124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue

Size: px
Start display at page:

Download "124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue"

Transcription

1 Chapter 8 Case Study: A Memory Component In chapter 6 we gave the outlne of a case study on the renement of a safe regster. In ths chapter wepresent the outne of another case study on persstent communcaton; we deal wth a memory component. Ths memory component s mplemented by a memory that communcates va a remote procedure call component. At the Dagstuhl Semnar on Speccaton and Renement of Reactve Systems [Dag94], organsed by Lamport and Broy, ths case study has been treated usng derent formalsms. In ths chapter we examne the soluton n the ImpUNITY framework. To descrbe the case study and the goals of the renement we quote the orgnal Speccaton Problem. Ths chapter s organsed as follows. Secton 8.1 deals wth the speccaton of a procedure nterface between components. It denes some of the domans used n ths chapter. In secton 8.2 a memory component s speced and we show that a relable memory s a renement of an unrelable memory. Secton 8.3 gves a remote procedure call component and secton 8.4 shows that an unrelable memory can be mplemented by a combnaton of a relable memory and a remote procedure component. 8.1 The Procedure Interface About the procedure nterface, the Speccaton Problem says: The problem calls for the speccaton and vercaton of a seres of components. Components nteract wth one another usng a procedure-callng nterface. One component ssues a call to another, and the second component responds by ssung a return. A call s an ndvsble (atomc) acton that communcates a procedure name and a lst of arguments to the called component. A return s an atomc acton ssued n response to a call. There are two knds of returns; normal and exceptonal. A normal call returns a value (whch could be a lst). An exceptonal return also returns a value, usually 123

2 124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssued only n response to a call. There may be \syntactc" restrctons on the types of arguments and return values. A component may contan multple processes that can concurrently ssue procedure calls. More precsely, after one process ssues a call, other processes can ssue calls to the same component before the component ssues a return from the rst call. A return acton communcates to the callng component the dentty of the process that ssued the correspondng call. In the ImpUNITY framework, components are modelled by programs. A component provdng servces exports a call procedure and mports a return procedure of the callng component. A call communcates the dentty of the callng process, a procedure name and a lst of arguments. A return communcates the dentty of the process and a value. We do not dstngush normal and exceptonal returns, normal and exceptonal values are just derent tems of the same doman. So, we use the followng types for the arguments of call and return procedures: CallType RetType = ProcId Names Args; = ProcId Values; where ProcId s the doman of process denttes, Names s the doman of procedure names, Values s the doman of argument values, and Args the doman of lsts of Values. Selecton of a eld of a tuple s denoted by the varable name followed by a dot and the name of the eld n the tuple. For a varable a : CallType, the elds are named by a = (a:proc; a:name; a:args). For a varable a : RetType, the elds are named by a =(a:proc; a:ret). For lsts we have the standard lst operatons cons (:), head (hd) and tal (tl), the length # gvng the length of a lst, and the selector :n that selects the n th tem n the lst. To handle calls, components have an array of slots as a local varable. A slot s a varable of the type SlotType = Tstat ProcId Names Args Values; and s used for storng status nformaton, the argument and the value to return. For a slot S : SlotType elds are named by S =(S :stat; S :proc; S :name; S :args; S :ret). On a call, a free slot s chosen to store the nformaton of the call. Wth every slot a set of statements s assocated dealng wth the call. The bult-n UNITY farness takes care of the progress for each call. A consequence of ths approach s that only a xed number of processes can be served.

3 8.2. A Memory Component A Memory Component About the memory component, the Speccaton Problem says: The component to be speced s a memory that mantans the contents of a set MemLocs of locatons. The contents of a locaton s an element of a set MemVals. Ths component has two procedures, descrbed nformally below. Note that beng an element of MemLocs or MemVals s a \semantc" restrcton, and cannot be mposed solely by syntactc restrctons on the types of arguments. Name Read Arguments loc : an element ofmemlocs Return Value an element ofmemvals Exceptons BadArg: argument loc s not an element ofmemlocs. MemFalure: the memory cannot be read. Descrpton Returns the value stored n address loc. Name Wrte Arguments loc : an element ofmemlocs val : an element of MemVals Return Value some xed value Exceptons BadArg: argument loc s not an element ofmemlocs, or argument val s not an element ofmemvals. MemFalure: the wrte mght not have succeeded. Descrpton Stores the value val n address loc. The memory must eventually ssue a return for every Read and Wrte call. Dene an operaton to consst of a procedure call and the correspondng return. The operaton s sad to be successful t has a normal (nonexceptonal) return. The memory behaves as f t mantans an array of atomcally read and wrtten locatons that ntally all contan the value IntVal, such that: An operaton that rases a BadArg excepton has no eect on the memory. Each successful Read(l) operaton performs a sngle atomc read to locaton l at some tme between the call and return. Each successful Wrte(l ; v ) operaton performs a sequence of one or more atomc wrtes of value v to locaton l at some tme between the call and return.

4 126 Chapter 8. Case Study: A Memory Component Each unsuccessful Wrte(l ; v ) operaton performs a sequence of zero or more atomc wrtes of value v to locaton l at some tme between the call and return. A varant of the Memory Component s the Relable Memory Component, n whch no MemFalure exceptons can be rased. Problem 1 (a) Wrte a formal speccaton of the Memory component and of the Relable Memory component. (b) Ether prove that a Relable Memory component s a correct mplementaton of a Memory component, or explan why t should not be. Soluton of problem 1(a) The memory component uses the procedure nterface as descrbed n secton 8.1. So, t exports a procedure call, t mports a return procedure and has a local varable Slot. The call procedure stores ts argument n a free slot,.e. a slot whch status s FREE and changes the status of ths slot to CALL. Wth every slot two actons are assocated. The rst chooses the value to return and updates a local memory varable n the proper way. The second takes care of ssung the return and frees the slot. The bult-n ImpUNITY farness takes care of the progress: every call has a return. In the speccaton of the memory component, we use the followng abbrevatons: Read(name; args) Wrte(name; args) IsMemCall(name; args) IsRead(name; args) IsWrte(name; args) BadArgs(name; args) = name = Read ^ #(args) =1; = name = Wrte ^ #(args) =2; = Read(name; args) _ Wrte(name; args); = Read(name; args) ^h9l : l 2 MemLocs : args =[l]; = Wrte(name; args) ^h9l ; v : l 2 MemLocs; v 2 MemVals : args =[l ; v ]; = IsMemCall(name; args) ^:(IsRead(name; args) _ IsWrte(name; args)): Now, the Memory component Mem s speced n example 8.1. The Relable Memory component Rel s smlar to the memory component but t cannot fal,.e. t does not return a MemFalure. Ths s modelled by the program Rel n example 8.2.

5 8.2. A Memory Component 127 Program Mem hde fslot; memg external [=fslot ;memg] export proc call(a : CallType) = IsMemcall(a:name; a:args)! f [] Slot[]:stat = FREE! Slot[] :=(CALL; a:proc; a:name; a:args; MemFalure) mport proc return(rettype) nt h8 : 2 MemLocs : mem[] =IntVal^h8 : 2 SlotLocs : Slot[]:stat = FREE assgn h []s : s 2 SlotLocs : Slot[s]:stat = CALL! f IsRead(Slot[s]:name; Slot[s]:args)! Slot[s]:ret := mem[slot[s]:args:1] [] IsWrte(Slot[s]:name; Slot[s]:args)! mem[slot[s]:args:1] := Slot[s]:args:2 ; Slot[s]:ret := FxedVal [] BadArgs(Slot[s]:name; Slot[s]:args)! Slot[s]:ret := BadArg [] true! Slot[s]:ret := MemFalure [] h []s : s 2 SlotLocs : Slot[s]:stat = CALL! return((slot[s]:proc; Slot[s]:ret)) ; Slot[s]:stat := FREE endfmemg Example 8.1. Soluton of problem 1(b) The Relable Memory component s a renement of the Memory component and ths renement sproven n two steps. Frst, the nondetermnsm of the statements n the rst set s reduced by transformaton Second, the guards of the statements n the second set are strengthened by transformaton We have to prove that the followng propertes hold n the relable memory components: (Slot[s]:stat = CALL),. CM (Slot[s]:stat 6= CALL _ ret 6= MemFalure); (ret 6= MemFalure) unless CM (Slot[s]:stat = CALL): Ths holds f MemFalure 62 MemVals.

6 128 Chapter 8. Case Study: A Memory Component Program Rel hde fslot; memg external [=fslot ;memg] export proc call(a : CallType) = IsMemcall(a:name; a:args)! f [] Slot[]:stat = FREE! Slot[] :=(CALL; a:proc; a:name; a:args; MemFalure) mport proc return(rettype) nt h8 : 2 MemLocs : mem[] =IntVal^h8 : 2 SlotLocs : Slot[]:stat = FREE assgn h []s : s 2 SlotLocs : Slot[s]:stat = CALL! f IsRead(Slot[s]:name; Slot[s]:args)! Slot[s]:ret := mem[slot[s]:args:1] [] IsWrte(Slot[s]:name; Slot[s]:args)! mem[slot[s]:args:1] := Slot[s]:args:2 ; Slot[s]:ret := FxedVal [] BadArgs(Slot[s]:name; Slot[s]:args)! Slot[s]:ret := BadArg [] h []s : s 2 SlotLocs : Slot[s]:stat = CALL ^ (ret 6= MemFalure)! return((slot[s]:proc; Slot[s]:ret)) ; Slot[s]:stat := FREE endfrelg Example The RPC Component About the RPC component, the Speccaton Problem says: The RPC component nterfaces wth two envronment components, a sender and a recever. It relays procedure calls from the sender to the recever, and relays the return values back to the sender. Parameters of the component are a set Procs of procedure names and a mappng ArgNum, where ArgNum(p) s the number of arguments of each procedure p. The RPC component contans a sngle procedure:

7 8.3. The RPC Component 129 Name RemoteCall Arguments Procs: name of a procedure args: lst of arguments Return Value any value that can be returned by a call to Procs Exceptons RPCFalure: the call faled BadCallProcs s not a vald name or args s not a syntactcally correct lst of arguments for Procs. Rases any excepton rased by a call to Procs Descrpton Calls procedure Procs wth arguments args A call of RemoteCall(Procs; args) causes the RPC component to do one of the followng: Rase a BadCall excepton f args s not a lst of ArgNum(Procs) arguments. Issue one call to procedure Procs wth arguments args, wat for the correspondng return (whch the RPC component assumes wll occur) and ether (a) return the value (normal or exceptonal) returned by that call, or (b) rase the RPCFalure excepton. Issue no procedure call, and rase the RPCFalure excepton. The component accepts concurrent calls of RemoteCall from the sender, and can have multple outstandng calls to the recever. Problem 2 Wrte a formal speccaton of the RPC component. Soluton of problem 2 The RPC component s an nterface component between two components, a sender and a recever. It provdes a procedure-callng nterface to the sender. So, the component exports a call procedure (rpc call), mports a return procedure (rpc return) and uses the slot mechansm as descrbed n secton 8.1. The RPC component also uses a procedure-callng nterface to the recever. Therefore t mports a call procedure (call) andexports a return procedure (return). In the descrpton of the RPC component we use the followng abbrevatons. IsRpcCall(name; args) GoodCall(args) BadCall(args) = name = RemoteCall ^ #(args) > 1 = arg:1 2 Procs ^ ArgNum(args:1) = #(args), 1 = :GoodCall(args) Now, the RPC component s speced n example 8.3. A call to rpc call communcates a remote procedure call and ths nformaton s stored n a free slot. In case of a bad call

8 130 Chapter 8. Case Study: A Memory Component Program RPC hde fslotg external [=fslotg] export proc rpc call(a : CallType) = IsRpcCall(a:name)! f [] Slot[]:stat = FREE! Slot[] :=(CALL; a:comp; a:proc; a:name; a:args; RPCFalure) [] proc return(a : RetType) = f true! Slot[a:proc]:ret := a:val ; Slot:[a:proc]:stat := RETURN mport proc rpc return(rettype) [] true! Slot[a:proc]:ret := RPCFalure ; Slot:[a:proc]:stat := RETURN [] proc call(calltype) nt h8 : 2 SlotLocs : Slot[]:stat = FREE assgn h []s : s 2 SlotLocs : f Slot[s]:stat = CALL! f GoodCall(Slot[s]:args)! Slot[s]:ret := CALLING endfrpcg ; call(s; hd(args); tl(args)) [] BadCall(Slot[s]:args)! Slot[s]:ret := BadCall ; Slot[s]:stat := RETURN [] true! Slot[s]:ret := RPCFalure [] Slot[s]:stat = RETURN! rpc return((slot[s]:proc; Slot[s]:ret)) ; Slot[s]:stat := FREE Example 8.3. ; Slot[s]:stat := RETURN

9 8.4. Implementaton of the Memory 131 the second statement of the program decdes to return wth a BadCall or a RPCFalure by settng the status eld to RETURN. On a proper call, the statement forwards the call to the recever or decdes to return wth a RPCFalure. The recever calls the return procedure wth the result of the remote call or an excepton. The last statement takes care of the return. 8.4 Implementaton of the Memory About mplementng the memory, the Speccaton Problem says: A Memory component s mplemented by combnng an RPC component wth a Relable Memory component as follows. A Read or Wrte call s forwarded to the Relable Memory by ssung the approprate call to the RPC component. If ths call returns wthout rasng an RPCFalure excepton, the value returned s returned to the caller. (An exceptonal return causes an excepton to be rased.) If the call rases an RPCFalure excepton, then the mplementaton may ether ressue the call to the RPC component or rase a MemFalure excepton. The RPC call can be retred arbtrarly many tmes because of RPCFalure exceptons, but a return from the Read or Wrte call must eventually be ssued. Problem 3 Wrte a formal speccaton of the mplementaton, and prove that t correctly mplements the speccaton of the Memory component of Problem 1. Soluton of problem 3 A memory component s mplemented by combnng the RPC component, as gven n example 8.3, wth a (Relable) Memory component, as gven n example 8.2. Besdes these two components, the mplementaton Imp contans an nterface component Int,.e. Imp = proc(frpc call ; rpc returng : Int[]RpcMem) where RpcMem = proc(fcall ; returng : RPC []Rel). Component Int s an nterface component that accepts memory calls and relays them to component RpcMem. Therefore, component Int provdes a procedure-callng nterface to the envronment, t exports a call procedure (call), mports a return procedure (return), and uses the slot mechansm as descrbed before. Furthermore, t uses the procedure-callng nterface of the RPC component,.e. t mports the call procedure (rpc call) and exports a return procedure (rpc return).

10 132 Chapter 8. Case Study: A Memory Component Program Int hde fslotg external [=fslotg] export proc call(a : CallType) = IsMemcall(a:name; a:args)! f [] Slot[] =FREE! Slot[] :=(CALL; a:proc; a:name; a:args; MemFalure) [] proc rpc return(a : RetType) = f Slot[a:proc]:stat = CALLING! Slot[a:proc]:ret := Map(a:val) ; Slot[a:proc]:stat := CALLED [] Slot[a:proc]:stat = CALLING! Slot[a:proc]:ret := Map(a:val) ; Slot[a:proc]:stat := RETURN [] Slot[a:proc]:stat = TERM! Slot[a:proc]:ret := Map(a:val) ; Slot[a:proc]:stat := RETURN mport proc return(rettype) [] proc rpc call(calltype) nt h8 : 2 SlotLocs : Slot[]:stat = FREE assgn h []s : s 2 SlotLocs : endfintg f Slot[s]:stat = CALL! Slot[s]:stat := CALLING ; rpc call(s; RemoteCall; name : args) [] Slot[s]:stat = CALLED! Slot[s]:stat := CALLING ; rpc call(s; RemoteCall; name : args) [] Slot[s]:stat = RETURN! return((slot[s]:proc; (Slot[s]:ret)) ; Slot[s]:stat := FREE [] h []s : s 2 SlotLocs : f Slot[s]:stat = CALLED! Slot[s]:stat := RETURN [] Slot[s]:stat = CALLING! Slot[s]:stat := TERM Example 8.4. The Int component s speced by program Int n example 8.4, where Map s the functon that maps RPCFalure to MemFalure and s the dentty on all other arguments.

11 8.5. Conclusons 133 To show that ths s a proper mplementaton of a Memory component we have to prove the renement Mem v Imp. Ths s done n a number of steps. We start wth the program Mem, gven n example 8.1, and show t s rened by a program proc(frpc call ; rpc returng : Int[]RelMem 0 ). Then, program RelMem 0 s rened to the program proc(frpc call ; rpc returng : RPC []Mem). In secton 8.2, we have proven the renement Mem v Rel, so, wemay conclude that RefMem 0 v RefMem and, consequently, Mem v Imp. The complete proof s rather long and can be found n [UK94]. All steps are applcatons of the renement rules we have gven before. 8.5 Conclusons In ths chapter we presented the outlne of a case study of the renement of a memory component n the ImpUNITY framework. Frst, t llustrates the use of procedures n the ImpUNITY framework as presented n the prevous chapter. It shows how a memory can be modelled and rened n ths framework and how the program transformaton rules are appled. It also shows that renement n envronment s useful. Furthermore, t s another example of modellng persstent communcaton n ths framework.

12 134 Chapter 8. Case Study: A Memory Component

all pre- and postcondton pars of programs. By modelng reactve systems as sequental programs and by usng data renement, the Renement Calculus can also

all pre- and postcondton pars of programs. By modelng reactve systems as sequental programs and by usng data renement, the Renement Calculus can also The RPC-Memory Speccaton Problem: UNITY + Renement Calculus Rob T. Udnk? & Joost N. Kok Department of Computer Scence, Leden Unversty, P.O. Box 9512, 2300 RA Leden, The Netherlands. Abstract. We use the

More information

Manfred Broy. Leslie Lamport. Sat 6 Aug The problem calls for the specication and verication of a series of components.

Manfred Broy. Leslie Lamport. Sat 6 Aug The problem calls for the specication and verication of a series of components. Specication Problem Manfred Broy Leslie Lamport Sat 6 Aug 1994 1 The Procedure Interface The problem calls for the specication and verication of a series of components. Components interact with one another

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Computer models of motion: Iterative calculations

Computer models of motion: Iterative calculations Computer models o moton: Iteratve calculatons OBJECTIVES In ths actvty you wll learn how to: Create 3D box objects Update the poston o an object teratvely (repeatedly) to anmate ts moton Update the momentum

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Broy-Lamport Specification Problem: A Gurevich Abstract State Machine Solution

Broy-Lamport Specification Problem: A Gurevich Abstract State Machine Solution Broy-Lamport Specification Problem: A Gurevich Abstract State Machine Solution James K. Huggins EECS Department, University of Michigan, Ann Arbor, MI, 48109-2122, USA. May 21, 2002 Abstract We apply the

More information

kccvoip.com basic voip training NAT/PAT extract 2008

kccvoip.com basic voip training NAT/PAT extract 2008 kccvop.com basc vop tranng NAT/PAT extract 28 As we have seen n the prevous sldes, SIP and H2 both use addressng nsde ther packets to rely nformaton. Thnk of an envelope where we place the addresses of

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Compiling Process Networks to Interaction Nets

Compiling Process Networks to Interaction Nets Complng Process Networks to Interacton Nets Ian Macke LIX, CNRS UMR 7161, École Polytechnque, 91128 Palaseau Cede, France Kahn process networks are a model of computaton based on a collecton of sequental,

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Installation and User Guide. Digidim Remote Control (303) Product description. Switching Lights On/Off using Digidim 303 Remote

Installation and User Guide. Digidim Remote Control (303) Product description. Switching Lights On/Off using Digidim 303 Remote Installaton and User Gude Dgdm Remote Control (0) Product descrpton The Dgdm Remote (0) can be used n conjuncton wth the Dm Sense to modfy the preset lght levels and recall/ store scenes, as well as actvatng

More information

Ecient Computation of the Most Probable Motion from Fuzzy. Moshe Ben-Ezra Shmuel Peleg Michael Werman. The Hebrew University of Jerusalem

Ecient Computation of the Most Probable Motion from Fuzzy. Moshe Ben-Ezra Shmuel Peleg Michael Werman. The Hebrew University of Jerusalem Ecent Computaton of the Most Probable Moton from Fuzzy Correspondences Moshe Ben-Ezra Shmuel Peleg Mchael Werman Insttute of Computer Scence The Hebrew Unversty of Jerusalem 91904 Jerusalem, Israel Emal:

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Intro. Iterators. 1. Access

Intro. Iterators. 1. Access Intro Ths mornng I d lke to talk a lttle bt about s and s. We wll start out wth smlartes and dfferences, then we wll see how to draw them n envronment dagrams, and we wll fnsh wth some examples. Happy

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

AP PHYSICS B 2008 SCORING GUIDELINES

AP PHYSICS B 2008 SCORING GUIDELINES AP PHYSICS B 2008 SCORING GUIDELINES General Notes About 2008 AP Physcs Scorng Gudelnes 1. The solutons contan the most common method of solvng the free-response questons and the allocaton of ponts for

More information

ANSYS FLUENT 12.1 in Workbench User s Guide

ANSYS FLUENT 12.1 in Workbench User s Guide ANSYS FLUENT 12.1 n Workbench User s Gude October 2009 Copyrght c 2009 by ANSYS, Inc. All Rghts Reserved. No part of ths document may be reproduced or otherwse used n any form wthout express wrtten permsson

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Bayesian Network Learning System based on Neural Networks

Bayesian Network Learning System based on Neural Networks ayesan Network Learnng System based on Neural Networks Yoch Motomura Electrotechncal Laboratory motomura@etl.go.p Isao Hara Electrotechncal Laboratory hara@etl.go.p bstract In real world applcatons lke

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.

Assembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface. IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language

More information

OPL: a modelling language

OPL: a modelling language OPL: a modellng language Carlo Mannno (from OPL reference manual) Unversty of Oslo, INF-MAT60 - Autumn 00 (Mathematcal optmzaton) ILOG Optmzaton Programmng Language OPL s an Optmzaton Programmng Language

More information

Simple Security Denitions for and Constructions of 0-RTT Key Exchange

Simple Security Denitions for and Constructions of 0-RTT Key Exchange Smple Securty Dentons for and Constructons of 0-RTT Key Exchange Brtta Hale 1 and Tbor Jager 2 and Sebastan Lauer 3 and Jörg Schwenk 3 1 NTNU, Norwegan Unversty of Scence and Technology, Trondhem brtta.hale@ntnu.no

More information

/98 $10.00 (c) 1998 IEEE

/98 $10.00 (c) 1998 IEEE Formal Development of Java Based Web Parallel Applcatons Govanna D Marzo Serugendo 1;2 Ncolas Guel 2 1 CUI, Unversty of Geneva 2 LGL-DI, Swss Federal Insttute Swtzerland dmarzo@d.ep.ch of Technology, Swtzerland

More information

Brave New World Pseudocode Reference

Brave New World Pseudocode Reference Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be

More information

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com

More information

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1 A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department

More information

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6) Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

A fault tree analysis strategy using binary decision diagrams

A fault tree analysis strategy using binary decision diagrams Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:

More information

Configure Address Book. Configure Show Send To. Options Supervision Message. Options Flood Preventer

Configure Address Book. Configure Show Send To. Options Supervision Message. Options Flood Preventer FlashPont Sotware Inc. eomega Pagng Sotware Qualty Sotware For The Fre Alarm Industry Descrpton eomega pagng sotware provdes a means o convertng prnter output rom a Smplex re alarm panel nto short messages.

More information

Intra-procedural Inference of Static Types for Java Bytecode 1

Intra-procedural Inference of Static Types for Java Bytecode 1 McGll Unversty School of Computer Scence Sable Research Group Intra-procedural Inference of Statc Types for Java Bytecode 1 Sable Techncal Report No. 5 Etenne Gagnon Laure Hendren October 14, 1998 w w

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Replication of the data object raises the issue of consistency. among the replicas, especially in determining

Replication of the data object raises the issue of consistency. among the replicas, especially in determining Eventually-Seralzable Data Servces Alan Fekete Davd Gupta y Vctor Luchangco y Nancy Lynch y Alex Shvartsman y Abstract We present a new speccaton for dstrbuted data servces that trade-o mmedate consstency

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

S.P.H. : A SOLUTION TO AVOID USING EROSION CRITERION?

S.P.H. : A SOLUTION TO AVOID USING EROSION CRITERION? S.P.H. : A SOLUTION TO AVOID USING EROSION CRITERION? Célne GALLET ENSICA 1 place Emle Bloun 31056 TOULOUSE CEDEX e-mal :cgallet@ensca.fr Jean Luc LACOME DYNALIS Immeuble AEROPOLE - Bat 1 5, Avenue Albert

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Polyhedral Compilation Foundations

Polyhedral Compilation Foundations Polyhedral Complaton Foundatons Lous-Noël Pouchet pouchet@cse.oho-state.edu Dept. of Computer Scence and Engneerng, the Oho State Unversty Feb 8, 200 888., Class # Introducton: Polyhedral Complaton Foundatons

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Math Homotopy Theory Additional notes

Math Homotopy Theory Additional notes Math 527 - Homotopy Theory Addtonal notes Martn Frankland February 4, 2013 The category Top s not Cartesan closed. problem. In these notes, we explan how to remedy that 1 Compactly generated spaces Ths

More information

Cost-efficient deployment of distributed software services

Cost-efficient deployment of distributed software services 1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed

More information

(1) The control processes are too complex to analyze by conventional quantitative techniques.

(1) The control processes are too complex to analyze by conventional quantitative techniques. Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson

More information

F-5000 View Software Installation and Operation Guide Belcher Road South, Largo, FL USA Tel +1 (727) Fax +1 (727)

F-5000 View Software Installation and Operation Guide Belcher Road South, Largo, FL USA Tel +1 (727) Fax +1 (727) ONICON Flow and Energy Measurement F-5000 Vew Software Installaton and Operaton Gude 11451 Belcher Road South, Largo, FL 33773 USA Tel +1 (727) 447-6140 Fax +1 (727)442-5699 2032-1 / 107050 Rev B www.oncon.com

More information

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation

Synchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,

More information

On Correctness of Nonserializable Executions

On Correctness of Nonserializable Executions Journal of Computer and System Scences 56, 688 (1998) Artcle No. SS971536 On Correctness of Nonseralzable Executons Rajeev Rastog,* Sharad Mehrotra, - Yur Bretbart, [,1 Henry F. Korth,* and Av Slberschatz*

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Model Clipping Triangle Strips and Quad Meshes.

Model Clipping Triangle Strips and Quad Meshes. Model Clppng Trangle Strps and Quad Meshes. Patrc-Glles Mallot Sun Mcrosystems, Inc. 2550 Garca Avenue, Mountan Vew, CA 94043 Abstract Ths paper descrbes an orgnal software mplementaton of 3D homogeneous

More information

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7 Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca

More information

A Similarity-Based Prognostics Approach for Remaining Useful Life Estimation of Engineered Systems

A Similarity-Based Prognostics Approach for Remaining Useful Life Estimation of Engineered Systems 2008 INTERNATIONAL CONFERENCE ON PROGNOSTICS AND HEALTH MANAGEMENT A Smlarty-Based Prognostcs Approach for Remanng Useful Lfe Estmaton of Engneered Systems Tany Wang, Janbo Yu, Davd Segel, and Jay Lee

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want

More information

News. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example

News. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example Unversty of Brtsh Columba CPSC, Intro to Computaton Jan-Apr Tamara Munzner News Assgnment correctons to ASCIIArtste.java posted defntely read WebCT bboards Arrays Lecture, Tue Feb based on sldes by Kurt

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Exercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005

Exercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005 Exercses (Part 4) Introducton to R UCLA/CCPR John Fox, February 2005 1. A challengng problem: Iterated weghted least squares (IWLS) s a standard method of fttng generalzed lnear models to data. As descrbed

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR Judth Aronow Rchard Jarvnen Independent Consultant Dept of Math/Stat 559 Frost Wnona State Unversty Beaumont, TX 7776 Wnona, MN 55987 aronowju@hal.lamar.edu

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Dynamic Routing and Operational Controls in Workow. Management Systems. Abstract

Dynamic Routing and Operational Controls in Workow. Management Systems. Abstract Dynamc Routng and Operatonal Controls n Workow Management Systems Akhl Kumar College of Busness, Campus Box 419 Unversty of Colorado Boulder CO 80309-0419 J. Leon Zhao School of Busness and Management

More information

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain AMath 483/583 Lecture 21 May 13, 2011 Today: OpenMP and MPI versons of Jacob teraton Gauss-Sedel and SOR teratve methods Next week: More MPI Debuggng and totalvew GPU computng Read: Class notes and references

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract

with `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract HPeR-`: A Hgh Performance Reservaton Protocol wth `ook-ahead for Broadcast WDM Networks Vjay Svaraman George N. Rouskas TR-96-06 May 14, 1996 Abstract We consder the problem of coordnatng access to the

More information

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,

More information

EMBET: Towards User Assistance, Collaboration and Knowledge Sharing *

EMBET: Towards User Assistance, Collaboration and Knowledge Sharing * EMBET: Towards User Assstance, Collaboraton and Knowledge Sharng * Mchal Laclavík 1, Martn Šeleng 1, Ladslav Hluchý 1 1 Insttute of Informatcs, Slovak Academy of Scences, Dubravska cesta 9 845 07 Bratslava,

More information

Outline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011

Outline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011 9/8/2 2 Outlne Appendx C: The Bascs of Logc Desgn TDT4255 Computer Desgn Case Study: TDT4255 Communcaton Module Lecture 2 Magnus Jahre 3 4 Dgtal Systems C.2: Gates, Truth Tables and Logc Equatons All sgnals

More information

A MapReduce-supported Data Center Networking Topology

A MapReduce-supported Data Center Networking Topology A MapReduce-supported Data Center Networkng Topology Zelu Dng*,, Xue Lu, Deke Guo*, Honghu Chen*, Xueshan Luo* * Natonal Unversty of Defense Technology, Chna McGll Unversty, Canada Abstract Several novel

More information

11. HARMS How To: CSV Import

11. HARMS How To: CSV Import and Rsk System 11. How To: CSV Import Preparng the spreadsheet for CSV Import Refer to the spreadsheet template to ad algnng spreadsheet columns wth Data Felds. The spreadsheet s shown n the Appendx, an

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information