Error-Resilient LZW Data Compression

Size: px
Start display at page:

Download "Error-Resilient LZW Data Compression"

Transcription

1 Error-Resilient LZW t Compression Yonghui Wu Stefno Lonrdi ept. Computer Science & Engineering University of Cliforni Riverside, CA {yonghui stelo}@cs.ucr.edu Wojciech Szpnkowski eprtment of Computer Sciences Purdue University West Lfyette, IN 490 sp@cs.purdue.edu Abstrct 1 Introduction As mny prctitiones know, compressed strems re very sensitive the trnsmission errors. Even single error cn hve devstting effects nd compromise ll the dt downstrem [5]. In fct, the non-resilience of dptive dt compression hs been prcticl drwbck of its use in mny pplictions. Joint source-chnnel coding [4, 1] hs emerged s possible solution to this problem. Usully, joint source-chnnel coding trdes source bits for chnnel bits or vice vers, nd more thn often requires some djustments in source coding nd chnnel coding prts. In this pper, we del with very populr compression scheme, nmely the so-clled Lempel- Ziv-Welch (LZW). LZW is lossless dt compression lgorithm developed by T. Welch in 1984 [8] s n improved version of the LZ8 dictionry coding lgorithm developed by A. Lempel nd J. Ziv [9]. The method becme modertely widely-used when the progrm compress becme more or less the stndrd compression utility in Unix systems circ by the yer of In 198, the lgorithm ws dopted s prt of the IF imge formt, nd hs since been very widely used. LZW is used in the V.42bis modem stndrd [] nd cn lso optionlly be used in TIFF imges nd PF formtted documents. Here focus on the problem of dding error-resiliency to the LZW compression scheme. Compred to our previous work on LZ- [1], extrcting from LZW/LZ-8 the extr redundncy bits needed to store the error correcting prity bits turned out to be significntly trickier. The constrins tht we hd in the design of the new scheme were minly two. First, we wnted to mintin the bckwrd comptibility with the originl LZW, tht is, we wnted file compressed with LZW nd ugmented for error-resiliency to be decodble by the originl LZW. Bckwrd-comptibility is very desirble property becuse it mkes it possible to deploy the new scheme grdully over the existing one, without disrupting service. Second, we wnted the compression rtio not to be ffected too much by the embedding of the extr prity bits for the detection nd correction of errors. We were ble to chieve both objectives by relxing (i.e., shortening) few selected LZW phrses in the compressed strem, so tht the pttern of shorter phrses would encode the extr 1

2 C C C bits. Since we re not shortening too mny phrses the compression is not ffected much (see Experimentl results). In fct, ccording to our experimentl results, sometimes the sum of the 2 Bsic concepts Let be text of length over finite lphbet, nd let be its corresponding LZWcompressed strem. We write to indicte the symbol of the text. We use shorthnd for #, where!, with the convention tht. Substrings in the form $ % correspond to the prefixes of, nd substrings in the form & ( to the suffixes of. iven two strings ) nd, ),+- is the string obtined by conctenting ) with. 0/ :::<; We use. to denote the LZW dictionry used during the encoding nd decoding processes. By construction of the LZW dictionry we hve tht 1= > for some nd B. 1 The length C C of phrse 1E is the number of symbols it contins, i.e., C B$+H. For completeness of presenttion we briefly review the originl LZW scheme [8, 9]. The lgorithm prses the text online left to right into phrses, where ech phrse is the longest mtching phrse seen previously plus one extr symbol. Ech new phrse is dded to the dictionry. of phrses, which is first initilized to include every single symbol in the input lphbet. The index of the longest mtching phrse is dded to the output s new codeword, wheres the extr symbol, i.e., the lst symbol of the current phrse, becomes the first symbol of the next phrse. To decode the compressed text I, the decoder first fills the dictionry. with ll the symbols in the input lphbet. It then reds the codewords one by one from the compressed text. Every time the decoder reds new codeword, it looks up the dictionry for the corresponding phrse. The string identified by the codeword is dded to the output, while new phrse, which is constructed by ppending the first symbol of the current codeword to the previous codeword, is dded to the dictionry.. 3 Extrcting bits from the LZW strem ue to the greediness inherent to the LZW lgorithm, t ny point of the encoding process there is lwys only one wy of producing the next phrse, nd hence, every phrse in the dictionry. is unique. The greediness prevents us from embedding directly extr bits into the compressed dt strem. A simple solution to this problem is to relx the greediness on some of the phrses (i.e., by mking them little shorter) in such wy to encode the extr bits. Relxing the length of too mny phrses will, however, degrde the compression performnce considerbly. Cre must be tken to select the set of phrses to shorten tht will llow the necessry extr spce to store the bits for error detection nd correction. Also, we must ensure tht the new compressed strem cn be decompressed by the originl lgorithm. Note tht by relxing the greediness some entries in the dictionry. will hve multiple codewords ssocited with them. A somewht similr pproch ws tken in [6], where the uthor nlyze scheme where the entries in the dictionry to hve multiplicity up to constnt J. Figure 1 show n exmple. On the left, the text =b is compressed with the greedy LZW lgorithm. The corresponding compressed dt strem is K =0231. By the end of the encoding process, the dictionry contins five phrses, nmely 13L =, 13 =b, 1E =, 1E =, 2

3 Phrses:,,, b Output: 0, 2, 3, 1 Phrses:,,,, b Output: 0, 2, 2, 0, 1 b b 0 b b 4 greedy-lzw lgorithm relxed-lzw lgorithm Figure 1: reedy-lzw prsing vs. relxed-lzw prsing on the input =b nd 1 =b. Phrses 1EL nd 13 re from the input lphbet, wheres 1F, 1E, nd 1, re constructed greedily s the text is prsed from left to right. If insted of generting the next phrse in greedy mnner ll the time, we reduce the length of 1 by one, we will get the result s shown in the right prt of the figure. This time, the dictionry contins 6 phrses nd the output, 02201, is one codeword longer thn tht in the greedy cse. The two phrses, 1 nd 1, re identicl, which is s expected. The dictionry. nd. re both shown s tries in the figure. The crucil question is whether this modifiction in the encoder will produce compressed file tht cn still be decompressed by the originl LZW lgorithm. The nswer to this question depends on the dt structure used to represent the dictionry. Although in the literture, the dictionry is lwys represented s trie, ll the implementtion we checked use fixed-size hsh tble (typiclly with 4096 entries). Thus, the decoder is not ffected by the multiplicities in the dictionry entries. All it does is to refer to the existing phrses by their indices, whether there re multiple such phrses or not, nd conctentes two strings to produce the next phrse. Becuse of this, our relxed-lzw scheme is bckwrd-comptible with the greedy-lzw. We verified the bckwrd comptibility of our scheme on vrious softwre tht support the LZW scheme. For exmple, for IF imges, we tested S Pint, S Internet Explorer nd ozill Firefox. We lso tested Unix Compress nd Winzip. All these ltter softwre were ble to decompress relxed- LZW strem. We expect PF nd TIFF files to be cpble of hndling our scheme s well. Once the bckwrd comptibility hve been ssessed, we need to tke the compression performnce into considertion. A detiled description on the relxed-lzw scheme is in order. We cll the LZW phrses tht will become shorter becuse of the relxtion, non-greedy phrses. Let denote the messge over the binry lphbet tht is going to be embedded into the compressed text. The cpcity of the embedding chnnel depends on two integer prmeters nd. The integer specifies the number of bits of the messge tht re embedded in the intervl between two consecutive non-greedy phrses, wheres the prmeter specifies the number of bits tht is embedded in the length of ech non-greedy phrse. For exmple, when we... The messge to be embedded is first logiclly divided into consecutive blocks of + bits. Every block is further divided into two sub-blocks of nd bits ech. The contents of the 3

4 ESSAE EBEIN LZW ENCOER get next bits from 3. if then 4. while (hve not finished encoding yet) 5.! #%$&() next phrse s ccording to the stndrd LZW lgorithm 6. if +#%$,&-,./%0+ then. 1! if56 then get next bits from 11. if :8;< then 8; %$&() reduce the length of + #%$,&- by 8 symbols 13. get next bits from 14. if4 then 15. 2=+ #%$,&- 16. return Figure 2: The sketch of the encoder cpble of embedding messge while compressing into LZW strem. nd re two integer prmeters of the lgorithm (see text) two sub-blocks re interpreted s positive integers, nd for clrity purposes, we denote them by 4E 4H B nd > respectively. Note tht 1 B@?ACB H(F nd >? AB 0 H-F. The messge is embedded into one block time while compressing ccording to LZW, s follows. We initilize counter to B, nd generte new phrses greedily s per the greedy LZW lgorithm. Every time new phrse is generted, its length is compred to the vlue 0 (note tht 0 is the mximum vlue for >, see footnote). If the length of the phrse is greter we increment the counter by 1. As soon s the counter equls the vlue B we relx the length of tht phrse by > symbols. Then, the counter is reset to 0, nd new cycle begins (see Figure 2) The decoding process is rther strightforwrd. As codewords re red from, phrses re being reconstructed. For ech phrse the decoder determines whether the phrse is greedy or nongreedy. If the phrse is non-greedy phrse, block of messge is recovered ccording to the rules we followed to embed it. At the sme time, the originl text is lso rebuilt s per the generic LZW lgorithm. Note tht in order to determine whether or not phrse is non-greedy, we need to look hed severl phrses. This cn be done by employing some sort of look-hed buffer. A sketch of the decoder is illustrted in Figure 3. As finl remrk, we wnt to note tht in the strtegy described bove we hve not exploited the multiplicities in the dictionry to embed even more bits of the messge. When the relxed-lzw lgorithm looks for longest prefix of text to be compressed tht is contined the dictionry., there might be multiple such longest phrses in the dictionry, due to the fct tht we hve reduced the lengths of some of the previous phrses. If tht is the cse, we cn embed free of chrge 9N nother I:J5K,L where is the multiplicity of the longest phrse. A similr ide is exploited in [1, 2] to embed extr bits in LZ- strems. 1OQP@R nd S PTR re treted s specil cse, by mpping them to U(V nd UHW, respectively. 4

5 C ESSAE EBEIN LZW ECOER 1. E( 2. while (hve not finished decoding yet) 3.! #%$&(3 decode the next phrse s ccording to the stndrd LZW decoder %$&(3 5. Fill E 6.! #%$&( encoder the text in E s ccording to the stndrd LZW encoder. if +#%$,&--6,./ ! if +#%$,&-3 +6%$&( & 2 +#%$,&--6!#%$&(3 & return ) Figure 3: The sketch of the decoder cpble of recovering the embedded messge. nd re two integer prmeters of the lgorithm (see text) from LZW strem 4 Selection of prmeters nd Embedding extr informtion into the LZW dt strem is clerly not free of chrge. With dditionl bits embedded, the size of the new LZW strem is usully lrger thn tht of the originl one, s is illustrted by the exmple in Figure 1. However, by choosing the two prmeters nd judiciously, the size will not increse by too much. In fct, we will show in the Section tht when is 5 or higher, the size of the new LZW file is typiclly less thn the sum of the sizes of the originl file nd the messge file. The compression tend to degrde s decreses nd increses, but t the sme time the number of bits embedded in the messge will increse. In the error resilient ppliction it is crucil to determine the best trdeoff. Once the file is compressed with the originl greedy-lzw, the strem is broken into blocks (see Section 6) nd the totl number of prity bits will be computed. In this section, we discuss how to choose nd so tht we cn estimte the number of bits tht cn be embedded in I. The im is to crete enough extr bits for the length of the messge to be embedded, i.e., ll the prity bits of the error-correcting code, but not much more so tht the compression will suffer. In our nlysis, we ssume tht during the embedding of the messge, the lengths of the phrses re lwys greter thn 0, which of course is not true t the beginning of the file. However, s long s the text is long enough nd s new phrses re being generted nd inserted into the dictionry, the ssumption is likely to be stisfied. For simplicity, we ssume the messge to be embedded is generted by n i.i.d. model with 0 nd 1 hving equl probbilities. Then, on verge we will get non-greedy phrse every + phrses. On verge, the length of the non-greedy phrse & will be reduced by 0 + symbols. For simplicity in our exposition, we set + nd 0 +. Let ssume tht C nd C C. Let us cll the portion of tht is encoded by greedy phrses, nd cll the portion of encoded by non-greedy phrses. Intuitively, if we zip nd t the points where is broken into phrses, we get bck. Let the sizes of nd be nd respectively. Clerly, +. 5

6 ) 4 + L / > The set of unique phrses in the dictionry is determined by the greedy phrses (in ). The number of the unique phrses,, is then pproximtely equl to, where is the entropy of. The verge length of the greedy phrses, >, will be roughly. The number of blocks of messge,, tht is embedded in the text will be, nd hence we hve + +. Let > be the verge length of the non greedy phrses. Then we hve >, nd >. The number of non-greedy phrses in the dictionry is equl to the number of blocks of messges embedded. The totl number of phrses,, generted by our lgorithm is the sum of tht of greedy phrses nd of the non-greedy phrses, which is equl to +. To sum up, we hve the following equlities: > > + J K,L& J K,L + From the bove set of equtions, cn be determined given nd, so will be, nd. The cpcity of our messge-embedding chnnel cn be represented s the rtio of over. The performnce of our lgorithm, in terms of compression rtio, cn be determined by compring! the totl number of phrses,, tht is generted by our lgorithm to the number of phrses, #%$&!, tht would be produced if we were to compress the conctention of the text nd the messge + simply by the generic LZW lgorithm. 5 Asymptotic nlysis of the redundncy In this section we re concerned with the nlysis of the redundncy of the new scheme when the input is lrge. In prticulr we re interested in compring the redundncy of the relxed-lzw scheme with the originl LZW/LZ-8. Here, we follow the nottion from [3]. On verge our relxed-lzw lgorithm decreses the number of mnipulted symbols by ( where ( is the yet unknown (verge) number of phrses when string of length is compressed. Let, s in [3], define ( ( J5K,L+(=, (= ( H+.- J K,L+( 0 (1) where,

7 B L L 3 L (, ) B nd where J5K,L + J5KL J K,L, nd J K,L 9: B is the @ J is the Euler constnt, The function 4 ( is fluctuting function with men zero nd smll mplitude for J5KL J K,L rtionl (e.g., the mplitude of 4 ( is smller thn %B for the unbised cse, where ), nd J 4 ( B otherwise. efine now ( s ( Then, s in [3], the verge number of phrses of our lgorithm is A the code length of our lgorithm is? -AJ K,L ( Thus, the reltive verge redundncy ( + becomes? -AJ K,L ( + J5K,L? + (F + (F F ( E (2). Observe tht Compring it to the regulr LZW/LZ 8, the redundncy of relxed-lzw is incresed by J5K,L. 6 Error resilient LZW Experimentl Results In order to vlidte our theoreticl studies nd test the correctness of our scheme, we implemented our lgorithm nd tested it on IF files, which, s is well-known, is compressed by LZW lgorithm. We downloded from Internet severl stndrd pictures for digitl imge processing, nd tested our lgorithm with them. Tble 1 shows our experimentl results with nd being set to nd B respectively. The essge (bytes) column indictes how much rndom informtion we cn embed into the originl IF file. Column Cmprssn Loss is defined to be the size of the new IF file minus the sum of the size of the originl IF file plus the size of the rndom messge. If this number is negtive, it mens tht overll we re gining more compression thn the stndrd LZW lgorithm. As we cn see from the tble, irplne.gif nd couple.gif re better thn the rest of the IF files in terms of compression loss, nd bboon.gif is the worst mong ll of them. This is becuse the compression rtio for irplne.gif nd couple.gif (5. nd 4.88 respectively) is much higher thn tht for bboon.gif (2.49), nd reducing the lengths of phrses will not hve s drmtic negtive impct on the file size for IF files with high compression rtios thn for those with low compression rtios. Column chnnel cpcity is defined to be the rtio of the size of the rndom messge over the size of the originl IF (3)

8 Originl IF file Width Height BPP Size (bytes) Averge LZW Phrse Size (bytes) essge embedded IF file Averge ssg LZW Cmprssn Phrse Loss (bytes) Chnnel Cpcity irplne.gif bboon.gif couple.gif girl.gif len.gif peppers.gif Tble 1: Compring the size of some IF files compressed with the stndrd LZW versus the messge embedding LZW scheme : 3 file. We notice tht the vrition of chnnel cpcity mong the files re quite smll, except bboon.gif, which gin we believe is due to its reltively poor compression rtio. Tble 2 shows our experimentl results with vrious prmeter settings. Clerly, the chnnel cpcity decreses s the prmeter increses. However, the reltionship between the chnnel cpcity nd the prmeter is not s cler. To our observtions, when the prmeter is smll, sy less thn 4, incresing the prmeter from 0 to 1 usully increses the chnnel cpcity s well. However, going beyond 1 neither helps chnnel cpcity nor does it improve the imge compression rtio. References [1] LONARI, S., AN SZPANKOWSKI, W. Joint source-chnnel LZ coding. In IEEE t Compression Conference, CC (Snowbird, Uth, rch 2003), J. A. Storer nd. Cohn, Eds., IEEE Computer Society TCC, pp [2] LONARI, S., SZPANKOWSKI, W., AN WAR,. Error resilient LZ nd its nlysis. In IEEE Interntionl Symposium on Informtion Theory (ISIT 04) (Chicgo, IL, June 2004), p. 56. [3] LOUCHAR,., AN SZPANKOWSKI, W. On the verge redundncy rte of the Lempel-Ziv code. IEEE Trns. Inf. Theory 43 (199), 2 8. [4] SAYOO, K., OTU, H., AN EIR, N. Joint source/chnnel coding for vrible length codes. IEEE Trns. Inf. Theory 48 (2000), [5] STORER, J. A., AN REIF, J. H. Error-resilient optiml dt compression. SIA Journl on Computing 26, 4 (199), [6] SZPANKOSWKI, W., AN KNESSL, C. A note on the symptotic behvior of the height in -tries for lrge. Electronic J. of Combintorics (2000), R39. [] THOBORSON, C. The V.42bis stndrd for dt-compressing modems. IEEE icro 12, 5 (Oct. 1992),

9 ssg (bytes) Averge LZW Phrse Cmprssn Loss Chnnel Cpcity ssg (bytes) Averge LZW Phrse Cmprssn Loss Chnnel Cpcity irplne.gif bboon.gif couple.gif girl.gif len.gif peppers.gif irplne.gif bboon.gif couple.gif girl.gif len.gif peppers.gif irplne.gif bboon.gif couple.gif girl.gif len.gif peppers.gif irplne.gif bboon.gif couple.gif girl.gif len.gif peppers.gif irplne.gif bboon.gif couple.gif girl.gif len.gif peppers.gif irplne.gif bboon.gif couple.gif girl.gif len.gif peppers.gif irplne.gif bboon.gif couple.gif girl.gif len.gif peppers.gif Tble 2: Experimentl results for severl choices of the prmeters 9

10 [8] WELCH, T. A. A technique for high-performnce dt compression. IEEE Computer 1, 6 (June 1984), [9] ZIV, J., AN LEPEL, A. Compression of individul sequences vi vrible-rte coding. IEEE Trns. Inf. Theory 24, 5 (Sept. 198),

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Approximation by NURBS with free knots

Approximation by NURBS with free knots pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

Misrepresentation of Preferences

Misrepresentation of Preferences Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

The dictionary model allows several consecutive symbols, called phrases

The dictionary model allows several consecutive symbols, called phrases A dptive Huffmn nd rithmetic methods re universl in the sense tht the encoder cn dpt to the sttistics of the source. But, dpttion is computtionlly expensive, prticulrly when k-th order Mrkov pproximtion

More information

2014 Haskell January Test Regular Expressions and Finite Automata

2014 Haskell January Test Regular Expressions and Finite Automata 0 Hskell Jnury Test Regulr Expressions nd Finite Automt This test comprises four prts nd the mximum mrk is 5. Prts I, II nd III re worth 3 of the 5 mrks vilble. The 0 Hskell Progrmming Prize will be wrded

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

such that the S i cover S, or equivalently S

such that the S i cover S, or equivalently S MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i

More information

Section 3.1: Sequences and Series

Section 3.1: Sequences and Series Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one

More information

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed

More information

CS201 Discussion 10 DRAWTREE + TRIES

CS201 Discussion 10 DRAWTREE + TRIES CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Fault injection attacks on cryptographic devices and countermeasures Part 2

Fault injection attacks on cryptographic devices and countermeasures Part 2 Fult injection ttcks on cryptogrphic devices nd countermesures Prt Isrel Koren Deprtment of Electricl nd Computer Engineering University of Msschusetts Amherst, MA Countermesures - Exmples Must first detect

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

On String Matching in Chunked Texts

On String Matching in Chunked Texts On String Mtching in Chunked Texts Hnnu Peltol nd Jorm Trhio {hpeltol, trhio}@cs.hut.fi Deprtment of Computer Science nd Engineering Helsinki University of Technology P.O. Box 5400, FI-02015 HUT, Finlnd

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1 Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the

More information

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012 Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.

More information

Nearest Keyword Set Search in Multi-dimensional Datasets

Nearest Keyword Set Search in Multi-dimensional Datasets Nerest Keyword Set Serch in Multi-dimensionl Dtsets Vishwkrm Singh Deprtment of Computer Science University of Cliforni Snt Brbr, USA Emil: vsingh014@gmil.com Ambuj K. Singh Deprtment of Computer Science

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

Fall 2018 Midterm 2 November 15, 2018

Fall 2018 Midterm 2 November 15, 2018 Nme: 15-112 Fll 2018 Midterm 2 November 15, 2018 Andrew ID: Recittion Section: ˆ You my not use ny books, notes, extr pper, or electronic devices during this exm. There should be nothing on your desk or

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

Expected Worst-case Performance of Hash Files

Expected Worst-case Performance of Hash Files Expected Worst-cse Performnce of Hsh Files Per-Ake Lrson Deprtment of Informtion Processing, Abo Akdemi, Fnriksgtn, SF-00 ABO 0, Finlnd The following problem is studied: consider hshfilend the longest

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey

Alignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

pdfapilot Server 2 Manual

pdfapilot Server 2 Manual pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:

More information

Digital Design. Chapter 6: Optimizations and Tradeoffs

Digital Design. Chapter 6: Optimizations and Tradeoffs Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Midterm I Solutions CS164, Spring 2006

Midterm I Solutions CS164, Spring 2006 Midterm I Solutions CS164, Spring 2006 Februry 23, 2006 Plese red ll instructions (including these) crefully. Write your nme, login, SID, nd circle the section time. There re 8 pges in this exm nd 4 questions,

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

Computing offsets of freeform curves using quadratic trigonometric splines

Computing offsets of freeform curves using quadratic trigonometric splines Computing offsets of freeform curves using qudrtic trigonometric splines JIULONG GU, JAE-DEUK YUN, YOONG-HO JUNG*, TAE-GYEONG KIM,JEONG-WOON LEE, BONG-JUN KIM School of Mechnicl Engineering Pusn Ntionl

More information

9.1 apply the distance and midpoint formulas

9.1 apply the distance and midpoint formulas 9.1 pply the distnce nd midpoint formuls DISTANCE FORMULA MIDPOINT FORMULA To find the midpoint between two points x, y nd x y 1 1,, we Exmple 1: Find the distnce between the two points. Then, find the

More information

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association 9. CISC - Curriculum & Instruction Steering Committee The Winning EQUATION A HIGH QUALITY MATHEMATICS PROFESSIONAL DEVELOPMENT PROGRAM FOR TEACHERS IN GRADES THROUGH ALGEBRA II STRAND: NUMBER SENSE: Rtionl

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Statistical classification of spatial relationships among mathematical symbols

Statistical classification of spatial relationships among mathematical symbols 2009 10th Interntionl Conference on Document Anlysis nd Recognition Sttisticl clssifiction of sptil reltionships mong mthemticl symbols Wl Aly, Seiichi Uchid Deprtment of Intelligent Systems, Kyushu University

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes by disks: volume prt ii 6 6 Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem 6) nd the ccumultion process is to determine so-clled volumes

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

Chapter 2 Sensitivity Analysis: Differential Calculus of Models

Chapter 2 Sensitivity Analysis: Differential Calculus of Models Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls

More information

Scanner Termination. Multi Character Lookahead. to its physical end. Most parsers require an end of file token. Lex and Jlex automatically create an

Scanner Termination. Multi Character Lookahead. to its physical end. Most parsers require an end of file token. Lex and Jlex automatically create an Scnner Termintion A scnner reds input chrcters nd prtitions them into tokens. Wht hppens when the end of the input file is reched? It my be useful to crete n Eof pseudo-chrcter when this occurs. In Jv,

More information

OUTPUT DELIVERY SYSTEM

OUTPUT DELIVERY SYSTEM Differences in ODS formtting for HTML with Proc Print nd Proc Report Lur L. M. Thornton, USDA-ARS, Animl Improvement Progrms Lortory, Beltsville, MD ABSTRACT While Proc Print is terrific tool for dt checking

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

CSE 401 Midterm Exam 11/5/10 Sample Solution

CSE 401 Midterm Exam 11/5/10 Sample Solution Question 1. egulr expressions (20 points) In the Ad Progrmming lnguge n integer constnt contins one or more digits, but it my lso contin embedded underscores. Any underscores must be preceded nd followed

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Fall 2018 Midterm 1 October 11, ˆ You may not ask questions about the exam except for language clarifications.

Fall 2018 Midterm 1 October 11, ˆ You may not ask questions about the exam except for language clarifications. 15-112 Fll 2018 Midterm 1 October 11, 2018 Nme: Andrew ID: Recittion Section: ˆ You my not use ny books, notes, extr pper, or electronic devices during this exm. There should be nothing on your desk or

More information

Scalable Distributed Data Structures: A Survey Λ

Scalable Distributed Data Structures: A Survey Λ Sclble Distributed Dt Structures: A Survey Λ ADRIANO DI PASQUALE University of L Aquil, Itly ENRICO NARDELLI University of L Aquil nd Istituto di Anlisi dei Sistemi ed Informtic, Itly Abstrct This pper

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

Tixeo compared to other videoconferencing solutions

Tixeo compared to other videoconferencing solutions compred to other videoconferencing solutions for V171026EN , unique solution on the video conferencing field Adobe Connect Web RTC Vydio for High security level, privcy Zero impct on network security policies

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-295 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers Wht do ll those bits men now? bits (...) Number Systems nd Arithmetic or Computers go to elementry school instruction R-formt I-formt... integer dt number text chrs... floting point signed unsigned single

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers

What do all those bits mean now? Number Systems and Arithmetic. Introduction to Binary Numbers. Questions About Numbers Wht do ll those bits men now? bits (...) Number Systems nd Arithmetic or Computers go to elementry school instruction R-formt I-formt... integer dt number text chrs... floting point signed unsigned single

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

COMBINATORIAL PATTERN MATCHING

COMBINATORIAL PATTERN MATCHING COMBINATORIAL PATTERN MATCHING Genomic Repets Exmple of repets: ATGGTCTAGGTCCTAGTGGTC Motivtion to find them: Genomic rerrngements re often ssocited with repets Trce evolutionry secrets Mny tumors re chrcterized

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

Introduction to Integration

Introduction to Integration Introduction to Integrtion Definite integrls of piecewise constnt functions A constnt function is function of the form Integrtion is two things t the sme time: A form of summtion. The opposite of differentition.

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI Appliction Note Rel-time nd offline modultion from ETI files Generting nd nlyzing ETI files Rel-time interfce using EDI/ETI IZT DAB CONTENTSERVER

More information

Space-Efficient Data Structures for Top-k Completion

Space-Efficient Data Structures for Top-k Completion Spce-Efficient Dt Structures for Top-k Completion Bo-June (Pul) Hsu Microsoft Reserch One Microsoft Wy, Redmond, WA, 9805 USA pulhsu@microsoft.com Giuseppe Ottvino Diprtimento di Informtic Università di

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

MATH 2530: WORKSHEET 7. x 2 y dz dy dx =

MATH 2530: WORKSHEET 7. x 2 y dz dy dx = MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl

More information

Exam #1 for Computer Simulation Spring 2005

Exam #1 for Computer Simulation Spring 2005 Exm # for Computer Simultion Spring 005 >>> SOLUTION

More information

Allocator Basics. Dynamic Memory Allocation in the Heap (malloc and free) Allocator Goals: malloc/free. Internal Fragmentation

Allocator Basics. Dynamic Memory Allocation in the Heap (malloc and free) Allocator Goals: malloc/free. Internal Fragmentation Alloctor Bsics Dynmic Memory Alloction in the Hep (mlloc nd free) Pges too corse-grined for llocting individul objects. Insted: flexible-sized, word-ligned blocks. Allocted block (4 words) Free block (3

More information