Ch6 Protocol Testing. Outline. Outline. Protocol Conformance Testing. Introduction Concepts Fault models Related definitions General approach

Size: px
Start display at page:

Download "Ch6 Protocol Testing. Outline. Outline. Protocol Conformance Testing. Introduction Concepts Fault models Related definitions General approach"

Transcription

1 Outline VI. Protocol Testing Introduction Concepts Fault models Related definitions General approach Methodologies based on FSM T-Method (Transition Tour method) D-Method d(distinguishing i sequences) W-Method (Characterizing sequences) U-Method (Unique input/output sequences) Dept. Electrical & Information Engineering, Computer Engineering Lab 6- Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6- Dr. Junzhao Sun Outline Protocol Conformance Testing Introduction Concepts Fault models Related definitions General approach Methodologies based on FSM T-Method (Transition Tour method) D-Method d(distinguishing i sequences) W-Method (Characterizing sequences) U-Method (Unique input/output sequences) To confirm if an implementation conforms to its standard External tester applies a sequence of inputs to IUT and verifies its behavior Issue: preparation of conformance tests in coverage of IUT s all aspects Issue: time required to run test should not be unacceptably long Two main limitations Controllability: the IUT cannot be directly put into a desired state, usually requiring several additional state transitions Observability: prevents the external tester from directly observing the state of the IUT, which is critical for a test to detect errors Formal conformance testing techniques based on FSM Generate a set of input sequences that will force the FSM implementation to undergo all specified transitions Black box approach: only the outputs generated by the IUT (upon receipt of inputs) are observable to the external tester Dept. Electrical & Information Engineering, Computer Engineering Lab 6-3 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-4 Dr. Junzhao Sun

2 Fault Models Fault Model for FSM A fault model is a hypothetical model of what types of faults may occur in an implementation Most fault models are structural, t i.e. the model is a refinement of the specification formalism (or of an implementation model) E.g. mutations of the specification or of a correct implementation It may be used to construct the fault domain used for defining what complete test coverage means E.g. single fault hypothesis (or multiple faults) gp Test suite development for given coverage objective Formalization of "test purpose" For existing test suite: coverage evaluation and optimization Diagnostics A fault model is useful for the following problems: Output fault: the machine provides an output different from the one specified by the output function Transfer fault: the machine enters a different state than that specified by the transfer function Transfer faults with additional states: number of states of the system is increased by the presence of faults, additional states is used to model certain types of errors Additional or missing transitions: one basic assumption is that the FSM is deterministic and completely defined (fully specified). So the faults occur when it turns out to be non-deterministic and/or incompletely (partially) specified Dept. Electrical & Information Engineering, Computer Engineering Lab 6-5 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-6 Dr. Junzhao Sun Fault Models for FIFO Queue and Petri Nets FSM with several FIFO input queues Ordering fault: FIFO ordering is not preserved, or in case of multiple input queues, some input event enters a wrong input queue Maximum length fault: the maximum length implemented is less than the one specified, or if an input event gets lost while queue is not overflow Flow control fault: errors of ordering or of loss occur, in case the number of submitted input events overflows the maximum queue length specified Petri Nets Input or output arc fault: one of the input or output arcs is connected to the wrong place, missing, or exists in addition to those specified Missing or additional transition: the number of transitions is not the same as in the specification FSM Related Definitions (/) Directed graph G=(V, E) representing FSM M Set of vertices V = {v, v,, v n} represents the set of states S in M Directed edge (v i, v j) E represent a transition from state s i to state s j in M An edge in G is represented by a triple (v i, v j; L), L=a k/o l is the input/output operation corresponding to the transition from s i to s j in M Some other definitions & assumptions Deterministic FSM: predictable behavior in a given state for a given input Strongly connected: for each state pair (s i, s j) there is a transition path going from s i to s j, I.e. each state can be reached from any other state Fully specified: form each state it has a transition for each input symbol. Otherwise partially specified Minimal: the number of states of M is less than or equal to the number of states of any equivalent machine Dept. Electrical & Information Engineering, Computer Engineering Lab 6-7 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-8 Dr. Junzhao Sun

3 FSM Related Definitions (/) Transition Level Approach Start state s 0 S, usually the state when power-up Often, there is a special input taking M to state s 0 from any other state with a single transition. In this case, M is said to have the reset capability and the input which performs the reset is denoted by ri Sequences for testing A test subsequence of M is a sequence of input symbols for testing either a state or a transition of M A β-sequence for M is a concatenation of test subsequences for testing all transitions of M A test sequence for M is a sequence of input symbols which can be used in testing conformance of implementations of M against the specification of M An optimize test sequence is a test sequence such that no subsequence of it is completely contained in any other subsequence So, the problem is how to obtain a optimize test sequence for M Dept. Electrical & Information Engineering, Computer Engineering Lab 6-9 Dr. Junzhao Sun The methods for protocol conformance test sequence generation Produce a test sequence which checks the correctness of each transition of the FSM implementation By no means exhaustive, I.e. no guarantee to exhibit correct behavior given every possible input sequence. The intent is to design a test sequence which guarantees beyond a reasonable doubt Three basic steps for checking a transition (s i, s j; L), L=a k/o l Step : The FSM implementation is put into state s i; (e.g. reset+transfer) Difficulty in realizing this is due to the limited controllability of the implementation Step : Input a k is applied and the output is checked to verify that it is o l, as expected; Step 3: The new state of the FSM implementation is checked to verify that it is s j, as expected Difficulty in verifying this is due to the limited observability of the implementation Dept. Electrical & Information Engineering, Computer Engineering Lab 6-0 Dr. Junzhao Sun Outline T-Method: Transition Tour Method Introduction Concepts Fault models Related definitions General approach Methodologies based on FSM T-Method (Transition Tour method) D-Method d(distinguishing i sequences) W-Method (Characterizing sequences) U-Method (Unique input/output sequences) For a given FSM S, a transition tour is a sequence which takes the FSM S from the initial state s 0, traverses every transition at least once, and returns to the initial state s 0. Straightforward and simple scheme New state of the FSM is not checked Fault detection power Detects all output errors There is no guarantee that all transfer errors can be detected The problem of generating a minimum-cost i ttest tsequence using the transition tour method is equivalent to the so-called Chinese Postman problem in graph theory First studied by Chinese mathematician Kuan Mei-Ko ( 管梅谷 ) in 96 Dept. Electrical & Information Engineering, Computer Engineering Lab 6- Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6- Dr. Junzhao Sun

4 T-Method Example T-Method Example The specification S. A transition tour is a,a,a,b,b,b The implementation I contains an output error. Our transition tour will detect it. The implementation I contains an transition error. Our transition tour will not detect it. 5 a/z 3 4 b/z A minimum-cost transition tour of the FSM is (including reset edges), starting from state : r, a, r, c, a, b, b, r, c, r, c, a, b, r, c, a, c, b, a, c, a, r, c, b, a, a Dept. Electrical & Information Engineering, Computer Engineering Lab 6-3 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-4 Dr. Junzhao Sun T-Method Example 3 0 A/0 4 A/0 A/0 3 B/0 A transition tour sequence is : B, A, B, A, B, A, A, A, A, A, A, A, B, B 0, 0, 3, 3, 4, 0, 3, 4,,, 4,,, (not return to 0, but traverse all the transitions) D-Method: Distinguishing Sequences A sequence of inputs is a distinguishing sequence (DS) for an FSM S, if the output sequence produced by the FSM S in response to the input sequence is distinct for each initial state A DS is used as a state identification sequence A DS is a useful tool for achieving Step 3 in checking the new state Fault detection power Detects all output errors Detects all transfer errors Two severe drawbacks In practice, very few FSMs actually possess a DS Even if an FSM does have a DS, the upper bound on the length of the DS will be too large to be useful in general The requirement is too strong (leading to W- & U- methods ) Dept. Electrical & Information Engineering, Computer Engineering Lab 6-5 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-6 Dr. Junzhao Sun

5 D-Method Example D-Method Example The specification S. A distinguishing sequence is: b,b If we apply it from: - state, we obtain y,y - state, we obtain y,x - state 3, we obtain x,y A test case which allow the detection of the transfer error is: a,b,b,b If we apply it from the initial state of: - the specification, we obtain x,x,y,y - the implementation, we obtain x,x,x,x Definitions to be used for other methods as well. The test cases (β -sequences) are: (no reset) state t : a,b,b bb b,b,b state : b,a,b,b b,b,b,b State 3: a,a,b,b a,b,b,b Test case structure corresponding to 3-step: preamble, tested transition, state identification Transfer sequence (Preamble): the minimumcost (shortest path) input sequence taking FSM fro one state to another. Dept. Electrical & Information Engineering, Computer Engineering Lab 6-7 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-8 Dr. Junzhao Sun D-Method Example 3 D-Method Example 4 DS = a,c,a,, 3 The test cases (β -sequences) are: r,a,c,a(-) r,a,a,c,a r,c,a,c,a r,c,a,b,r,a,c,a (-) 5 b/z r,c,a,b,a,a,c,a r,c,a,b,b,a,c,a a/z r,c,b,r,a,c,a(3-) r,c,b,a,a,c,a r,c,r,a,c,a(4-) r,c,a,a,c,a 4 r,c,b,a,c,a r,c,a,r,a,c,a(5-) r,c,a,a,a,c,a r,c,a,b,a,c,a r,c,a,c,a,c,a Including the testing for reset capability 0 A/0 4 A/0 A/0 3 B/0 DS = B, B The β -sequences are: r, A, B, B r, B, B, B r, A, A, A, A, A, B, B r, A, A, A, A, B, B, B r, A, A, A, A, B, B r, A, A, A, B, B, B r, A, A, B, B r, A, B, B, B r, A, A, A, B, B r, A, A, B, B, B An optimized test sequence constructed from above is: raaaaabbraaaabbb raaabbbraabbbrabbbrbbb Dept. Electrical & Information Engineering, Computer Engineering Lab 6-9 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-0 Dr. Junzhao Sun

6 W-Method: Characterizing Sequences W-Method Example For FSMs that do not possess a DS, W-Method defines partial DS each of which distinguishes a state si from a subset of the remaining states instead of from every state of the FSM The states of the FSM are first partitioned into blocks which can be distinguished by observing the sequence of outputs produced by a sequence of inputs Each block is subsequently partitioned into distinguishable sub-blocks, and so on, until each block consists of exactly one state Main idea is to iteratively find a DS for each subset To identify a state (for step 3) Applying an input sequence Returning to the state via a transfer sequence Applying a second input sequence, and so on The complete set of such input sequences for an FSM is called the characterizing set Attach each CS in the set to the end of each transfer sequence 0 A/0 4 A/0 A/0 3 B/0 For the input sequence Acs = A,A, the response is identical for states and 3 (0), but is distinct from that for states 0(00), (), 4(0). Another input sequence Acs = B is distinct for states (0) and 3(). Therefore, Acs is required to identify states 0,, 4, and two input sequences Acs and Acs, along with appropriate transfer sequences, are required to identify states and 3. I.e. W = {AA, B} Dept. Electrical & Information Engineering, Computer Engineering Lab 6- Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6- Dr. Junzhao Sun W-Method Example W-Method Example 3 /0 A D 0/ 0/0 0/0 /0 /0 0/ /0 B C No DS! For the input sequence Acs = 0,,0, the response is identical i for states C and D (0), but is distinct from that for states A(000) and B(00). Another input sequence Acs =, 0 is distinct for states C(00) and D(0). Therefore, Acs is required to identify states A and B, and two input sequences Acs and Acs, along with appropriate transfer sequences, are required to identify states C and D. I.e. W = {00, 0} Dept. Electrical & Information Engineering, Computer Engineering Lab 6-3 Dr. Junzhao Sun b/e c/e b/f a/e a/f 3 a/f c/e b/f c/f A characterizing set W = {a, b} - for state : a/e, b/f - for state : a/f, b/f - for state 3: a/f, b/e The β -sequences generated are: r,a r,b r,a,a r,a,b r,b,a r,b,b r,c,a, r,c,b, r,b,a,a r,b,a,b r,b,b,a r,b,b,b r,b,c,a r,b,c,b r,c,a,a r,c,a,b r,c,b,a r,c,b,b r,c,c,a r,c,c,b Dept. Electrical & Information Engineering, Computer Engineering Lab 6-4 Dr. Junzhao Sun

7 U-Method: Unique Input/Putout Sequences U-Method Example In DS and CS, requirement of state identification is too strong Answer the question of what is the current state of the implementation? For testing it is sufficient to know an error has been detected UIO sequence of a state of a FSM An I/O behavior that is not exhibited by any other state of the FSM Answer the question of is the implementation currently in state x? Advantages against DS & CS Cost is never more than DS and in practice is usually much less (shorter) Nearly all FSMs have UIO sequences for each state DS same for all states; UIO sequence normally different for each state To check state s by using UIO sequence of s Apply input part of UIO, compare output sequence with the expected one If the same, then the FSM is in the state s; otherwise, not in the state s If not in state s, no information about the identity of the actual state s The UIO sequences are: - state :, - state :, - state 3: The β -sequences generated by U-Method are: r,a,b r,a,a r,b,a,a r,b,a,a,b r,b,b,a r,a,a,a,a r,a,b,a,b Dept. Electrical & Information Engineering, Computer Engineering Lab 6-5 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-6 Dr. Junzhao Sun U-Method Example U-Method Example 3 3 The UIO sequences are: state :, state : state 3:,a/z state 4: b/z state 5: The minimum-cost test sequence 5 b/z generated by U-Method are: a/z r,a,c,a, a,c,a, r,c,a, (5-) c,b, a,c,a, b,b, a,b, b,a,a, r,c,a, (-) a,c,b, r,c,a, (3-) a,c,r,c,a, (4-) a,c,a,b, 4 r,c,a, (-) a,c,b,a,a Including the testing for reset capability 0 A/0 4 A/0 A/0 3 B/0 The UIO sequences are: state 0: B/null state :, state : B/0 state 3:, state 4:,A/0 The β -sequences are: r,a,b,b r,b,b r,a,a,a,a,a,a,a r,a,a,a,a,b,b r,a,a,a,a,a,a r,a,a,a,b,b,b r,a,a,a,a r,a,b,b,b r,a,a,a,b r,a,a,b,b An optimized test sequence is: raaaaaaaraaaabbraaabbbraabbrab BBrBB Dept. Electrical & Information Engineering, Computer Engineering Lab 6-7 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-8 Dr. Junzhao Sun

8 Analysis References Fault Testing Coverage Fault coverage for D-, W-, and U-methods is better than of T-method Fault coverage for D-, W-, and du-methods are the same Summary All of these four methods assume minimal, strongly connected and fully specified Mealy FSM model of protocol entities On average, T-method produces the shortest test sequence, W-method the longest. D- and U- methods generate test sequence of comparable lengths T-method test sequences are able to detect output faults but not transition D-, W-, and U-methods are capable of detecting all kinds of faults and give the same performance. U-method attracts more and more attentions and there are several approaches based on the basic idea with some improvements R. Dssouli and F. Khendek, Test development for distributed system, 000, R. Lai, A survey of communication protocol testing. Elsevier Journal of Systems and Software, 6, 00: -46 G.V. Bochmann and A. Petrenko, Protocol testing: review of methods and relevance for software testing, Proc. ACM ISSTA, Seattle Washington, USA, 994: 09-4 A.T. Dahbura, K.K. Sabnani, and M.U. Uyar, Formal methods for generating g protocol conformance test sequences, Proceedings of the IEEE, vol. 78, no. 8, 990: D.P. Sidhu and T.-K. Leung, Formal methods for protocol testing: a detailed study, IEEE Trans. Software Engineering, vol. 5, no. 4, 989: Dept. Electrical & Information Engineering, Computer Engineering Lab 6-9 Dr. Junzhao Sun Dept. Electrical & Information Engineering, Computer Engineering Lab 6-30 Dr. Junzhao Sun

Université de Montréal

Université de Montréal Diagnosing Multiple Faults in Finite State Machines by A. Ghedamsi, G.v. Bochmann and R. Dssouli Publication # 859 Département d'informatique et de recherche opérationnelle Université de Montréal Janvier

More information

Communication Protocols Testability Improvement by Narrow Input/Output (NIO) Sequences

Communication Protocols Testability Improvement by Narrow Input/Output (NIO) Sequences Communication Protocols Testability Improvement by Narrow Input/Output (NIO) Sequences Tao Huang and Anthony Chung School of Computer Science, Telecommunications and Information Systems DePaul University

More information

Model-Based Testing. (DIT848 / DAT260) Spring Lecture 10 FSMs, EFSMs and ModelJUnit

Model-Based Testing. (DIT848 / DAT260) Spring Lecture 10 FSMs, EFSMs and ModelJUnit Model-Based Testing (DIT848 / DAT260) Spring 2015 Lecture 10 FSMs, EFSMs and ModelJUnit Gerardo Schneider Department of Computer Science and Engineering Chalmers University of Gothenburg 1 Outline The

More information

Part I: Preliminaries 24

Part I: Preliminaries 24 Contents Preface......................................... 15 Acknowledgements................................... 22 Part I: Preliminaries 24 1. Basics of Software Testing 25 1.1. Humans, errors, and testing.............................

More information

Test Path Selection Based on Effective Domains*

Test Path Selection Based on Effective Domains* Abstract Test Path Selection Based on Effective Domains* In this papec a method is proposed to produce test paths that check both dataflow and controlflow for a protocol specijied in the Extended Finite

More information

Fault Management using Passive Testing formobileipv6networks

Fault Management using Passive Testing formobileipv6networks Fault Management using Passive Testing formobileipv6networks Raymond E. Miller Khaled A. Arisha Department of Computer Science Honeywell International Inc. University of Maryland, 7 Columbia Gateway Drive

More information

On Fault Coverage of Tests for Finite State Specifications

On Fault Coverage of Tests for Finite State Specifications On Fault Coverage of Tests for Finite State Specifications A. Petrenko and G. v. Bochmann Département d'informatique et de Recherche Opérationnelle, Université de Montréal, CP. 6128, Succ. Centre-Ville,

More information

CS402 Theory of Automata Solved Subjective From Midterm Papers. MIDTERM SPRING 2012 CS402 Theory of Automata

CS402 Theory of Automata Solved Subjective From Midterm Papers. MIDTERM SPRING 2012 CS402 Theory of Automata Solved Subjective From Midterm Papers Dec 07,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 MIDTERM SPRING 2012 Q. Point of Kleen Theory. Answer:- (Page 25) 1. If a language can be accepted

More information

Chapter 4: Regular Expressions

Chapter 4: Regular Expressions CSI 3104 /Winter 2011: Introduction to Formal Languages What are the languages with a finite representation? We start with a simple and interesting class of such languages. Dr. Nejib Zaguia CSI3104-W11

More information

Abstract This thesis presents a mathematical model for test selection problem in protocol conformance testing, the goal of which is to select a test s

Abstract This thesis presents a mathematical model for test selection problem in protocol conformance testing, the goal of which is to select a test s Budapest University of Technology and Economics Department of Telecommunication and Telematics Conformance Test Suite Optimization PhD thesis Tibor Csöndes Advisors Dr. Katalin Tarnay dr. Gyula Csopaki

More information

Multiple Choice Questions

Multiple Choice Questions Techno India Batanagar Computer Science and Engineering Model Questions Subject Name: Formal Language and Automata Theory Subject Code: CS 402 Multiple Choice Questions 1. The basic limitation of an FSM

More information

CHAPTER TWO LANGUAGES. Dr Zalmiyah Zakaria

CHAPTER TWO LANGUAGES. Dr Zalmiyah Zakaria CHAPTER TWO LANGUAGES By Dr Zalmiyah Zakaria Languages Contents: 1. Strings and Languages 2. Finite Specification of Languages 3. Regular Sets and Expressions Sept2011 Theory of Computer Science 2 Strings

More information

Department of Computer Science San Marcos, TX Report Number TXSTATE-CS-TR Ngozi I. Ihemelandu Carl J. Mueller

Department of Computer Science San Marcos, TX Report Number TXSTATE-CS-TR Ngozi I. Ihemelandu Carl J. Mueller Department of Computer Science San Marcos, TX 78666 Report Number TXSTATE-CS-TR-2011-26 THE INTRACTABILITY OF FINITE STATE MACHINE TEST SEQUENCES Ngozi I. Ihemelandu Carl J. Mueller 2011-01-03 T A B L

More information

Using Finite State Machine at the Testing of Network Protocols

Using Finite State Machine at the Testing of Network Protocols Australian Journal of Basic and Applied Sciences, 5(10): 956-960, 2011 ISSN 1991-8178 Using Finite State Machine at the Testing of Network Protocols 1 Ashraf Abdel-Karim Helal Abu-Ein, 2 Hazem (Moh'd Said)

More information

Lec-5-HW-1, TM basics

Lec-5-HW-1, TM basics Lec-5-HW-1, TM basics (Problem 0)-------------------- Design a Turing Machine (TM), T_sub, that does unary decrement by one. Assume a legal, initial tape consists of a contiguous set of cells, each containing

More information

CMPSCI 521/621 HW6 Solutions

CMPSCI 521/621 HW6 Solutions CMPSCI 521/621 HW6 Solutions Problem 1 (based on Xiang Zhao s solution). The node labels are an ordered pair that indicates the location of the program counter in the two different tasks. The first element

More information

CE 371 Surveying ANGLE MEASURING_3

CE 371 Surveying ANGLE MEASURING_3 CE 371 Surveying ANGLE MEASURING_3 Dr. Ragab Khalil Department of Landscape Architecture Faculty of Environmental Design King AbdulAziz University Room LIE15 Overview 2/20 Deflection Angle Measurement

More information

The paper provides an inventory of various fault models used for speciæcationbased hardware and software testing. Various types of speciæcations are c

The paper provides an inventory of various fault models used for speciæcationbased hardware and software testing. Various types of speciæcations are c Fault Model-Driven Test Derivation from Finite State Models: Annotated Bibliography Alexandre Petrenko Centre de Recherche Informatique de Montreal ècrimè, 550 Sherbrooke West, Suite 100, Montreal, H3A

More information

Automata Theory TEST 1 Answers Max points: 156 Grade basis: 150 Median grade: 81%

Automata Theory TEST 1 Answers Max points: 156 Grade basis: 150 Median grade: 81% Automata Theory TEST 1 Answers Max points: 156 Grade basis: 150 Median grade: 81% 1. (2 pts) See text. You can t be sloppy defining terms like this. You must show a bijection between the natural numbers

More information

On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment

On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment Khaled El-Fakih 1, Tariq Salameh 1, and Nina Yevtushenko 2 1 American University of Sharjah, Sharjah, UAE {Kelfakih,b00046306}@aus.edu

More information

Graph Theory. Part of Texas Counties.

Graph Theory. Part of Texas Counties. Graph Theory Part of Texas Counties. We would like to visit each of the above counties, crossing each county only once, starting from Harris county. Is this possible? This problem can be modeled as a graph.

More information

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1

Verification and Validation. Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification and Validation Ian Sommerville 2004 Software Engineering, 7th edition. Chapter 22 Slide 1 Verification vs validation Verification: "Are we building the product right?. The software should

More information

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING ZVI LOTKER, BOAZ PATT-SHAMIR, AND ADI ROSÉN Abstract. We consider the model of adversarial queuing theory for packet networks introduced by Borodin et al.

More information

An Efficient Method for Multiple Fault Diagnosis

An Efficient Method for Multiple Fault Diagnosis An Efficient Method for Multiple Fault Diagnosis Khushboo Sheth Department of Electrical and Computer Engineering Auburn University, Auburn, AL Abstract: In this paper, failing circuits are analyzed and

More information

Matching Theory. Figure 1: Is this graph bipartite?

Matching Theory. Figure 1: Is this graph bipartite? Matching Theory 1 Introduction A matching M of a graph is a subset of E such that no two edges in M share a vertex; edges which have this property are called independent edges. A matching M is said to

More information

Lexical Analysis. Dragon Book Chapter 3 Formal Languages Regular Expressions Finite Automata Theory Lexical Analysis using Automata

Lexical Analysis. Dragon Book Chapter 3 Formal Languages Regular Expressions Finite Automata Theory Lexical Analysis using Automata Lexical Analysis Dragon Book Chapter 3 Formal Languages Regular Expressions Finite Automata Theory Lexical Analysis using Automata Phase Ordering of Front-Ends Lexical analysis (lexer) Break input string

More information

Compiler Construction

Compiler Construction Compiler Construction Exercises 1 Review of some Topics in Formal Languages 1. (a) Prove that two words x, y commute (i.e., satisfy xy = yx) if and only if there exists a word w such that x = w m, y =

More information

Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected

Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected graph G with at least 2 vertices contains at least 2

More information

Slides for Faculty Oxford University Press All rights reserved.

Slides for Faculty Oxford University Press All rights reserved. Oxford University Press 2013 Slides for Faculty Assistance Preliminaries Author: Vivek Kulkarni vivek_kulkarni@yahoo.com Outline Following topics are covered in the slides: Basic concepts, namely, symbols,

More information

Proof Techniques Alphabets, Strings, and Languages. Foundations of Computer Science Theory

Proof Techniques Alphabets, Strings, and Languages. Foundations of Computer Science Theory Proof Techniques Alphabets, Strings, and Languages Foundations of Computer Science Theory Proof By Case Enumeration Sometimes the most straightforward way to prove that a property holds for all elements

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

A New Optimal State Assignment Technique for Partial Scan Designs

A New Optimal State Assignment Technique for Partial Scan Designs A New Optimal State Assignment Technique for Partial Scan Designs Sungju Park, Saeyang Yang and Sangwook Cho The state assignment for a finite state machine greatly affects the delay, area, and testabilities

More information

Evaluation of test coverage for embedded system testing

Evaluation of test coverage for embedded system testing Evaluation of test coverage for embedded system testing Jinsong Zhu, Son T. Vuong Department of Computer Science University of British Columbia Vancouver, B.C., Canada V6T lz4 Samuel T. Chanson Department

More information

Test Design Techniques ISTQB (International Software Testing Qualifications Board)

Test Design Techniques ISTQB (International Software Testing Qualifications Board) Test Design Techniques ISTQB (International Software Testing Qualifications Board) Minsoo Ryu Hanyang University Testing Process Planning and Control Analysis and Design Implementation and Execution Evaluating

More information

Studying Graph Connectivity

Studying Graph Connectivity Studying Graph Connectivity Freeman Yufei Huang July 1, 2002 Submitted for CISC-871 Instructor: Dr. Robin Dawes Studying Graph Connectivity Freeman Yufei Huang Submitted July 1, 2002 for CISC-871 In some

More information

Testing Process and Methods. CS 490MT/5555, Spring 2017, Yongjie Zheng

Testing Process and Methods. CS 490MT/5555, Spring 2017, Yongjie Zheng Testing Process and Methods CS 490MT/5555, Spring 2017, Yongjie Zheng Context of Software Testing Verification & Validation Verification: checking that the software conforms to its specification. Validation:

More information

Part 5. Verification and Validation

Part 5. Verification and Validation Software Engineering Part 5. Verification and Validation - Verification and Validation - Software Testing Ver. 1.7 This lecture note is based on materials from Ian Sommerville 2006. Anyone can use this

More information

Theory of Computations III. WMU CS-6800 Spring -2014

Theory of Computations III. WMU CS-6800 Spring -2014 Theory of Computations III WMU CS-6800 Spring -2014 Markov Algorithm (MA) By Ahmed Al-Gburi & Barzan Shekh 2014 Outline Introduction How to execute a MA Schema Examples Formal Definition Formal Algorithm

More information

Regular Expressions. Lecture 10 Sections Robb T. Koether. Hampden-Sydney College. Wed, Sep 14, 2016

Regular Expressions. Lecture 10 Sections Robb T. Koether. Hampden-Sydney College. Wed, Sep 14, 2016 Regular Expressions Lecture 10 Sections 3.1-3.2 Robb T. Koether Hampden-Sydney College Wed, Sep 14, 2016 Robb T. Koether (Hampden-Sydney College) Regular Expressions Wed, Sep 14, 2016 1 / 23 Outline 1

More information

The Restrained Edge Geodetic Number of a Graph

The Restrained Edge Geodetic Number of a Graph International Journal of Computational and Applied Mathematics. ISSN 0973-1768 Volume 11, Number 1 (2016), pp. 9 19 Research India Publications http://www.ripublication.com/ijcam.htm The Restrained Edge

More information

Decreasing the Diameter of Bounded Degree Graphs

Decreasing the Diameter of Bounded Degree Graphs Decreasing the Diameter of Bounded Degree Graphs Noga Alon András Gyárfás Miklós Ruszinkó February, 00 To the memory of Paul Erdős Abstract Let f d (G) denote the minimum number of edges that have to be

More information

2 Solution of Homework

2 Solution of Homework Math 3181 Name: Dr. Franz Rothe February 6, 2014 All3181\3181_spr14h2.tex Homework has to be turned in this handout. The homework can be done in groups up to three due February 11/12 2 Solution of Homework

More information

The testing process. Component testing. System testing

The testing process. Component testing. System testing Software testing Objectives To discuss the distinctions between validation testing and defect testing To describe the principles of system and component testing To describe strategies for generating system

More information

Modeling and Testing of Protocol Systems

Modeling and Testing of Protocol Systems 23 Modeling and Testing of Protocol Systems David Lee Bell Laboratories, Lucent Technologies 600 Mountain Avenue, Murray Hill, NJ 07974 Tel: (908) 582-5872; Fax: (908) 582-5857 E-mail: lee@research.bell-labs.com

More information

CUT VERTICES IN ZERO-DIVISOR GRAPHS OF FINITE COMMUTATIVE RINGS

CUT VERTICES IN ZERO-DIVISOR GRAPHS OF FINITE COMMUTATIVE RINGS CUT VERTICES IN ZERO-DIVISOR GRAPHS OF FINITE COMMUTATIVE RINGS M. AXTELL, N. BAETH, AND J. STICKLES Abstract. A cut vertex of a connected graph is a vertex whose removal would result in a graph having

More information

Cross Clock-Domain TDM Virtual Circuits for Networks on Chips

Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Zhonghai Lu Dept. of Electronic Systems School for Information and Communication Technology KTH - Royal Institute of Technology, Stockholm

More information

Glynda, the good witch of the North

Glynda, the good witch of the North Strings and Languages It is always best to start at the beginning -- Glynda, the good witch of the North What is a Language? A language is a set of strings made of of symbols from a given alphabet. An

More information

2010: Compilers REVIEW: REGULAR EXPRESSIONS HOW TO USE REGULAR EXPRESSIONS

2010: Compilers REVIEW: REGULAR EXPRESSIONS HOW TO USE REGULAR EXPRESSIONS 2010: Compilers Lexical Analysis: Finite State Automata Dr. Licia Capra UCL/CS REVIEW: REGULAR EXPRESSIONS a Character in A Empty string R S Alternation (either R or S) RS Concatenation (R followed by

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures Chapter 9 Graph s 2 Definitions Definitions an undirected graph is a finite set

More information

INACTIVE T[ 7,8,12,13,15,20, 25,26,30,32,35] T[ 15,17,19,20,26,28, 30,32,34,35] T[ 9,11,16,18,22,27,33] T[23] T[ 2-6,7,8,25,26,32,35] TOP-UPDATE

INACTIVE T[ 7,8,12,13,15,20, 25,26,30,32,35] T[ 15,17,19,20,26,28, 30,32,34,35] T[ 9,11,16,18,22,27,33] T[23] T[ 2-6,7,8,25,26,32,35] TOP-UPDATE GENERATION OF REALIZABLE CONFORMANCE TESTS UNDER TIMING CONSTRAINTS æ M. íumit Uyar y, Mariusz A. Fecko, Adarshpal S. Sethi, Paul D. Amer Computer and Information Science Department University of Delaware,

More information

UNIT I PART A PART B

UNIT I PART A PART B OXFORD ENGINEERING COLLEGE (NAAC ACCREDITED WITH B GRADE) DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING LIST OF QUESTIONS YEAR/SEM: III/V STAFF NAME: Dr. Sangeetha Senthilkumar SUB.CODE: CS6503 SUB.NAME:

More information

Darshan Institute of Engineering & Technology for Diploma Studies

Darshan Institute of Engineering & Technology for Diploma Studies CODING Good software development organizations normally require their programmers to follow some welldefined and standard style of coding called coding standards. Most software development organizations

More information

Figure 2.1: A bipartite graph.

Figure 2.1: A bipartite graph. Matching problems The dance-class problem. A group of boys and girls, with just as many boys as girls, want to dance together; hence, they have to be matched in couples. Each boy prefers to dance with

More information

The Service-Time Restricted Capacitated Arc Routing Problem

The Service-Time Restricted Capacitated Arc Routing Problem The Service-Time Restricted Capacitated Arc Routing Problem Lise Lystlund Aarhus University Århus, Denmark Sanne Wøhlk CORAL - Centre of OR Applications in Logistics, Aarhus School of Business, Aarhus

More information

Lecture 6,

Lecture 6, Lecture 6, 4.16.2009 Today: Review: Basic Set Operation: Recall the basic set operator,!. From this operator come other set quantifiers and operations:!,!,!,! \ Set difference (sometimes denoted, a minus

More information

Software testing. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 23 Slide 1

Software testing. Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 23 Slide 1 Software testing Ian Sommerville 2006 Software Engineering, 8th edition. Chapter 23 Slide 1 Objectives To discuss the distinctions between validation testing and defect testing To describe the principles

More information

Chapter 4. Relations & Graphs. 4.1 Relations. Exercises For each of the relations specified below:

Chapter 4. Relations & Graphs. 4.1 Relations. Exercises For each of the relations specified below: Chapter 4 Relations & Graphs 4.1 Relations Definition: Let A and B be sets. A relation from A to B is a subset of A B. When we have a relation from A to A we often call it a relation on A. When we have

More information

JNTUWORLD. Code No: R

JNTUWORLD. Code No: R Code No: R09220504 R09 SET-1 B.Tech II Year - II Semester Examinations, April-May, 2012 FORMAL LANGUAGES AND AUTOMATA THEORY (Computer Science and Engineering) Time: 3 hours Max. Marks: 75 Answer any five

More information

THE ISOMORPHISM PROBLEM FOR SOME CLASSES OF MULTIPLICATIVE SYSTEMS

THE ISOMORPHISM PROBLEM FOR SOME CLASSES OF MULTIPLICATIVE SYSTEMS THE ISOMORPHISM PROBLEM FOR SOME CLASSES OF MULTIPLICATIVE SYSTEMS BY TREVOR EVANS 1. Introduction. We give here a solution of the isomorphism problem for finitely presented algebras in various classes

More information

A Controller Testability Analysis and Enhancement Technique

A Controller Testability Analysis and Enhancement Technique A Controller Testability Analysis and Enhancement Technique Xinli Gu Erik Larsson, Krzysztof Kuchinski and Zebo Peng Synopsys, Inc. Dept. of Computer and Information Science 700 E. Middlefield Road Linköping

More information

A macro- generator for ALGOL

A macro- generator for ALGOL A macro- generator for ALGOL byh.leroy Compagnie Bull-General Electric Paris, France INTRODUCfION The concept of macro-facility is ambiguous, when applied to higher level languages. For some authorsl,2,

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures 3 Definitions an undirected graph G = (V, E) is a

More information

LOGICAL OPERATOR USAGE IN STRUCTURAL MODELLING

LOGICAL OPERATOR USAGE IN STRUCTURAL MODELLING LOGICAL OPERATOR USAGE IN STRUCTURAL MODELLING Ieva Zeltmate (a) (a) Riga Technical University, Faculty of Computer Science and Information Technology Department of System Theory and Design ieva.zeltmate@gmail.com

More information

Online Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors

Online Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors Online Dial-A-Ride Problem with Time Windows: an exact algorithm using status vectors A. Fabri 1 and P. Recht 2 1 Universität Dortmund a.fabri@wiso.uni-dortmund.de 2 Universität Dortmund p.recht@wiso.uni-dortmund.de

More information

ConData: a Tool for Automating Specification-based Test Case Generation for Communication Systems

ConData: a Tool for Automating Specification-based Test Case Generation for Communication Systems ConData: a Tool for Automating Specification-based Test Case Generation for Communication Systems Eliane Martins, Selma B.Sabião Institute of Computing State University of Campinas (UNICAMP) {eliane, selmasab}@dcc.unicamp.br

More information

Design for testability: a step-wise approach to protocol testing

Design for testability: a step-wise approach to protocol testing Proc. 10th Int. Workshop on Testing of Communicating Systems (IWTCS 97), Seoul, Sept. 1997, Chapman & Hall, pp. 125-140. Design for testability: a step-wise approach to protocol testing Hartmut König a,

More information

Request for Comments: 2. 1a1 Logical link 0 will be a control link between any two HOSTs on the network

Request for Comments: 2. 1a1 Logical link 0 will be a control link between any two HOSTs on the network Network Working Group Request for Comments: 2 Bill Duvall SRI [unknown title] [page 1 missing] 1 LINKS 1a Control Links 1a1 Logical link 0 will be a control link between any two HOSTs on the network 1a1a

More information

MONIKA HEINER.

MONIKA HEINER. LESSON 1 testing, intro 1 / 25 SOFTWARE TESTING - STATE OF THE ART, METHODS, AND LIMITATIONS MONIKA HEINER monika.heiner@b-tu.de http://www.informatik.tu-cottbus.de PRELIMINARIES testing, intro 2 / 25

More information

[IT6004-SOFTWARE TESTING] UNIT 2

[IT6004-SOFTWARE TESTING] UNIT 2 1. List the two basic Testing strategies. UNIT 2 Black box testing. White box testing. 2. What are the knowledge sources for Black box testing? Requirements Document specification Domain knowledge Defect

More information

On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment

On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment On Code Coverage of Extended FSM Based Test Suites: An Initial Assessment Khaled El-Fakih, Tariq Salameh, Nina Yevtushenko To cite this version: Khaled El-Fakih, Tariq Salameh, Nina Yevtushenko. On Code

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Notes for Comp 454 Week 2

Notes for Comp 454 Week 2 Notes for Comp 454 Week 2 This week we look at the material in chapters 3 and 4. Homework on Chapters 2, 3 and 4 is assigned (see end of notes). Answers to the homework problems are due by September 10th.

More information

8. The Postman Problems

8. The Postman Problems 8. The Postman Problems The Chinese postman problem (CPP) A postal carrier must pick up the mail at the post office, deliver the mail along blocks on the route, and finally return to the post office. To

More information

SIP Conformance Testing Based on TTCN-2 *

SIP Conformance Testing Based on TTCN-2 * TSINGHUA SCIENCE AND TECHNOLOGY ISSN 1007-0214 40/49 pp223-228 Volume 12, Number S1, July 2007 SIP Conformance Testing Based on TTCN-2 * LI Tian ( 李天 ), WANG Zhiliang ( 王之梁 ), YIN Xia ( 尹霞 ) ** Department

More information

CSE 431S Scanning. Washington University Spring 2013

CSE 431S Scanning. Washington University Spring 2013 CSE 431S Scanning Washington University Spring 2013 Regular Languages Three ways to describe regular languages FSA Right-linear grammars Regular expressions Regular Expressions A regular expression is

More information

Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence

Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Introducing MESSIA: A Methodology of Developing Software Architectures Supporting Implementation Independence Ratko Orlandic Department of Computer Science and Applied Math Illinois Institute of Technology

More information

INTEGRATED SYSTEM INTEROPERABILITY TESTING WITH APPLICATIONS TO VOIP

INTEGRATED SYSTEM INTEROPERABILITY TESTING WITH APPLICATIONS TO VOIP INTEGRATED SYSTEM INTEROPERABILITY TESTING WITH APPLICATIONS TO VOIP Nancy Griffeth, Ruibing Hao, David Lee*, Rakesh K. Sinha Bell Laboratories Murray Hill, New Jersey * Bell Laboratories Research China

More information

Zhizheng Zhang. Southeast University

Zhizheng Zhang. Southeast University Zhizheng Zhang Southeast University 2016/10/5 Lexical Analysis 1 1. The Role of Lexical Analyzer 2016/10/5 Lexical Analysis 2 2016/10/5 Lexical Analysis 3 Example. position = initial + rate * 60 2016/10/5

More information

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1

CIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1 Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router

More information

On the construction of convergent transfer subgraphs in general labeled directed graphs

On the construction of convergent transfer subgraphs in general labeled directed graphs On the construction of convergent transfer subgraphs in general labeled directed graphs 38th CGTC 7 March 2007 Christopher League * Mohammed Ghriga First, I ll explain what we mean by Convergent Transfer

More information

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph.

Trees. 3. (Minimally Connected) G is connected and deleting any of its edges gives rise to a disconnected graph. Trees 1 Introduction Trees are very special kind of (undirected) graphs. Formally speaking, a tree is a connected graph that is acyclic. 1 This definition has some drawbacks: given a graph it is not trivial

More information

DETECTION OF IMAGE PAIRS USING CO-SALIENCY MODEL

DETECTION OF IMAGE PAIRS USING CO-SALIENCY MODEL DETECTION OF IMAGE PAIRS USING CO-SALIENCY MODEL N S Sandhya Rani 1, Dr. S. Bhargavi 2 4th sem MTech, Signal Processing, S. J. C. Institute of Technology, Chickballapur, Karnataka, India 1 Professor, Dept

More information

Specifications and Modeling

Specifications and Modeling 12 Specifications and Modeling Peter Marwedel TU Dortmund, Informatik 12 Springer, 2010 2012 年 10 月 17 日 These slides use Microsoft clip arts. Microsoft copyright restrictions apply. Hypothetical design

More information

Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements

Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements Automatic Verification of Firewall Configuration with Respect to Security Policy Requirements Soutaro Matsumoto 1 and Adel Bouhoula 2 1 Graduate School of System and Information Engineering University

More information

Formal Languages and Automata

Formal Languages and Automata Mobile Computing and Software Engineering p. 1/3 Formal Languages and Automata Chapter 3 Regular languages and Regular Grammars Chuan-Ming Liu cmliu@csie.ntut.edu.tw Department of Computer Science and

More information

Introduction to Electronic Design Automation. Model of Computation. Model of Computation. Model of Computation

Introduction to Electronic Design Automation. Model of Computation. Model of Computation. Model of Computation Introduction to Electronic Design Automation Model of Computation Jie-Hong Roland Jiang 江介宏 Department of Electrical Engineering National Taiwan University Spring 03 Model of Computation In system design,

More information

Binary Relations McGraw-Hill Education

Binary Relations McGraw-Hill Education Binary Relations A binary relation R from a set A to a set B is a subset of A X B Example: Let A = {0,1,2} and B = {a,b} {(0, a), (0, b), (1,a), (2, b)} is a relation from A to B. We can also represent

More information

Paths partition with prescribed beginnings in digraphs: a Chvátal-Erdős condition approach.

Paths partition with prescribed beginnings in digraphs: a Chvátal-Erdős condition approach. Paths partition with prescribed beginnings in digraphs: a Chvátal-Erdős condition approach. S. Bessy, Projet Mascotte, CNRS/INRIA/UNSA, INRIA Sophia-Antipolis, 2004 route des Lucioles BP 93, 06902 Sophia-Antipolis

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1

CIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1 Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.

More information

Dynamically Random Graphs

Dynamically Random Graphs Dynamically Random Graphs Alexis Byers, Wittenberg University Mallory Reed, Earlham College Laura Rucci, Cabrini College Elle VanTilburg, University of Texas-Austin SUMSRI 203 Miami University July 8,

More information

11/22/2016. Chapter 9 Graph Algorithms. Introduction. Definitions. Definitions. Definitions. Definitions

11/22/2016. Chapter 9 Graph Algorithms. Introduction. Definitions. Definitions. Definitions. Definitions Introduction Chapter 9 Graph Algorithms graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 2 Definitions an undirected graph G = (V, E) is

More information

LOGIC SYNTHESIS AND VERIFICATION ALGORITHMS. Gary D. Hachtel University of Colorado. Fabio Somenzi University of Colorado.

LOGIC SYNTHESIS AND VERIFICATION ALGORITHMS. Gary D. Hachtel University of Colorado. Fabio Somenzi University of Colorado. LOGIC SYNTHESIS AND VERIFICATION ALGORITHMS by Gary D. Hachtel University of Colorado Fabio Somenzi University of Colorado Springer Contents I Introduction 1 1 Introduction 5 1.1 VLSI: Opportunity and

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be slow if not careful with data structures 3 Definitions an undirected graph G = (V, E)

More information

Generating Minimum-Cost Fault-Free Rule Bases Using Minimum Spanning Trees

Generating Minimum-Cost Fault-Free Rule Bases Using Minimum Spanning Trees International Journal of Computing & Information Sciences Vol. 4, No. 3, December 2006, On-Line 114 Generating Minimum-Cost Fault-Free Rule Bases Using Minimum Spanning Trees Nabil Arman Pages 114 118

More information

Automated Generation of Directed Tests for Transition Coverage in Cache Coherence Protocols

Automated Generation of Directed Tests for Transition Coverage in Cache Coherence Protocols Automated Generation of Directed Tests for Transition Coverage in Cache Coherence Protocols Xiaoke Qin and Prabhat Mishra Computer and Information Science and Engineering, University of Florida, USA {xqin,

More information

RELATIONAL REPRESENTATION OF ALN KNOWLEDGE BASES

RELATIONAL REPRESENTATION OF ALN KNOWLEDGE BASES RELATIONAL REPRESENTATION OF ALN KNOWLEDGE BASES Thomas Studer ABSTRACT The retrieval problem for a knowledge base O and a concept C is to find all individuals a such that O entails C(a). We describe a

More information

Key Grids: A Protocol Family for Assigning Symmetric Keys

Key Grids: A Protocol Family for Assigning Symmetric Keys Key Grids: A Protocol Family for Assigning Symmetric Keys Amitanand S. Aiyer University of Texas at Austin anand@cs.utexas.edu Lorenzo Alvisi University of Texas at Austin lorenzo@cs.utexas.edu Mohamed

More information

Direction-Length Code (DLC) To Represent Binary Objects

Direction-Length Code (DLC) To Represent Binary Objects IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. I (Mar-Apr. 2016), PP 29-35 www.iosrjournals.org Direction-Length Code (DLC) To Represent Binary

More information

PBW 654 Applied Statistics - I Urban Operations Research. Unit 3. Network Modelling

PBW 654 Applied Statistics - I Urban Operations Research. Unit 3. Network Modelling PBW 54 Applied Statistics - I Urban Operations Research Unit 3 Network Modelling Background So far, we treated urban space as a continuum, where an entity could travel from any point to any other point

More information