124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue
|
|
- Moses Hines
- 5 years ago
- Views:
Transcription
1 Chapter 8 Case Study: A Memory Component In chapter 6 we gave the outlne of a case study on the renement of a safe regster. In ths chapter wepresent the outne of another case study on persstent communcaton; we deal wth a memory component. Ths memory component s mplemented by a memory that communcates va a remote procedure call component. At the Dagstuhl Semnar on Speccaton and Renement of Reactve Systems [Dag94], organsed by Lamport and Broy, ths case study has been treated usng derent formalsms. In ths chapter we examne the soluton n the ImpUNITY framework. To descrbe the case study and the goals of the renement we quote the orgnal Speccaton Problem. Ths chapter s organsed as follows. Secton 8.1 deals wth the speccaton of a procedure nterface between components. It denes some of the domans used n ths chapter. In secton 8.2 a memory component s speced and we show that a relable memory s a renement of an unrelable memory. Secton 8.3 gves a remote procedure call component and secton 8.4 shows that an unrelable memory can be mplemented by a combnaton of a relable memory and a remote procedure component. 8.1 The Procedure Interface About the procedure nterface, the Speccaton Problem says: The problem calls for the speccaton and vercaton of a seres of components. Components nteract wth one another usng a procedure-callng nterface. One component ssues a call to another, and the second component responds by ssung a return. A call s an ndvsble (atomc) acton that communcates a procedure name and a lst of arguments to the called component. A return s an atomc acton ssued n response to a call. There are two knds of returns; normal and exceptonal. A normal call returns a value (whch could be a lst). An exceptonal return also returns a value, usually 123
2 124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssued only n response to a call. There may be \syntactc" restrctons on the types of arguments and return values. A component may contan multple processes that can concurrently ssue procedure calls. More precsely, after one process ssues a call, other processes can ssue calls to the same component before the component ssues a return from the rst call. A return acton communcates to the callng component the dentty of the process that ssued the correspondng call. In the ImpUNITY framework, components are modelled by programs. A component provdng servces exports a call procedure and mports a return procedure of the callng component. A call communcates the dentty of the callng process, a procedure name and a lst of arguments. A return communcates the dentty of the process and a value. We do not dstngush normal and exceptonal returns, normal and exceptonal values are just derent tems of the same doman. So, we use the followng types for the arguments of call and return procedures: CallType RetType = ProcId Names Args; = ProcId Values; where ProcId s the doman of process denttes, Names s the doman of procedure names, Values s the doman of argument values, and Args the doman of lsts of Values. Selecton of a eld of a tuple s denoted by the varable name followed by a dot and the name of the eld n the tuple. For a varable a : CallType, the elds are named by a = (a:proc; a:name; a:args). For a varable a : RetType, the elds are named by a =(a:proc; a:ret). For lsts we have the standard lst operatons cons (:), head (hd) and tal (tl), the length # gvng the length of a lst, and the selector :n that selects the n th tem n the lst. To handle calls, components have an array of slots as a local varable. A slot s a varable of the type SlotType = Tstat ProcId Names Args Values; and s used for storng status nformaton, the argument and the value to return. For a slot S : SlotType elds are named by S =(S :stat; S :proc; S :name; S :args; S :ret). On a call, a free slot s chosen to store the nformaton of the call. Wth every slot a set of statements s assocated dealng wth the call. The bult-n UNITY farness takes care of the progress for each call. A consequence of ths approach s that only a xed number of processes can be served.
3 8.2. A Memory Component A Memory Component About the memory component, the Speccaton Problem says: The component to be speced s a memory that mantans the contents of a set MemLocs of locatons. The contents of a locaton s an element of a set MemVals. Ths component has two procedures, descrbed nformally below. Note that beng an element of MemLocs or MemVals s a \semantc" restrcton, and cannot be mposed solely by syntactc restrctons on the types of arguments. Name Read Arguments loc : an element ofmemlocs Return Value an element ofmemvals Exceptons BadArg: argument loc s not an element ofmemlocs. MemFalure: the memory cannot be read. Descrpton Returns the value stored n address loc. Name Wrte Arguments loc : an element ofmemlocs val : an element of MemVals Return Value some xed value Exceptons BadArg: argument loc s not an element ofmemlocs, or argument val s not an element ofmemvals. MemFalure: the wrte mght not have succeeded. Descrpton Stores the value val n address loc. The memory must eventually ssue a return for every Read and Wrte call. Dene an operaton to consst of a procedure call and the correspondng return. The operaton s sad to be successful t has a normal (nonexceptonal) return. The memory behaves as f t mantans an array of atomcally read and wrtten locatons that ntally all contan the value IntVal, such that: An operaton that rases a BadArg excepton has no eect on the memory. Each successful Read(l) operaton performs a sngle atomc read to locaton l at some tme between the call and return. Each successful Wrte(l ; v ) operaton performs a sequence of one or more atomc wrtes of value v to locaton l at some tme between the call and return.
4 126 Chapter 8. Case Study: A Memory Component Each unsuccessful Wrte(l ; v ) operaton performs a sequence of zero or more atomc wrtes of value v to locaton l at some tme between the call and return. A varant of the Memory Component s the Relable Memory Component, n whch no MemFalure exceptons can be rased. Problem 1 (a) Wrte a formal speccaton of the Memory component and of the Relable Memory component. (b) Ether prove that a Relable Memory component s a correct mplementaton of a Memory component, or explan why t should not be. Soluton of problem 1(a) The memory component uses the procedure nterface as descrbed n secton 8.1. So, t exports a procedure call, t mports a return procedure and has a local varable Slot. The call procedure stores ts argument n a free slot,.e. a slot whch status s FREE and changes the status of ths slot to CALL. Wth every slot two actons are assocated. The rst chooses the value to return and updates a local memory varable n the proper way. The second takes care of ssung the return and frees the slot. The bult-n ImpUNITY farness takes care of the progress: every call has a return. In the speccaton of the memory component, we use the followng abbrevatons: Read(name; args) Wrte(name; args) IsMemCall(name; args) IsRead(name; args) IsWrte(name; args) BadArgs(name; args) = name = Read ^ #(args) =1; = name = Wrte ^ #(args) =2; = Read(name; args) _ Wrte(name; args); = Read(name; args) ^h9l : l 2 MemLocs : args =[l]; = Wrte(name; args) ^h9l ; v : l 2 MemLocs; v 2 MemVals : args =[l ; v ]; = IsMemCall(name; args) ^:(IsRead(name; args) _ IsWrte(name; args)): Now, the Memory component Mem s speced n example 8.1. The Relable Memory component Rel s smlar to the memory component but t cannot fal,.e. t does not return a MemFalure. Ths s modelled by the program Rel n example 8.2.
5 8.2. A Memory Component 127 Program Mem hde fslot; memg external [=fslot ;memg] export proc call(a : CallType) = IsMemcall(a:name; a:args)! f [] Slot[]:stat = FREE! Slot[] :=(CALL; a:proc; a:name; a:args; MemFalure) mport proc return(rettype) nt h8 : 2 MemLocs : mem[] =IntVal^h8 : 2 SlotLocs : Slot[]:stat = FREE assgn h []s : s 2 SlotLocs : Slot[s]:stat = CALL! f IsRead(Slot[s]:name; Slot[s]:args)! Slot[s]:ret := mem[slot[s]:args:1] [] IsWrte(Slot[s]:name; Slot[s]:args)! mem[slot[s]:args:1] := Slot[s]:args:2 ; Slot[s]:ret := FxedVal [] BadArgs(Slot[s]:name; Slot[s]:args)! Slot[s]:ret := BadArg [] true! Slot[s]:ret := MemFalure [] h []s : s 2 SlotLocs : Slot[s]:stat = CALL! return((slot[s]:proc; Slot[s]:ret)) ; Slot[s]:stat := FREE endfmemg Example 8.1. Soluton of problem 1(b) The Relable Memory component s a renement of the Memory component and ths renement sproven n two steps. Frst, the nondetermnsm of the statements n the rst set s reduced by transformaton Second, the guards of the statements n the second set are strengthened by transformaton We have to prove that the followng propertes hold n the relable memory components: (Slot[s]:stat = CALL),. CM (Slot[s]:stat 6= CALL _ ret 6= MemFalure); (ret 6= MemFalure) unless CM (Slot[s]:stat = CALL): Ths holds f MemFalure 62 MemVals.
6 128 Chapter 8. Case Study: A Memory Component Program Rel hde fslot; memg external [=fslot ;memg] export proc call(a : CallType) = IsMemcall(a:name; a:args)! f [] Slot[]:stat = FREE! Slot[] :=(CALL; a:proc; a:name; a:args; MemFalure) mport proc return(rettype) nt h8 : 2 MemLocs : mem[] =IntVal^h8 : 2 SlotLocs : Slot[]:stat = FREE assgn h []s : s 2 SlotLocs : Slot[s]:stat = CALL! f IsRead(Slot[s]:name; Slot[s]:args)! Slot[s]:ret := mem[slot[s]:args:1] [] IsWrte(Slot[s]:name; Slot[s]:args)! mem[slot[s]:args:1] := Slot[s]:args:2 ; Slot[s]:ret := FxedVal [] BadArgs(Slot[s]:name; Slot[s]:args)! Slot[s]:ret := BadArg [] h []s : s 2 SlotLocs : Slot[s]:stat = CALL ^ (ret 6= MemFalure)! return((slot[s]:proc; Slot[s]:ret)) ; Slot[s]:stat := FREE endfrelg Example The RPC Component About the RPC component, the Speccaton Problem says: The RPC component nterfaces wth two envronment components, a sender and a recever. It relays procedure calls from the sender to the recever, and relays the return values back to the sender. Parameters of the component are a set Procs of procedure names and a mappng ArgNum, where ArgNum(p) s the number of arguments of each procedure p. The RPC component contans a sngle procedure:
7 8.3. The RPC Component 129 Name RemoteCall Arguments Procs: name of a procedure args: lst of arguments Return Value any value that can be returned by a call to Procs Exceptons RPCFalure: the call faled BadCallProcs s not a vald name or args s not a syntactcally correct lst of arguments for Procs. Rases any excepton rased by a call to Procs Descrpton Calls procedure Procs wth arguments args A call of RemoteCall(Procs; args) causes the RPC component to do one of the followng: Rase a BadCall excepton f args s not a lst of ArgNum(Procs) arguments. Issue one call to procedure Procs wth arguments args, wat for the correspondng return (whch the RPC component assumes wll occur) and ether (a) return the value (normal or exceptonal) returned by that call, or (b) rase the RPCFalure excepton. Issue no procedure call, and rase the RPCFalure excepton. The component accepts concurrent calls of RemoteCall from the sender, and can have multple outstandng calls to the recever. Problem 2 Wrte a formal speccaton of the RPC component. Soluton of problem 2 The RPC component s an nterface component between two components, a sender and a recever. It provdes a procedure-callng nterface to the sender. So, the component exports a call procedure (rpc call), mports a return procedure (rpc return) and uses the slot mechansm as descrbed n secton 8.1. The RPC component also uses a procedure-callng nterface to the recever. Therefore t mports a call procedure (call) andexports a return procedure (return). In the descrpton of the RPC component we use the followng abbrevatons. IsRpcCall(name; args) GoodCall(args) BadCall(args) = name = RemoteCall ^ #(args) > 1 = arg:1 2 Procs ^ ArgNum(args:1) = #(args), 1 = :GoodCall(args) Now, the RPC component s speced n example 8.3. A call to rpc call communcates a remote procedure call and ths nformaton s stored n a free slot. In case of a bad call
8 130 Chapter 8. Case Study: A Memory Component Program RPC hde fslotg external [=fslotg] export proc rpc call(a : CallType) = IsRpcCall(a:name)! f [] Slot[]:stat = FREE! Slot[] :=(CALL; a:comp; a:proc; a:name; a:args; RPCFalure) [] proc return(a : RetType) = f true! Slot[a:proc]:ret := a:val ; Slot:[a:proc]:stat := RETURN mport proc rpc return(rettype) [] true! Slot[a:proc]:ret := RPCFalure ; Slot:[a:proc]:stat := RETURN [] proc call(calltype) nt h8 : 2 SlotLocs : Slot[]:stat = FREE assgn h []s : s 2 SlotLocs : f Slot[s]:stat = CALL! f GoodCall(Slot[s]:args)! Slot[s]:ret := CALLING endfrpcg ; call(s; hd(args); tl(args)) [] BadCall(Slot[s]:args)! Slot[s]:ret := BadCall ; Slot[s]:stat := RETURN [] true! Slot[s]:ret := RPCFalure [] Slot[s]:stat = RETURN! rpc return((slot[s]:proc; Slot[s]:ret)) ; Slot[s]:stat := FREE Example 8.3. ; Slot[s]:stat := RETURN
9 8.4. Implementaton of the Memory 131 the second statement of the program decdes to return wth a BadCall or a RPCFalure by settng the status eld to RETURN. On a proper call, the statement forwards the call to the recever or decdes to return wth a RPCFalure. The recever calls the return procedure wth the result of the remote call or an excepton. The last statement takes care of the return. 8.4 Implementaton of the Memory About mplementng the memory, the Speccaton Problem says: A Memory component s mplemented by combnng an RPC component wth a Relable Memory component as follows. A Read or Wrte call s forwarded to the Relable Memory by ssung the approprate call to the RPC component. If ths call returns wthout rasng an RPCFalure excepton, the value returned s returned to the caller. (An exceptonal return causes an excepton to be rased.) If the call rases an RPCFalure excepton, then the mplementaton may ether ressue the call to the RPC component or rase a MemFalure excepton. The RPC call can be retred arbtrarly many tmes because of RPCFalure exceptons, but a return from the Read or Wrte call must eventually be ssued. Problem 3 Wrte a formal speccaton of the mplementaton, and prove that t correctly mplements the speccaton of the Memory component of Problem 1. Soluton of problem 3 A memory component s mplemented by combnng the RPC component, as gven n example 8.3, wth a (Relable) Memory component, as gven n example 8.2. Besdes these two components, the mplementaton Imp contans an nterface component Int,.e. Imp = proc(frpc call ; rpc returng : Int[]RpcMem) where RpcMem = proc(fcall ; returng : RPC []Rel). Component Int s an nterface component that accepts memory calls and relays them to component RpcMem. Therefore, component Int provdes a procedure-callng nterface to the envronment, t exports a call procedure (call), mports a return procedure (return), and uses the slot mechansm as descrbed before. Furthermore, t uses the procedure-callng nterface of the RPC component,.e. t mports the call procedure (rpc call) and exports a return procedure (rpc return).
10 132 Chapter 8. Case Study: A Memory Component Program Int hde fslotg external [=fslotg] export proc call(a : CallType) = IsMemcall(a:name; a:args)! f [] Slot[] =FREE! Slot[] :=(CALL; a:proc; a:name; a:args; MemFalure) [] proc rpc return(a : RetType) = f Slot[a:proc]:stat = CALLING! Slot[a:proc]:ret := Map(a:val) ; Slot[a:proc]:stat := CALLED [] Slot[a:proc]:stat = CALLING! Slot[a:proc]:ret := Map(a:val) ; Slot[a:proc]:stat := RETURN [] Slot[a:proc]:stat = TERM! Slot[a:proc]:ret := Map(a:val) ; Slot[a:proc]:stat := RETURN mport proc return(rettype) [] proc rpc call(calltype) nt h8 : 2 SlotLocs : Slot[]:stat = FREE assgn h []s : s 2 SlotLocs : endfintg f Slot[s]:stat = CALL! Slot[s]:stat := CALLING ; rpc call(s; RemoteCall; name : args) [] Slot[s]:stat = CALLED! Slot[s]:stat := CALLING ; rpc call(s; RemoteCall; name : args) [] Slot[s]:stat = RETURN! return((slot[s]:proc; (Slot[s]:ret)) ; Slot[s]:stat := FREE [] h []s : s 2 SlotLocs : f Slot[s]:stat = CALLED! Slot[s]:stat := RETURN [] Slot[s]:stat = CALLING! Slot[s]:stat := TERM Example 8.4. The Int component s speced by program Int n example 8.4, where Map s the functon that maps RPCFalure to MemFalure and s the dentty on all other arguments.
11 8.5. Conclusons 133 To show that ths s a proper mplementaton of a Memory component we have to prove the renement Mem v Imp. Ths s done n a number of steps. We start wth the program Mem, gven n example 8.1, and show t s rened by a program proc(frpc call ; rpc returng : Int[]RelMem 0 ). Then, program RelMem 0 s rened to the program proc(frpc call ; rpc returng : RPC []Mem). In secton 8.2, we have proven the renement Mem v Rel, so, wemay conclude that RefMem 0 v RefMem and, consequently, Mem v Imp. The complete proof s rather long and can be found n [UK94]. All steps are applcatons of the renement rules we have gven before. 8.5 Conclusons In ths chapter we presented the outlne of a case study of the renement of a memory component n the ImpUNITY framework. Frst, t llustrates the use of procedures n the ImpUNITY framework as presented n the prevous chapter. It shows how a memory can be modelled and rened n ths framework and how the program transformaton rules are appled. It also shows that renement n envronment s useful. Furthermore, t s another example of modellng persstent communcaton n ths framework.
12 134 Chapter 8. Case Study: A Memory Component
all pre- and postcondton pars of programs. By modelng reactve systems as sequental programs and by usng data renement, the Renement Calculus can also
The RPC-Memory Speccaton Problem: UNITY + Renement Calculus Rob T. Udnk? & Joost N. Kok Department of Computer Scence, Leden Unversty, P.O. Box 9512, 2300 RA Leden, The Netherlands. Abstract. We use the
More informationManfred Broy. Leslie Lamport. Sat 6 Aug The problem calls for the specication and verication of a series of components.
Specication Problem Manfred Broy Leslie Lamport Sat 6 Aug 1994 1 The Procedure Interface The problem calls for the specication and verication of a series of components. Components interact with one another
More informationan assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han
UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16
More informationProgramming in Fortran 90 : 2017/2018
Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationArray transposition in CUDA shared memory
Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationComputer models of motion: Iterative calculations
Computer models o moton: Iteratve calculatons OBJECTIVES In ths actvty you wll learn how to: Create 3D box objects Update the poston o an object teratvely (repeatedly) to anmate ts moton Update the momentum
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationBroy-Lamport Specification Problem: A Gurevich Abstract State Machine Solution
Broy-Lamport Specification Problem: A Gurevich Abstract State Machine Solution James K. Huggins EECS Department, University of Michigan, Ann Arbor, MI, 48109-2122, USA. May 21, 2002 Abstract We apply the
More informationkccvoip.com basic voip training NAT/PAT extract 2008
kccvop.com basc vop tranng NAT/PAT extract 28 As we have seen n the prevous sldes, SIP and H2 both use addressng nsde ther packets to rely nformaton. Thnk of an envelope where we place the addresses of
More informationETAtouch RESTful Webservices
ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationCompiling Process Networks to Interaction Nets
Complng Process Networks to Interacton Nets Ian Macke LIX, CNRS UMR 7161, École Polytechnque, 91128 Palaseau Cede, France Kahn process networks are a model of computaton based on a collecton of sequental,
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationInstallation and User Guide. Digidim Remote Control (303) Product description. Switching Lights On/Off using Digidim 303 Remote
Installaton and User Gude Dgdm Remote Control (0) Product descrpton The Dgdm Remote (0) can be used n conjuncton wth the Dm Sense to modfy the preset lght levels and recall/ store scenes, as well as actvatng
More informationEcient Computation of the Most Probable Motion from Fuzzy. Moshe Ben-Ezra Shmuel Peleg Michael Werman. The Hebrew University of Jerusalem
Ecent Computaton of the Most Probable Moton from Fuzzy Correspondences Moshe Ben-Ezra Shmuel Peleg Mchael Werman Insttute of Computer Scence The Hebrew Unversty of Jerusalem 91904 Jerusalem, Israel Emal:
More informationCSCI 104 Sorting Algorithms. Mark Redekopp David Kempe
CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal
More informationConcurrent Apriori Data Mining Algorithms
Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng
More informationIntro. Iterators. 1. Access
Intro Ths mornng I d lke to talk a lttle bt about s and s. We wll start out wth smlartes and dfferences, then we wll see how to draw them n envronment dagrams, and we wll fnsh wth some examples. Happy
More informationChapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationAP PHYSICS B 2008 SCORING GUIDELINES
AP PHYSICS B 2008 SCORING GUIDELINES General Notes About 2008 AP Physcs Scorng Gudelnes 1. The solutons contan the most common method of solvng the free-response questons and the allocaton of ponts for
More informationANSYS FLUENT 12.1 in Workbench User s Guide
ANSYS FLUENT 12.1 n Workbench User s Gude October 2009 Copyrght c 2009 by ANSYS, Inc. All Rghts Reserved. No part of ths document may be reproduced or otherwse used n any form wthout express wrtten permsson
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationBayesian Network Learning System based on Neural Networks
ayesan Network Learnng System based on Neural Networks Yoch Motomura Electrotechncal Laboratory motomura@etl.go.p Isao Hara Electrotechncal Laboratory hara@etl.go.p bstract In real world applcatons lke
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationAssembler. Shimon Schocken. Spring Elements of Computing Systems 1 Assembler (Ch. 6) Compiler. abstract interface.
IDC Herzlya Shmon Schocken Assembler Shmon Schocken Sprng 2005 Elements of Computng Systems 1 Assembler (Ch. 6) Where we are at: Human Thought Abstract desgn Chapters 9, 12 abstract nterface H.L. Language
More informationOPL: a modelling language
OPL: a modellng language Carlo Mannno (from OPL reference manual) Unversty of Oslo, INF-MAT60 - Autumn 00 (Mathematcal optmzaton) ILOG Optmzaton Programmng Language OPL s an Optmzaton Programmng Language
More informationSimple Security Denitions for and Constructions of 0-RTT Key Exchange
Smple Securty Dentons for and Constructons of 0-RTT Key Exchange Brtta Hale 1 and Tbor Jager 2 and Sebastan Lauer 3 and Jörg Schwenk 3 1 NTNU, Norwegan Unversty of Scence and Technology, Trondhem brtta.hale@ntnu.no
More information/98 $10.00 (c) 1998 IEEE
Formal Development of Java Based Web Parallel Applcatons Govanna D Marzo Serugendo 1;2 Ncolas Guel 2 1 CUI, Unversty of Geneva 2 LGL-DI, Swss Federal Insttute Swtzerland dmarzo@d.ep.ch of Technology, Swtzerland
More informationBrave New World Pseudocode Reference
Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be
More informationResearch Article. ISSN (Print) s k and. d k rate of k -th flow, source node and
Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com
More informationA Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1
A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department
More informationHarvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)
Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationA fault tree analysis strategy using binary decision diagrams
Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:
More informationConfigure Address Book. Configure Show Send To. Options Supervision Message. Options Flood Preventer
FlashPont Sotware Inc. eomega Pagng Sotware Qualty Sotware For The Fre Alarm Industry Descrpton eomega pagng sotware provdes a means o convertng prnter output rom a Smplex re alarm panel nto short messages.
More informationIntra-procedural Inference of Static Types for Java Bytecode 1
McGll Unversty School of Computer Scence Sable Research Group Intra-procedural Inference of Statc Types for Java Bytecode 1 Sable Techncal Report No. 5 Etenne Gagnon Laure Hendren October 14, 1998 w w
More informationWightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK
Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationReplication of the data object raises the issue of consistency. among the replicas, especially in determining
Eventually-Seralzable Data Servces Alan Fekete Davd Gupta y Vctor Luchangco y Nancy Lynch y Alex Shvartsman y Abstract We present a new speccaton for dstrbuted data servces that trade-o mmedate consstency
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationS.P.H. : A SOLUTION TO AVOID USING EROSION CRITERION?
S.P.H. : A SOLUTION TO AVOID USING EROSION CRITERION? Célne GALLET ENSICA 1 place Emle Bloun 31056 TOULOUSE CEDEX e-mal :cgallet@ensca.fr Jean Luc LACOME DYNALIS Immeuble AEROPOLE - Bat 1 5, Avenue Albert
More informationELEC 377 Operating Systems. Week 6 Class 3
ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems
More informationPolyhedral Compilation Foundations
Polyhedral Complaton Foundatons Lous-Noël Pouchet pouchet@cse.oho-state.edu Dept. of Computer Scence and Engneerng, the Oho State Unversty Feb 8, 200 888., Class # Introducton: Polyhedral Complaton Foundatons
More informationSequential search. Building Java Programs Chapter 13. Sequential search. Sequential search
Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to
More informationMath Homotopy Theory Additional notes
Math 527 - Homotopy Theory Addtonal notes Martn Frankland February 4, 2013 The category Top s not Cartesan closed. problem. In these notes, we explan how to remedy that 1 Compactly generated spaces Ths
More informationCost-efficient deployment of distributed software services
1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed
More information(1) The control processes are too complex to analyze by conventional quantitative techniques.
Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a
More informationA NOTE ON FUZZY CLOSURE OF A FUZZY SET
(JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationNAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics
Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson
More informationF-5000 View Software Installation and Operation Guide Belcher Road South, Largo, FL USA Tel +1 (727) Fax +1 (727)
ONICON Flow and Energy Measurement F-5000 Vew Software Installaton and Operaton Gude 11451 Belcher Road South, Largo, FL 33773 USA Tel +1 (727) 447-6140 Fax +1 (727)442-5699 2032-1 / 107050 Rev B www.oncon.com
More informationSynchronous Distributed Wireless Network Emulator for High-Speed Mobility: Implementation and Evaluation
Synchronous Dstrbuted Wreless Network Emulator for Hgh-Speed Moblty: Implementaton and Evaluaton Mnoru Kozum, Tomoch Ebata Yokohama Research Laboratory, Htach, Ltd., 292 Yoshda-cho, Totsuka-ku, Yokohama,
More informationOn Correctness of Nonserializable Executions
Journal of Computer and System Scences 56, 688 (1998) Artcle No. SS971536 On Correctness of Nonseralzable Executons Rajeev Rastog,* Sharad Mehrotra, - Yur Bretbart, [,1 Henry F. Korth,* and Av Slberschatz*
More informationAssembler. Building a Modern Computer From First Principles.
Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationCircuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)
Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,
More informationGSLM Operations Research II Fall 13/14
GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationApplication of VCG in Replica Placement Strategy of Cloud Storage
Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng
More informationA New Transaction Processing Model Based on Optimistic Concurrency Control
A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationModel Clipping Triangle Strips and Quad Meshes.
Model Clppng Trangle Strps and Quad Meshes. Patrc-Glles Mallot Sun Mcrosystems, Inc. 2550 Garca Avenue, Mountan Vew, CA 94043 Abstract Ths paper descrbes an orgnal software mplementaton of 3D homogeneous
More informationChannel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7
Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca
More informationA Similarity-Based Prognostics Approach for Remaining Useful Life Estimation of Engineered Systems
2008 INTERNATIONAL CONFERENCE ON PROGNOSTICS AND HEALTH MANAGEMENT A Smlarty-Based Prognostcs Approach for Remanng Useful Lfe Estmaton of Engneered Systems Tany Wang, Janbo Yu, Davd Segel, and Jay Lee
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationUSING GRAPHING SKILLS
Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp
More informationCHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar
CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want
More informationNews. Recap: While Loop Example. Reading. Recap: Do Loop Example. Recap: For Loop Example
Unversty of Brtsh Columba CPSC, Intro to Computaton Jan-Apr Tamara Munzner News Assgnment correctons to ASCIIArtste.java posted defntely read WebCT bboards Arrays Lecture, Tue Feb based on sldes by Kurt
More informationConnection-information-based connection rerouting for connection-oriented mobile communication networks
Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang
More informationExercises (Part 4) Introduction to R UCLA/CCPR. John Fox, February 2005
Exercses (Part 4) Introducton to R UCLA/CCPR John Fox, February 2005 1. A challengng problem: Iterated weghted least squares (IWLS) s a standard method of fttng generalzed lnear models to data. As descrbed
More informationPYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES
PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes
More informationIntroduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time
Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events
More informationAdvanced Computer Networks
Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans
More informationSENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR
SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR Judth Aronow Rchard Jarvnen Independent Consultant Dept of Math/Stat 559 Frost Wnona State Unversty Beaumont, TX 7776 Wnona, MN 55987 aronowju@hal.lamar.edu
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More information3D vector computer graphics
3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres
More informationDynamic Routing and Operational Controls in Workow. Management Systems. Abstract
Dynamc Routng and Operatonal Controls n Workow Management Systems Akhl Kumar College of Busness, Campus Box 419 Unversty of Colorado Boulder CO 80309-0419 J. Leon Zhao School of Busness and Management
More informationAMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain
AMath 483/583 Lecture 21 May 13, 2011 Today: OpenMP and MPI versons of Jacob teraton Gauss-Sedel and SOR teratve methods Next week: More MPI Debuggng and totalvew GPU computng Read: Class notes and references
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationwith `ook-ahead for Broadcast WDM Networks TR May 14, 1996 Abstract
HPeR-`: A Hgh Performance Reservaton Protocol wth `ook-ahead for Broadcast WDM Networks Vjay Svaraman George N. Rouskas TR-96-06 May 14, 1996 Abstract We consder the problem of coordnatng access to the
More informationA RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood
A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,
More informationEMBET: Towards User Assistance, Collaboration and Knowledge Sharing *
EMBET: Towards User Assstance, Collaboraton and Knowledge Sharng * Mchal Laclavík 1, Martn Šeleng 1, Ladslav Hluchý 1 1 Insttute of Informatcs, Slovak Academy of Scences, Dubravska cesta 9 845 07 Bratslava,
More informationOutline. Digital Systems. C.2: Gates, Truth Tables and Logic Equations. Truth Tables. Logic Gates 9/8/2011
9/8/2 2 Outlne Appendx C: The Bascs of Logc Desgn TDT4255 Computer Desgn Case Study: TDT4255 Communcaton Module Lecture 2 Magnus Jahre 3 4 Dgtal Systems C.2: Gates, Truth Tables and Logc Equatons All sgnals
More informationA MapReduce-supported Data Center Networking Topology
A MapReduce-supported Data Center Networkng Topology Zelu Dng*,, Xue Lu, Deke Guo*, Honghu Chen*, Xueshan Luo* * Natonal Unversty of Defense Technology, Chna McGll Unversty, Canada Abstract Several novel
More information11. HARMS How To: CSV Import
and Rsk System 11. How To: CSV Import Preparng the spreadsheet for CSV Import Refer to the spreadsheet template to ad algnng spreadsheet columns wth Data Felds. The spreadsheet s shown n the Appendx, an
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More information