Solution 3: (a) True. Proof.
|
|
- Angel Madeline Quinn
- 6 years ago
- Views:
Transcription
1 Solution 3: (a) True Proof. f = (x + f x ) (x + f x ) + f x f x + f x f x (x + x) f x + x f x + x f x f x (Boolean absorption) This is equal to Shannon s expansion of f. (b) True Proof. f = x f x x f x f = x f x (x f x ) + x f x (x f x ) f = x f x (x + f x ) + x f x (x + f x ) (DeMorgan) f x + x f x + x f x f x (Boolean absorption) This is equal to Shannon s expansion of f. (c) True Proof. (Shannon s expansion) f = (x + f x ) (x + f x ) (DeMorgan) + f x f x + f x f x (x + x) f x + x f x + x f x f x (Boolean absorption)
2
3 Problem 6 (Pseudo Code) ECE/CS 6745 Fall 2014 Solution HW1 September 25, 2014 Problem 6 Problem description: Given a ROBDD f with variables (x 1,x 2,...,x n )whichisordered by x 1 >x 2 > >x n. Our objective is to transform f to ROBDD f xi eliminating variable x i (or f x 0 i when x 0 i is negative cofactor) Algorithm 1 Arbitrary variable elimination algorithm on ROBDD 1: function ROBDDVarElim(f,i) 2: if v = top(f) then. v is the variable of top node 3: return f v or f v 0. Directly return f v or f v 0 when requiring negative cofactor 4: else 5: while BFS Traverse(f) do 6: if idx(v) =i then. Reach nodes of variable x i 7: Edge.Delete(v, low(v)) 8: Edge.Delete(v, high(v)). Delete its edges to children 9: for all parent(v) do. For all of its parent nodes 10: if x i is positive cofactor then 11: Redirect edge hparent(v), vi to hparent(v), high(v)i 12: else 13: Redirect edge hparent(v),vi to hparent(v),low(v)i 14: end if 15: Clean-up if a node has no reference. Please refer to Example 1 16: end for 17: Node.Delete(v) 18: end if 19: end while 20: f xi Reduce(top(f)). Please refer to Example 2 21: return f xi 22: end if 23: end function Note: low(), high(), idx() means the child on FALSE edge, child on TRUE edge, and index of variables of this node. Their definitions and function Reduce() can be found in Graph-Based Algorithms for Boolean Function Manipulation by R. E. Bryant, which is linked on class webpage. 1
4
5 int main() { FILE* fp; // Initializing the Manager // Cudd_Init(numVars, numvarsz, numslots, cachesize, maxmemory) DdManager* manager=cudd_init(0, 0, CUDD_UNIQUE_SLOTS, CUDD_CACHE_SLOTS, 0); if(manager == NULL) { printf("error while initializing CUDD\n"); return 1; } DdNode *one = Cudd_ReadOne(manager); DdNode *zero = Cudd_Not(one); char const * outputnames[1]; outputnames[0] = "BDD"; char const * inputnames[3]; inputnames[0] = "a"; inputnames[1] = "b"; inputnames[2] = "c"; DdNode *a, *b, *c; a = Cudd_bddNewVar(manager); Cudd_Ref(a); // a variable will have index 0 b = Cudd_bddNewVar(manager); Cudd_Ref(b); // 1 c = Cudd_bddNewVar(manager); Cudd_Ref(c); // 2 //Part 1 f1 = ab + ac + bc DdNode *ft11 = Cudd_bddOr(manager,b,c); Cudd_Ref(ft11); DdNode *ft12 = Cudd_bddAnd(manager,a,ft11); Cudd_Ref(ft12); DdNode *ft13 = Cudd_bddAnd(manager,b,c); Cudd_Ref(ft13); DdNode *f1 = Cudd_bddOr(manager, ft13, ft12); Cudd_Ref(f1); Cudd_RecursiveDeref(manager,ft11); Cudd_RecursiveDeref(manager,ft12); Cudd_RecursiveDeref(manager,ft13); // Some details about the function f1 Cudd_PrintDebug( manager, f1, 3, 3); // Printing out f1 fp = fopen("dot_files/f_maj.dot","w"); Cudd_DumpDot(manager, 1, &f1, inputnames, outputnames, fp); fclose(fp); // Positive Cofactor of f1 w.r.t. b DdNode *f1_b = Cudd_Cofactor(manager, f1, b); Cudd_Ref(f1_b); // Negative Cofactor of f1 w.r.t. b DdNode *f1_bbar = Cudd_Cofactor(manager, f1, Cudd_Not(b) ); Cudd_Ref(f1_bbar); DdNode *f1_check = Cudd_bddOr(manager,f1_b,Cudd_Not(f1_bbar)); Cudd_Ref(f1_check); // Checking for containment f1_bbar \subset f1_b if(f1_check == one) printf("f1_b contains f1_bbar\n"); else printf("f1_b does not contains f1_bbar\n");
6 //Dereferencing all the variables that are no longer needed Cudd_RecursiveDeref(manager,f1_check); Cudd_RecursiveDeref(manager,f1_bbar); Cudd_RecursiveDeref(manager,f1_b); Cudd_RecursiveDeref(manager,f1); //Part 2 f2 = a xor b xor c DdNode *ft21 = Cudd_bddXor(manager,a,b); Cudd_Ref(ft21); DdNode *f2 = Cudd_bddXor(manager, c, ft21); Cudd_Ref(f2); Cudd_RecursiveDeref(manager,ft21); // Some details about the function f2 Cudd_PrintDebug( manager, f2, 3, 3); // Printing out f2 fp = fopen("dot_files/f_xor.dot","w"); Cudd_DumpDot(manager, 1, &f2, inputnames, outputnames, fp); fclose(fp); // Positive Cofactor of f2 w.r.t. b DdNode *f2_b = Cudd_Cofactor(manager, f2, b); Cudd_Ref(f2_b); // Negative Cofactor of f2 w.r.t. b DdNode *f2_bbar = Cudd_Cofactor(manager, f2, Cudd_Not(b) ); Cudd_Ref(f2_bbar); DdNode *f2_check = Cudd_bddOr(manager,f2_b,Cudd_Not(f2_bbar)); Cudd_Ref(f2_check); // Checking for containment f2_bbar \subset f2_b if(f2_check == one) printf("f2_b contains f2_bbar\n"); else printf("f2_b does not contains f2_bbar\n"); //Dereferencing all the variables that are no longer needed Cudd_RecursiveDeref(manager,f2_check); Cudd_RecursiveDeref(manager,f2_bbar); Cudd_RecursiveDeref(manager,f2_b); Cudd_RecursiveDeref(manager,f2); //Dereferencing all the inputs Cudd_RecursiveDeref(manager, a); Cudd_RecursiveDeref(manager, b); Cudd_RecursiveDeref(manager, c); // Checking if ref-deref was done right int nonzref = Cudd_CheckZeroRef(manager); printf("no. of non-zero refs = %d\n", nonzref ); // Exiting the manager Cudd_Quit(manager); return 0; }
7
8
CUDD Colorado University Decision Diagram Package
CUDD Colorado University Decision Diagram Package Software per Sistemi Embedded Corso di Laurea in Informatica Davide Bresolin Tiziano Villa SSE (Lab) CUDD Lesson 3 1 / 21 Outline 1 Introduction 2 CUDD:
More informationL4: Binary Decision Diagrams. Reading material
L4: Binary Decision Diagrams de Micheli pp. 75-85 Reading material R. Bryant, Graph-ased algorithms for Boolean function manipulation, IEEE Transactions on computers, C-35, No 8, August 1986; can e downloaded
More informationBinary Decision Diagrams
5-44 Bug Catching: Automated Program Verification and Testing based on slides by SagarChaki 2 Carnegie Mellon University BDDs in a nutshell Typically mean Reduced Ordered (ROBDDs) Canonical representation
More informationBinary Decision Diagrams (BDD)
Binary Decision Diagrams (BDD) Contents Motivation for Decision diagrams Binary Decision Diagrams ROBDD Effect of Variable Ordering on BDD size BDD operations Encoding state machines Reachability Analysis
More informationEECS 219C: Formal Methods Binary Decision Diagrams (BDDs) Sanjit A. Seshia EECS, UC Berkeley
EECS 219C: Formal Methods Binary Decision Diagrams (BDDs) Sanjit A. Seshia EECS, UC Berkeley Boolean Function Representations Syntactic: e.g.: CNF, DNF (SOP), Circuit Semantic: e.g.: Truth table, Binary
More informationUnit 4: Formal Verification
Course contents Unit 4: Formal Verification Logic synthesis basics Binary-decision diagram (BDD) Verification Logic optimization Technology mapping Readings Chapter 11 Unit 4 1 Logic Synthesis & Verification
More informationSynthesis 1. 1 Figures in this chapter taken from S. H. Gerez, Algorithms for VLSI Design Automation, Wiley, Typeset by FoilTEX 1
Synthesis 1 1 Figures in this chapter taken from S. H. Gerez, Algorithms for VLSI Design Automation, Wiley, 1998. Typeset by FoilTEX 1 Introduction Logic synthesis is automatic generation of circuitry
More informationBoolean Representations and Combinatorial Equivalence
Chapter 2 Boolean Representations and Combinatorial Equivalence This chapter introduces different representations of Boolean functions. It then discusses the applications of these representations for proving
More informationChapter 6: Multilevel Combinational Circuits. Name: Lương Văn Minh No. :
Chapter 6: Multilevel Combinational Circuits Name: Lương Văn Minh No. : 09070452 Overview 6.1 Boolean Networks 6.2 Special Classes of Circuits 6.3 Binary Decision Diagrams 2 Overview 6.1 Boolean Networks
More informationCOL351: Analysis and Design of Algorithms (CSE, IITD, Semester-I ) Name: Entry number:
Name: Entry number: There are 6 questions for a total of 75 points. 1. Consider functions f(n) = 10n2 n + 3 n and g(n) = n3 n. Answer the following: (a) ( 1 / 2 point) State true or false: f(n) is O(g(n)).
More informationMotivation. CS389L: Automated Logical Reasoning. Lecture 5: Binary Decision Diagrams. Historical Context. Binary Decision Trees
Motivation CS389L: Automated Logical Reasoning Lecture 5: Binary Decision Diagrams Işıl Dillig Previous lectures: How to determine satisfiability of propositional formulas Sometimes need to efficiently
More informationBits and Bytes. Why bits? Representing information as bits Binary/Hexadecimal Byte representations» numbers» characters and strings» Instructions
Bits and Bytes Topics Why bits? Representing information as bits Binary/Hexadecimal Byte representations» numbers» characters and strings» Instructions Bit-level manipulations Boolean algebra Expressing
More informationBehavior models and verification Lecture 6
Behavior models and verification Lecture 6 http://d3s.mff.cuni.cz Jan Kofroň, František Plášil Model checking For a Kripke structure M = (S, I, R, L) over AP and a (state based) temporal logic formula
More informationModel Checking I Binary Decision Diagrams
/42 Model Checking I Binary Decision Diagrams Edmund M. Clarke, Jr. School of Computer Science Carnegie Mellon University Pittsburgh, PA 523 2/42 Binary Decision Diagrams Ordered binary decision diagrams
More informationOperating Systems Lab
Operating Systems Lab Islamic University Gaza Engineering Faculty Department of Computer Engineering Fall 2012 ECOM 4010: Operating Systems Lab Eng: Ahmed M. Ayash Lab # 3 Fork() in C and C++ programming
More informationCSCI2467: Systems Programming Concepts
CSCI2467: Systems Programming Concepts Slideset 2: Information as Data (CS:APP Chap. 2) Instructor: M. Toups Spring 2018 Course updates datalab out today! - due after Mardi gras... - do not wait until
More informationWhy Don t Computers Use Base 10? Lecture 2 Bits and Bytes. Binary Representations. Byte-Oriented Memory Organization. Base 10 Number Representation
Lecture 2 Bits and Bytes Topics! Why bits?! Representing information as bits " Binary/Hexadecimal " Byte representations» numbers» characters and strings» Instructions! Bit-level manipulations " Boolean
More informationAn Introduction to Zero-Suppressed Binary Decision Diagrams
An Introduction to Zero-Suppressed Binary Decision Diagrams Alan Mishchenko Berkeley Verification and Synthesis Research Center Department of Electrical Engineering and Computer Sciences University of
More informationAn Introduction to Zero-Suppressed Binary Decision Diagrams
An Introduction to Zero-Suppressed Binary Decision Diagrams Alan Mishchenko Department of Electrical and Computer Engineering Portland State University, Portland, OR 97207, USA alanmi@ee.pdx.edu; http://www.ee.pdx.edu/~alanmi/research.htm
More information1/28/2013. Synthesis. The Y-diagram Revisited. Structural Behavioral. More abstract designs Physical. CAD for VLSI 2
Synthesis The Y-diagram Revisited Structural Behavioral More abstract designs Physical CAD for VLSI 2 1 Structural Synthesis Behavioral Physical CAD for VLSI 3 Structural Processor Memory Bus Behavioral
More informationControl Structures. Chapter 13 Control Structures. Example If Statements. ! Conditional. if (condition) action;
Chapter 13 Control Structures Original slides from Gregory Byrd, North Carolina State University Modified slides by Chris Wilcox, Colorado State University Control Structures! Conditional n making a decision
More informationCNS 188a Overview. Implementing Boolean functions with relay circuits, circuits of AON (AND, OR, NOT) gates and LT (Linear Threshold) gates
CNS 88a Overview Boolean algebra as an axiomatic system Boolean functions and their representations using Boolean formulas and spectral methods Implementing Boolean functions with relay circuits, circuits
More informationWhy Don t Computers Use Base 10? Lecture 2 Bits and Bytes. Binary Representations. Byte-Oriented Memory Organization. Base 10 Number Representation
Lecture 2 Bits and Bytes Topics Why bits? Representing information as bits Binary/Hexadecimal Byte representations» numbers» characters and strings» Instructions Bit-level manipulations Boolean algebra
More informationCS 261 Fall C Introduction. Variables, Memory Model, Pointers, and Debugging. Mike Lam, Professor
CS 261 Fall 2017 Mike Lam, Professor C Introduction Variables, Memory Model, Pointers, and Debugging The C Language Systems language originally developed for Unix Imperative, compiled language with static
More informationA Relational View of Subgraph Isomorphism
A Relational View of Subgraph Isomorphism J. Cortadella and G. Valiente Department of Software, Technical University of Catalonia, Barcelona, Spain Abstract. This paper presents a novel approach to the
More informationBDDC v2 A basic bdd-based logical calculator
BDDC v2 A basic bdd-based logical calculator Pascal RAYMOND November 24, 2008, (rev. September 28, 2015) BDDC is a tool for manipulating logical formula. It is based on a Binary Decision Diagram library,
More informationBasic operators, Arithmetic, Relational, Bitwise, Logical, Assignment, Conditional operators. JAVA Standard Edition
Basic operators, Arithmetic, Relational, Bitwise, Logical, Assignment, Conditional operators JAVA Standard Edition Java - Basic Operators Java provides a rich set of operators to manipulate variables.
More informationC Introduction. Comparison w/ Java, Memory Model, and Pointers
CS 261 Fall 2018 Mike Lam, Professor C Introduction Comparison w/ Java, Memory Model, and Pointers Please go to socrative.com on your phone or laptop, choose student login and join room LAMJMU The C Language
More informationCS 361 Data Structures & Algs Lecture 11. Prof. Tom Hayes University of New Mexico
CS 361 Data Structures & Algs Lecture 11 Prof. Tom Hayes University of New Mexico 09-28-2010 1 Last Time Priority Queues & Heaps Heapify (up and down) 1: Preserve shape of tree 2: Swaps restore heap order
More informationUniversity of Calgary Department of Electrical and Computer Engineering ENCM 339 Lecture Section 01 Instructor: Steve Norman
page 1 of 6 University of Calgary Department of Electrical and Computer Engineering ENCM 339 Lecture Section 01 Instructor: Steve Norman Fall 2017 MIDTERM TEST Wednesday, November 1 7:00pm to 9:00pm This
More informationGraphiti A Simple Graph Language. Language Reference Manual
Graphiti A Simple Graph Language Language Reference Manual Alice Thum, System Architect, at3160@barnard.edu Sydney Lee, System Architect, stl2121@barnard.edu Michal Porubcin, Language Guru, mp3242@columbia.edu
More information3. Logical Values. Boolean Functions; the Type bool; logical and relational operators; shortcut evaluation
140 3. Logical Values Boolean Functions; the Type bool; logical and relational operators; shortcut evaluation Our Goal 141 int a; std::cin >> a; if (a % 2 == 0) std::cout
More informationCSC Java Programming, Fall Java Data Types and Control Constructs
CSC 243 - Java Programming, Fall 2016 Java Data Types and Control Constructs Java Types In general, a type is collection of possible values Main categories of Java types: Primitive/built-in Object/Reference
More informationBits and Bytes January 13, 2005
15-213 The Class That Gives CMU Its Zip! Topics Bits and Bytes January 13, 25 Why bits? Representing information as bits Binary / Hexadecimal Byte representations» Numbers» Characters and strings» Instructions
More informationBinary Decision Diagrams (BDDs) Pingqiang Zhou ShanghaiTech University
Binary Decision Diagrams (BDDs) Pingqiang Zhou ShanghaiTech University Computational Boolean Algera Representations Applying unate recursive paradigm (URP) in solving tautology is a great warm up example.
More informationChapter 8: Data Abstractions
Chapter 8: Data Abstractions Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Presentation files modified by Farn Wang Copyright 28 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
More informationCS 33. Data Representation, Part 1. CS33 Intro to Computer Systems VII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved.
CS 33 Data Representation, Part 1 CS33 Intro to Computer Systems VII 1 Copyright 2017 Thomas W. Doeppner. All rights reserved. Number Representation Hindu-Arabic numerals developed by Hindus starting in
More informationLSN 4 Boolean Algebra & Logic Simplification. ECT 224 Digital Computer Fundamentals. Department of Engineering Technology
LSN 4 Boolean Algebra & Logic Simplification Department of Engineering Technology LSN 4 Key Terms Variable: a symbol used to represent a logic quantity Compliment: the inverse of a variable Literal: a
More informationUNIVERSITY OF NEBRASKA AT OMAHA Computer Science 4500/8506 Operating Systems Fall Programming Assignment 1 (updated 9/16/2017)
UNIVERSITY OF NEBRASKA AT OMAHA Computer Science 4500/8506 Operating Systems Fall 2017 Programming Assignment 1 (updated 9/16/2017) Introduction The purpose of this programming assignment is to give you
More informationReading Assignment 4. n Chapter 4 Threads, due 2/7. 1/31/13 CSE325 - Processes 1
Reading Assignment 4 Chapter 4 Threads, due 2/7 1/31/13 CSE325 - Processes 1 What s Next? 1. Process Concept 2. Process Manager Responsibilities 3. Operations on Processes 4. Process Scheduling 5. Cooperating
More informationPriority queues. Priority queues. Priority queue operations
Priority queues March 30, 018 1 Priority queues The ADT priority queue stores arbitrary objects with priorities. An object with the highest priority gets served first. Objects with priorities are defined
More informationProcess a program in execution; process execution must progress in sequential fashion. Operating Systems
Process Concept An operating system executes a variety of programs: Batch system jobs Time-shared systems user programs or tasks 1 Textbook uses the terms job and process almost interchangeably Process
More informationQUESTION BANK FOR TEST
CSCI 2121 Computer Organization and Assembly Language PRACTICE QUESTION BANK FOR TEST 1 Note: This represents a sample set. Please study all the topics from the lecture notes. Question 1. Multiple Choice
More informationUnit 9 Practice Test (AB27-30)
Unit 9 Practice Test (AB27-30) Name 1. Consider the following method: public static int checktree(treenode root) return 0; int x = checktree(root.getleft()); if ( x >= 0 && checktree(root.getright()) ==
More informationVLSI System Design Part II : Logic Synthesis (1) Oct Feb.2007
VLSI System Design Part II : Logic Synthesis (1) Oct.2006 - Feb.2007 Lecturer : Tsuyoshi Isshiki Dept. Communications and Integrated Systems, Tokyo Institute of Technology isshiki@vlsi.ss.titech.ac.jp
More informationData III & Integers I
Data III & Integers I CSE 351 Autumn 2016 Instructor: Justin Hsia Teaching Assistants: Chris Ma Hunter Zahn John Kaltenbach Kevin Bi Sachin Mehta Suraj Bhat Thomas Neuman Waylon Huang Xi Liu Yufang Sun
More informationReal Time & Embedded Systems. Final Exam - Review
Real Time & Embedded Systems Final Exam - Review Final Exam Review Topics Finite State Machines RTOS Context switching Process states Mutex - purpose and application Blocking versus non-blocking Synchronous
More informationA Data Parallel Algorithm for Boolean Function Manipulation
A Data Parallel Algorithm for Boolean Function Manipulation S. Gai, M. Rebaudengo, M. Sonza Reorda Politecnico di Torino Dipartimento di Automatica e Informatica Torino, Italy Abstract * This paper describes
More information1KOd17RMoURxjn2 CSE 20 DISCRETE MATH Fall
CSE 20 https://goo.gl/forms/1o 1KOd17RMoURxjn2 DISCRETE MATH Fall 2017 http://cseweb.ucsd.edu/classes/fa17/cse20-ab/ Today's learning goals Explain the steps in a proof by mathematical and/or structural
More informationConstants and Variables
DATA STORAGE Constants and Variables In many introductory courses you will come across characteristics or elements such as rates, outputs, income, etc., measured by numerical values. Some of these will
More informationPage 1. Where Have We Been? Chapter 2 Representing and Manipulating Information. Why Don t Computers Use Base 10?
Where Have We Been? Class Introduction Great Realities of Computing Int s are not Integers, Float s are not Reals You must know assembly Memory Matters Performance! Asymptotic Complexity It s more than
More informationBawar Abid Abdalla. Assistant Lecturer Software Engineering Department Koya University
Logic Design First Stage Lecture No.5 Boolean Algebra Bawar Abid Abdalla Assistant Lecturer Software Engineering Department Koya University Boolean Operations Laws of Boolean Algebra Rules of Boolean Algebra
More informationCS 3113 Introduction to Operating Systems Midterm October 11, 2018
General instructions: CS 3113 Introduction to Operating Systems Midterm October 11, 2018 Please wait to open this exam booklet until you are told to do so. This examination booklet has 10 pages. You also
More informationCS 3113 Introduction to Operating Systems Midterm October 11, 2018
General instructions: CS 3113 Introduction to Operating Systems Midterm October 11, 2018 Please wait to open this exam booklet until you are told to do so. This examination booklet has 10 pages. You also
More informationFlow Control. CSC215 Lecture
Flow Control CSC215 Lecture Outline Blocks and compound statements Conditional statements if - statement if-else - statement switch - statement? : opertator Nested conditional statements Repetitive statements
More informationCombinational Devices and Boolean Algebra
Combinational Devices and Boolean Algebra Silvina Hanono Wachman M.I.T. L02-1 6004.mit.edu Home: Announcements, course staff Course information: Lecture and recitation times and locations Course materials
More informationLogic Synthesis and Verification
Logic Synthesis and Verification Jie-Hong Roland Jiang 江介宏 Department of Electrical Engineering National Taiwan University Fall 2012 1 SOPs and Incompletely Specified Functions Reading: Logic Synthesis
More informationPriority queues. Priority queues. Priority queue operations
Priority queues March 8, 08 Priority queues The ADT priority queue stores arbitrary objects with priorities. An object with the highest priority gets served first. Objects with priorities are defined by
More informationPROCESS PROGRAMMING INTERFACE
Reading Reference: Textbook 1 Chapter 3 Molay Reference Text: Chapter 8 PROCESS PROGRAMMING INTERFACE Tanzir Ahmed CSCE 313 FALL 2018 Theme of Today s Lecture Talk a bit about Unix Shell Introduce some
More informationBDDC v2 A basic bdd-based logical calculator
BDDC v2 A basic bdd-based logical calculator Pascal RAYMOND http://www-verimag.imag.fr/people/pascal.raymond November 24, 2008 BDDC is a tool for manipulating logical formula. It is based on a Binary Decision
More informationSolving Boolean Equations with BDDs and Clause Forms. Gert Smolka
Solving Boolean Equations with BDDs and Clause Forms Gert Smolka Abstract Methods for solving Boolean equations BDDs [Bryant 1986] Clause forms [Quine 1959] Efficient data structure and algorithms for
More informationArithmetic and Bitwise Operations on Binary Data
Arithmetic and Bitwise Operations on Binary Data CSCI 2400: Computer Architecture ECE 3217: Computer Architecture and Organization Instructor: David Ferry Slides adapted from Bryant & O Hallaron s slides
More informationINDIAN SCHOOL SOHAR FIRST TERM EXAM ( ) INFORMATICS PRACTICES
INDIAN SCHOOL SOHAR FIRST TERM EXAM (2015-2016) INFORMATICS PRACTICES Page 1 of 5 No. of printed pages: 5 Class: XI Marks: 70 Date: 10-09-15 Time: 3 hours Instructions: a. All the questions are compulsory.
More informationLecture 5-6: Bits, Bytes, and Integers
CSCI-UA.0201-003 Computer Systems Organization Lecture 5-6: Bits, Bytes, and Integers Mohamed Zahran (aka Z) mzahran@cs.nyu.edu http://www.mzahran.com Slides adapted from: Jinyang Li Bryant and O Hallaron
More informationGraph-Based Algorithms for Boolean Function Manipulation 12. Abstract
Graph-Based Algorithms for Boolean Function Manipulation 2 Randal E. Bryant 3 Abstract In this paper we present a new data structure for representing Boolean functions and an associated set of manipulation
More informationChapter 20: Binary Trees
Chapter 20: Binary Trees 20.1 Definition and Application of Binary Trees Definition and Application of Binary Trees Binary tree: a nonlinear linked list in which each node may point to 0, 1, or two other
More informationBASIC ELEMENTS OF A COMPUTER PROGRAM
BASIC ELEMENTS OF A COMPUTER PROGRAM CSC128 FUNDAMENTALS OF COMPUTER PROBLEM SOLVING LOGO Contents 1 Identifier 2 3 Rules for naming and declaring data variables Basic data types 4 Arithmetic operators
More informationNetwork Reliability Computation by using Different Binary Decision Diagrams
Network Reliability Computation by using Different Binary Decision Diagrams Manoj Singhal 1, R. K. Chauhan 2, Girish Sharma 3 1 Asso. Prof., Deptt. Of MCA, Academy of Business and Engineering Sciences,
More informationIST 4 Information and Logic
IST 4 Information and Logic T = today x= hw#x out x= hw#x due mon tue wed thr 28 M oh 4 oh M oh oh 2 M2 8 oh oh 2 fri oh oh = office hours oh 25 oh M2 2 3 oh T midterms oh Mx= MQx out 9 oh 3 4 oh Mx= MQx
More informationSYNERGY INSTITUTE OF ENGINEERING & TECHNOLOGY,DHENKANAL LECTURE NOTES ON DIGITAL ELECTRONICS CIRCUIT(SUBJECT CODE:PCEC4202)
Lecture No:5 Boolean Expressions and Definitions Boolean Algebra Boolean Algebra is used to analyze and simplify the digital (logic) circuits. It uses only the binary numbers i.e. 0 and 1. It is also called
More information3. Logical Values. Our Goal. Boolean Values in Mathematics. The Type bool in C++
Our Goal 3. Logical Values Boolean Functions; the Type bool; logical and relational operators; shortcut evaluation int a; std::cin >> a; if (a % 2 == 0) std::cout
More information3. Logical Values. Our Goal. Boolean Values in Mathematics. The Type bool in C++
148 Our Goal 149 3. Logical Values Boolean Functions; the Type bool; logical and relational operators; shortcut evaluation int a; std::cin >> a; if (a % 2 == 0) std::cout
More informationBasics of Java: Expressions & Statements. Nathaniel Osgood CMPT 858 February 15, 2011
Basics of Java: Expressions & Statements Nathaniel Osgood CMPT 858 February 15, 2011 Java as a Formal Language Java supports many constructs that serve different functions Class & Interface declarations
More informationWindows architecture. user. mode. Env. subsystems. Executive. Device drivers Kernel. kernel. mode HAL. Hardware. Process B. Process C.
Structure Unix architecture users Functions of the System tools (shell, editors, compilers, ) standard library System call Standard library (printf, fork, ) OS kernel: processes, memory management, file
More information4&5 Binary Operations and Relations. The Integers. (part I)
c Oksana Shatalov, Spring 2016 1 4&5 Binary Operations and Relations. The Integers. (part I) 4.1: Binary Operations DEFINITION 1. A binary operation on a nonempty set A is a function from A A to A. Addition,
More informationCS 380/480 Foundations of Artificial Intelligence Winter 2007 Assignment 2 Solutions to Selected Problems
CS 380/480 Foundations of Artificial Intelligence Winter 2007 Assignment 2 Solutions to Selected Problems 1. Search trees for the state-space graph given below: We only show the search trees corresponding
More informationfork System-Level Function
Princeton University Computer Science 217: Introduction to Programming Systems Process Management Goals of this Lecture Help you learn about: Creating new processes Waiting for processes to terminate Executing
More informationPrinceton University Computer Science 217: Introduction to Programming Systems. Process Management
Princeton University Computer Science 217: Introduction to Programming Systems Process Management 1 Goals of this Lecture Help you learn about: Creating new processes Waiting for processes to terminate
More informationCS313D: ADVANCED PROGRAMMING LANGUAGE
CS313D: ADVANCED PROGRAMMING LANGUAGE Computer Science department Lecture 2 : C# Language Basics Lecture Contents 2 The C# language First program Variables and constants Input/output Expressions and casting
More informationCS 267: Automated Verification. Lecture 6: Binary Decision Diagrams. Instructor: Tevfik Bultan
CS 267: Automated Verification Lecture 6: Binar Decision Diagrams Instructor: evfik Bultan Binar Decision Diagrams (BDDs) [Brant 86] Reduced Ordered Binar Decision Diagrams (BDDs) An efficient data structure
More informationA New Optimal Approach for evaluating the size of BDD for calculating the Reliability of a CCN
Int. J. Of Advanced Networking and Applications 230 A New Optimal Approach for evaluating the size of BDD for calculating the Reliability of a CCN Manoj Singhal #, R. K. Chauhan ##, Girish Sharma ###,
More informationComputer Systems Organization V Fall 2009
Computer Systems Organization V22.0201 Fall 2009 Sample Midterm Exam ANSWERS 1. True/False. Circle the appropriate choice. (a) T (b) F At most one operand of an x86 assembly instruction can be an memory
More informationPrinceton University. Computer Science 217: Introduction to Programming Systems. Process Management
Princeton University Computer Science 217: Introduction to Programming Systems Process Management 1 Goals of this Lecture Help you learn about: Creating new processes Waiting for processes to terminate
More informationNotes on Project 1. version September 01, 2014
Notes on Project 1 version 1.44 September 01, 2014 1 Definitions Your program will keep a collection of rectangles which we refer to by C and a rectangle-quadtree which we refer to by T. The collection
More informationInt. J. Advanced Networking and Applications 1430 Volume:03 Issue:06 Pages: (2012) ISSN :
1430 Binary Decision Diagrams and Its Variable Ordering for Disjoint Network Manoj Singhal Associate professor, Department of Information Technology, Accurate Institute of Management & Technology, Greater
More informationSample Problems for Quiz # 2
EE 1301 UMN Introduction to Computing Systems Fall 2013 Sample Problems for Quiz # 2 (with solutions) Here are sample problems to help you prepare for Quiz 2 on Oct. 31. 1. Bit-Level Arithmetic (a) Consider
More informationCSE 530A. Inheritance and Partitioning. Washington University Fall 2013
CSE 530A Inheritance and Partitioning Washington University Fall 2013 Inheritance PostgreSQL provides table inheritance SQL defines type inheritance, PostgreSQL's table inheritance is different A table
More informationCS 231 Data Structures and Algorithms, Fall 2016
CS 231 Data Structures and Algorithms, Fall 2016 Dr. Bruce A. Maxwell Department of Computer Science Colby College Course Description Focuses on the common structures used to store data and the standard
More informationABC basics (compilation from different articles)
1. AIG construction 2. AIG optimization 3. Technology mapping ABC basics (compilation from different articles) 1. BACKGROUND An And-Inverter Graph (AIG) is a directed acyclic graph (DAG), in which a node
More informationProgramming II (CS300)
1 Programming II (CS300) Chapter 11: Binary Search Trees MOUNA KACEM mouna@cs.wisc.edu Fall 2018 General Overview of Data Structures 2 Introduction to trees 3 Tree: Important non-linear data structure
More informationECE/CS 314 Fall 2003 Homework 2 Solutions. Question 1
ECE/CS 314 Fall 2003 Homework 2 Solutions Question 1 /* Equivalent C code with no loops (goto instead) char* strchr(char* pcstring, char csearchchr) strchr_loop: if (!*pcstring) return 0; if (*pcstring
More informationBinary decision diagram to design balanced secure logic styles
Binary decision diagram to design balanced secure logic styles Hyunmin Kim, Seokhie Hong, Bart Preneel and Ingrid Verbauwhede Center for Information Security Technologies Korea University, Seoul, South
More informationfirebase-arduino Documentation
firebase-arduino Documentation Release 1.0 firebase-arduino Nov 17, 2017 Contents i ii FirebaseArduino is a library to simplify connecting to the Firebase database from arduino clients. It is a full abstraction
More informationCMSC351 - Fall 2014, Homework #6
CMSC351 - Fall 2014, Homework #6 Due: December 12th at the start of class PRINT Name: Grades depend on neatness and clarity. Write your answers with enough detail about your approach and concepts used,
More informationIntroduction: Language Description:
SAKÉ S halva Kohen: sak2232 ( Language Guru ) A runavha Chanda: ac3806 ( Manager ) K ai-zhan Lee: kl2792 ( System Architect ) E mma Etherington: ele2116 ( Tester ) Introduction: Behind all models of computation
More informationCrit-bit Trees. Adam Langley (Version )
CRITBIT CWEB OUTPUT 1 Crit-bit Trees Adam Langley (agl@imperialviolet.org) (Version 20080926) 1. Introduction This code is taken from Dan Bernstein s qhasm and implements a binary crit-bit (alsa known
More informationECE570 Lecture 2: Types and Conventions
ECE570 Lecture 2: Types and Conventions Jeffrey Mark Siskind School of Electrical and Computer Engineering Fall 2017 Siskind (Purdue ECE) ECE570 Lecture 2: Types and Conventions Fall 2017 1 / 28 Booleans
More informationWorking with Mediator Framework
CHAPTER 2 This chapter describes the Mediator framework and includes the following sections: Framework Overview, page 2-1 Configurable Nodes, page 2-2 Composite Nodes, page 2-4 Getting and Setting Node
More informationFrom Pseudcode Algorithms directly to C++ programs
From Pseudcode Algorithms directly to C++ programs (Chapter 7) Part 1: Mapping Pseudo-code style to C++ style input, output, simple computation, lists, while loops, if statements a bit of grammar Part
More information4. Logical Values. Our Goal. Boolean Values in Mathematics. The Type bool in C++
162 Our Goal 163 4. Logical Values Boolean Functions; the Type bool; logical and relational operators; shortcut evaluation int a; std::cin >> a; if (a % 2 == 0) std::cout
More information