Undecidability of Static Analysis. William Landi. Siemens Corporate Research Inc. 755 College Rd East.
|
|
- Florence Johnson
- 6 years ago
- Views:
Transcription
1 Undecidability of Static Analysis William Landi Siemens Copoate Reseach Inc 755 College Rd East Pinceton, NJ Abstact Static Analysis of pogams is indispensable to any softwae tool, envionment, o system that equies compile time infomation about the semantics of pogams. With the emegence of languages like C and LISP, Static Analysis of pogams with dynamic stoage and ecusive data stuctues has become a eld of active eseach. Such analysis is dicult, and the Static Analysis community has ecognized the need fo simplifying assumptions and appoximate solutions. Howeve, even unde the common simplifying assumptions, such analyses ae hade than peviously ecognized. Two fundamental Static Analysis poblems ae May Alias and Must Alias. The fome is not ecusive (i.e., is undecidable) and the latte is not ecusively enumeable (i.e., is uncomputable), even when all paths ae executable in the pogam being analyzed fo languages with if-statements, loops, dynamic stoage, and ecusive data stuctues. Categoies and Subject Desciptos: D.3.1 [Pogamming Languages]: Pocessos; F.1.1 [Computation by Abstact Devices]: Models of Computation bounded-action devices; F.4.1 [Math Logic and Fomal Languages]: Mathematical Logic computability theoy Geneal Tems: Languages, Theoy Additional Key Wods and Phases: Alias analysis, data ow analysis, abstact intepetation, halting poblem Fom acm Lettes on Pogamming Languages and Systems, Vol. 1, No. 4, Decembe 1992, Pages Pemission to copy without fee all o pat of this mateial is ganted povided that the copies ae not made o distibuted fo diect commecial advantage, the ACM copyight notice and the title of the publication and its date appea, and notice is given that copying is by pemission of the Association fo Computing Machiney. To copy othewise, o to epublish, equies a fee and/o specic pemission. c1992 ACM /92/ $
2 1 Intoduction Static Analysis is the pocesses of extacting semantic infomation about a pogam at compile time. One classical example is the live vaiables [4] poblem; a vaiable x is live at a statement s i on some execution x is used (accessed) afte s is executed without being edened. Othe classical poblems include eaching denitions, available expessions, and vey busy expessions [4]. Thee ae two main famewoks fo doing Static Analysis: Data Flow Analysis [4] and Abstact Intepetation [3]. The famewok is not elevant to this pape, as we show that two fundamental Static Analysis poblems ae hade than peviously acknowledged, egadless of the famewok used. We view the solution to a Static Analysis poblem as the set of \facts" that hold fo a given pogam. Thus, fo live vaiables the solution is f(x; s)j vaiable x is live at statement sg. With that in mind, we eview a few denitions: A set is ecusive i it can be accepted by a Tuing machine that halts on all inputs. A set is ecusively enumeable i it can be accepted by a Tuing machine which may o may not halt on all inputs. Static Analysis oiginally concentated on FORTRAN, and was pedominately conned to a single pocedue (intapocedual analysis) [7, 9, 15]. Howeve, even this simple fom of Static Analysis is not ecusive. The diculty lies in conditionals. Thee ae, in geneal, many paths though a pocedue, but not all paths coespond to an execution. Fo example, conside if (x > -1) y = 1; if (x < 0) y = -1; Execution of this fagment always executes exactly one then banch. It is impossible fo both o neithe then banches to be executed. Static Analysis is not ecusive since detemining which paths ae executable is not ecusive. To ovecome this poblem, Static Analysis is pefomed assuming that all paths though the pogam ae executable [2]. This assumption is not always valid, but it is safe [2]. 1 Also, it simplies the poblem and allows Static Analysis of FORTRAN pocedues to be done faily eciently. Some appoaches (fo example [16]) categoize some paths as not executable. Howeve, these techniques have limited applicability, and often must assume that paths ae executable. With a basis of a m undestanding of intapocedual Static Analysis of FORTRAN, Static Analysis of entie pogams (intepocedual analysis) was investigated. Myes [14] came up with the negative esult that many intepocedual Static Analysis poblems ae N P complete. Pactically, this means that intepocedual Static Analysis must make futhe appoximations ove intapocedual analysis o take an exponential amount of time. With the emegence of popula languages like C and LISP, the Static Analysis community has tuned its attention to languages with pointes, dynamic stoage, and ecusive data stuctues. It is widely accepted that Static Analysis unde these conditions is had. The geneal feeling is that it is pobably N P complete [11, 13, 12]; this is incoect. Recently, the poblem of nding aliases was shown to be P-space had [10]. Unfotunately, this is still an undeestimate. 1 The tem consevative is used in [2] instead of safe. 2
3 An alias occus at some point duing execution of a pogam when two o moe names exist fo the same stoage location. Fo example, the C statement \p = &v" ceates an alias between p and v. Aliases ae associated with pogam points, indicating not only that p and v efe to the same location duing execution, but also whee in the pogam they efe to the same location. Aliasing, statically nding aliases, is a fundamental poblem of Static Analysis. Conside the poblem of nding live vaiables fo: s 1 : v = 1; s 2 : p = &v; s 3 : w = 2; s 4 : pintf("%d",p); The vaiable v is live at s 3 only because p is aliased to v when pogam point s 4 is executed. Aliasing also inuences most inteesting Static Analysis poblems. Any poblem that is inuenced by aliasing is at least as had as aliasing. Thee ae two types of aliasing. May Alias Find the aliases that occu duing some execution of the pogam. Must Alias Find the aliases that occu on all executions of the pogam. Finding the aliases can mean detemining the set of all aliases which hold at some associated pogam points, o detemining whethe x and y ae names fo the same location at a paticula pogam point s. We use the latte meaning as, in geneal, the set of all aliases maybe innite in size. We fomally dene May Alias as a boolean function: may-alias P (s; hx; yi) is tue i thee is an execution of pogam P to pogam point s (including the eects of executing s) on which x and y efe to the same location. Must Alias is dened analogously. We show that, fo languages with if-statements, loops, dynamic stoage, and ecusive data stuctues, Intapocedual May Alias is not ecusive (i.e., is undecidable) and Intapocedual Must Alias is not ecusively enumeable (i.e., is uncomputable) even when all paths in a pogam ae executable by educing ([5], p ) the halting poblem into an alias poblem. This is a dieent fom the esult of Kam and Ullman [8] that the MOP solution is undecidable fo monotone famewoks. 2 Reduction of the Halting Poblem to an Alias Poblem A Deteministic Tuing Machine (DTM) [1] is a tuple (Q,T,I,,,q 0,q f ) whee: Q = fq 1, q 2,..., q n Qg is the set of states T = f 1 ; 2 ; :::; n T g is the set of tape symbols I T is the set of input symbols : (Q T)! (Q T fl,r,sg) is the tansition function 2 3
4 2 T I is the blank symbol q 0 2 Q is the stat state q f 2 Q is the nal state We assume that is a total function and that the DTM will not move o the left end of the tape. In geneal, neithe of these assumptions ae tue, but any Tuing machine can be modied to confom to them. In this section, we specify a machine educe (Figue 1) which takes a DTM M and input sting w and pocedues a pogam C such that may-alias C (s; hcuent state,valid simulationi) is tue i M halts on w. must-alias C (s; hcuent state,not validi) is tue i M does not halt on w. all paths though C ae executable 2.1 Repesenting an ID An Instantaneous Desciption (ID) is an encoding of the following infomation: contents of the DTM's tape cuent state of the DTM location of the tape head An ID is usually epesented by a sting xq i y 2 T QT whee the tape contains xy innitely padded to the ight with blanks, the cuent state is q i, and the tape head is scanning the st chaacte of y. 3 We encode this infomation in the alias patten of a pogam execution. By alias patten, we mean the elationship of names to each othe. We use a doubly linked list to epesent the tape of a DTM: pev sym next. Fo each i 2 T we ceate a vaiable i. The \sym" eld points to i i the tape location contains i. Thus, the tape that contained \hello" padded to the ight with blanks () is epesented by the alias patten: h: e: l: o: : 2 L moves tape head left, R moves tape head ight, and S leaves the tape head whee it is. 3 q i is undelined in xq iy to make the state stand out fom the tape sting. 4
5 Fo each q i 2 Q we ceate a vaiable q i and thee ae two additional vaiables, cuent state and tape head. Cuent state points to the cuent state of the machine, and tape head indicates the tape head location by pointing into the list epesenting the tape. The ID = heq 2 llo is epesented by: h: tape head: cuent state: q 1 : q 2 :... q n Q e: l: o: : : 2.2 Pogamming Language In ode to pefom the equied eduction, we need to constuct a pogam fom a DTM. The pogam is in C, but it could be any language with if-statements, loops, dynamic stoage, and ecusive data stuctues. We use the addess opeato (&) but it is not fundamentally necessay to the poof. To specify a C pogam fom a DTM, we need the meta-statements: #fo and #if. The syntax and meaning of these ae elatively staight fowad and should be appaent fom the following examples: #fo i = 1 to 3 x i = i; #endfo #fo i = 1 to 3 x i = i; #if i is odd y i = i; #endif #endfo 9 >= >; epesents 9 >= >; epesents 8 >< >: 8 >< >: x 1 = 1; x 2 = 2; x 3 = 3; x 1 = 1; y 1 = 1; x 2 = 2; x 3 = 3; y 3 = 3; Also, we use next bool fo eading pogam input. It etuns the next boolean value fom the input steam. If the end of the steam has been encounteed, it etuns Simulating a DTM In Section 2.1, we showed how we epesent an ID with aliases. In this section, we show how to simulate a DTM with the alias patten of executions of a paticula pogam. We now specify educe (Figue 1) which constucts a pogam fom a DTM M = (Q,T,I,,,q 0,q f ) with initial input w 2 5
6 / Given a DTM, M = (Q,T,I,,,q 0,q f ) and w 2 I / s: Geneate vaiable declaation and initialization Figue 2 Geneate code fo ceating the initial Instantaneous Desciption Figue 3 Geneate code fo simulating the tansition function Figue 4 Geneate code fo validating the esult Figue 4 Figue 1: Outline of the machine educe I such that cuent state is aliased to valid simulation on some execution to pogam point s i machine M halts on input w = x 1 x 2 :::x nw. Lemma 2.1 The code geneated by Figue 3 ceates the data stuctue that epesents the initial conguation of M (q 0 x 1 x 2 :::x nw ) in the manne descibed in Section 2.1. This is evident fom inspection of the code. \cuent state = &q 0 ;" points cuent state to q 0. tape head points to the st element of the linked list which coesponds to the tape head of M being on the beginning of the tape. Finally, NEXT SYM(i) points the \sym" eld of the i th element of the linked list to the vaiable epesenting the i th symbol on the tape (x i ). This is exactly what is equied by Section 2.1 fo the initial ID q 0 x 1 x 2 :::x nw. 2 As an example, conside the case whee T = fh,e,l,o,g, w = \hello", and q 0 = q 2. The initial ID is q 2 hello and the code geneated by Figue 3 poduces: h: tape head: back: cuent state: q 1 : q 2 :... q n Q e: l: o: : : Notice that back points to the end of the linked list epesenting the tape. This allows us to add a new tape element to the end of the tape and, as seen late, is used to ensue that we neve un o the ight end of the tape. The declaation and initialization of the vaiables of the pogam used to simulate a DTM ae specied in Figue 2. All the vaiables except yes, no, not valid, and valid simulation have 6
7 / Given a DTM, M = (Q,T,I,,,q 0,q f ) and w 2 I / typedef int **state; typedef int **lette; stuct tape f lette *sym; stuct tape *next,*pev; g *back,*tape head; state *cuent state; int not valid,valid simulation; int *yes = &valid simulation; int *no = ¬ valid; #fo i=1 to n Q state q i = &yes; #endfo #fo i=1 to n T lette i = &yes; #endfo Figue 2: Vaiable declaation and initialization / Given a DTM, M = (Q,T,I,,,q 0,q f ) and w 2 I / cuent state = &q 0 ; back = malloc(sizeof(stuct tape)); tape head = back; tape head->pev = NULL; tape head->next = NULL; tape head->sym = &; /* initialize tape to w = x 1 x 2 :::x nw */ #fo i = 1 to n w back->next = malloc(sizeof(stuct tape)); back->sym = &x i ; back->next->pev = back; back = back->next; back->next = NULL; back->sym = &; #endfo 9 >= >; NEXT SYM(i) Figue 3: Initial Instantaneous Desciption (ID) 7
8 / Given a DTM, M = (Q,T,I,,,q 0,q f ) and w 2 I / / next bool etuns the next boolean value fom the input steam. / back->next = malloc(sizeof(stuct tape)); back->next->pev = back; back = back->next; back->next = NULL; back->sym = &; #fo i = 1 to n Q /* once fo each state q i 2 Q */ #fo j = 1 to n T /* once fo each lette j 2 T */ /* let (q i ; j ) = (q 0 i ; 0 j ; d) */ if (next bool == 1) f 9 q i = &no; j = &no; cuent state = ¬ valid; (tape head->sym) = ¬ valid; cuent state = &q 0 i ; tape head->sym = & 0 j ; #if d = R tape head = tape head->next; #endif #if d = L tape head = tape head->pev; #endif = &yes; q i j = &yes; g else #endfo #endfo yes = ¬ valid; / This is the else pat of the last if-then-else poduced above. */ g 9 no = ¬ valid; / no aleady is not valid, but the assignment makes the poof simple / #fo i=1 to n Q >= q i = &no; #endfo >; q f = &yes; s: / cuent state is valid simulation hee i M halts on w / 9 >= >; >= >; ADD TO END DELTA(i,j) CHECK ANSWER Figue 4: Repesentation of the tansition function 8
9 aleady been explained in Section 2.1. Thee of the fou new vaiables ae simply to ecod if the cuent path is a valid simulation of M. Yes points to valid simulation i the cuent path is a simulation of M and yes points to not valid othewise. The fouth vaiable (no) is just a \don't cae" location fo pointes that must efe to something othe than yes. No always points to not valid. Continuing ou example, the initialization specied in Figue 2 followed by the code specied in Figue 3 fo T = fh,e,l,o,g, w = \hello", and q 0 = q 2, poduces: h: tape head: back: e: l: o: no: not valid: : cuent state: q 1 : q 2 :... q : n Q - yes: valid simulation: The emainde of the pogam ceated by educe is mostly a while loop (Figue 4). Each pass though the body of the loop epesents one application of the tansition function (). The st pat the the loop (ADD TO END) simply adds a new tape location, initially blank, to the ight end of the tape. This ensues that wheneve the simulated DTM moves ight on the tape, a tape location is available to it. The emainde of the loop is a nested if-then-else-if if (next bool == 1) DELTA(1,1); else if (next bool == 1) DELTA(1,2);... else if (next bool == 1) DELTA(n Q,n T ); else yes = ¬ valid; whee DELTA(i,j) (explained below) is the code to implement (q i ; j ). The code if (next bool == 1) DELTA(1,1); if (next bool == 1) DELTA(1,2);... if (next bool == 1) DELTA(n Q,n T ); would also be valid and does not equie an aticially deep if-then-else-if nesting. Howeve, in the fome, a pass though the loop eithe is not a valid simulation o epesents exactly one tansition of the DTM M. In the late, a pass though the loop is an invalid simulation o epesents a legal sequence of 0 to n Q n T coectness easie. tansitions of M. The fome is pefeable because it makes the poof of 9
10 Lemma 2.2 If yes points to not valid befoe the loop specied in Figue 4 is executed then yes still points to not valid afte execution of the loop. Inspection of the code eveals that in the while loop only ¬ valid can be assigned to yes. 2 The next lemma basically states that if the execution is a valid simulation of M befoe executing the loop geneated by Figue 4, then one path though the loop simulates the next tansition of M and all othe paths ae not a valid simulation. Lemma 2.3 If befoe the loop specied in Figue 4 is executed, yes points to valid simulation, the ID encoded by the alias patten is xq i y, and xq i y `M x 0 q j y 0 then on all but one path though the loop yes points to not valid and on the emaining path, yes points to valid simulation and the alias patten epesents the ID x 0 q j y 0. We illustate this poof with the example heq 2 llo `M hq 1 eelo (theefoe (q 2,l) = (q 1,e,L)). Fo this example, the alias patten befoe execution of the loop is: h: tape head: no: back: e: l: o: : not valid: cuent state: q 1 : q 2 :... q : n Q - yes: valid simulation: Befoe execution of the while loop, all 2 T and all q 2 Q point to yes. 4 The st pat of the loop, as stated ealie just expands the tape. The last else-clause simply points yes to not valid signaling an invalid simulation. Now conside the code fo DELTA(i,j) which epesents the application of (q i ; j ). Notice that we can only use this ule if M is in state q i and the tape head is eading j. Thus we would like to say (in pseudo-c) if (cuent state 6= q i o tape head->sym 6= j ) yes = ¬ valid / i.e., not a valid simulation / (1) but this would ceate paths which ae not executable in the pogam. The st fou statements of DELTA(i,j) do exactly (1) without using a conditional. The statements \q i = &no; j = &no" 4 We have not poven this hee, but it follows fom a simple inductive poof on numbe of iteations of the while loop. 10
11 point q i and j to no. All othe states and alphabet symbols still point to yes. In ou unning example (whee q i = q 2 and j = l) we have: h: tape head: back: e: l: no: not valid: cuent state: q 1 : q 2 :... q : n Q - yes: valid simulation: The statements, \cuent state = ¬ valid" and \(tape head->sym) = ¬ valid", make sue that the application of (q i, j ) is applicable. Thee ae two cases that can occu: The tape head is scanning j (l) and M is in state q i (q 2 ) This means that cuent state is no and (tape head->sym) is also no. Thus both of these statements eectively ae \no = ¬ valid" and the value of yes is unchanged and still points to valid simulation. This is the path though the loop that is a valid simulation of M. Fo all i,j thee is exactly one such path since M is a DTM. Eithe the tape head is not scanning j (l) o M is not in state q i (q 2 ) In the st case, cuent state is yes. Thus \cuent state = ¬ valid" causes yes to point to not valid instead of valid simulation. In the second case (tape head- >sym) is yes and \(tape head->sym) = ¬ valid" causes yes to point to not valid. The lemma is satised egadless of the subsequent code because yes points to not valid. We now poceed assuming that M is scanning j (l) and is in state q i (q 2 ). Since (q i, j ) = (q 0,d) i,0 j we want to shift to state q 0 i (\cuent state = &q0 i "), wite 0 j &j 0 "), and move the tape head one unit in diection d: to the tape (\tape head->sym = #if d = R #if d = L tape head = tape head->next; tape head = tape head->pev; #endif #endif Finally, the statements \q i = &yes; j = &yes" estoe the condition that all state and alphabet vaiables point to yes. To nish ou example whee (q 2,l) = (q 1,e,L), the pogam stoe now is: 11
12 h: tape head: back: e: l: no: not valid: o: : cuent state: q 1 : q 2 :... q : n Q - yes: valid simulation: 2 The est of Figue 4 is addessed in the following lemma: Lemma 2.4 M halts on w i on some path to s, in the pogam geneated by educe, cuent state is valid simulation. Conside the pogam C geneated by educe. By an inductive agument it is easy to show that: 1. on all paths to the top of the while loop on which yes points to valid simulation, if the alias patten epesents x 0 q i 0y 0 then q 0 w ` M q x0 i 0y if q 0 w ` xq M iy then thee is at least one path 5 to the top of the while loop geneated by Figue 4 on which yes points to valid simulation and the alias patten epesents xq i y. The poofs ae by induction on the numbe of times the path has passed though the top of the loop and on numbe of steps M has taken to deive xq i y. In both poofs, the base case is shown by Lemma 2.1 and the induction step can be shown by appealing to Lemma 2.2 and Lemma 2.3. M halts on w i q 0 w ` M xq f y (some x,y); thus M halts on w i thee exists a path to the top of the loop on which yes points to valid simulation and cuent state points to q f. Conside the eects of CHECK ANSWER in Figue 4. If cuent state does not point to q f then **cuent state must be not valid. If yes points to not valid then **cuent state must be not valid. If cuent state points to q f must be valid simulation. and yes points to valid simulation then **cuent state This means that M halts on w i on some path to s cuent state is valid simulation. 2 5 exactly one path unless xq iy `+ M xqiy. 12
13 3 May Alias is not ecusive Theoem 3.1 Statically detemining Intapocedual May Alias fo languages with if-statements, loops, dynamic stoage, and ecusive data stuctues is ecusively enumeable but not ecusive even when all paths though the pogam ae executable. Conside the pogam C geneated by educe. All paths though C ae executable. Conside any path P, let c 1 c 2 :::c k be a sequence with a unique c i fo evey conditional (i.e., if and while statements) on P in the ode that they appea on P. Let c i be 1 if the tue banch of the coesponding conditional is taken on P, and let c i be 0 othewise. Clealy, c 1 c 2 :::c k is an input that executes path P. By Lemma 2.4, M halts on w i on some path to s in C cuent state is valid simulation. Theefoe, May Alias is not ecusive as it can be used to solve the halting poblem even fo pogams on which all paths ae executable. May Alias is ecusively enumeable since we can nondeteministically geneate uns of a pogam and questions about aliasing duing an execution can be answeed by examining the symbol table and the pogam stoe. 2 Theoem 3.2 Statically detemining Intapocedual Must Alias fo languages with if-statements, loops, dynamic stoage, and ecusive data stuctues is not ecusively enumeable even when all paths though the pogam ae executable. A quick look at the pogam poduced by educe (on which all paths ae executable; see poof of Theoem 3.1) shows that yes eithe points to not valid o valid simulation, no always points to not valid, q 2 Q always points to yes o no, and cuent state always points to a state. This implies that cuent state is eithe valid simulation o not valid. Since we aleady showed that M halts on w i on some path to s cuent state is valid simulation (Lemma 2.4), it follows that M does not halt i cuent state is not valid on all paths to s. Thus, Must Alias can be used to solve the complement of the halting poblem which is not ecusively enumeable. This means that Must Alias is not ecusively enumeable given the language equiements stated by the theoem. 2 13
14 4 Conclusion We have shown that intapocedual May Alias is not ecusive and intapocedual Must Alias is not ecusively enumeable even fo pogams on which all paths ae executable given the language has dynamically allocated ecusive data stuctues, loops, and if-statements. This is an extemely negative esult, consideing that a doubly linked list was the only dynamic data stuctue needed. Unfotunately, the poofs can be modied to use only a singly linked list. In Appendix A, we show how to modify educe so that only a singly linked list is needed. These esults do not imply that Static Analysis is dead. They simply mean that, as has been known all along, some appoximation must be done. What the new esults do show is that, even if we ae allowed to wite exponential algoithms, Static Analysis would still have to be appoximate. It pobably also means that, in the pesence of dynamically allocated ecusive data stuctues, we have to accept appoximations of lesse quality, which also take moe time and space to compute than in FORTRAN. One nal implication of ou esults is that while detemining the stuctue of dynamic data stuctues (i.e., is it a tee linked list...) is impotant, it is not sucient to make Static Analysis ecusive, because ou poofs used only pogams with linked lists. Cuently, Static Analysis is in the same situation as it was fo FORTRAN 20 o so yeas ago. We ae dealing with a poblem which is not ecusive, and need to come up with a good set of simplifying assumptions and algoithms that yield easonably good appoximations quickly and cheaply. In most wok in Static Analysis, these assumptions ae being intoduced in an ad hoc manne and ae often not even explicitly stated. In the futue, it would be nice to have simplifying assumptions that would wok fo Static Analysis is geneal. One such assumption is that only polynomial length paths need be consideed. This seems easonable, as we aleady assume that pogams \teminate nomally" (fo example, no division by 0), and non-polynomial executions ae geneally not toleated. The nice esult of this assumption is that it makes most Static Analyses N P complete (see Appendix B). On the othe hand, it is dicult to see how this would inuence the development of appoximate algoithms. Acknowledgments: We thank Rita Altuche, Buce Ladendof, Tom Malowe, Michael Plato, and the eviewes fo thei comments on this mateial. 14
15 Refeences [1] Aho, A. V., Hopcoft, J. E., and Ullman, J. D. The Design and Analysis of Compute Algoithms. Addison-Wesley, [2] Aho, A. V., Sethi, R., and Ullman, J. D. Compiles: Pinciples, Techniques, and Tools. Addison-Wesley, [3] Cousot, P., and Cousot, R. Abstact intepetation: A unied lattice model fo static analysis of pogams by constuction o appoximation of xpoints. In Confeence Recod of the Fouth Annual ACM Symposium on Pinciples of Pogamming Languages (Jan. 1977), pp. 238{252. [4] Hecht, M. S. Flow Analysis of Compute Pogams. Elsevie Noth-Holland, [5] Hopcoft, J. E., and Ullman, J. D. Intoduction to Automata Theoy, Languages, and Computation. Addison-Wesley, Reading, Mass., [6] Howitz, S., Pfeiffe, P., and Reps, T. Dependence analysis fo pointe vaiables. In Poceedings of the ACM SIGPLAN Symposium on Compile Constuction (June 1989), pp. 28{40. [7] Kam, J. B., and Ullman, J. D. Global ow analysis and iteative algoithms. Jounal of the ACM 23, 1 (1976), 158{171. [8] Kam, J. B., and Ullman, J. D. Monotone data ow analysis famewoks. Acta Infomatica 7 (1977), 305{317. [9] Kildall, G. A unied appoach to global pogam optimization. In Confeence Recod of the ACM Symposium on Pinciples of Pogamming Languages (Jan. 1973), pp. 194{206. [10] Landi, W. Intepocedual Aliasing in the Pesence of Pointes. PhD thesis, Rutges Univesity, Jan LCSR-TR-174. [11] Landi, W., and Ryde, B. G. Pointe-induced aliasing: A poblem classication. In Confeence Recod of the Eighteenth Annual ACM Symposium on Pinciples of Pogamming Languages (Jan. 1991), pp. 93{103. [12] Laus, J. R. Restuctuing Symbolic Pogams fo Concuent Execution on Multipocessos. PhD thesis, Univesity of Califonia Bekeley, May [13] Laus, J. R., and Hilfinge, P. N. Detecting conicts between stuctue accesses. In Poceedings of the SIG- PLAN '88 Confeence on Pogamming Language Design and Implementation (July 1988), pp. 21{34. SIGPLAN NOTICES, Vol. 23, No. 7. [14] Myes, E. M. A pecise intepocedual data ow algoithm. In Confeence Recod of the Eighth Annual ACM Symposium on Pinciples of Pogamming Languages (Jan. 1981), pp. 219{230. [15] Ullman, J. D. Fast algoithms fo the elimination of common subexpessions. Acta Infomatica 2, 3 (1973), 191{213. [16] Wegman, M., and Zadeck, F. K. Constant popagation with conditional banches. ACM Tansactions on Pogamming Languages and Systems 13, 2 (Ap. 1991), 181{210. A Modication to singly linked list The machine educe (Figue 1) is modied to constuct a pogam with only a singly linked list and that still satisfy Theoem 3.1 and Theoem 3.2 as follows: Remove pev eld fom stuct tape. Also emove all statements dealing with pev. Add the eld \int not at" to type stuct tape. Point not at to yes wheneve a new tape element is ceated. 15
16 Add a vaiable \stuct tape font" which will always point to the st (leftmost) element of the linked list. Immediately befoe the while loop that simulates add the statement: tape head>not at = &no In geneal, the not at eld of the linked list epesenting the tape points to yes except at tape head whee it points to no. Replace the code fo when d = R in the loop with: #if d = R tape head->not at = &yes; tape head = tape head->next ; tape head->not at = &no; #endif Finally, eplace the code fo when d = L in the loop with: #if d = L tape head = font; while (next bool == 1) f ADD TO END / The code fo ADD TO END hee / tape head = tape head->next; g / tape head->next->not at points to yes and this assignment signals invalid simulation unless tape head is one LEFT of whee it was / (tape head->next->not at) = ¬ valid; tape head->next->not at = &yes; tape head->not at = &no; #endif B Polynomial paths only When only polynomial length paths ae consideed, May Alias and the complement of Must Alias ae N P complete fo pogams on which all paths ae executable given the language has dynamically allocated ecusive data stuctues, loops, and if-statements. These poblems ae in N P because we can nondeteministically geneate an execution of the pogam and then simulate the execution in time linea in the length of the execution (a simila agument is in [12]). Fom the pogam stoe 16
17 we can easily answe questions about May Alias and the complement of Must Alias. This agument woks fo Static Analysis poblems which can be nondeteministically answeed fo a given execution in a polynomial amount of time, in the size of the pogam and length of the execution path, fom the pogam, symbol table, and a possibly augmented pogam stoe. Howeve, the augmented stoe must be polynomial in the size of the oiginal stoe; fo example, [6]. The fact that May Alias and the complement of Must Alias ae both N P had unde this new assumption is evident because ou oiginal poofs of this claim [11, 10] do not contain any loops and only linea length paths exist. Since most Static Analyses ae inuenced by aliases, they ae also N P had. 17
Reader & ReaderT Monad (11A) Young Won Lim 8/20/18
Copyight (c) 2016-2018 Young W. Lim. Pemission is ganted to copy, distibute and/o modify this document unde the tems of the GNU Fee Documentation License, Vesion 1.2 o any late vesion published by the
More informationa Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives
SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationPOMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler
POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially
More informationShortest Paths for a Two-Robot Rendez-Vous
Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationDEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson
DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:
More informationCompiler-based Implementation of. Katia Gladitz. Lehrstuhl fur Informatik II, RWTH Aachen. Ahornstrae 55, W{5100 Aachen, Germany
Compile-based Implementation of Syntax-Diected Functional Pogamming Katia Gladitz ehstuhl fu Infomatik II, RWTH Aachen Ahonstae 55, W{5100 Aachen, Gemany Heinz Fabende and Heiko Vogle Abt. Theoetische
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More informationOn the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes
On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation
More informationFACE VECTORS OF FLAG COMPLEXES
FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.
More informationART GALLERIES WITH INTERIOR WALLS. March 1998
ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall
More informationAlso available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)
Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment
More informationApproaches to Automatic Programming
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mel.com Appoaches to Automatic Pogamming Chales Rich, Richad C. Wates TR92-04 July 1992 Abstact This pape is an oveview of cuent appoaches to automatic
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationQuery Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented
Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation
More informationarxiv: v1 [cs.lo] 3 Dec 2018
A high-level opeational semantics fo hadwae weak memoy models axiv:1812.00996v1 [cs.lo] 3 Dec 2018 Abstact Robet J. Colvin School of Electical Engineeing and Infomation Technology The Univesity of Queensland
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationEmbeddings into Crossed Cubes
Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability
More informationLecture 27: Voronoi Diagrams
We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the
More informationGARBAGE COLLECTION METHODS. Hanan Samet
gc0 GARBAGE COLLECTION METHODS Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu
More informationDYNAMIC STORAGE ALLOCATION. Hanan Samet
ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationAutomatically Testing Interacting Software Components
Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt
More informationSpiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks
Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition
More informationReachable State Spaces of Distributed Deadlock Avoidance Protocols
Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications
More informationzeo, i.e., each watchman emains stationay, and we have the at galley poblem. At the othe limit, if m = 1, we have the watchman oute poblem. Anothe con
Optimum Guad Coves and m-watchmen Routes fo Resticted Polygons Svante Calsson y Bengt J. Nilsson yz Simeon Ntafos x Abstact A watchman, in the teminology of at galleies, is a mobile guad. We conside seveal
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationA Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces
A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationInput Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer
Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au
More informationThe International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994.
The Intenational Confeence in Knowledge Management (CIKM'94), Gaithesbug, MD, Novembe 994. Hashing by Poximity to Pocess Duplicates in Spatial Databases Walid G. Aef Matsushita Infomation Technology Laboatoy
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationEfficient Execution Path Exploration for Detecting Races in Concurrent Programs
IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent
More informationCOEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines
1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep
More informationPipes, connections, channels and multiplexors
Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok
More informationInformation Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes
CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues
More informationA New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE
5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationGCC-AVR Inline Assembler Cookbook Version 1.2
GCC-AVR Inline Assemble Cookbook Vesion 1.2 About this Document The GNU C compile fo Atmel AVR isk pocessos offes, to embed assembly language code into C pogams. This cool featue may be used fo manually
More informationUser Specified non-bonded potentials in gromacs
Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationarxiv: v4 [cs.ds] 7 Feb 2018
Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data
More informationDYNAMIC STORAGE ALLOCATION. Hanan Samet
ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu
More informationComparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters
Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationLecture # 04. Image Enhancement in Spatial Domain
Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency
More informationA Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform
A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad
More informationGravitational Shift for Beginners
Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational
More informationConservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery
Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in
More information= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2
Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used
More informationdc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc
- CentOS 5.2 - Linux Uses Guide - Linux Command SYNOPSIS [-V] [--vesion] [-h] [--help] [-e sciptexpession] [--expession=sciptexpession] [-f sciptfile] [--file=sciptfile] [file...] DESCRIPTION is a evese-polish
More informationConversion Functions for Symmetric Key Ciphers
Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401
More informationConcomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution
Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants
More information(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.
Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationIllumination methods for optical wear detection
Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical
More informationThe Internet Ecosystem and Evolution
The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee
More informationParallel processing model for XML parsing
Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia
More informationLecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining
EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining
More informationOn Error Estimation in Runge-Kutta Methods
Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment
More informationScaling Location-based Services with Dynamically Composed Location Index
Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute
More informationData mining based automated reverse engineering and defect discovery
Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More informationHaptic Glove. Chan-Su Lee. Abstract. This is a final report for the DIMACS grant of student-initiated project. I implemented Boundary
Physically Accuate Haptic Rendeing of Elastic Object fo a Haptic Glove Chan-Su Lee Abstact This is a final epot fo the DIMACS gant of student-initiated poject. I implemented Bounday Element Method(BEM)
More informationMIS to Prepress ICS. Version Date: File: ICS-MIS-Prepress-1.01.doc,.pdf. Origination & Prepress WG
MIS to Pepess ICS Vesion 1.01 Date: 2006-01-02 File: ICS-MIS-Pepess-1.01.doc,.pdf Oigination & Pepess WG Abstact This ICS defines the Inteface between the MIS and Pepess. It specifies the Pocesses fo a
More informationImprovement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1
Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica
More informationA Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation
A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801
More informationTransmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design
Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced
More informationThe Java Virtual Machine. Compiler construction The structure of a frame. JVM stacks. Lecture 2
Compile constuction 2009 Lectue 2 Code geneation 1: Geneating code The Java Vitual Machine Data types Pimitive types, including intege and floating-point types of vaious sizes and the boolean type. The
More informationUCB CS61C : Machine Structures
inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called
More informationTESSELLATIONS. This is a sample (draft) chapter from: MATHEMATICAL OUTPOURINGS. Newsletters and Musings from the St. Mark s Institute of Mathematics
TESSELLATIONS This is a sample (daft) chapte fom: MATHEMATICAL OUTPOURINGS Newslettes and Musings fom the St. Mak s Institute of Mathematics James Tanton www.jamestanton.com This mateial was and can still
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More informationThe University of North Carolina. its production and consumption. Embedded signal processing applications are naturally
Feasibility concens in PGM gaphs with bounded bues Sanjoy Bauah Depatment of Compute Science The Univesity of Vemont Email: sanjoy@cs.uvm.edu Steve Goddad Kevin Jeay Depatment of Compute Science The Univesity
More informationn If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons.
Counting Convex Polygons in Plana Point Sets Joseph S. B. Mitchell a;1, Günte Rote b, Gopalakishnan Sundaam c, and Gehad Woeginge b a Applied Mathematics and Statistics, SUNY Stony Book, NY 11794-3600.
More informationA Functional Approach for Formalizing Regular. Universitat Karlsruhe, Institut fur Rechnerentwurf und Fehlertoleranz,
A Functional Appoach fo Fomalizing Regula Hadwae Stuctues? Dik Eisenbiegle 1, Klaus Schneide 1 and Ramayya Kuma 2 1 Univesitat Kalsuhe, Institut fu Rechneentwuf und Fehletoleanz, (Pof. D. Schmid), P.O.
More informationLecture #22 Pipelining II, Cache I
inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More information4.2. Co-terminal and Related Angles. Investigate
.2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as
More informationOPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO
OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO Zeeshan A. Shaikh 1 and T.Y. Badguja 2 1,2 Depatment of Mechanical Engineeing, Late G. N. Sapkal
More informationConfiguring RSVP-ATM QoS Interworking
Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP
More informationTopic -3 Image Enhancement
Topic -3 Image Enhancement (Pat 1) DIP: Details Digital Image Pocessing Digital Image Chaacteistics Spatial Spectal Gay-level Histogam DFT DCT Pe-Pocessing Enhancement Restoation Point Pocessing Masking
More informationEffective Data Co-Reduction for Multimedia Similarity Search
Effective Data Co-Reduction fo Multimedia Similaity Seach Zi Huang Heng Tao Shen Jiajun Liu Xiaofang Zhou School of Infomation Technology and Electical Engineeing The Univesity of Queensland, QLD 472,
More informationA Recommender System for Online Personalization in the WUM Applications
A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based
More informationColor Correction Using 3D Multiview Geometry
Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,
More informationClass 21. N -body Techniques, Part 4
Class. N -body Techniques, Pat Tee Codes Efficiency can be inceased by gouping paticles togethe: Neaest paticles exet geatest foces diect summation. Distant paticles exet smallest foces teat in goups.
More informationA General Characterization of Representing and Determining Fuzzy Spatial Relations
7 The Intenational Aab Jounal of Infomation Technolog A Geneal Chaacteization of Repesenting and Detemining Fuzz Spatial Relations Lui Bai and Li Yan 2 College of Infomation Science and Engineeing, Notheasten
More informationGetting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3
A PMW-EX1/PMW-EX3 Getting Stated Oveview This document descibes how to use the XDCAM EX Vesion Up Tool (heeafte Vesion Up Tool ) to upgade the PMW-EX1 and PMW-EX3 to vesion 1.20 (PMW-EX1) o vesion 1.10
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationThis document contains the draft version of the following paper:
This document contains the daft vesion of the following pape: R. Sinha, S.K. Gupta, C.J. Paedis, P.K. Khosla. Extacting aticulation models fom CAD models of pats with cuved sufaces. ASME Jounal of Mechanical
More informationHierarchical Region Mean-Based Image Segmentation
Hieachical Region Mean-Based Image Segmentation Slawo Wesolkowski and Paul Fieguth Systems Design Engineeing Univesity of Wateloo Wateloo, Ontaio, Canada, N2L-3G1 s.wesolkowski@ieee.og, pfieguth@uwateloo.ca
More informationParametric Query Optimization for Linear and Piecewise Linear Cost Functions
Paametic Quey Oimization fo Linea and Piecewise Linea Cost Functions Avind Hulgei S. Sudashan Indian Institute of Technology, Bombay {au, sudasha}@cse.iitb.ac.in Abstact The of a quey an depends on many
More informationEfficient protection of many-to-one. communications
Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok
More informationLecture 8 Introduction to Pipelines Adapated from slides by David Patterson
Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.
More informationIP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs
IP MULTICAST Adiseshu Hai, T. V. Lakshman and Godon Wilfong Nokia DIMACS Wokshop on Algoithms fo Data Cente Netwoks Rutges Univesity, NJ 1 Why is IP Multicast not deployed in public netwoks? Denial-of-Sevice
More informationFifth Wheel Modelling and Testing
Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les
More information