A Formalism for Functionality Preserving System Level Transformations

Size: px
Start display at page:

Download "A Formalism for Functionality Preserving System Level Transformations"

Transcription

1 A Formlism for Functionlity Preserving System Level Trnsformtions Smr Abdi Dniel Gjski Center for Embedded Computer Systems UC Irvine Center for Embedded Computer Systems UC Irvine Irvine, CA Irvine, CA Tel: Tel: Fx: Fx: e-mil: e-mil Abstrct With the rise in complexity of modern systems, designers re spending significnt time on modeling t the system level of bstrction. This pper introduces Model Algebr, formlism built on top of system level design lnguges, tht cn be used for implementing functionlity preserving trnsformtions on system level models. Such trnsformtions enble us to implement high level design decisions without hving to write new models for ech design decision. Moreover, since these trnsformtions preserve functionlity, the trnsformed models do not need to be re-verified. We present the definition of Model Algebr nd show how system level models cn be represented s expressions in this formlism. The lws of Model Algebr re use to define correct model trnsformtions. We show system level design scenrio, where design decisions grdully refine the functionl model of the system to n rchitecturl model with components nd communiction structure. The refinement cn be performed using the correct model trnsformtions in our formlism. I. Introduction Due to the complexity of modern systems, designers hve to describe them t high level of bstrction using system level design lnguges (SLDLs).However, independently written models in SLDLs hve little correltion between them which mkes it intrctble to compre them for equivlence. A possible solution is to derive the detiled system level models from the specifiction by series of functionlity preserving trnsformtions. The specifiction is cptured using n executble model, which is purely functionl description of the design. As design decisions re mde during system synthesis, the designer refines the functionl specifiction model to more detiled model representing the trget rchitecture. Such design methodology requires formlisms to represent the system level models nd notions for their correctness refinement. In this pper, we introduce Model Algebr (MA), which is one such formlism. Significnt reserch hs been done in the pst for developing modeling formlisms for system level design. Process lgebrs, such s CSP [4] nd CCS [8] hve been used for verifying distributed softwre, but hve limittions in modeling. For exmple, CSP llows only rendezvous communiction between prllel processes. StteChrts [3] provide for hierrchy, synchroniztion nd exceptions, but hve uncler execution semntics, which hve led to severl vrints. Colored Petri Nets re widely used for nlysis nd modeling of concurrent systems, nd verifiction techniques hve been developed to check for their equivlence [5]. Forml methods, developed for hrdwre verifiction, hve been pplied to embedded systems like bounded model checking [2] nd theorem proving [9]. The problem with most stte bsed pproches, s bove, is tht their complexity increses exponentilly with design size. Our gol is to correctly derive detiled system level models, so tht we cn leve the functionl verifiction tsk for only the specifiction model. Correct by construction techniques hve been widely pplied t RT Level to prove the correctness of high level synthesis steps [9] [1]. A complete methodology for correct digitl design hs been proposed in [7], but they only consider synchronous models which re insufficient t system level. The rest of the pper is orgnized s follows. Section II gives the definition of MA. In Section III we demonstrte how to represent hierrchicl system level models in MA. In Section IV we present the forml execution semntics nd notions for functionl equivlence of models in MA. Section V presents functionlity preserving trnsformtions on models nd in Section VI we show how these trnsformtions my enble useful refinements during system level design. II. Model Algebr The objects of MA cn be defined s the tuple < B, C, I, V >, where B is the set of behviors C is the set of chnnels I is the behvior interfce V is the set of vribles We lso define subset B I of B representing the set of identity behviors. Identity behviors re those behviors tht, upon execution, produce n output tht is identicl to their input. We define the subset Q to be the set of ll

2 boolen functions on V. A. Ports Ech behvior hs n ssocited object clled its interfce. The interfce crries the dt ports of the behvior. In the cse of hierrchicl behvior, the ports re identified by ssocition of vrible to the interfce. Hence, to sub-behviors of hierrchicl behvior, the port is seen s I < p >, where p V. The port is treted like ny other locl vrible except tht we llow only one kind of i/o opertion on it. Locl behviors cn either write to port, in which cse it is known s the out-port, or they my red from the port, in which cse it is clled the inport. When the sme port p is ccessed from outside the behvior, it is identified by its ssocition to the behvior. For exmple, in our cse, port p of behvior b would be written s b < p >, s seen by externl behviors. B. Addressing Behviors executing concurrently use synchronized dt trnsctions mongst themselves for communiction. Chnnels serve s the medi for such trnsctions. Ech trnsction uses n ddress to identify the sender nd the receiver behviors. The trnsctions cn, thus, be visulized to tke plce over virtul links, tht re lbeled by distinct ddresses. Ech of the links is ssocited with chnnel. Hence, such link my be identified s c < >, where the link uses chnnel c nd hs the ddress. Two trnsctions on chnnel cnnot shre link if they might tke plce simultneously. In other words, ll trnsctions on single link must be totlly ordered in time. C. Composition Rules Composition rules on the bove objects re defined s reltions in MA. Ech composition cretes term in MA. 1. Control flow: A control flow composition (R c )determines the execution order of behviors during model simultion. We write the reltion s q : b 1 &b 2 &...&b n b, where i, 1 i nb, b i B I, q Q. The composition rule implies tht b executes fter ll the behviors b 1 through b n, clled predecessors in the reltion, hve completed nd q evlutes to TRUE. R c is sid to led to b under the condition q, implying tht b must wit for ll predecessors. 2. Non-blocking write: This composition rule (R nw ) is used to indicte tht behvior writes to vrible or n out-port of its prent behvior. In the cse of write to dt vrible, we use the expression b < p > v, where b < p > is the out-port of the writing behvior nd v indictes the memory into which the dt is written. In its other mnifesttion, this composition rule cn be used to crete port connection, written s b < p > I < p >, In this cse, the composition rule indictes n out-port-mp. 3. Non-blocking red: This composition rule (R nr ) is used to indicte tht behvior reds dt from vrible or through n in-port of its prent behvior. In the cse of red from dt vrible, we use the expression v b < p >, where b < p > is the in-port of the reding behvior nd v indictes the memory from which the dt is red. In its other mnifesttion, this composition rule cn be used to crete port connection, written s I < p > b < p >, In this cse, the composition rule indictes n in-port-mp. 4. Chnnel trnsction: This composition rule (R t ) indictes dt trnsfer link from the sender behvior to one or more receiver behvior(s) over chnnel. The semntics of the composition rule ensure rendezvous communiction mechnism. We write this reltion s c < >: b < p > b 1 < p 1 > &b 2 < p 2 >...&b n < p n >, where b < p > is the outport of the sending behvior nd b 1 < p 1 > through b n < p n > re the in-ports of the receiving behviors. The trnsction tkes plce over chnnel c nd uses the link ddressed by c < >. Also, ny two trnsctions over the sme chnnel re mutully exclusive in time. 5. Blocking write: This composition rule (R bw ) is used to indicte the port connection for the sender prt of trnsction. The sender behvior writes to the out-port of its prent behvior through one of its own out-ports. We represent blocking write by the expression b < p > I < p >, where b < p > is the out-port of the writing behvior nd I < p > is n out-port on the prent of b. 6. Blocking red: This composition rule (R br ) is used to indicte the port connection for the receiver prt of trnsction link. The receiving behvior(s) red(s) from the in-port of their prent behvior through one of their own in-ports. We represent blocking red by the expression < >: I < p > b 1 < p 1 > &b 2 < p 2 >...&b n < p n >, where b 1 < p 1 > through b n < p n > re the in-port(s) of the receiving behvior(s) nd I < p > is n in-port on the prent of b. The ddress of the virtul link (< >) will be used for binding this port. 7. Grouping: This composition rule (R g )is used to indicte collection of compositions. Essentilly, grouping is used to crete hierrchy of behviors, by collecting the vrious compositions of sub-behviors, locl chnnels nd locl vribles. This commuttive reltion is written s r 1.r 2...r n, where i, 1 i n nd r i {R c, R nw, R nr, R t, R bw, R br, R g }. III. Model Construction with MA In this section, we look t how to construct hierrchicl system models s expressions in MA. A given hierrchicl behvior b hs unique virtul strting point(vsp)

3 nd the virtul terminting point(vtp). The VSP is the identity behvior vsp b tht is the first to execute inside b. Other sub-behviors of b re executed fter vsp b, depending on outgoing control reltions from vsp b. Due to its nture, VSP behvior would only hve outgoing control edges to other sub-behviors of b. Similrly, the identity behvior vtp b is the lst behvior to execute inside b. In other words, the completion of b is indicted by the execution of vtp b. Due to its nture, the VTP behvior will only hve incoming edges from other sub-behviors of b. bpr vsp b pr b 1 b 2 b 1 vtp b pr () bfsm q' 1 vsp b fsm q 1 b 2 q' 2 vtp b fsm (b) Fig. 1. ()Prllel nd (b)fsm style compositions of behviors A. Prllel nd Conditionl Execution Most SLDLs provide for specil lnguge constructs to crete different types of behviorl hierrchies. The common ones re prllel composition nd fsm-style composition. A sequentil composition is simply degenerte form of the fsm-composition. In MA, we cn relize both these types of composition by using control reltions. Figure 1() shows prllel composition of behviors b 1 nd b 2. A typicl SLDL my llow construction of prllel composition using sttement like pr {run b 1 ; run b 2 }. Let the resulting behvior be clled b pr. The execution of b pr indictes tht both b 1 nd b 2 re redy to execute. The execution of b pr completes when both b 1 nd b 2 hve completed. In the corresponding MA expression, vsp bpr nd vtp bpr serve s the strting nd terminting points, respectively, of the hierrchicl behvior b pr. We cn see, tht inside b pr, b 1 nd b 2 re llowed to strt simultneously. This is ensured by the control reltions vsp bpr b 1.vsp bpr b 2 Hence, the prllelism is relized by orthogonlity of the execution of behviors b 1 nd b 2. The control reltion t the end (b 1 &b 2 vtp bpr ) ensures tht both b 1 nd b 2 must complete their execution before vtp bpr executes. The execution of vtp bpr indictes the completion of the hierrchicl behvior b pr. A typicl FSM style composition of behviors is shown in Figure 1(b). The control flow between behviors is typiclly expressed using switch-cse or goto constructs in SLDLs. A simple pseudo code exmple for hierrchicl behvior b fsm is s follows l1: run b 1 ; if q 1 == 1 goto l2 else brek; q 2 l2: run b 2 ; if q 2 == 1 goto l1 else brek; The control reltions of b fsm cn be written s follows vsp bfsm b 1.q 1 : b 1 b 2.q 1 : b 1 vtp bfsm. q 2 : b 2 b 1.q 2 : b 2 vtp bfsm bhier v2 out b p2 b 1 p1 b 2 in Fig. 2. Using ports for non-blocking dt flow B. Vrible Access vi Ports In MA, s in most SLDLs, vrible is directly visible only to the behviors tht re t the sme level of hierrchy s the vrible itself. Therefore, in order to ccess vribles t higher levels of hierrchy, dt ports re used. As shown in Figure 2, behvior b 1 reds vrible v 1 present in b hier vi the port in of its prent b. Hence, to relized this port connection, we use the non-blocking reltion v 1 b < in >. At the level of b, we crete port connection from the interfce of b to b 1 using the term I < in > b 1 < p 1 >. The dul of red port connection is the write port connection s shown by the ccess of vrible v 2 from behvior b 2 in figure 2. In this cse, the port out of b is used to relize the vrible ccess. The term t the level of b hier is b < out > v 2, while the term t the level of b is b 2 < p 2 > I < out >. b 1 b' 1 p1' p1 c Fig. 3. Blocking dt flow bound to chnnel C. Chnnel Access vi Ports v1 p2 b 2 p2' b' 2 As in the cse of non-blocking reds nd write, MA provides mechnism for blocking reds nd writes vi ports. For instnce, in Figure 3, we see chnnel trnsction from b 1 to b 2 over c. After zooming into the hierrchy of b 1 nd b 2, we see tht the trnsction is tking plce from b 1 to b 2. The port p 1 of b 1 mkes the chnnel c visible to b 1. Therefore, using the reltion < >: b 1 < p 1 > I < p 1 > behvior b 1 cn ccess chnnel c. However, this requires p 1 to be bound to the virtul link ddressed by. Similrly, on the other side, sub-behvior b 2 inside b 2, uses the blocking reltion < >: I < p 2 > b 2 < p 2 > to ccess the red method of c vi port p 2. In this cse, port p 2 mkes the chnnel c visible to b 2. As before, p 2 must be bound to the virtul link ddressed by.

4 b hier vspb hier 1 b1 p11 p12 p1 b1_queue b 1 b1_'_queue b1_qn'_queue ' p2 ' p22 b2 1 vtp bhier p21 v qm qn' b k Fig. 5. The firing semntics of BCG nodes bk_qn_queue Fig. 4. A hierrchicl behvior with locl objects nd reltions D. Internl nd Interfce Terms Figure 4 shows hierrchicl behvior b hier. The expression for the hierrchicl behvior is written using compositions involving locl objects nd the interfce. The grouping of reltions between locl objects will be referred to s the internl terms of hierrchicl behvior. Similrly, the grouping of reltions involving the interfce will be referred to s the interfce terms of the hierrchicl behvior. We cn write the hierrchicl behvior s grouping of ll its internl nd interfce terms, long with the internl terms of its sub-behviors. The grouping of internl terms for given behvior b is represented s [b]. Thus, we cn write [b hier ] = [vsp bhier ].[b 1 ].[b 2 ].[vtp bhier ].vsp bhier b 1. q 1 : b 1 b 2.q 1 : b 1 vtp bhier.b 2 vtp bhier. b 1 < p 12 > v.v b 2 < p 21 > The interfce terms of b hier is represented by b hier. From figure 4, we cn see tht b hier =< >: I < p 1 > b 1 < p 11 >. b 2 < p 22 > I < p 2 > Finlly, we write the hierrchicl behvior s grouping of its internl nd interfce terms. Therefore, we get b hier = ([b hier ]. b hier ) IV. Execution Semntics nd Equivlence Before we ttempt to estblish equivlence notions for models expressed in MA, we must clerly define the execution semntics of such models. The control dependencies in the model re cptured using the Behvior Control Grph (BCG), which is similr to the populr computtion model of Khn process network (KPN) [6]. The chnnels in the model re bstrcted wy nd replced by corresponding control dependencies, resulting from their rendezvous semntics. A. Behvior Control Grph The BCG is directed grph (N,E) with two types of nodes, nmely behvior nodes(n B ) nd control nodes(n Q ). The behvior nodes, s the nme suggests, indicte behvior execution, while the control nodes evlute control conditions tht led to further behvior executions. Directed edges re llowed from behvior nodes to control nodes nd vice vers. Also, control node cn hve one, nd only one, out going edge. The execution of behvior node, nd similrly, evlution in control node, will be referred to s firing. Node firings re fcilitted by tokens tht circulte in the queues of the BCG s shown in Figure 5. Ech behvior node (shown by rounded edged box) in the BCG hs one queue, for instnce b1 queue for behvior node b 1. All incoming edges to behvior node represent the vrious writers to the queue. A behvior node blocks on n empty queue nd fires if there is t lest one token in its queue. Upon firing, one token is dequeued from the node s queue. The control node (shown by circulr node), on the other hnd, hs s mny queues s the number of incoming edges. For instnce q n hs k queues, one ech for edges from b 1 through b k. A control node, sequentilly checks ll its queues nd blocks on empty queues. If the queue is not empty, it dequeues token from the queue nd proceeds to check the next queue. The node fires fter it hs dequeued one token from ech of its queues. After firing, behvior node genertes s mny tokens s its out-degree, nd ech token is written to the corresponding queue of the destintion control node in nonblocking fshion. Upon firing, the control node evlutes its condition. If the condition evlutes to TRUE, then token is generted nd written to the queue of the destintion behvior node. B. Chnnel Semntics e1 b1 c q2 e2 b2 e1 b1 Fig. 6. Resolution of chnnels into control dependencies The rendezvous property of chnnel would ensure tht ny behvior following the sender behvior would not execute until the receiver behvior hs executed nd e2 b2 q2

5 ny behvior following the receiver behvior would not execute until the sender behvior hs executed. If we were to optimize wy the chnnel to extrct only the control dependencies, the result will be s shown in figure 6. As per the bove premises, behvior b 1 following sender e 1 cnnot strt until e 2 hs completed. This is gurnteed by including the term q 1 : e 1 &e 2 b 1 In the dul of the bove cse, b 2 following e 2 is blocked until the sender e 1 hs executed. This premise is ensured by the term q 2 : e 2 &e 1 b 2 C. Notion of Functionl Equivlence Our notion of functionl equivlence is bsed on the trce of vlues tht the vribles hold during model execution. In prticulr, we re interested in the vribles tht re written to by non-identity behviors. We will refer to such vribles s observed vribles. The resoning is tht vribles tht re connected to the output ports of identity behviors re simply copy of nother vrible. Informlly speking, we consider two models to be functionlly equivlent, if they hve identicl observed vribles nd the trce of vlues ssumed by those vribles during model execution is identicl, given the sme initil ssignment.formlly, Given model M, let I(M) be the initil ssignment of observed vribles in M. v, wr(v) N B (BCG(M)) Let d i, i > 0 be the vlue written to v fter the i th execution of wr(v). Let d 0 be the initil ssignment vlue of v. We define the ordered set τ(v, M, I(M)) = {d 0, d 1, d 2,...} We clim tht two models M nd M re equivlent iff v, I(M) = I(M ) τ(v, M, I(M)) = τ(v, M, I(M )) V. Functionlity Preserving Trnsformtions In this section, we present some lws of MA tht llow us to define functionlity preserving model trnsformtions. A. Behvior Flttening Lws Hierrchy is only modeling rtifct, without ny influence on functionlity. Hence, it my be optimized wy. By the semntics of the VSP, ny control reltion leding to b hier is effectively leding to vsp bhier. Similrly, in ny control reltion where b hier is predecessor, it my be replced by vtp bhier. Thus, we hve L 1 q : x b = q : x vsp b L 2 q : b x = q : vtp b x We lso hve the following lws for port optimiztion during behvior flttening. L 3 (...y I < p >...) < p > x = y x L 4 x (...I < p > y...) < p >= x y > L 5 c < >: x (... < >: I < p > y...) < p >= c < >: x y > L 6 c < >: (... < >: y I < p >...) < p > x = c < >: y x > B. Identity Elimintion Lws The identity behvior does not modify ny vrible, so it my be optimized wy using pproprite trnsformtions to control nd dt flow reltions in model. L 7 q 1 : x e.q 2 : e y = q 1 q 2 : x y L 8 x < p > v 1.v 1 e < in >.e < out > v 2 = x < p > v 2 L 9 c < >: e 1 < out > e 2 < in >.e 2 < out > v = e 1 < out > v L 10 c < >: e 1 < out > e 2 < in >.c < >: e 2 < out > e 3 < in >= c < >: e 1 < out > e 3 < in > C. Control Relxtion Lws Control dependencies between two behviors, sy x nd y do not influence the functionlity of the model if there is no dt dependence between x nd y. Thus control dependence q : x y my be removed if v such tht x < p > v.v y < p > or q depends on v. Under these conditions, we cn sy L 11 R.q : x y = R L 12 R.q : x 1 &x 2 &...&x y = R.q : x 1 &x 2 &... y VI. System Level Design nd Verifiction Methodology In our system level design methodology, the following design steps re encountered s we strt from functionl specifiction model nd produce scheduled bus trnsction level model. 1. Behvior prtitioning: During behvior prtitioning, we choose the number of PEs tht will be needed to implement the design nd the mpping of lef behviors in the specifiction to those PEs. The output is prllel composition of hierrchicl PE behviors. Ech PE behvior is composed from the lef level behviors tht were mpped to it. Hence, the trnsformtion produces rerrngement of behviors. Additionl chnnels re dded for synchroniztion mongst behviors to preserve the originl order of execution of the lef behviors. The dt flow reltions re modified to reflect the loclity of memory in ech PE. The originl dt trnsfers between lef behviors, mpped to different PEs, will now go cross PEs, nd needs to be routed vi identity behviors using chnnels. The trnsformtions to derive the output prtitioned model use the identity elimintion nd flttening lws (in either direction).

6 2. Sttic scheduling: Sttic scheduling is performed in system level models either due to resource constrints or timing optimiztion. Behviors mpped to HW re typiclly trgeted for implementtion with single controller. As result, ny prllelism in the HW PEs must be serilized stticlly. Reordering of behviors cn lso tke plce s result of communiction scheduling. Essentilly, we cn use the trnsformtions llowed by control relxtion lws (in either direction) to crete new schedule stticlly. 3. RTOS insertion: PEs tht implement softwre my provide for dynmic scheduling. In this cse, the nondeterminism of concurrency is resolved t execution time. The ordering of prllel behviors is performed by scheduler tht is prt of the PE s operting system. In SLDL implementtion, the scheduler is nother behvior tht models the Rel Time Operting System (RTOS).Therefore, for functionlly correct implementtion of dynmic scheduling, we need to ensure tht the scheduler behvior, nd hence the scheduling policy, stisfies the sme properties s the scheduler of the SLDL simultor. This cn be verified using property verifiction tool. If the property verifiction is successful, the scheduler behvior cn be bstrcted wy from the model. The MA expression during this SLDL trnsformtion cn, thus, remin unchnged if the dynmic scheduler of the RTOS follows the simultor s properties. 4. Bus protocol insertion: After behvior prtitioning nd scheduling, the system model consists of concurrent behviors communicting with severl chnnels. Although, the model shows the computtion structure correctly, the communiction structure still needs to be implemented. In bus-bsed SoC communiction scheme, the vrious PEs re connected to system busses. The communiction model cn thus be represented using chnnels for busses. All virtul links in the input model re shred over the new bus chnnels. The design decision in this cse is choosing the number of bus chnnels nd mpping the virtul links to the bus chnnels. Also, the ordering of trnsctions on the bus my be done using n rbitrtion policy. Trnsctions on chnnel re mutully exclusive nd the new rbiter must stisfy this property. For correct implementtion of rbitrtion policy, we hve the sme scenrio s tht in RTOS insertion. We cn use property checking to verify tht the rbitrtion policy preserves the functionlity of the model. If we cn prove tht the rbiter behvior will never cuse dedlock nd will eventully schedule trnsction request then we cn bstrct it wy. level models from more bstrct ones using correct trnsformtions. We estblished notion of functionl equivlence nd refinement using prtil order trces. The xioms nd rewriting rules of MA were then shown to be sound, which led us to defining functionlity preserving model trnsformtions. Finlly, we presented system synthesis scenrio nd showed how our formlism cn be used in system design methodology. The complexity of modern systems stresses upon the need for such forml pproch, so s to void the overhed of verifying nd debugging ll models during design spce explortion. References [1] R. Cmposno. Behvior-preserving trnsformtions for high-level synthesis. In Proceedings of the Mthemticl Sciences Institute workshop on Hrdwre specifiction, verifiction nd synthesis: mthemticl spects, pges Springer-Verlg New York, Inc., [2] X. Chen, H. Hsieh, F. Blrin, nd Y. Wtnbe. Cse studies of model checking for embedded system designs. In Third Interntionl Conference on Appliction of Concurrency to System Design, pges 20 28, June [3] D. Hrel. Sttechrts: A visul formlism for complex systems. Science of Computer Progrmming, 8(3): , June [4] C. Hore. Communicting Sequentil Processes. Prentice Hll, [5] J. Jorgensen nd L. Kristensen. Verifiction of colored petri nets using stte spces with equivlence clsses. In Proceedings of the Workshop on Petri Nets in System Engineering, pges 20 31, September [6] G. Khn. The semntics of simple lnguge for prllel progrmming. In Info. Proc., pges , August [7] Middlehoek. A methodology for the design of gurnteed correct nd efficient digitl systems. In IEEE Interntionl High Level Design Vlidtion nd Test Workshop, November [8] R. Milner. A Clculus of Communicting Systems. Springer, [9] S. Rjn. Correctness of trnsformtions in high level synthesis. In Interntionl Conference on Computer Hrdwre Description Lnguges nd their Applictions, pges , June VII. Conclusions In this pper, we introduced formlism clled Model Algebr, which is employed in deriving detiled system

Data Flow on a Queue Machine. Bruno R. Preiss. Copyright (c) 1987 by Bruno R. Preiss, P.Eng. All rights reserved.

Data Flow on a Queue Machine. Bruno R. Preiss. Copyright (c) 1987 by Bruno R. Preiss, P.Eng. All rights reserved. Dt Flow on Queue Mchine Bruno R. Preiss 2 Outline Genesis of dt-flow rchitectures Sttic vs. dynmic dt-flow rchitectures Pseudo-sttic dt-flow execution model Some dt-flow mchines Simple queue mchine Prioritized

More information

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

Functor (1A) Young Won Lim 8/2/17

Functor (1A) Young Won Lim 8/2/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

Enginner To Engineer Note

Enginner To Engineer Note Technicl Notes on using Anlog Devices DSP components nd development tools from the DSP Division Phone: (800) ANALOG-D, FAX: (781) 461-3010, EMAIL: dsp_pplictions@nlog.com, FTP: ftp.nlog.com Using n ADSP-2181

More information

Functor (1A) Young Won Lim 10/5/17

Functor (1A) Young Won Lim 10/5/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

Inverting Martin Synthesis for Verification

Inverting Martin Synthesis for Verification Inverting Mrtin Synthesis for Verifiction Stephen Longfield, Jr., Rjit Mnohr School of Electricl nd omputer Engineering ornell University, Ithc, NY, 14853, U.S.A. Emil: {slongfield, rjit}@csl.cornell.edu

More information

An introduction to model checking

An introduction to model checking An introduction to model checking Slide 1 University of Albert Edmonton July 3rd, 2002 Guy Trembly Dépt d informtique UQAM Outline Wht re forml specifiction nd verifiction methods? Slide 2 Wht is model

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Virtual Machine I: Stack Arithmetic

Virtual Machine I: Stack Arithmetic Virtul Mchine I: Stck Arithmetic Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 7: Virtul Mchine

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

CS201 Discussion 10 DRAWTREE + TRIES

CS201 Discussion 10 DRAWTREE + TRIES CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

FPGA-Based Implementation of Genetic Algorithm for the Traveling Salesman Problem and Its Industrial Application

FPGA-Based Implementation of Genetic Algorithm for the Traveling Salesman Problem and Its Industrial Application FPGA-Bsed Implementtion of Genetic Algorithm for the Trveling Slesmn Problem nd Its Industril Appliction Ioulii Sklirov nd António B.Ferrri Deprtment of Electronics nd Telecommunictions University of Aveiro,

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-204 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

On components with explicit protocols satisfying a notion of correctness by construction

On components with explicit protocols satisfying a notion of correctness by construction On components with explicit protocols stisfying notion of correctness by construction Andrés Frís nd Mrio Südholt Déprtement Informtique École des Mines de Nntes 4, rue Alfred Kstler BP 20722 F-44307 Nntes

More information

Harmony/SE: A SysML Based Systems Engineering Process

Harmony/SE: A SysML Based Systems Engineering Process Hrmony/SE: A SysML Bsed Systems Engineering Process Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist hoffmpe@us.ibm.com 0-0-08 Model-Bsed Systems Engineering Integrted System / Embedded Softwre Development

More information

Synchronizability of Conversations Among Web Services

Synchronizability of Conversations Among Web Services 1 Synchronizbility of Converstions Among Web Services Xing Fu, Tevfik Bultn, Jinwen Su Abstrct We present frmework for nlyzing interctions mong web services tht communicte with synchronous messges. We

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI Appliction Note Rel-time nd offline modultion from ETI files Generting nd nlyzing ETI files Rel-time interfce using EDI/ETI IZT DAB CONTENTSERVER

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

How to Design REST API? Written Date : March 23, 2015

How to Design REST API? Written Date : March 23, 2015 Visul Prdigm How Design REST API? Turil How Design REST API? Written Dte : Mrch 23, 2015 REpresenttionl Stte Trnsfer, n rchitecturl style tht cn be used in building networked pplictions, is becoming incresingly

More information

Visual IoT/Robotics Programming Language in -Calculus

Visual IoT/Robotics Programming Language in -Calculus 2017 IEEE 13th Interntionl Symposium on Autonomous Decentrlized Systems Visul IoT/Robotics Progrmming Lnguge in -Clculus Gennro De Luc nd Yinong Chen School of Computing, Informtics nd Decision Systems

More information

A Scalable and Reliable Mobile Agent Computation Model

A Scalable and Reliable Mobile Agent Computation Model A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper

More information

OMG, Real Time Embedded Distributed Object Systems Workshop. Arlington, USA, July 15-18, 2002

OMG, Real Time Embedded Distributed Object Systems Workshop. Arlington, USA, July 15-18, 2002 OMG, Rel Time Embedded Distributed Object Systems Workshop. Arlington, USA, July 15-18, 2002 The DSSV Methodology: High Level Vlidtion of CORBA Architecture using Discrete Event Simultion Approch. Emmnuelle

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-295 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-188 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

Address Register Assignment for Reducing Code Size

Address Register Assignment for Reducing Code Size Address Register Assignment for Reducing Code Size M. Kndemir 1, M.J. Irwin 1, G. Chen 1, nd J. Rmnujm 2 1 CSE Deprtment Pennsylvni Stte University University Prk, PA 16802 {kndemir,mji,guilchen}@cse.psu.edu

More information

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X 4. Mon, Sept. 30 Lst time, we defined the quotient topology coming from continuous surjection q : X! Y. Recll tht q is quotient mp (nd Y hs the quotient topology) if V Y is open precisely when q (V ) X

More information

COMMON HALF YEARLY EXAMINATION DECEMBER 2018

COMMON HALF YEARLY EXAMINATION DECEMBER 2018 li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net.pds.pds COMMON HALF YEARLY EXAMINATION DECEMBER 2018 STD : XI SUBJECT: COMPUTER SCIENCE

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

CPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls

CPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls Redings for Next Two Lectures Text CPSC 213 Switch Sttements, Understnding Pointers - 2nd ed: 3.6.7, 3.10-1st ed: 3.6.6, 3.11 Introduction to Computer Systems Unit 1f Dynmic Control Flow Polymorphism nd

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

Discovering Program s Behavioral Patterns by Inferring Graph-Grammars from Execution Traces

Discovering Program s Behavioral Patterns by Inferring Graph-Grammars from Execution Traces Discovering Progrm s Behviorl Ptterns by Inferring Grph-Grmmrs from Execution Trces Chunying Zho 1, Keven Ates 1, Jun Kong 2, Kng Zhng 1 1 The University of Texs t Dlls {cxz051000, tescomp, kzhng }@utdlls.edu

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-232 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Reducing a DFA to a Minimal DFA

Reducing a DFA to a Minimal DFA Lexicl Anlysis - Prt 4 Reducing DFA to Miniml DFA Input: DFA IN Assume DFA IN never gets stuck (dd ded stte if necessry) Output: DFA MIN An equivlent DFA with the minimum numer of sttes. Hrry H. Porter,

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

Data sharing in OpenMP

Data sharing in OpenMP Dt shring in OpenMP Polo Burgio polo.burgio@unimore.it Outline Expressing prllelism Understnding prllel threds Memory Dt mngement Dt cluses Synchroniztion Brriers, locks, criticl sections Work prtitioning

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

Fall 2018 Midterm 1 October 11, ˆ You may not ask questions about the exam except for language clarifications.

Fall 2018 Midterm 1 October 11, ˆ You may not ask questions about the exam except for language clarifications. 15-112 Fll 2018 Midterm 1 October 11, 2018 Nme: Andrew ID: Recittion Section: ˆ You my not use ny books, notes, extr pper, or electronic devices during this exm. There should be nothing on your desk or

More information

Topic 2: Lexing and Flexing

Topic 2: Lexing and Flexing Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of

More information

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop

More information

Coprocessor memory definition. Loic Pallardy / Arnaud Pouliquen

Coprocessor memory definition. Loic Pallardy / Arnaud Pouliquen Coprocessor memory definition Loic Pllrdy / Arnud Pouliquen Objective 2 The gol of following slides is to sum up on-going discussion in OpenAP weekly bout Remoteproc/Rpmsg memory lloction. Following proposl

More information

Control-Flow Analysis and Loop Detection

Control-Flow Analysis and Loop Detection ! Control-Flow Anlysis nd Loop Detection!Lst time! PRE!Tody! Control-flow nlysis! Loops! Identifying loops using domintors! Reducibility! Using loop identifiction to identify induction vribles CS553 Lecture

More information

Lecture Overview. Knowledge-based systems in Bioinformatics, 1MB602. Procedural abstraction. The sum procedure. Integration as a procedure

Lecture Overview. Knowledge-based systems in Bioinformatics, 1MB602. Procedural abstraction. The sum procedure. Integration as a procedure Lecture Overview Knowledge-bsed systems in Bioinformtics, MB6 Scheme lecture Procedurl bstrction Higher order procedures Procedures s rguments Procedures s returned vlues Locl vribles Dt bstrction Compound

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

c360 Add-On Solutions

c360 Add-On Solutions c360 Add-On Solutions Functionlity Dynmics CRM 2011 c360 Record Editor Reltionship Explorer Multi-Field Serch Alerts Console c360 Core Productivity Pck "Does your tem resist using CRM becuse updting dt

More information

such that the S i cover S, or equivalently S

such that the S i cover S, or equivalently S MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i

More information

MIPS I/O and Interrupt

MIPS I/O and Interrupt MIPS I/O nd Interrupt Review Floting point instructions re crried out on seprte chip clled coprocessor 1 You hve to move dt to/from coprocessor 1 to do most common opertions such s printing, clling functions,

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-148 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Virtual Machine (Part I)

Virtual Machine (Part I) Hrvrd University CS Fll 2, Shimon Schocken Virtul Mchine (Prt I) Elements of Computing Systems Virtul Mchine I (Ch. 7) Motivtion clss clss Min Min sttic sttic x; x; function function void void min() min()

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-245 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Topic: Software Model Checking via Counter-Example Guided Abstraction Refinement. Having a BLAST with SLAM. Combining Strengths. SLAM Overview SLAM

Topic: Software Model Checking via Counter-Example Guided Abstraction Refinement. Having a BLAST with SLAM. Combining Strengths. SLAM Overview SLAM Hving BLAST with SLAM Topic: Softwre Model Checking vi Counter-Exmple Guided Abstrction Refinement There re esily two dozen SLAM/BLAST/MAGIC ppers; I will skim. # # Theorem Proving Combining Strengths

More information

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-167 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples EURSIP Journl on pplied Signl Processing 2003:6, 54 529 c 2003 Hindwi Publishing orportion Memory-Optimized Softwre Synthesis from tflow Progrm Grphs withlrgesizetsmples Hyunok Oh The School of Electricl

More information

Address/Data Control. Port latch. Multiplexer

Address/Data Control. Port latch. Multiplexer 4.1 I/O PORT OPERATION As discussed in chpter 1, ll four ports of the 8051 re bi-directionl. Ech port consists of ltch (Specil Function Registers P0, P1, P2, nd P3), n output driver, nd n input buffer.

More information

VATA: A Library for Efficient Manipulation of Non-Deterministic Tree Automata

VATA: A Library for Efficient Manipulation of Non-Deterministic Tree Automata VATA: A Librry for Efficient Mnipultion of Non-Deterministic Tree Automt Ondřej Lengál 1, Jiří Šimáček 1,2, nd Tomáš Vojnr 1 1 FIT, Brno University of Technology, IT4Innovtions Centre of Excellence, Czech

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

Transparent neutral-element elimination in MPI reduction operations

Transparent neutral-element elimination in MPI reduction operations Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing

More information

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer.

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer. DBMS Architecture SQL INSTRUCTION OPTIMIZER Dtbse Mngement Systems MANAGEMENT OF ACCESS METHODS BUFFER MANAGER CONCURRENCY CONTROL RELIABILITY MANAGEMENT Index Files Dt Files System Ctlog DATABASE 2 Query

More information

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08 CS412/413 Introduction to Compilers Tim Teitelum Lecture 4: Lexicl Anlyzers 28 Jn 08 Outline DFA stte minimiztion Lexicl nlyzers Automting lexicl nlysis Jlex lexicl nlyzer genertor CS 412/413 Spring 2008

More information

It consists of two cold rooms, each with their own evaporator but sharing the same cooling flui d R134a system ( compressor, condenser...).

It consists of two cold rooms, each with their own evaporator but sharing the same cooling flui d R134a system ( compressor, condenser...). This system llows study of refrigertion systems implementtion of rmodyn mic clcultions pplied to refrigertion Its uniqueness is tht it is fully controllble vi Internet directly from web browser like Internet

More information

Computer-Aided Multiscale Modelling for Chemical Process Engineering

Computer-Aided Multiscale Modelling for Chemical Process Engineering 17 th Europen Symposium on Computer Aided Process Engineesing ESCAPE17 V. Plesu nd P.S. Agchi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Computer-Aided Multiscle Modelling for Chemicl Process

More information

Scanner Termination. Multi Character Lookahead. to its physical end. Most parsers require an end of file token. Lex and Jlex automatically create an

Scanner Termination. Multi Character Lookahead. to its physical end. Most parsers require an end of file token. Lex and Jlex automatically create an Scnner Termintion A scnner reds input chrcters nd prtitions them into tokens. Wht hppens when the end of the input file is reched? It my be useful to crete n Eof pseudo-chrcter when this occurs. In Jv,

More information

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1 vcloud Director Service Provider Admin Portl Guide vcloud Director 9. vcloud Director Service Provider Admin Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

PARALLEL AND DISTRIBUTED COMPUTING

PARALLEL AND DISTRIBUTED COMPUTING PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce

More information

Automated and Quality-driven Requirements Engineering

Automated and Quality-driven Requirements Engineering Automted nd Qulity-driven Requirements Engineering Rolf Drechsler Mthis Soeken Robert Wille Deprtment of Mmtics nd Computer Science, University of Bremen, Germny Cyber-Physicl Systems, DFKI GmbH, Bremen,

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association 9. CISC - Curriculum & Instruction Steering Committee The Winning EQUATION A HIGH QUALITY MATHEMATICS PROFESSIONAL DEVELOPMENT PROGRAM FOR TEACHERS IN GRADES THROUGH ALGEBRA II STRAND: NUMBER SENSE: Rtionl

More information

If f(x, y) is a surface that lies above r(t), we can think about the area between the surface and the curve.

If f(x, y) is a surface that lies above r(t), we can think about the area between the surface and the curve. Line Integrls The ide of line integrl is very similr to tht of single integrls. If the function f(x) is bove the x-xis on the intervl [, b], then the integrl of f(x) over [, b] is the re under f over the

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-208 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Fall 2018 Midterm 2 November 15, 2018

Fall 2018 Midterm 2 November 15, 2018 Nme: 15-112 Fll 2018 Midterm 2 November 15, 2018 Andrew ID: Recittion Section: ˆ You my not use ny books, notes, extr pper, or electronic devices during this exm. There should be nothing on your desk or

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information

CSCI 446: Artificial Intelligence

CSCI 446: Artificial Intelligence CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 Introduction to EsyMP Network Projection EsyMP Network Projection Fetures... 5 Disply Options... 6 Multi-Screen Disply Function... 6 Movie Sending Mode...

More information

CSEP 573 Artificial Intelligence Winter 2016

CSEP 573 Artificial Intelligence Winter 2016 CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch

More information

Chapter 2 Sensitivity Analysis: Differential Calculus of Models

Chapter 2 Sensitivity Analysis: Differential Calculus of Models Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls

More information

UNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS 1 COMPUTATION & LOGIC INSTRUCTIONS TO CANDIDATES

UNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS 1 COMPUTATION & LOGIC INSTRUCTIONS TO CANDIDATES UNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS COMPUTATION & LOGIC Sturdy st April 7 : to : INSTRUCTIONS TO CANDIDATES This is tke-home exercise. It will not

More information