Efficient Implementation of Binary Trees in LISP Systems

Size: px
Start display at page:

Download "Efficient Implementation of Binary Trees in LISP Systems"

Transcription

1 Efficient Implementation of Binary Trees in LISP Systems P. SIPALA Dipartimento di Eleltrotecnica, Eleltronica, Informatica, Universitd di Trieste, Italy In this paper, I consider how to implement the basic data strctre of LISP programming, the binary tree. I show that, for the compact encoding of LISP trees, three-pointer cells are preferable to the conventional two-pointer ones. The reslt is one I reported previosly, bt here the analysis is done more elegantly, sing the methods of probabilistic grammars. I also present a detailed implementation of LISP operators for the case in which mlti-pointer cells are adopted. Received December 986, revised November 987. INTRODUCTION The term 'software science' has been introdced by M. Halstead 7 to denote the statistical stdy of programming practice. This field incldes the empirical analysis of programming habits in the se of langage constrcts 8 and data strctres. 5 In general these stdies have shown that, in the composition of compter programs, there are strong reglarities, both in the lexical and in the strctral aspects of programs, which are broadly analogos to the ' laws' observed by Zipf in the analysis of natral-langage texts. 6 Sch reglarities (for example in the relative freqencies of identifiers and in the nesting of blocks) are of psychological interest, 2 and may also be sefl in software management and software engineering. For the stdy of tree strctres in programming, interesting data may be derived from the statistical measrements performed by Clark 54 on programs written in LISP, a programming langage in which binary trees are the fndamental data strctre. These measrements show that LISP trees occr statistically, in practical se, with a pecliar distribtion, where nbalanced strctres are prevalent. In a previos paper, 3 this observed distribtion of LISP trees was modelled as a branching process; 2 on this basis, it was shown that three-pointer cells are better than the conventional twopointer ones for the compact encoding of LISP data strctres. In this paper, I resme and extend the previos analysis, sing a different statistical model (probabilistic grammars) 5 in order to obtain a simpler treatment. I extend the discssion to cover the case of infinite trees, that is, list strctres containing loops. Moreover, I also examine in detail the implementation of the basic LISP operators for the case in which mltipointer cells are adopted. 2. MULTI-POINTER CELLS FOR LISP TREES Extensive measrements on LISP programs 54 have shown that there exists a marked bias in the freqency distribtion of binary trees, which are the fndamental data strctre in the langage (circlar lists and shared sblists are also allowed in most implementations, bt they occr rarely in practice). 3 Ordinarily, the left and right branches of tree nodes {car and cdr in LISP terminology) are sed for qite different prposes: cdr fields point to lists (that is, to sbtrees) three times as often as they do to terminal nodes (called atoms in LISP); car fields, on the other hand, point to lists less than one-third of the time. Becase LISP nodes are mainly chained together in the cdr direction, it might be convenient, for the compact encoding of LISP binary trees, to replace the conventional binary cells (with two pointers, car and cdr) by means of largerfc-arycells, each containing the k pointers denoted in LISP as car, ca(dfr, for i =,2,...,k-2, and c(rf)*"v. In this arrangement, which may be considered as a generalisation of cdr-coding, a A;-ary cell is a packed representation for a series of k binary cells, chained together in the cdr direction, with all inner links omitted and simply implied by the adjacency of fields, as shown in Fig.. This packed representation (generalised cdrcoding) has been shown by simlation 9 to provide considerable advantages for compaction. cadr caddr car cadr caddr Cell Cell 2 Cell 3 k-3 ca(d) r k-3 ca(d) r Cell k-2 k-2 k-\ ca(d)r c(d) r '*-2 ca(d) r c(d) r Cell Ar- k-ziy cell Figre I. k l binary cells, chained together in the cdr direction, and their representation as a single ft-ary cell. Downloaded from by gest on 3 September THE COMPUTER JOURNAL, VOL. 3, NO. 4, 988

2 EFFICIENT IMPLEMENTATION OF BINARY TREES IN LISP SYSTEMS There is obviosly a compromise to be fond on the size k of the -ary cells to be adopted. Large cells wold save many inner links, bt on the other hand they might often be mostly noccpied. Small cells wold be flly occpied more freqently, bt they wold also se mch more link space. My earlier reslt, 3 which will be proven here in a simpler way, asserts that k 3 is the best choice for typical LISP programs, providing an optimal storage cost abot 2 % lower than that of binary cells. The sections of this paper are organised as follows. I introdce, in Section 3, a model for the statistical distribtion of LISP binary trees. Trees are represented, in a standard way, by means of S-expressions (dotted pairs), which are generated sing a probabilistic context-free grammar. 5 The grammar is characterised by two parameters, p and q, indicating the probability of having an S-expression, instead of an atom, on the left (respectively, on the right) side of a dotted pair. Section 4 considers the case when p + q <, corresponding to the case of a consistent probabilistic grammar. 5 With this assmption, I derive an expression for c(k,p, q)- the expected nmber of pointers reqired to represent a tree - when k-ary cells are adopted. In Section 5 the discssion is extended to the case when p + q >. In this sitation the probabilistic grammar may generate not only finite trees, bt also trees having an infinite nmber of nodes. I deal first with the finite tree poplation, deriving for it an expression for c(k,p,q) similar to the one obtained for p + q < I. Section 6 examines the infinite trees which are seen as nfolded representations of linked strctres containing circlar paths. Section 7 discsses a possible implementation of the basic LISP primitives (car, cdr and cons) in terms of operations on linked fc-ary cells. 3. A PROBABILISTIC GRAMMAR The basic LISP data strctres, binary trees, are sally represented by means of symbolic expressions, called 5- expressions with dot notation. If a binary tree T consists of a terminal node, containing the atom, then the S- expression representing T, S(T), is simply the symbol. If Thas a left sbtree T x and a right sbtree T 2, then S(T) is obtained (recrsively) from 5(7]) and S(7^) by concatenating the two expressions, separated by a dot and enclosed in parentheses. For example, the binary tree shown in Fig. 2 is represented by means of the S- expression ((M.v).((w.(.(.v))).(.(.v)))). The seqel will be concerned mainly with the shape of binary trees and not with the contents (atoms) of their terminal nodes. However, left and right branches issing from nodes behave differently. The S-expressions will therefore se two distinct atomic symbols, and v, which will appear only on the left and only on the right side of dotted pairs, respectively. The S-expressions can be described by the context-free grammar G = (V N, V T,S,P), where V N = {S}, V T = {(,),.,, v} and the set P = {P x, P 2, P 3, P t } of prodctions is P = S-*(«.»); P 2 :S-*(.S); P 3 :S-+(S.v); Denote by p the probability that, in a dotted pair, the left-hand part is an S-expression, while p is the probability that it is an atom (the atom w); let q and q denote the corresponding probabilities for an S-expression and an atom (the atom v) on the right-hand side of dotted pairs. Measrements 5-4 indicate that, for typical LISP programs, p lies in the range , while q has vales in the range Assming that occrrences of atoms or S-expressions on therightand on the left of dotted pairs are independent, the grammar G above becomes a probabilistic grammar, * with probabilities attached to each prodction as follows: p 3 =p(l-q) It is now convenient to introdce the notation and theory for probabilistic grammars. 5 In particlar, denoting by \X\ the nmber of elements in a set X, the matrices Q (with \V N \ rows and P colmns), C (\P\ rows and \V N \ colmns), and T(\P\ rows and \V T \ colmns) are defined as follows. p }, if the yth prodction contains therth nonterminal on its left-hand side; -!, otherwise. C i} = nmber of occrrences of the yth non-terminal in the right-hand side of the /th prodction. T tf = nmber of occrrences of the /th terminal in the right-hand side of therth prodction. In the present case, since V N = {S}, V T = {(,),.,, v} and P is formed by the for prodctions in (), the matrices Q, C and T are () Downloaded from by gest on 3 September 28 Figre 2. The binary tree corresponding to the ^-expression ((II.!>).((«.(«.(«.!>))). («.(«.»)))). c = 2 ' T = THE COMPUTER JOURNAL, VOL. 3, NO. 4,

3 P. SIPALA Notice that, since V N \ =, matrices Q and C have one row and one colmn respectively, that is they are in this case row and colmn vectors, respectively. According to the theory, 5 the matrix A = QC is called the stochastic expectation matrix for the grammar. In general, the element A (j indicates the expected nmber of times the /th non-terminal will occr, when the fth non-terminal is rewritten, sing exactly one prodction. In the present case there is jst one non-terminal S, and A = \\p + q\\. This means that, every time the nonterminal S is rewritten, p + q S"s take its place on the average. A grammar G is called 'consistent' when it generates only strings of a finite length. In this case, to have a 'consistent' grammar, that is, to garantee that, starting with one S, the derivations always terminate, it is clearly necessary to assme that p + q <. The assmption of a 'consistent' grammar will be removed later on in Section 5. According to the theory of probabilistic grammars, 5 the composition of terminal strings is described by the matrix W (terminal expectation matrix), defined as W = (I-A)' Q T (/ is the identity matrix). Here, W=(\-p-q)- -/7 \-q\\. The element W i} of W is the expected nmber of occrrences of the yth terminal in a terminal string derived from therthnon-terminal, as shown in Ref. 5. For example, in the present case the atomic symbol v occrs, on the average, ( q)/(\ p q) times in an S- expression. More information may be obtained by maniplating the matrices Q, C and T, thogh it is not necessary to this argment. 4. REPRESENTATION OF BINARY TREES BY A-ARY CELLS To represent a binary tree by means of A>ary cells, as shown in Fig., consider, within the tree, the seqences of binary cells chained together in the cdr direction. For example, for the tree shown in Fig. 2, look at the three cells seqences formed respectively by the cells {,3,5,7}, {2} and {4,6,8}. The nmber of sch seqences in a tree is clearly eqal to the nmber of v atoms occrring in the S-expression corresponding to the tree; this nmber, as noted in the previos section, has the expected vale To represent the tree by means of k-ary cells, every seqence of cafr-chained binary cells mst be divided into blocks containing k cells each. If the nmber of cells in the seqence is not a mltiple of k, then the first block will contain fewer than k cells. For example, if k = 3, the cell seqences {,3,5,7}, {2} and {4,6,8} of the tree in Fig. 2 mst be divided into blocks of size k \ = 2. The blocks are in this case {,3}, {5,7}, {2}, {4} and {6,8}. If p r is the probability that a cell seqence has length r, then the expected nmber of blocks per seqence is p r \r/{k-\)\ (\x\ denotes the least integer not smaller than x.) The probability that a crfr-chained seqence contains only a single binary cell is q, the probability that it is formed by two binary cells is q{\ q), and so on. In general, p r = ( q)q r ~, becase a seqence of length r contains r list pointers (each occrring with probability q) and one final atom pointer (having probability \ q of occrrence). Therefore the expected nmber of blocks per seqence will be 2 <7 r W-l)lr-l < Becase every block prodces a A>ary cell, containing k pointer fields, and becase there are, on the average ( q)/{\ p q) seqences (or terminal v's) in a tree, it may be conclded that, to represent a binary tree by means of k-ary cells, the reqired nmber of pointer fields is, on the average, c(k,p,q) = \-q It may be easily shown that r-l and therefore c(k,p,q) = k(l-q) This vale indicates the average nmber offields (each containing a pointer or an atom) reqired to represent a binary tree by means of /c-ary cells. It will be convenient in the seqel to se a normalised form of the storage cost c(k,p,q), as a ratio with respect to c(2,p,q), that is, the cost incrred when sing conventional binary cells. Defining c(k,p,q) = c{k,p,q)/c(2,p,q), the previos calclations give k(\ n\ c(k,p,q)= «l l J! (2) It shold be remarked that this reslt has been obtained nder the hypothesis that p + q <, that is, that the probabilistic grammar is 'consistent'. 5. FINITE AND INFINITE TREES Consider now the case p+\ >. This hypothesis, with reference to the probabilistic grammar (), implies that P4 = PI > Pi = ( />) <!) The ineqality means that, in a derivation, it is more likely for the non-terminal 5 to be replaced by two 5"s (prodction P t in ()) than to disappear, generating terminals (prodction Pj). As a conseqence, when p + q >, it is possible, for the probabilistic grammar (), to generate not only S- expressions of finite length, bt also, with a positive probability, infinite ^-expressions, that is infinite binary trees. Moreover, it is clear that the probability of generating finite trees is expressed by the ratio between the probability of sing prodction P and the probability of sing P t. This probability is therefore a = p /p i = (l-p)(\-q)/(pq) <, while -a = (p + q- \)/{pq) is the expected freqency of occrrence of infinite trees. Infinite trees may indeed be interpreted, in LISP, as nfolded representations of circlar list strctres; this will be discssed in the next section. For the present, the sitation for p + q > may be tentatively expressed by means of the following probabilistic grammar (where S generates all trees, F the finite trees and / the infinite ones). Downloaded from by gest on 3 September THE COMPUTER JOURNAL, VOL. 3, NO. 4, 988

4 EFFICIENT IMPLEMENTATION OF BINARY TREES IN LISP SYSTEMS ( («.S); Q, ( ) ; q s pq Q, :/->(«.!>) ; q 7 = Q 9 :I^(S.v) ; q 9 =p(l-q) Q :-* (S.S); q = Pq- -\)/(pq) = (\-p)(\-q) In (3) the prodctions Q and Q 2 express the relative proportions of finite and infinite trees, as discssed above; the prodction sets Q 3 Q s and Q 7 Q, on the other hand, correspond perfectly to those in grammar (), with the exception of Q 7, where q 7 =, becase an infinite tree obviosly cannot terminate. From (3), extract now a sb-grammar for the finite tree poplation, composing the prodctions Q 3 Q e with Q as follows: R :F^(.v) ; r, = q 3 = (l-p)(l-q) R 2 :F- (.F); R 3 :F- (F.v); (F.F); The grammar above is not a 'proper' probabilistic grammar, becase r l + r 2 + r 3 + r i = a = (l-p)(\-q)/(pq)< (a is in fact the overall probability of finite trees). Ignoring for the moment the infinite trees, normalise the grammar above by dividing all probabilities r i by a = ( p)(\ q)/(pq), obtaining in this way qp q(l-p) (\-q)p Comparing grammar (4) with (), they appear to be essentially identical, except for the replacement of p by q (and conseqently of q by p) in the probabilities s t with respect to p t (the initial non-terminal is denoted by F in (4), while in () it is S). It may therefore be conclded that reslt (2), obtained for c(k,p, q) nder the hypothesis p + q <, carries over to the case in which p + q > and only thefinitetrees are taken into accont. The new reslt is obtained from the previos one by a simple replacement, in the formla, of p by q and of q by p. From (2), valid when p + q <, the following expression is derived: holding when p + q > and only finite trees are considered. The two expressions (2) and (5) may be given the nified form c(k,p,q) = 2(i_,*-i)' where (4) ' = min{\-p,q) (6) valid for any vale of/? + q, provided that the contribtion from infinite trees (in the case p + q > ) is ignored. Reslt (6) has been obtained previosly 3 sing a more complicated method, based on the theory of statistical branching processes. 2 Consider valed of the parameters p and q typical of LISP programs, as reported in Refs. 4 and 5, that is, /> =.286, q =.725; then c(k,.286,.725) is minimal for k = 3. Moreover, becase c(3,.286,.725) =.875, the se of three-pointer cells in LISP to represent all (finite) trees may provide a saving of approximately 2% in the storage reqirements with respect to the conventional sage of binary cells. However, the implementation of the basic LISP operators on trees {car, cdr and cons) is somewhat more complex whenfc-arycells are sed than in the binary case. 6. INFINITE TREES IN LISP Considering the vales of p and q typical of LISP programs (p =.286, q =.725), and observing that p + q =. >, it may be conclded that infinite trees may occr in LISP; their freqency, expressed by the probability q 2 = I a = (p + q \)/(pq) in (3), shold be abot./.27, that is abot 5 %. This is in reasonable agreement with the reported data, 3 stating that only a small percentage of the LISP cells are pointed to more than once (those at the head of shared sblists or within cell loops). Infinite trees (in actal practice, circlar list strctres) may arise in LISP in two ways. They may be constrcted by the ser of the langage, by means of field-altering operators, sch as rplaca, rplacd and set} However, in 'pre' LISP, sch operators are not allowed. The only other sorce of circlar strctres in LISP is the constrction, within the system, of'closres' to represent mtally recrsive fnction definitions. 6 These circlar strctres all have a specific shape: they are essentially finite binary trees, except that some of the leaves may have been folded back to point to the root, as shown in Fig. 3. Assme that all infinite trees in LISP have Figre 3. A circlar list strctre in LISP. this particlar strctre (as might be the case for a 'pre' LISP implementation); then it is appropriate to extend to these strctres the previos discssion concerning finite trees. In fact, circlar strctres of this type are nothing else than finite trees, containing, in addition to the terminal symbols and v considered previosly, two other terminal symbols (say ' and v'), indicating a left or right branch folded back towards the root. The general expression (6), therefore, essentially remains the same when taking into accont circlar strctres, that is 'infinite' trees, throgh a simple reformlation of the probabilistic grammar (). 7. IMPLEMENTATION OF LISP OPERATORS ON A-ARY CELLS This section examines the implementation of the basic LISP operators on trees (car, cdr and cons), for the case when trees are represented by linked A>ary cells, of the Downloaded from by gest on 3 September 28 THE COMPUTER JOURNAL, VOL. 3, NO. 4,

5 P. SIPALA type shown in Fig.. Compare Ref. 9 for another implementation, inclding also the field-altering operators rplaca and rplacd, and covering the case of cells of varying size k. A possible approach to the implementation of LISP operators might consist in introdcing selectors and constrctors directly tailored to the A:-ary case. This has been done, for example, in an implementation of LISP, 4 based on the se of both binary (k = 2) and qaternary (k = 4) types of cells. In the latter case, for qaternary cells, the following operators have been introdced: for selectors, car, cbr (= cadr), ccr (= caddr) and cdr (= cdddr), and a constrctor qcons, having k 4 argments. Another possible approach consists in allowing only the conventional LISP operators {car, cdr and cons), which are implemented, however, in terms of k-ary cells. The size k of the cells shold be completely invisible and irrelevant to the programmer. This approach is conceptally otlined in the following program, written for simplicity in Pascal. program kary; const k = 3; {or any other integer > = 2} ' type data = (, v); kind = (list, atom, nll); pkcell = T kcell; fname = record cell: pkcell; index: 2..k field = record case ftype: kind of list: (pointer: fname); atom: (object: data); nll: () kcell = array [..k] of field; The declarations indicate that a k-ary cell (kcell) is an array of k fields; each field may be of one of three different kinds, that is, it may contain a pointer to a list, or it may contain an atom (an object of type data, either the symbol or the symbol v), or,finally,it may be empty (nll). A pointer mst specify, within a k-ary cell, which one of the k \ binary cells packed there it points to. Therefore a pointer shold be of a type (fname) containing both a pointer to the k-ary cell and an index to a position within it. The k \ possible positions are specified by a vale (index) between 2 and k. Procedres car, cdr and cons, implementing the basic LISP operators, may now be declared as follows. procedre car(a:fname; var b:field); {b: = car(a)} begin with a do b: = cell ][index ] procedre cdr(a:fname; var b:field); {b: = cdr(a)} begin with a do if index = k then b: = cew\[k] else begin b.ftype:= list; b.pointer. cell: = cell; b.pointer. index: = index + end The procedre car receives in inpt a pointer and gives as otpt the contents of a field. The field is obtained sing the inpt pointer to get to the relevant A>ary cell and to the relevant position within it, given by index (becase index has been defined to range between 2 and k). The procedre cdr gives as otpt the contents of the link fields between binary cells. These links are actally implied in the k-ary cell representation (see Fig. ), with the exception of the last one (this is the link referred to when index = k). As a conseqence, when index + k, the procedre cdr explicitly constrcts the implied link field and retrns it in otpt. The procedre cons allocates a new binary cell, either within the crrent A>ary cell, if there is room (that is, a nll field) available, or in a new k-ary cell allocated for this prpose. procedre cons(a,b-.field; var c:field); {c:= cons(a,b)} procedre new cell; var d:pkcell; i:..k; begin new(d); d\[k- ]: = a; d][k]: = b; for i:= to k-2 do d][i\. ftype := nll; with c.pointer do begin cell:= d; index: = k end end {allocation of a new k-ary cell}; begin c.ftype: = list; if b.ftype = atom then newcell else with b.pointer do if index = 2 then newcell else if cell\(index -2].ftype =t= nll then newcell else begin cell][index 2]:= a; c.pointer. cell: = cell; c. pointer. index: = index end The procedre cons ses the procedre newcell to allocate a new A>ary cell. In each new cell, all fields are initialised to nll fields, and a pointer is retrned to the rightmost position in the cell. Thefieldsin a k-ary cell are sed by cons, starting from the rightmost one and progressing towards the left. The operator cons constrcts a new binary cell with a car pointer to a and a cdr pointer to b, where a and b are the operands. If there is empty room (that is a nll field) in the A>ary cell, immediately to the left of the b operand, then it is sed for the constrction. If this is not the case a new A>ary cell is allocated, and the constrction is performed within it. To illstrate the sage of the basic operator declarations jst given, consider the following example. procedre printot(a '.field); var /:field; {prints ot the S-expression denoting a tree} begin with a do if ftype = atom then if object = then write(' ') else write(' v') else if ftype = list then begin write('('); car(pointer, t); printot(i); write('.'); cdr(pointer, t); printot(t); write(')') end procedre example; var i, vi, r, s: field; {constrcts the tree of Figre 2 and prints it} begin i.ftype:= atom; i.object:= ; vi.ftype: = atom; vi. object := v; cons(i,vi,r); cons(i,r,r); cons(i,r,r); cons(i,vi,s); cons(i,s,s); cons(r,s,r); cons(i,vi,s); cons(s,r,r) ; printot(r) begin {main program} example end. The program above, when rn, will constrct the data strctre shown in Fig. 4. The tree strctre is explicitly indicated in the procedre example, sing the standard Downloaded from by gest on 3 September THE COMPUTER JOURNAL, VOL. 3, NO. 4, 988

6 EFFICIENT IMPLEMENTATION OF BINARY TREES JN LISP SYSTEMS binary constrctor cons of LISP. However, as an effect of the constant declaration (const k = 3) in the heading of the program, a ternary cell representation is generated internally. It shold be noticed that some of thefieldsin the ternary cells ths constrcted are empty. The representation in Fig. 4 ses altogether 5 fields to based on k-ary cells with different vales of k, are generated, changing the declaration of the constant k. In all cases the procedre printot will print the same S- expression denoting the trees, that is ((.v).((«. (.(.v))).(.(.v)))). The internal representation of the S-expression is irrelevant to the programmer, if only the procedres car, cdr and cons are sed, with no reference to the declarations in the program heading. V Figre 4. Representation of the binary tree in Fig. 2 by means of ternary cells. represent the given S-expression. If we change the constant declaration in the program to const k = 2, then the binary cell strctre of Fig. 2 is prodced internally; this strctre ses 6fields.Corresponding strctres, REFERENCES. J. R. Allen, Anatomy of Lisp. McGraw-Hill, New York (978). 2. K. B. Athreya and P. E. Ney, Branching Processes. Springer, Berlin (972). 3. D. W. Clark, A note on shared list strctre in Lisp. Inf. Process. Lett. 7 (), (978). 4. D. W. Clark, Measrements of dynamic list strctre se in Lisp. IEEE Trans. Software Eng. 5 (), 5-59 (979). 5. D. W. Clark and C. G. Green, An empirical stdy of list strctres in Lisp. Comm. ACM 2 (2), (977). 6. D. P. Friedman and D. S. Wise, Reference conting can manage the circlar environments of mtal recrsion. Inf. Process. Lett. 8 (), 4-45 (979). 7. M. H. Halstead, Elements of Software Science. Elsevier North-Holland, New York (977). 8. D. E. Knth, An empirical stdy of Fortran programs. Softw. Pract. Exper. (2), 5-33 (97). 9. K. Li and P. Hdak, A new list compaction method. Softw. Pract. Exper. 6 (2), (986). V V 8. CONCLUSIONS On the basis of a statistical model for the distribtion of LISP binary trees, sing a probabilistic grammar, ternary cells have been shown to provide a better storage economy than conventional binary ones, both for finite trees and for circlar strctres. The new derivation of this known reslt 3 is a straightforward application of probabilistic grammars. The methods employed can be sed to stdy other programming langage implementation problems; in particlar, they can provide gidance when qestions of optimal implementation strategies arise. Here a detailed implementation has been presented of the basic LISP operators on trees {car, cdr and cons) for the general case of ^-pointer cells.. J. McCarthy, P. W. Abrahams, D. J. Edwards, T. P. Hart and M. I. Levin, Lisp.5 Programmer's Manal. M.I.T. Press, Cambridge, Mass. (965).. R. Sethi, Circlar expressions: elimination of static environments. Science ofcomp. Progr. (3), (982). 2. B. A. Sheil, The psychological stdy of programming. Comp. Srv. 3 (), -2 (98). 3. P. Sipala, Compact storage of binary trees. ACM Trans. Program. Lang. Syst. 4 (3), (982). 4. I. Takechi and H. Okno, A list processor LIPQ. Rev. Electr. Comm. Lab. (Japan) 26 (5-6), (978). 5. C. S. Wetherell, Probabilistic langages. Comp. Srv. 2 (4), (98). 6. G. K. Zipf, Hman Behavior and the Principle of Least Effort. An Introdction to Hman Ecology. Hafner, New York (949). Downloaded from by gest on 3 September 28 THE COMPUTER JOURNAL, VOL. 3, NO. 4,

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

Review Multicycle: What is Happening. Controlling The Multicycle Design

Review Multicycle: What is Happening. Controlling The Multicycle Design Review lticycle: What is Happening Reslt Zero Op SrcA SrcB Registers Reg Address emory em Data Sign etend Shift left Sorce A B Ot [-6] [5-] [-6] [5-] [5-] Instrction emory IR RegDst emtoreg IorD em em

More information

Data/Metadata Data and Data Transformations

Data/Metadata Data and Data Transformations A Framework for Classifying Scientic Metadata Helena Galhardas, Eric Simon and Anthony Tomasic INRIA Domaine de Volcea - Rocqencort 7853 Le Chesnay France email: First-Name.Last-Name@inria.fr Abstract

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Optimization and Translation of Tableau-Proofs. Abstract: Dierent kinds of logical calculi have dierent advantages and disadvantages.

Optimization and Translation of Tableau-Proofs. Abstract: Dierent kinds of logical calculi have dierent advantages and disadvantages. J. Inform. Process. Cybernet. EIK?? (199?), (formerly: Elektron. Inform.verarb. Kybernet.) Optimization and Translation of Tablea-Proofs into Resoltion By Andreas Wolf, Berlin Abstract: Dierent kinds of

More information

A GENERIC MODEL OF A BASE-ISOLATED BUILDING

A GENERIC MODEL OF A BASE-ISOLATED BUILDING Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Functions of Combinational Logic

Functions of Combinational Logic CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

CAPL Scripting Quickstart

CAPL Scripting Quickstart CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

Nash Convergence of Gradient Dynamics in General-Sum Games. Michael Kearns.

Nash Convergence of Gradient Dynamics in General-Sum Games. Michael Kearns. Convergence of Gradient Dynamics in General-Sm Games Satinder Singh AT&T Labs Florham Park, NJ 7932 bavejaresearch.att.com Michael Kearns AT&T Labs Florham Park, NJ 7932 mkearnsresearch.att.com Yishay

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

A personalized search using a semantic distance measure in a graph-based ranking model

A personalized search using a semantic distance measure in a graph-based ranking model Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

Chapter 6: Pipelining

Chapter 6: Pipelining CSE 322 COPUTER ARCHITECTURE II Chapter 6: Pipelining Chapter 6: Pipelining Febrary 10, 2000 1 Clothes Washing CSE 322 COPUTER ARCHITECTURE II The Assembly Line Accmlate dirty clothes in hamper Place in

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

Lecture 10. Diffraction. incident

Lecture 10. Diffraction. incident 1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

QoS-driven Runtime Adaptation of Service Oriented Architectures

QoS-driven Runtime Adaptation of Service Oriented Architectures Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

arxiv: v1 [cs.cg] 27 Nov 2015

arxiv: v1 [cs.cg] 27 Nov 2015 On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca

More information

The multicycle datapath. Lecture 10 (Wed 10/15/2008) Finite-state machine for the control unit. Implementing the FSM

The multicycle datapath. Lecture 10 (Wed 10/15/2008) Finite-state machine for the control unit. Implementing the FSM Lectre (Wed /5/28) Lab # Hardware De Fri Oct 7 HW #2 IPS programming, de Wed Oct 22 idterm Fri Oct 2 IorD The mlticycle path SrcA Today s objectives: icroprogramming Etending the mlti-cycle path lti-cycle

More information

Submodule construction for systems of I/O automata*

Submodule construction for systems of I/O automata* Sbmodle constrction for systems of I/O atomata* J. Drissi 1, G. v. Bochmann 2 1 Dept. d'iro, Université de Montréal, CP. 6128, Scc. Centre-Ville, Montréal, H3C 3J7, Canada, Phone: (514) 343-6161, Fax:

More information

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela

More information

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

Topological Drawings of Complete Bipartite Graphs

Topological Drawings of Complete Bipartite Graphs Topological Drawings of Complete Bipartite Graphs Jean Cardinal Stefan Felsner y Febrary 017 Abstract Topological drawings are natral representations of graphs in the plane, where vertices are represented

More information

An Introduction to GPU Computing. Aaron Coutino MFCF

An Introduction to GPU Computing. Aaron Coutino MFCF An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

Hardware Design Tips. Outline

Hardware Design Tips. Outline Hardware Design Tips EE 36 University of Hawaii EE 36 Fall 23 University of Hawaii Otline Verilog: some sbleties Simlators Test Benching Implementing the IPS Actally a simplified 6 bit version EE 36 Fall

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1 .3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline

More information

MPC for Humanoid Gait Generation: Stability and Feasibility

MPC for Humanoid Gait Generation: Stability and Feasibility MPC for Hmanoid Gait Generation: Stability and Feasibility Nicola Scianca, Daniele De Simone, Leonardo Lanari, Giseppe Oriolo arxiv:191.855v1 [cs.ro] 24 Jan 219 Abstract We present a novel MPC framework

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

Evaluating GLR parsing algorithms

Evaluating GLR parsing algorithms cience of Compter Programming 61 (2006) 228 244 www.elsevier.com/locate/scico Evalating GLR parsing algorithms Adrian Johnstone, Elizabeth cott, Giorgios Economopolos Department of Compter cience, Royal

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

Enhanced Performance with Pipelining

Enhanced Performance with Pipelining Chapter 6 Enhanced Performance with Pipelining Note: The slides being presented represent a mi. Some are created by ark Franklin, Washington University in St. Lois, Dept. of CSE. any are taken from the

More information

Compression by induction of hierarchical grammars

Compression by induction of hierarchical grammars Working Paper Series ISSN 11 70-487X Compression by indction of hierarchical grammars by Craig G. Nevill-Manning, Ian H. Witten & David L. Malsby Working Paper 93/9 October, 1993 1993 by Craig G. Nevill-Manning,

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

NETWORKED CONTROL SYSTEM: THEORY AND SIMULATIONS. A Project by. Sandeep Bimali

NETWORKED CONTROL SYSTEM: THEORY AND SIMULATIONS. A Project by. Sandeep Bimali NETWORKED CONTROL SYSTEM: THEORY AND SIMULATIONS A Project by Sandeep Bimali Bacelor s Degree in Electronics Engineering, Tribvani University, Nepal December 21 Sbmitted to te Department of Electrical

More information

Dr Paolo Guagliardo. Fall 2018

Dr Paolo Guagliardo. Fall 2018 The NULL vale Dr Paolo Gagliardo dbs-lectrer@ed.ac.k Fall 2018 NULL: all-prpose marker to represent incomplete information Main sorce of problems and inconsistencies... this topic cannot be described in

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Picking and Curves Week 6

Picking and Curves Week 6 CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

EEC 483 Computer Organization

EEC 483 Computer Organization EEC 483 Compter Organization Chapter 4.4 A Simple Implementation Scheme Chans Y The Big Pictre The Five Classic Components of a Compter Processor Control emory Inpt path Otpt path & Control 2 path and

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

Local Run Manager Generate FASTQ Analysis Module

Local Run Manager Generate FASTQ Analysis Module Local Rn Manager Generate FASTQ Analysis Modle Workflow Gide For Research Use Only. Not for se in diagnostic procedres. Overview 3 Set Parameters 3 Analysis Methods 5 View Analysis Reslts 5 Analysis Report

More information

MTL 776: Graph Algorithms. B S Panda MZ 194

MTL 776: Graph Algorithms. B S Panda MZ 194 MTL 776: Graph Algorithms B S Panda MZ 194 bspanda@maths.iitd.ac.in bspanda1@gmail.com Lectre-1: Plan Definitions Types Terminology Sb-graphs Special types of Graphs Representations Graph Isomorphism Definitions

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Review. A single-cycle MIPS processor

Review. A single-cycle MIPS processor Review If three instrctions have opcodes, 7 and 5 are they all of the same type? If we were to add an instrction to IPS of the form OD $t, $t2, $t3, which performs $t = $t2 OD $t3, what wold be its opcode?

More information

Graceful Labeling for Double Step Grid Graph

Graceful Labeling for Double Step Grid Graph International Jornal of Mathematics And its Applications Volme 3, Isse 1 (015), 33 38. ISSN: 347-1557 International Jornal 347-1557 of Mathematics Applications And its ISSN: Gracefl Labeling for Doble

More information

EXAMINATIONS 2003 END-YEAR COMP 203. Computer Organisation

EXAMINATIONS 2003 END-YEAR COMP 203. Computer Organisation EXAINATIONS 2003 COP203 END-YEAR Compter Organisation Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. There are 180 possible marks on the eam. Calclators and foreign langage dictionaries

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

arxiv: v3 [math.co] 7 Sep 2018

arxiv: v3 [math.co] 7 Sep 2018 Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 12: Deadlock Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Deadlock the deadly embrace! Synchronization

More information

New Architectures for Hierarchical Predictive Control

New Architectures for Hierarchical Predictive Control Preprint, 11th IFAC Symposim on Dynamics and Control of Process Systems, inclding Biosystems Jne 6-8, 216. NTNU, Trondheim, Norway New Architectres for Hierarchical Predictive Control Victor M. Zavala

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 153 Design of Operating Systems Spring 18 Lectre 26: Dynamic Memory (2) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Some slides modified from originals

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Review: Computer Organization

Review: Computer Organization Review: Compter Organization Pipelining Chans Y Landry Eample Landry Eample Ann, Brian, Cathy, Dave each have one load of clothes to wash, dry, and fold Washer takes 3 mintes A B C D Dryer takes 3 mintes

More information

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra

More information

Triangle-Free Planar Graphs as Segments Intersection Graphs

Triangle-Free Planar Graphs as Segments Intersection Graphs Triangle-ree Planar Graphs as Segments Intersection Graphs N. de Castro 1,.J.Cobos 1, J.C. Dana 1,A.Márqez 1, and M. Noy 2 1 Departamento de Matemática Aplicada I Universidad de Sevilla, Spain {natalia,cobos,dana,almar}@cica.es

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

On total regularity of the join of two interval valued fuzzy graphs

On total regularity of the join of two interval valued fuzzy graphs International Jornal of Scientific and Research Pblications, Volme 6, Isse 12, December 2016 45 On total reglarity of the join of two interval valed fzzy graphs Soriar Sebastian 1 and Ann Mary Philip 2

More information

More eamples with half half(0) handle Zero => 1000; > val it = 1000 : int half(1) handle Zero => 1000; > ncaght eception Odd half(0) handle Zero => 10

More eamples with half half(0) handle Zero => 1000; > val it = 1000 : int half(1) handle Zero => 1000; > ncaght eception Odd half(0) handle Zero => 10 Lectre 4 0 More eamples with half half(0) handle Zero => 1000; > val it = 1000 : int half(1) handle Zero => 1000; > ncaght eception Odd half(0) handle Zero => 1000 Odd => 1001; > val it = 1000 : int half(3)

More information

Uncertainty Determination for Dimensional Measurements with Computed Tomography

Uncertainty Determination for Dimensional Measurements with Computed Tomography Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 11: Semaphores Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Worked throgh software implementation

More information

CS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu.

CS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu. CS224W Final Report Cyprien de Lichy, Renke Pan, Zheng W 1 Introdction December 9, 2015 Recommender systems are information filtering systems that provide sers with personalized sggestions for prodcts

More information