covers material from Chapters 1-8. Semester Exam will be built from these questions and answers, though they will be re-ordered and re-numbered and possibly worded slightly differently than on this study

More information

Assignment 1: Needfinding

Assignment 1: Needfinding Assignment 1: Needfinding Category Unsatisfactory Bare minimum Satisfactory effort & Above & Beyond Observations or. student observed only one person and/or the student observed an activity unrelated to

More information

Design Proposal: Outline

Design Proposal: Outline Design Proposal: Outline This outline should be used as a checklist to help each member of the team make sure that every section of the document meets the requirements for a design proposal. Writing Style

More information

Chapter 2. Designing a Program. Input, Processing, and Output Fall 2016, CSUS. Chapter 2.1

Chapter 2. Designing a Program. Input, Processing, and Output Fall 2016, CSUS. Chapter 2.1 Chapter 2 Input, Processing, and Output Fall 2016, CSUS Designing a Program Chapter 2.1 1 Algorithms They are the logic on how to do something how to compute the value of Pi how to delete a file how to

More information

Algorithm Engineering Applied To Graph Clustering

Algorithm Engineering Applied To Graph Clustering Algorithm Engineering Applied To Graph Clustering Insights and Open Questions in Designing Experimental Evaluations Marco 1 Workshop on Communities in Networks 14. March, 2008 Louvain-la-Neuve Outline

More information

Introduction to Software Specifications and Data Flow Diagrams. Neelam Gupta The University of Arizona

Introduction to Software Specifications and Data Flow Diagrams. Neelam Gupta The University of Arizona Introduction to Software Specifications and Data Flow Diagrams Neelam Gupta The University of Arizona Specification A broad term that means definition Used at different stages of software development for

More information

Top Down Design. 2. Design Methodology

Top Down Design. 2. Design Methodology Top Down Design 1 A solution method where the problem is broken down into smaller subproblems, which in turn are broken down into smaller problems until each subproblem can be solved in a few steps. (Also

More information

Programming Languages Third Edition. Chapter 9 Control I Expressions and Statements

Programming Languages Third Edition. Chapter 9 Control I Expressions and Statements Programming Languages Third Edition Chapter 9 Control I Expressions and Statements Objectives Understand expressions Understand conditional statements and guards Understand loops and variation on WHILE

More information

Data Structures and Algorithms CSE 465

Data Structures and Algorithms CSE 465 Data Structures and Algorithms CSE 465 LECTURE 2 Analysis of Algorithms Insertion Sort Loop invariants Asymptotic analysis Sofya Raskhodnikova and Adam Smith The problem of sorting Input: sequence a 1,

More information

Programming Languages Third Edition

Programming Languages Third Edition Programming Languages Third Edition Chapter 12 Formal Semantics Objectives Become familiar with a sample small language for the purpose of semantic specification Understand operational semantics Understand

More information

Programming Logic and Design Sixth Edition Chapter 2 Working with Data, Creating Modules, and Designing High-Quality Programs

Programming Logic and Design Sixth Edition Chapter 2 Working with Data, Creating Modules, and Designing High-Quality Programs Objectives Programming Logic and Design Sixth Edition Chapter 2 Working with Data, Creating Modules, and Designing High-Quality Programs In this chapter, you will learn about: Declaring and using variables

More information

Handout 9: Imperative Programs and State

Handout 9: Imperative Programs and State 06-02552 Princ. of Progr. Languages (and Extended ) The University of Birmingham Spring Semester 2016-17 School of Computer Science c Uday Reddy2016-17 Handout 9: Imperative Programs and State Imperative

More information

introduction to Programming in C Department of Computer Science and Engineering Lecture No. #40 Recursion Linear Recursion

introduction to Programming in C Department of Computer Science and Engineering Lecture No. #40 Recursion Linear Recursion introduction to Programming in C Department of Computer Science and Engineering Lecture No. #40 Recursion Linear Recursion Today s video will talk about an important concept in computer science which is

More information

3.4 Deduction and Evaluation: Tools Conditional-Equational Logic

3.4 Deduction and Evaluation: Tools Conditional-Equational Logic 3.4 Deduction and Evaluation: Tools 3.4.1 Conditional-Equational Logic The general definition of a formal specification from above was based on the existence of a precisely defined semantics for the syntax

More information

Source Code and Construction. CxOne Standard

Source Code and Construction. CxOne Standard Source Code and Construction CxOne Standard CxStand_Code.doc November 3, 2002 Advancing the Art and Science of Commercial Software Engineering Contents 0 INTRODUCTION... 1 0.1 SCOPE... 1 0.1.1 Relationship

More information

The Cleanroom Method

The Cleanroom Method Course "Softwareprozesse" The Cleanroom Method Lutz Prechelt Freie Universität Berlin, Institut für Informatik http://www.inf.fu-berlin.de/inst/ag-se/ Principles Empirical results Typical practices Stepwise

More information

Memory Management Virtual Memory

Memory Management Virtual Memory Memory Management Virtual Memory Part of A3 course (by Theo Schouten) Biniam Gebremichael http://www.cs.ru.nl/~biniam/ Office: A6004 April 4 2005 Content Virtual memory Definition Advantage and challenges

More information

CITS5501 Software Testing and Quality Assurance Formal methods

CITS5501 Software Testing and Quality Assurance Formal methods CITS5501 Software Testing and Quality Assurance Formal methods Unit coordinator: Arran Stewart May 1, 2018 1 / 49 Sources Pressman, R., Software Engineering: A Practitioner s Approach, McGraw-Hill, 2005

More information

Two hours. Please note that an OMR Sheet is attached for use with Section A: full instructions for their use are given in Section A

Two hours. Please note that an OMR Sheet is attached for use with Section A: full instructions for their use are given in Section A COMP23111 Two hours Please note that an OMR Sheet is attached for use with Section A: full instructions for their use are given in Section A QUESTION PAPER MUST NOT BE REMOVED FROM THE EXAM ROOM UNIVERSITY

More information

CSE 307: Principles of Programming Languages

CSE 307: Principles of Programming Languages CSE 307: Principles of Programming Languages Advanced Topics R. Sekar Topics 1 / 14 1. 2 / 14 Section 1 3 / 14 Semantics of Programs Syntax defines what programs are valid. Semantics defines what the valid

More information

Requirements Validation and Negotiation

Requirements Validation and Negotiation REQUIREMENTS ENGINEERING LECTURE 2015/2016 Eddy Groen Requirements Validation and Negotiation AGENDA Fundamentals of Requirements Validation Fundamentals of Requirements Negotiation Quality Aspects of

More information

7.1 Analysis 7.2 Design 7.3 Development and Testing 7.4 Implementation 7.5 Documentation 7.6 Evaluation

7.1 Analysis 7.2 Design 7.3 Development and Testing 7.4 Implementation 7.5 Documentation 7.6 Evaluation 7.1 Analysis 7.2 Design 7.3 Development and Testing 7.4 Implementation 7.5 Documentation 7.6 Evaluation Systems Analysts will review an existing system which is currently not meeting expectations. The

More information

DESKTOP PUBLISHING OVERVIEW PURPOSE ELIGIBILITY TIME LIMITS ATTIRE

DESKTOP PUBLISHING OVERVIEW PURPOSE ELIGIBILITY TIME LIMITS ATTIRE DESKTOP PUBLISHING OVERVIEW Participants produce a notebook containing a news release, a three (3)-column newsletter, and a poster. Each of these publications to attract students to the TSA organization.

More information

Writing better code Loop invariants Correctness. John Edgar 2

Writing better code Loop invariants Correctness. John Edgar 2 Writing better code Loop invariants Correctness John Edgar 2 Not all code is equal Correct and reliable code is one of our goals Is a new car correct or reliable? Other characteristics of good code Affordable

More information

Verification and Validation. Verification and validation

Verification and Validation. Verification and validation Verification and Validation Verification and validation Verification and Validation (V&V) is a whole life-cycle process. V&V has two objectives: Discovery of defects, Assessment of whether or not the system

More information

Spring 2017 CMSC 140 Programming Project 7: Payroll

Spring 2017 CMSC 140 Programming Project 7: Payroll Spring 2017 CMSC 140 Programming Project 7: Payroll Concepts tested by the program: 1. Working with arrays 2. Using file operations 3. Using a selection sort to sort parallel arrays 4. Using a binary search

More information

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license.

Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Working with Health IT Systems is available under a Creative Commons Attribution-NonCommercial- ShareAlike 3.0 Unported license. Johns Hopkins University. Welcome to the Fundamentals of Health Workflow

More information

Algorithms - Ch2 Sorting

Algorithms - Ch2 Sorting Algorithms - Ch2 Sorting (courtesy of Prof.Pecelli with some changes from Prof. Daniels) 1/28/2015 91.404 - Algorithms 1 Algorithm Description Algorithm Description: -Pseudocode see conventions on p. 20-22

More information

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN

NOTES ON OBJECT-ORIENTED MODELING AND DESIGN NOTES ON OBJECT-ORIENTED MODELING AND DESIGN Stephen W. Clyde Brigham Young University Provo, UT 86402 Abstract: A review of the Object Modeling Technique (OMT) is presented. OMT is an object-oriented

More information

UNIT 13 Web Management GCE Applied ICT 1

UNIT 13 Web Management GCE Applied ICT 1 6963 Web Management Commentary on Assessment of Student 6963 Edexcel Inset Training September 2007-08 Assessment criteria Unit 13: strand a) outlining the need for a web hosting service giving a brief

More information

Online EA Routing Online EA User Manual Table of Contents

Online EA Routing Online EA User Manual Table of Contents Online EA Routing Online EA User Manual Table of Contents Routing, Delegating and Email Notification... 1 Work Item Routing... 1 Delegate... 2 Adding/Deleting a Delegate... 3 Email Notifications... 6 Predefine

More information

Software Requirements Specification (SRS) Software Requirements Specification for <Name of Project>

Software Requirements Specification (SRS) Software Requirements Specification for <Name of Project> Software Requirements Specification (SRS) Software Requirements Specification for Version Release Responsible Party Major Changes Date 0.1 Initial Document Release for

More information

STUDENT OUTLINE. Lesson 8: Structured Programming, Control Structures, if-else Statements, Pseudocode

STUDENT OUTLINE. Lesson 8: Structured Programming, Control Structures, if-else Statements, Pseudocode STUDENT OUTLINE Lesson 8: Structured Programming, Control Structures, if- Statements, Pseudocode INTRODUCTION: This lesson is the first of four covering the standard control structures of a high-level

More information

Lecture Notes: Hoare Logic

Lecture Notes: Hoare Logic Lecture Notes: Hoare Logic 17-654/17-754: Analysis of Software Artifacts Jonathan Aldrich (jonathan.aldrich@cs.cmu.edu) Lecture 3 1 Hoare Logic The goal of Hoare logic is to provide a formal system for

More information

Object-Oriented Programming and Laboratory of Simulation Development

Object-Oriented Programming and Laboratory of Simulation Development Object-Oriented Programming and Laboratory of Simulation Development Marco Valente LEM, Pisa and University of L Aquila January, 2008 Outline Goal: show major features of LSD and their methodological motivations

More information

Rules of Writing Software Requirement Specifications

Rules of Writing Software Requirement Specifications Short Note. Version 1a, FGCU April 10, 2018 A properly written Software Requirements Specification should adhere to a number of rules that can be expressed as matching the following properties: 1) Clarity

More information

An Ontological Approach to Domain Engineering

An Ontological Approach to Domain Engineering An Ontological Approach to Domain Engineering Richard de Almeida Falbo, Giancarlo Guizzardi, Katia Cristina Duarte International Conference on Software Engineering and Knowledge Engineering, SEKE 02 Taehoon

More information

CPSC 444 Project Milestone III: Prototyping & Experiment Design Feb 6, 2018

CPSC 444 Project Milestone III: Prototyping & Experiment Design Feb 6, 2018 CPSC 444 Project Milestone III: Prototyping & Experiment Design Feb 6, 2018 OVERVIEW... 2 SUMMARY OF MILESTONE III DELIVERABLES... 2 1. Blog Update #3 - Low-fidelity Prototyping & Cognitive Walkthrough,

More information

This session will provide an overview of the research resources and strategies that can be used when conducting business research.

This session will provide an overview of the research resources and strategies that can be used when conducting business research. Welcome! This session will provide an overview of the research resources and strategies that can be used when conducting business research. Many of these research tips will also be applicable to courses

More information

FUNDAMENTALS OF COMPUTING & COMPUTER PROGRAMMING UNIT III. 2 Marks PROBLEM SOLVING AND OFFICE AUTOMATION

FUNDAMENTALS OF COMPUTING & COMPUTER PROGRAMMING UNIT III. 2 Marks PROBLEM SOLVING AND OFFICE AUTOMATION FUNDAMENTALS OF COMPUTING & COMPUTER PROGRAMMING UNIT III 2 Marks PROBLEM SOLVING AND OFFICE AUTOMATION Planning the Computer Program Purpose Algorithm Flow Charts Pseudocode -Application Software Packages-

More information

Algorithm: 1. Introduction

Algorithm: 1. Introduction Algorithm 1 Algorithm: a finite set of instructions that specify a sequence of operations to be carried out in order to solve a specific problem or class of problems. [Zwass] Properties of algorithms:

More information

User Interface Evaluation

User Interface Evaluation User Interface Evaluation Cognitive Walkthrough Lecture #16 Agenda Evaluation through Expert Analysis Cognitive walkthrough Heuristic evaluation Model-based evaluation Cognitive dimension of notations

More information

CS 307: Software Engineering. Lecture 10: Software Design and Architecture

CS 307: Software Engineering. Lecture 10: Software Design and Architecture CS 307: Software Engineering Lecture 10: Software Design and Architecture Prof. Jeff Turkstra 2017 Dr. Jeffrey A. Turkstra 1 Announcements Discuss your product backlog in person or via email by Today Office

More information

Basic Verification Strategy

Basic Verification Strategy ormal Verification Basic Verification Strategy compare behavior to intent System Model of system behavior intent Verifier results Intent Usually, originates with requirements, refined through design and

More information

Distributed Systems Programming (F21DS1) Formal Verification

Distributed Systems Programming (F21DS1) Formal Verification Distributed Systems Programming (F21DS1) Formal Verification Andrew Ireland Department of Computer Science School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh Overview Focus on

More information

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems

Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Some Applications of Graph Bandwidth to Constraint Satisfaction Problems Ramin Zabih Computer Science Department Stanford University Stanford, California 94305 Abstract Bandwidth is a fundamental concept

More information

CPS122 Lecture: Detailed Design and Implementation

CPS122 Lecture: Detailed Design and Implementation CPS122 Lecture: Detailed Design and Implementation Objectives: Last revised March 3, 2017 1. To introduce the use of a complete UML class box to document the name, attributes, and methods of a class 2.

More information

Framework for Improvement in Cleanroom Software Engineering Thesis Submitted in the partial fulfillment of requirements for the award of the degree

Framework for Improvement in Cleanroom Software Engineering Thesis Submitted in the partial fulfillment of requirements for the award of the degree Framework for Improvement in Cleanroom Software Engineering Thesis Submitted in the partial fulfillment of requirements for the award of the degree of Master of Engineering in Software Engineering By:

More information

Part II. Hoare Logic and Program Verification. Why specify programs? Specification and Verification. Code Verification. Why verify programs?

Part II. Hoare Logic and Program Verification. Why specify programs? Specification and Verification. Code Verification. Why verify programs? Part II. Hoare Logic and Program Verification Part II. Hoare Logic and Program Verification Dilian Gurov Props: Models: Specs: Method: Tool: safety of data manipulation source code logic assertions Hoare

More information

Software Engineering using Formal Methods

Software Engineering using Formal Methods Software Engineering using Formal Methods Introduction to Promela Wolfgang Ahrendt 03 September 2015 SEFM: Promela /GU 150903 1 / 36 Towards Model Checking System Model Promela Program byte n = 0; active

More information

Understanding the æsthetics of math typesetting

Understanding the æsthetics of math typesetting Understanding the æsthetics of math typesetting Ulrik Vieth Vaihinger Straße 69 70567 Stuttgart Germany ulrik dot vieth (at) arcor dot de Abstract One of the core strengths of TEX is the ability to typeset

More information

Lecture 6: Requirements Engineering

Lecture 6: Requirements Engineering Lecture 6: Requirements Engineering Software System Design and Implementation ITCS/ITIS 6112/8112 001 Fall 2008 Dr. Jamie Payton Department of Computer Science University of North Carolina at Charlotte

More information

ANALYSIS OF ALGORITHMS

ANALYSIS OF ALGORITHMS ANALYSIS OF ALGORITHMS Running Time Pseudo-Code Asymptotic Notation Asymptotic Analysis Mathematical facts T(n) n = 4 Input Algorithm Output 1 Average Case vs. Worst Case Running Time of an Algorithm An

More information

Figure 1: Typical output of condor q -analyze

Figure 1: Typical output of condor q -analyze 1 Introduction The Condor high throughput distributed system is underpinned by the matchmaking process which performs distributed resource allocation. While the implementation of matchmaking is quite robust,

More information

3. DESCRIBING SYNTAX AND SEMANTICS

3. DESCRIBING SYNTAX AND SEMANTICS 3. DESCRIBING SYNTAX AND SEMANTICS CSc 4330/6330 3-1 9/15 Introduction The task of providing a concise yet understandable description of a programming language is difficult but essential to the language

More information

SOFTWARE ENGINEERING. Software Specification Software Design and Implementation Software Validation. Peter Mileff PhD

SOFTWARE ENGINEERING. Software Specification Software Design and Implementation Software Validation. Peter Mileff PhD Peter Mileff PhD SOFTWARE ENGINEERING Software Specification Software Design and Implementation Software Validation University of Miskolc Department of Information Technology Software Specification...

More information

DISASTER RECOVERY IN AN EMC DISKXTENDER FOR WINDOWS ENVIRONMENT

DISASTER RECOVERY IN AN EMC DISKXTENDER FOR WINDOWS ENVIRONMENT White Paper DISASTER RECOVERY IN AN EMC DISKXTENDER FOR WINDOWS ENVIRONMENT Recommended best practices Abstract This white paper explains how to prepare for disaster recovery in an environment where EMC

More information

Spark verification features

Spark verification features Spark verification features Paul Jackson School of Informatics University of Edinburgh Formal Verification Spring 2018 Adding specification information to programs Verification concerns checking whether

More information

LECTURE 9 Data Structures: A systematic way of organizing and accessing data. --No single data structure works well for ALL purposes.

LECTURE 9 Data Structures: A systematic way of organizing and accessing data. --No single data structure works well for ALL purposes. LECTURE 9 Data Structures: A systematic way of organizing and accessing data. --No single data structure works well for ALL purposes. Input Algorithm Output An algorithm is a step-by-step procedure for

More information

This section provides some reminders and some terminology with which you might not be familiar.

This section provides some reminders and some terminology with which you might not be familiar. Chapter 3: Functions 3.1 Introduction The previous chapter assumed that all of your Bali code would be written inside a sole main function. But, as you have learned from previous programming courses, modularizing

More information

CIS 895 agenttool III (Static) Project Plan Version 2.0. Project Plan. For agenttool III (Static) Version 2.0

CIS 895 agenttool III (Static) Project Plan Version 2.0. Project Plan. For agenttool III (Static) Version 2.0 Project Plan For agenttool III (Static) Version 2.0 Submitted in partial fulfillment of the requirements of the degree of MSE Deepti Gupta CIS 895 MSE Project Kansas State University Page 1 of 9 TABLE

More information

Have we Learned from the Vasa Disaster?

Have we Learned from the Vasa Disaster? Have we Learned from the Vasa Disaster? Jean-Raymond Abrial ETH Zurich September 19th 2006 The Vasa Disaster 1 The Story 2 - August 10, 1628: The Swedish warship Vasa sank. - This was her maiden voyage.

More information

Software Engineering

Software Engineering Software Engineering Lecture 13: Testing and Debugging Testing Peter Thiemann University of Freiburg, Germany SS 2014 Recap Recap Testing detect the presence of bugs by observing failures Recap Testing

More information

Decomposition into modules

Decomposition into modules Programming Languages Seminar Program Structure and readability Lefel Yaniv Hagay Pollak 1 Decomposition into modules On the criteria to be used in decomposing systems into modules by D.L.Parnas.(1972)

More information

Programming Logic and Design Seventh Edition Chapter 2 Elements of High-Quality Programs

Programming Logic and Design Seventh Edition Chapter 2 Elements of High-Quality Programs Programming Logic and Design Chapter 2 Elements of High-Quality Programs Objectives In this chapter, you will learn about: Declaring and using variables and constants Assigning values to variables [assignment

More information

CSc 225 Algorithms and Data Structures I Case Studies

CSc 225 Algorithms and Data Structures I Case Studies CSc 225 Algorithms and Data Structures I Case Studies Jianping Pan Fall 2007 9/12/07 CSc 225 1 Things we have so far Algorithm analysis pseudo code primitive operations worst-case scenarios Asymptotic

More information

Pseudocode. 1 Guidelines for writing pseudocode. CS 231 Naomi Nishimura

Pseudocode. 1 Guidelines for writing pseudocode. CS 231 Naomi Nishimura Pseudocode CS 231 Naomi Nishimura In lectures, algorithms will often be expressed in pseudocode, a mixture of code and English. While understanding pseudocode is usually not difficult, writing it can be

More information

Hardware Revision. AQA Computing AS-Level COMP2. 63 minutes. 60 marks. Page 1 of 24

Hardware Revision. AQA Computing AS-Level COMP2. 63 minutes. 60 marks. Page 1 of 24 Hardware Revision AQA Computing AS-Level COMP2 204 63 minutes 60 marks Page of 24 Q. The diagram below shows some of the components of a computer system. (a) Suggest names for the components numbered to

More information

Restricted Use Case Modeling Approach

Restricted Use Case Modeling Approach RUCM TAO YUE tao@simula.no Simula Research Laboratory Restricted Use Case Modeling Approach User Manual April 2010 Preface Use case modeling is commonly applied to document requirements. Restricted Use

More information

DITA for Enterprise Business Documents Sub-committee Proposal Background Why an Enterprise Business Documents Sub committee

DITA for Enterprise Business Documents Sub-committee Proposal Background Why an Enterprise Business Documents Sub committee DITA for Enterprise Business Documents Sub-committee Proposal Background Why an Enterprise Business Documents Sub committee Documents initiate and record business change. It is easy to map some business

More information

Answer any Five Questions. All questions carry equal marks.

Answer any Five Questions. All questions carry equal marks. PART I, PAPER I (Problem Solving and Programming) 1. What do you understand by function prototype? Differentiate between call by value and call by reference methods of parameters passing to a function

More information

Software Engineering using Formal Methods

Software Engineering using Formal Methods Software Engineering using Formal Methods Introduction to Promela Wolfgang Ahrendt & Richard Bubel & Reiner Hähnle & Wojciech Mostowski 31 August 2011 SEFM: Promela /GU 110831 1 / 35 Towards Model Checking

More information