15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes

Size: px
Start display at page:

Download "15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes"

Transcription

1 15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written part: before lecture, Programming part: 11:59 pm) 1 Written: (25 points) Te written portion of tis week s omework will give you some practice reasoning about variants of binary searc trees. You can eiter type up your solutions or write tem neatly by and, and you sould submit your work in class on te due date just before lecture begins. Please remember to staple your written omework before submission. 1.1 Heaps and BSTs Exercise 1 (3 pts). Draw a tree tat matces eac of te following descriptions. (a) Draw a eap tat is not a BST. (b) Draw a BST tat is not a eap. (c) Draw a non-empty BST tat is also a eap. 1.2 Binary Searc Trees Refer to te binary searc tree code posted on te course website for Lecture 17. Exercise 2 (4 pts). Te eigt of a binary searc tree (or any binary tree for tat matter) is te number of levels it as. (An empty binary tree as eigt 0.) (a) Write a function bst eigt tat returns te eigt of a binary searc tree. You will need a wrapper function wit te following type: 1

2 int bst_eigt(bst B); Tis function sould not be recursive, but it will require a elper function tat will be recursive. See te BST code for examples of wrapper functions and recursive elper functions. (b) Wy is recursion preferred over iteration for tis problem? Exercise 3 (5 pts). In tis exercise you will re-implement bst searc in an iterative fasion. a) Complete te bst searc function below tat uses iteration instead of recursion. elem bst_searc(bst B, key k) //@requires is_bst(b); //@ensures \result == NULL compare(k, elem_key(\result)) == 0; { tree T = B->root; } wile ( ) { if ( ) T = T->left; else T = T->rigt; } if (T == NULL) return NULL; return T->data; b) Using your loop condition, prove tat te ensures clause of bst searc must old wen it returns. 1.3 AVL Trees Exercise 4 (3 pts). Draw te AVL tree tat results after successively inserting te following keys (in te order sown) into an initially empty tree, maintaining and restoring te invariants of a BST and te additional balance invariant required for an AVL tree after every insert Your answer sould sow te tree after eac key is successfully inserted. Also be sure to label eac node wit its balance factor, wic is defined as te eigt of te rigt subtree minus te eigt of te left subtree. 2

3 x x x y y y +1 A B C A +1 B C A B C (a) (b) (c) Figure 1: Te tree ways a tree can violate te AVL balance invariant at te root. Exercise 5 (10 pts). During lecture 17, we sowed briefly ow binary tree rotations could be used to restore AVL invariants after an insertion. We can easily see tat it can take at most O(log n) time to restore te balance invariant, since te invariant can only be broken along te pat from te insertion point to te root, wic can be at longest O(log n) nodes, and rotations take constant time. But in fact, for AVL trees, te balance invariant can be restored in just one (single or double) rotation! 1 In tis exercise we will go troug several steps to prove tat we only need to perform at most one rotation following an insertion into an AVL tree. Te basic idea is to sow tat any rotation of an unbalanced tree created from an insertion of a new element into a balanced AVL tree must reduce te eigt of te rotated tree. After a single insert into an AVL tree, te tree may be sligtly unbalanced: its left and rigt cildren may differ in eigt by 2 instead of 1 or 0. Witout loss of generality, we assume tat te eigt of te left cild is 2 greater tan tat of te rigt cild. Figure 1 depicts all of te ways tis can be te case. (a) Sow ow to restore te balance invariant for te case in Figure 1(a) using a single rotation. Sow also tat te resulting tree is sorter tan te original tree. (b) Sow ow to restore te balance invariant for te cases engendered by Figure 1(b) (all depicted in Figure 2) using a double rotation. Sow also tat in every case, te resulting tree is sorter tan te original tree. (c) Sow ow to restore te balance invariant for te case in Figure 1(c) using a single rotation. But sow tat in tis case, te resulting tree is not sorter tan te original tree. (d) Explain wy case 1(c) cannot arise as te result of a single insertion (witout rebalancing) into a balanced AVL tree. 1 It takes O(log n) time to find te place in te tree to insert te new element, so te insert operation is still O(log n) overall, but fewer rotations mean a smaller constant factor of overead, wic is an important practical consideration. 3

4 x x x y y y A z B 2-1 B 1 C A -1 z B 1 B 2 C A z B 1 B 2 C (a) (b) (c) Figure 2: Te tree ways a tree can violate te AVL balance invariant at te root via an inner cild subtree. (e) Given tat all te invariant-restoring rotations tat can actually arise reduce te eigt of te tree, argue tat after rotation, te parent of te rotated tree cannot be unbalanced. (Hint: Tink about ow te eigt of te subtree as canged between te insertion and te rotation.) 4

5 2 Programming: Huffman Coding (25 points) For te programming portion of tis week s omework, you ll write a C 0 implementation of a popular compression tecnique called Huffman coding. In addition, you will be asked to generate a suite of examples using ideas from testing metodologies presented in lecture 19. You sould submit your code electronically by 11:59 pm on te due date. Detailed submission instructions can be found below. Starter code. Download te file w6-starter.zip from te course website. It contains some code for reading frequency tables (freqtable.c0), described below, as well as some sample inputs. Compiling and running. For tis omework, you will use te standard cc0 command wit command line options. Don t forget to include te -d switc if you d like to enable dynamic annotation cecking. Write all non-testing code in te file uffman.c0. For details on ow we will compile your code, see te file COMPILING.txt included in te starter code. Warning: You will lose credit if your code does not compile. Submitting. te command Once you ve completed some files, you can submit tem by running andin -a w6 <file1>.c0... <filen>.c0 You can submit files as many times as you like and in any order. Wen we grade your assignment, we will consider te most recent version of eac file submitted before te due date. If you get any errors wile trying to submit your code, you sould contact te course staff immediately. Annotations. Be sure to include appropriate //@requires, //@ensures, //@assert, and //@loop invariant annotations in your program. You sould write tese as you are writing te code rater tan after you re done: documenting your code as you go along will elp you reason about wat it sould be doing, and tus elp you write code tat is bot clearer and more correct. Annotations are part of your score for te programming problems; you will not receive maximum credit if your annotations are weak or missing. Style. Strive to write code wit good style: indent every line of a block to te same level, use descriptive variable names, keep lines to 80 caracters or fewer, document your code wit comments, etc. We will read your code wen we grade it, and good style is sure to earn our good graces. Feel free to ask on te course bboard (academic.cs ) if you re unsure of wat constitutes good style. 5

6 Caracter Code c 000 e 001 f 010 m 011 o 100 r 101 Figure 3: A custom fixed-lengt encoding for te non-witespace caracters in te string "more free coffee". 2.1 Data Compression Primer Wenever we represent data in a computer, we ave to coose some sort of encoding wit wic to represent it. Wen representing strings in C 0, for instance, we use ASCII codes to represent te individual caracters. Under te ASCII encoding, eac caracter is represented using 7 bits, so a string of lengt n requires 7n bits of storage, wic we usually round up to 8n bits or n bytes. Oter encodings are possible as well, toug. Te UNICODE standard defines a variety of caracter encodings wit a variety of different properties. Te simplest, UTF-32, uses 32 bits per caracter. Sometimes wen we wis to store a large quantity of data, or to transmit a large quantity of data over a slow network link, it may be advantageous to seek a specialized encoding tat requires less space to represent our data by taking advantage of redundancies inerent in it. For example, consider te string "more free coffee"; ignoring spaces, it can be represented in ASCII as follows wit 14 7 = 98 bits: Tis encoding of te string is rater wasteful, toug. In fact, since tere are only 6 distinct caracters in te string, we sould be able to represent it using a custom encoding tat uses only lg 6 = 3 bits to encode eac caracter. If we were to use te custom encoding sown in Figure 3, te string would be represented wit only 14 3 = 42 bits: In bot cases, we may of course omit te separator between codes; tey are included only for readability. If we confine ourselves to representing eac caracter using te same number of bits, i.e., a fixed-lengt encoding, ten tis is te best we can do. But if we allow 6

7 Caracter Code e 0 o 100 m 1010 c 1011 r 110 f 111 Figure 4: A custom variable-lengt encoding for te non-witespace caracters in te string "more free coffee". ourselves a variable-lengt encoding, ten we can take advantage of special properties of te data: for instance, in te sample string, te caracter e occurs very frequently wile te caracters c and m occur very infrequently, so it would be wortwile to use a smaller bit pattern to encode te caracter e even at te expense of aving to use longer bit patterns to encode c and m. Te encoding sown in Figure 4 employs suc a strategy, and using it, te sample string can be represented wit only 34 bits: Since tis encoding is prefix-free no code word is a prefix of any oter code word te separators are redundant ere, too. It can be proven tat tis encoding is optimal for tis particular string: no oter encoding can represent te string using fewer tan 34 bits. Moreover, te encoding is optimal for any string tat as te same distribution of caracters as te sample string. In tis assignment, you will implement a metod for constructing suc optimal encodings due to David Huffman. 2.2 Huffman Coding A Brief History Huffman coding is an algoritm for constructing optimal encodings given a frequency distribution over caracters. It was developed in 1951 by David Huffman wen e was a P.D student at MIT taking a course on information teory taugt by Robert Fano. It was towards te end of te semester, and Fano ad given is students a coice: tey could eiter take a final exam to demonstrate mastery of te material, or tey could write a term paper on someting pertinent to information teory. Fano suggested a number of possible topics, one of wic was efficient binary encodings: wile Fano imself ad worked on te subject wit is colleague Claude Sannon, it was not known at te time ow to efficiently construct optimal encodings. 7

8 Figure 5: Te custom encoding from Figure 3 as a binary tree. Huffman struggled for some time to make eadway on te problem and was about to give up and start studying for te final wen e it upon a key insigt and invented te algoritm tat bears is name, tus outdoing is professor, making istory, and attaining an A for te course. Today, Huffman coding enjoys a variety of applications: it is used as part of te DEFLATE algoritm for producing ZIP files and as part of several multimedia codecs like JPEG and MP Huffman Trees Recall tat an encoding is prefix-free if no code word is a prefix of any oter code word. Prefix-free encodings can be represented as binary trees wit caracters stored at te leaves: a branc to te left represents a 0 bit, a branc to te rigt represents a 1 bit, and te pat from te root to a leaf gives te code word for te caracter stored at tat leaf. For example, te encodings from Figures 3 and 4 are represented by te binary trees in Figures 5 and 6, respectively. Recall tat te variable-lengt encoding represented by te tree in Figure 6 is an optimal encoding. Te tree representation reflects te optimality in te following property: frequently-occuring caracters ave sort pats to te root. We can see tis property clearly if we label eac subtree wit te total frequency of te caracters occurring at its leaves, as sown in Figure 7. A frequency-annotated tree is called a Huffman tree. Huffman trees ave a recursive structure: a Huffman tree is eiter a leaf containing a caracter and its frequency, or an interior node containing te combined frequency of two cild Huffman trees. Since only te leaves contain caracter data, we draw tem as rectangles to distinguis tem from te interior nodes, wic we draw as circles. We represent bot kinds of Huffman tree nodes in C 0 using a struct tree: 8

9 Figure 6: Te custom encoding from Figure 4 as a binary tree. Figure 7: Te custom encoding from Figure 4 as a binary tree annotated wit frequencies, i.e., a Huffman tree. 9

10 typedef struct tree* tree; struct tree { car caracter; int frequency; tree left; tree rigt; }; // \0 except at leaves Te caracter field of an tree sould consist of a NUL caracter \0 everywere except at te leaves of te tree, and every interior node sould ave exactly two cildren. Tese criteria give rise to te following recursive definitions: An tree is a valid tree if it is non-null, its frequency is strictly positive, and it is eiter a valid tree leaf or a valid tree interior node. An tree is a valid tree leaf if its caracter is not \0 and its left and rigt cildren are NULL. An tree is a valid tree interior node if its caracter is \0, its left and rigt cildren are valid trees, and its frequency is te sum of te frequency of its cildren. Task 1 (6 pts). Write a specification function bool is tree(tree H) tat returns true if H is a valid tree and false oterwise Finding Optimal Encodings Huffman s key insigt was to use te frequencies of caracters to build an optimal encoding tree from te bottom up. Given a set of caracters and teir associated frequencies, we can build an optimal Huffman tree as follows: 1. Construct leaf Huffman trees for eac caracter/frequency pair. 2. Repeatedly coose two minimum-frequency Huffman trees and join tem togeter into a new Huffman tree wose frequency is te sum of teir frequencies. 3. Wen only one Huffman tree remains, it is an optimal encoding. Tis is an example of a greedy algoritm since it makes locally optimal coices tat neverteless yield a globally optimal result at te end of te day. Selection of a minimum-frequency tree in step 2 can be accomplised using a priority queue based on a eap. A sample run of te algoritm is sown in Figure 8. (Implementation Note: wen joining two Huffman trees put te tree removed from te priority queue first as te left cild of te new Huffman tree). 10

11 Figure 8: Building an optimal encoding using Huffman s algoritm. 11

12 Task 2 (8 pts). Write a function tree build tree(car[] cars, int[] freqs, int n) tat constructs an optimal encoding for an n-caracter alpabet using Huffman s algoritm. Te cars array contains te caracters of te alpabet and te freqs array teir frequencies, were cars[i] occurs wit frequency freqs[i]. Use te code in te included eaps.c0 as your implementation of priority queues. To test your implementation, you may use te code in freqtable.c0, wic reads a caracter frequency table from a file in te following format: <caracter 1> <frequency 1> <caracter 2> <frequency 2> Decoding Bitstrings Huffman trees are a data structure well-suited to te task of decoding encoded data. Given an encoded bitstring and te Huffman tree tat was used to encode it, decode te bitstring as follows: 1. Initialize a pointer to te root of te Huffman tree. 2. Repeatedly read bits from te bitstring and update te pointer: wen you read a 0 bit, follow te left branc, and wen you read a 1 bit, follow te rigt branc. 3. Wenever you reac a leaf, output te caracter at tat leaf and reset te pointer to te root of te Huffman tree. If te bitstring was properly encoded, ten wen all of te bits are exausted, te pointer sould once again point to te root of te Huffman tree. If tis is not te case, ten te decoding fails for te given inputs. As an example, we can use te encoding from Figure 7 to decode te following message: r o o m f o r c r e m e Room for creme? Bitstrings can be represented in C 0 as ordinary strings composed only of caracters 0 and 1. typedef string bitstring; bool is_bitstring(bitstring s) { int len = string_lengt(s); int i; for (i = 0; i < len; i++) { car c = string_carat(s, i); 12

13 } if (!(c == 0 c == 1 )) return false; } return true; You will implement tis algoritm in a function string decode(tree encoding, bitstring bits) tat decodes bits based on te encoding. Te function sould return te decoded string if te bitstring can be decoded and sould signal an error oterwise. But first, recall te metodology of black box testing via equivalence classes, in wic we attempt to reduce te number of test cases by dividing all te possible inputs to te function into equivalence classes on wic te function sould beave in te same way and ten testing only one input from eac class. Before you implement te decode function, you will use tis metodology to implement a suite of examples to test your implementation. Task 3 (5 pts). For tis task, write a series of tests tat you will use to be confident tat your implementation of decode is correct based on your reading of te spec. Following black box testing metodology, write tests tat are representative of a large class of inputs and tink about te different kind of results you expect from different inputs. For eac test you will submit a test file and potentially some input files. Eac individual test sould be given a unique number used in te naming conventions below. Tere sould be two primary components of eac test: Inputs: Te main portion of eac test is a well cosen set of inputs tat represents te beavior of te function on a large class of possible inputs. You sould eiter ard-code tese inputs into te testing function (see below) or store tem in files tat you submit along wit your tests. If you coose to place te inputs in files, put te specification of te Huffman Tree and te bitstring in different files. Name tem using te convention: input#-<inputtype>.txt were # is te test number and <inputtype> is FT for te frequency table and BS for te bitstring (For example, te bitstring input file for your second test sould be named input2-bs.txt). Main function: You sould write a main function tat runs te test on your inputs. Te main function sould do tree tings: 1. Test Description: Before doing anyting else, you sould print a sort description of te test to te screen including te class of inputs it is testing and te expected result. 2. Build/Import Inputs: Next you sould build or read in te inputs to decode for tis test. If you import te inputs from files, read in te bitstring wit 13

14 te read words function defined in te readfile.c0 file and import te frequency table used to build your Huffman Tree using te read freqtable function defined in te file freqtable.c0. Call tese functions wit te bare file name (For example, load te bitstring for your second test by calling read words("input2-bs.txt")). 3. Call decode: Call decode on your inputs. 4. Verify Results: If te test sould result in an error, tere will be no output to test. Oterwise compare te output to te output you expect for te test and return 0 if te test succeeded and 1 if it did not (recall tat 0 is te return value of coice wen a function succeeds). You sould name te file containing te main function for te test using te following format: test#-<expectedoutput>.c0 were # is te test number and <expectedoutput> is F if te function sould end in an assertion or annotation failure or S if te function sould succeed (return 0). (For example, if your second test sould succeed, you would name te file test2-s.c0) Submit all test and input files. We will be looking for a set of tests tat ceck all different possible outputs of te decode function witout duplicate tests for inputs in te same equivalence class. A few ints to get you started: You sould be writing a relatively small number of tests. Your examples don t ave to be long or even form complete sentences, but tey sould test te functionality explained in te spec. As a start, you migt consider using te provided example above. Task 4 (6 pts). Write a function string decode(tree encoding, bitstring bits) tat decodes bits based on te encoding. Use any functions from te string library to build te result string. Use te tests you developed to ceck your program. Add additional tests if you notice new classes of inputs tat were not tested by your original suite. 14

15-122: Principles of Imperative Computation, Spring 2013

15-122: Principles of Imperative Computation, Spring 2013 15-122 Homework 6 Page 1 of 13 15-122: Principles of Imperative Computation, Spring 2013 Homework 6 Programming: Huffmanlab Due: Thursday, April 4, 2013 by 23:59 For the programming portion of this week

More information

CS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33

CS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33 CS 234 Module 6 October 16, 2018 CS 234 Module 6 ADT Dictionary 1 / 33 Idea for an ADT Te ADT Dictionary stores pairs (key, element), were keys are distinct and elements can be any data. Notes: Tis is

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance

More information

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?

More information

each node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree.

each node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree. Data Structures CSC212 1 AVL Trees A binary tree is a eigt-balanced-p-tree if for eac node in te tree, te difference in eigt of its two subtrees is at te most p. AVL tree is a BST tat is eigt-balanced-tree.

More information

Data Structures and Programming Spring 2014, Midterm Exam.

Data Structures and Programming Spring 2014, Midterm Exam. Data Structures and Programming Spring 2014, Midterm Exam. 1. (10 pts) Order te following functions 2.2 n, log(n 10 ), 2 2012, 25n log(n), 1.1 n, 2n 5.5, 4 log(n), 2 10, n 1.02, 5n 5, 76n, 8n 5 + 5n 2

More information

When a BST becomes badly unbalanced, the search behavior can degenerate to that of a sorted linked list, O(N).

When a BST becomes badly unbalanced, the search behavior can degenerate to that of a sorted linked list, O(N). Balanced Binary Trees Binary searc trees provide O(log N) searc times provided tat te nodes are distributed in a reasonably balanced manner. Unfortunately, tat is not always te case and performing a sequence

More information

Wrap up Amortized Analysis; AVL Trees. Riley Porter Winter CSE373: Data Structures & Algorithms

Wrap up Amortized Analysis; AVL Trees. Riley Porter Winter CSE373: Data Structures & Algorithms CSE 373: Data Structures & Wrap up Amortized Analysis; AVL Trees Riley Porter Course Logistics Symposium offered by CSE department today HW2 released, Big- O, Heaps (lecture slides ave pseudocode tat will

More information

AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic

AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic 1 AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic AVL Trees 2 Binary Searc Trees better tan linear dictionaries; owever, te worst case performance

More information

CSE 332: Data Structures & Parallelism Lecture 8: AVL Trees. Ruth Anderson Winter 2019

CSE 332: Data Structures & Parallelism Lecture 8: AVL Trees. Ruth Anderson Winter 2019 CSE 2: Data Structures & Parallelism Lecture 8: AVL Trees Rut Anderson Winter 29 Today Dictionaries AVL Trees /25/29 2 Te AVL Balance Condition: Left and rigt subtrees of every node ave eigts differing

More information

CS 234. Module 6. October 25, CS 234 Module 6 ADT Dictionary 1 / 22

CS 234. Module 6. October 25, CS 234 Module 6 ADT Dictionary 1 / 22 CS 234 Module 6 October 25, 2016 CS 234 Module 6 ADT Dictionary 1 / 22 Case study Problem: Find a way to store student records for a course, wit unique IDs for eac student, were records can be accessed,

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

1 Copyright 2012 by Pearson Education, Inc. All Rights Reserved.

1 Copyright 2012 by Pearson Education, Inc. All Rights Reserved. CHAPTER 20 AVL Trees Objectives To know wat an AVL tree is ( 20.1). To understand ow to rebalance a tree using te LL rotation, LR rotation, RR rotation, and RL rotation ( 20.2). To know ow to design te

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

Lecture 7. Binary Search Trees / AVL Trees

Lecture 7. Binary Search Trees / AVL Trees Lecture 7. Binary Searc Trees / AVL Trees T. H. Cormen, C. E. Leiserson and R. L. Rivest Introduction to Algoritms, 3rd Edition, MIT Press, 2009 Sungkyunkwan University Hyunseung Coo coo@skku.edu Copyrigt

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Binary Search Tree - Best Time. AVL Trees. Binary Search Tree - Worst Time. Balanced and unbalanced BST

Binary Search Tree - Best Time. AVL Trees. Binary Search Tree - Worst Time. Balanced and unbalanced BST AL Trees CSE Data Structures Unit Reading: Section 4.4 Binary Searc Tree - Best Time All BST operations are O(d), were d is tree dept minimum d is d = log for a binary tree N wit N nodes at is te best

More information

Design Patterns for Data Structures. Chapter 10. Balanced Trees

Design Patterns for Data Structures. Chapter 10. Balanced Trees Capter 10 Balanced Trees Capter 10 Four eigt-balanced trees: Red-Black binary tree Faster tan AVL for insertion and removal Adelsen-Velskii Landis (AVL) binary tree Faster tan red-black for lookup B-tree

More information

Design Patterns for Data Structures. Chapter 10. Balanced Trees

Design Patterns for Data Structures. Chapter 10. Balanced Trees Capter 10 Balanced Trees Capter 10 Four eigt-balanced trees: Red-Black binary tree Faster tan AVL for insertion and removal Adelsen-Velskii Landis (AVL) binary tree Faster tan red-black for lookup B-tree

More information

19.2 Surface Area of Prisms and Cylinders

19.2 Surface Area of Prisms and Cylinders Name Class Date 19 Surface Area of Prisms and Cylinders Essential Question: How can you find te surface area of a prism or cylinder? Resource Locker Explore Developing a Surface Area Formula Surface area

More information

TREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II

TREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II UNIT -II TREES General Binary Trees Te Searc Tree DT Binary Searc Trees VL Trees Treaded trees Splay Trees B-Trees. 2MRKS Q& 1. Define Tree tree is a data structure, wic represents ierarcical relationsip

More information

Announcements SORTING. Prelim 1. Announcements. A3 Comments 9/26/17. This semester s event is on Saturday, November 4 Apply to be a teacher!

Announcements SORTING. Prelim 1. Announcements. A3 Comments 9/26/17. This semester s event is on Saturday, November 4 Apply to be a teacher! Announcements 2 "Organizing is wat you do efore you do someting, so tat wen you do it, it is not all mixed up." ~ A. A. Milne SORTING Lecture 11 CS2110 Fall 2017 is a program wit a teac anyting, learn

More information

CSCE476/876 Spring Homework 5

CSCE476/876 Spring Homework 5 CSCE476/876 Spring 2016 Assigned on: Friday, Marc 11, 2016 Due: Monday, Marc 28, 2016 Homework 5 Programming assignment sould be submitted wit andin Te report can eiter be submitted wit andin as a PDF,

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Advanced Tree. Structures. AVL Tree. Outline. AVL Tree Recall, Binary Search Tree (BST) is a special case of. Splay Tree (Ch 13.2.

Advanced Tree. Structures. AVL Tree. Outline. AVL Tree Recall, Binary Search Tree (BST) is a special case of. Splay Tree (Ch 13.2. ttp://1...0/csd/ Data tructure Capter 1 Advanced Tree tructures Dr. atrick Can cool of Computer cience and Engineering out Cina Universit of Tecnolog AVL Tree Recall, Binar earc Tree (BT) is a special

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

MAC-CPTM Situations Project

MAC-CPTM Situations Project raft o not use witout permission -P ituations Project ituation 20: rea of Plane Figures Prompt teacer in a geometry class introduces formulas for te areas of parallelograms, trapezoids, and romi. e removes

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

CS211 Spring 2004 Lecture 06 Loops and their invariants. Software engineering reason for using loop invariants

CS211 Spring 2004 Lecture 06 Loops and their invariants. Software engineering reason for using loop invariants CS211 Spring 2004 Lecture 06 Loops and teir invariants Reading material: Tese notes. Weiss: Noting on invariants. ProgramLive: Capter 7 and 8 O! Tou ast damnale iteration and art, indeed, ale to corrupt

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

Fault Localization Using Tarantula

Fault Localization Using Tarantula Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all

More information

THANK YOU FOR YOUR PURCHASE!

THANK YOU FOR YOUR PURCHASE! THANK YOU FOR YOUR PURCHASE! Te resources included in tis purcase were designed and created by me. I ope tat you find tis resource elpful in your classroom. Please feel free to contact me wit any questions

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

PLK-B SERIES Technical Manual (USA Version) CLICK HERE FOR CONTENTS

PLK-B SERIES Technical Manual (USA Version) CLICK HERE FOR CONTENTS PLK-B SERIES Technical Manual (USA Version) CLICK ERE FOR CONTENTS CONTROL BOX PANEL MOST COMMONLY USED FUNCTIONS INITIAL READING OF SYSTEM SOFTWARE/PAGES 1-2 RE-INSTALLATION OF TE SYSTEM SOFTWARE/PAGES

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

1.4 RATIONAL EXPRESSIONS

1.4 RATIONAL EXPRESSIONS 6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions

More information

SORTING 9/26/18. Prelim 1. Prelim 1. Why Sorting? InsertionSort. Some Sorting Algorithms. Tonight!!!! Two Sessions:

SORTING 9/26/18. Prelim 1. Prelim 1. Why Sorting? InsertionSort. Some Sorting Algorithms. Tonight!!!! Two Sessions: Prelim 1 2 "Organizing is wat you do efore you do someting, so tat wen you do it, it is not all mixed up." ~ A. A. Milne SORTING Tonigt!!!! Two Sessions: You sould now y now wat room to tae te final. Jenna

More information

12.2 Investigate Surface Area

12.2 Investigate Surface Area Investigating g Geometry ACTIVITY Use before Lesson 12.2 12.2 Investigate Surface Area MATERIALS grap paper scissors tape Q U E S T I O N How can you find te surface area of a polyedron? A net is a pattern

More information

NOTES: A quick overview of 2-D geometry

NOTES: A quick overview of 2-D geometry NOTES: A quick overview of 2-D geometry Wat is 2-D geometry? Also called plane geometry, it s te geometry tat deals wit two dimensional sapes flat tings tat ave lengt and widt, suc as a piece of paper.

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

CHAPTER 7: TRANSCENDENTAL FUNCTIONS

CHAPTER 7: TRANSCENDENTAL FUNCTIONS 7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of

More information

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector.

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Adam Clinc Lesson: Deriving te Derivative Grade Level: 12 t grade, Calculus I class Materials: Witeboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Goals/Objectives:

More information

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental

More information

Notes: Dimensional Analysis / Conversions

Notes: Dimensional Analysis / Conversions Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?

More information

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin.

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin. 1 G.SRT.1-Some Tings To Know Dilations affect te size of te pre-image. Te pre-image will enlarge or reduce by te ratio given by te scale factor. A dilation wit a scale factor of 1> x >1enlarges it. A dilation

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR 13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

You must print this PDF and write your answers neatly by hand. You should hand in the assignment before recitation begins.

You must print this PDF and write your answers neatly by hand. You should hand in the assignment before recitation begins. 15-122 Homework 5 Page 1 of 15 15-122 : Principles of Imperative Computation, Summer 1 2014 Written Homework 5 Due: Thursday, June 19 before recitation Name: Andrew ID: Recitation: Binary search trees,

More information

HW 2 Bench Table. Hash Indexes: Chap. 11. Table Bench is in tablespace setq. Loading table bench. Then a bulk load

HW 2 Bench Table. Hash Indexes: Chap. 11. Table Bench is in tablespace setq. Loading table bench. Then a bulk load Has Indexes: Cap. CS64 Lecture 6 HW Benc Table Table of M rows, Columns of different cardinalities CREATE TABLE BENCH ( KSEQ integer primary key, K5K integer not null, K5K integer not null, KK integer

More information

All truths are easy to understand once they are discovered; the point is to discover them. Galileo

All truths are easy to understand once they are discovered; the point is to discover them. Galileo Section 7. olume All truts are easy to understand once tey are discovered; te point is to discover tem. Galileo Te main topic of tis section is volume. You will specifically look at ow to find te volume

More information

: Principles of Imperative Computation. Fall Assignment 5: Interfaces, Backtracking Search, Hash Tables

: Principles of Imperative Computation. Fall Assignment 5: Interfaces, Backtracking Search, Hash Tables 15-122 Assignment 3 Page 1 of 12 15-122 : Principles of Imperative Computation Fall 2012 Assignment 5: Interfaces, Backtracking Search, Hash Tables (Programming Part) Due: Monday, October 29, 2012 by 23:59

More information

Areas of Triangles and Parallelograms. Bases of a parallelogram. Height of a parallelogram THEOREM 11.3: AREA OF A TRIANGLE. a and its corresponding.

Areas of Triangles and Parallelograms. Bases of a parallelogram. Height of a parallelogram THEOREM 11.3: AREA OF A TRIANGLE. a and its corresponding. 11.1 Areas of Triangles and Parallelograms Goal p Find areas of triangles and parallelograms. Your Notes VOCABULARY Bases of a parallelogram Heigt of a parallelogram POSTULATE 4: AREA OF A SQUARE POSTULATE

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

z = x 2 xy + y 2 clf // c6.1(2)contour Change to make a contour plot of z=xy.

z = x 2 xy + y 2 clf // c6.1(2)contour Change to make a contour plot of z=xy. 190 Lecture 6 3D equations formatting Open Lecture 6. See Capter 3, 10 of text for details. Draw a contour grap and a 3D grap of z = 1 x 2 y 2 = an upper emispere. For Classwork 1 and 2, you will grap

More information

Communicator for Mac Quick Start Guide

Communicator for Mac Quick Start Guide Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main

More information

Limits and Continuity

Limits and Continuity CHAPTER Limits and Continuit. Rates of Cange and Limits. Limits Involving Infinit.3 Continuit.4 Rates of Cange and Tangent Lines An Economic Injur Level (EIL) is a measurement of te fewest number of insect

More information

6 Computing Derivatives the Quick and Easy Way

6 Computing Derivatives the Quick and Easy Way Jay Daigle Occiental College Mat 4: Calculus Experience 6 Computing Derivatives te Quick an Easy Way In te previous section we talke about wat te erivative is, an we compute several examples, an ten we

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

Areas of Parallelograms and Triangles. To find the area of parallelograms and triangles

Areas of Parallelograms and Triangles. To find the area of parallelograms and triangles 10-1 reas of Parallelograms and Triangles ommon ore State Standards G-MG..1 Use geometric sapes, teir measures, and teir properties to descrie ojects. G-GPE..7 Use coordinates to compute perimeters of

More information

Classify solids. Find volumes of prisms and cylinders.

Classify solids. Find volumes of prisms and cylinders. 11.4 Volumes of Prisms and Cylinders Essential Question How can you find te volume of a prism or cylinder tat is not a rigt prism or rigt cylinder? Recall tat te volume V of a rigt prism or a rigt cylinder

More information

MAPI Computer Vision

MAPI Computer Vision MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -

More information

Efficient Content-Based Indexing of Large Image Databases

Efficient Content-Based Indexing of Large Image Databases Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

When the dimensions of a solid increase by a factor of k, how does the surface area change? How does the volume change?

When the dimensions of a solid increase by a factor of k, how does the surface area change? How does the volume change? 8.4 Surface Areas and Volumes of Similar Solids Wen te dimensions of a solid increase by a factor of k, ow does te surface area cange? How does te volume cange? 1 ACTIVITY: Comparing Surface Areas and

More information

8/6/2010 Assignment Previewer

8/6/2010 Assignment Previewer Week 4 Friday Homework (1321979) Question 1234567891011121314151617181920 1. Question DetailsSCalcET6 2.7.003. [1287988] Consider te parabola y 7x - x 2. (a) Find te slope of te tangent line to te parabola

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

Lecture Notes on Binary Search Trees

Lecture Notes on Binary Search Trees Lecture Notes on Binary Search Trees 15-122: Principles of Imperative Computation Tom Cortina Lecture 15 October 14, 2010 1 Introduction In the previous two lectures we have seen how to exploit the structure

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

: Principles of Imperative Computation. Summer Assignment 4. Due: Monday, June 11, 2012 in class

: Principles of Imperative Computation. Summer Assignment 4. Due: Monday, June 11, 2012 in class 15-122 Assignment 4 Page 1 of 8 15-122 : Principles of Imperative Computation Summer 1 2012 Assignment 4 (Theory Part) Due: Monday, June 11, 2012 in class Name: Andrew ID: Recitation: The written portion

More information

Section 1.2 The Slope of a Tangent

Section 1.2 The Slope of a Tangent Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt

More information

Algebra Area of Triangles

Algebra Area of Triangles LESSON 0.3 Algera Area of Triangles FOCUS COHERENCE RIGOR LESSON AT A GLANCE F C R Focus: Common Core State Standards Learning Ojective 6.G.A. Find te area of rigt triangles, oter triangles, special quadrilaterals,

More information

Midterm II Exam Principles of Imperative Computation Frank Pfenning. March 31, 2011

Midterm II Exam Principles of Imperative Computation Frank Pfenning. March 31, 2011 Midterm II Exam 15-122 Principles of Imperative Computation Frank Pfenning March 31, 2011 Name: Sample Solution Andrew ID: fp Section: Instructions This exam is closed-book with one sheet of notes permitted.

More information

You must include this cover sheet. Either type up the assignment using theory4.tex, or print out this PDF.

You must include this cover sheet. Either type up the assignment using theory4.tex, or print out this PDF. 15-122 Assignment 4 Page 1 of 12 15-122 : Principles of Imperative Computation Fall 2012 Assignment 4 (Theory Part) Due: Thursday, October 18, 2012 at the beginning of lecture Name: Andrew ID: Recitation:

More information

An Application of Minimum Description Length Clustering to Partitioning Learning Curves

An Application of Minimum Description Length Clustering to Partitioning Learning Curves An Application of Minimum Description Lengt Clustering to Partitioning Learning Curves Daniel J Navarro Department of Psycology University of Adelaide, SA 00, Australia Email: danielnavarro@adelaideeduau

More information

Section 3. Imaging With A Thin Lens

Section 3. Imaging With A Thin Lens Section 3 Imaging Wit A Tin Lens 3- at Ininity An object at ininity produces a set o collimated set o rays entering te optical system. Consider te rays rom a inite object located on te axis. Wen te object

More information

What s the Difference?

What s the Difference? 1 Wat s te Difference? A Functional Pearl on Subtracting Bijections BRENT A. YORGEY, Hendrix College, USA KENNETH FONER, University of Pennsylvania, USA It is a straigtforward exercise to write a program

More information

Lecture Notes on Binary Search Trees

Lecture Notes on Binary Search Trees Lecture Notes on Binary Search Trees 15-122: Principles of Imperative Computation Frank Pfenning Lecture 17 1 Introduction In the previous two lectures we have seen how to exploit the structure of binary

More information

Measuring Length 11and Area

Measuring Length 11and Area Measuring Lengt 11and Area 11.1 Areas of Triangles and Parallelograms 11.2 Areas of Trapezoids, Romuses, and Kites 11.3 Perimeter and Area of Similar Figures 11.4 Circumference and Arc Lengt 11.5 Areas

More information

2.5 Evaluating Limits Algebraically

2.5 Evaluating Limits Algebraically SECTION.5 Evaluating Limits Algebraically 3.5 Evaluating Limits Algebraically Preinary Questions. Wic of te following is indeterminate at x? x C x ; x x C ; x x C 3 ; x C x C 3 At x, x isofteform 0 xc3

More information

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION MP MOSICKING WITH DISSIMILR PROJECTIONS, SPTIL RESOLUTIONS, DT TYPES ND NUMBER OF BNDS Tyler J. lumbaug and Peter Bajcsy National Center for Supercomputing pplications 605 East Springfield venue, Campaign,

More information

( )( ) ( ) MTH 95 Practice Test 1 Key = 1+ x = f x. g. ( ) ( ) The only zero of f is 7 2. The only solution to g( x ) = 4 is 2.

( )( ) ( ) MTH 95 Practice Test 1 Key = 1+ x = f x. g. ( ) ( ) The only zero of f is 7 2. The only solution to g( x ) = 4 is 2. Mr. Simonds MTH 95 Class MTH 95 Practice Test 1 Key 1. a. g ( ) ( ) + 4( ) 4 1 c. f ( x) 7 7 7 x 14 e. + 7 + + 4 f g 1+ g. f 4 + 4 7 + 1+ i. g ( 4) ( 4) + 4( 4) k. g( x) x 16 + 16 0 x 4 + 4 4 0 x 4x+ 4

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

AVL Trees. CSE260, Computer Science B: Honors Stony Brook University

AVL Trees. CSE260, Computer Science B: Honors Stony Brook University AVL Trees CSE260, Computer Science B: Honors Stony Brook University ttp://www.cs.stonybrook.edu/~cse260 1 Objectives To know wat an AVL tree is To understand ow to rebalance a tree using te LL rotation,

More information

Cubic smoothing spline

Cubic smoothing spline Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable

More information

University of Illinois at Urbana-Champaign Department of Computer Science. Second Examination

University of Illinois at Urbana-Champaign Department of Computer Science. Second Examination University of Illinois at Urbana-Champaign Department of Computer Science Second Examination CS 225 Data Structures and Software Principles Spring 2014 7-10p, Tuesday, April 8 Name: NetID: Lab Section

More information

11. Transceiver Link Debugging Using the System Console

11. Transceiver Link Debugging Using the System Console November 2011 QII53029-11.1.0 11. Transceiver Link Debugging Using te System Console QII53029-11.1.0 Tis capter describes ow to use te Transceiver Toolkit in te Quartus II sotware. Te Transceiver Toolkit

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

Midterm 2 Exam Principles of Imperative Computation. Tuesday 31 st March, This exam is closed-book with one sheet of notes permitted.

Midterm 2 Exam Principles of Imperative Computation. Tuesday 31 st March, This exam is closed-book with one sheet of notes permitted. Midterm 2 Exam 15-122 Principles of Imperative Computation Tuesday 31 st March, 2015 Name: Andrew ID: Recitation Section: Instructions This exam is closed-book with one sheet of notes permitted. You have

More information