A Formalism for Functionality Preserving System Level Transformations
|
|
- Pearl Watson
- 5 years ago
- Views:
Transcription
1 A Formlism for Functionlity Preserving System Level Trnsformtions Smr Abdi Dniel Gjski Center for Embedded Computer Systems UC Irvine Center for Embedded Computer Systems UC Irvine Irvine, CA Irvine, CA Tel: Tel: Fx: Fx: e-mil: e-mil Abstrct With the rise in complexity of modern systems, designers re spending significnt time on modeling t the system level of bstrction. This pper introduces Model Algebr, formlism built on top of system level design lnguges, tht cn be used for implementing functionlity preserving trnsformtions on system level models. Such trnsformtions enble us to implement high level design decisions without hving to write new models for ech design decision. Moreover, since these trnsformtions preserve functionlity, the trnsformed models do not need to be re-verified. We present the definition of Model Algebr nd show how system level models cn be represented s expressions in this formlism. The lws of Model Algebr re use to define correct model trnsformtions. We show system level design scenrio, where design decisions grdully refine the functionl model of the system to n rchitecturl model with components nd communiction structure. The refinement cn be performed using the correct model trnsformtions in our formlism. I. Introduction Due to the complexity of modern systems, designers hve to describe them t high level of bstrction using system level design lnguges (SLDLs).However, independently written models in SLDLs hve little correltion between them which mkes it intrctble to compre them for equivlence. A possible solution is to derive the detiled system level models from the specifiction by series of functionlity preserving trnsformtions. The specifiction is cptured using n executble model, which is purely functionl description of the design. As design decisions re mde during system synthesis, the designer refines the functionl specifiction model to more detiled model representing the trget rchitecture. Such design methodology requires formlisms to represent the system level models nd notions for their correctness refinement. In this pper, we introduce Model Algebr (MA), which is one such formlism. Significnt reserch hs been done in the pst for developing modeling formlisms for system level design. Process lgebrs, such s CSP [4] nd CCS [8] hve been used for verifying distributed softwre, but hve limittions in modeling. For exmple, CSP llows only rendezvous communiction between prllel processes. StteChrts [3] provide for hierrchy, synchroniztion nd exceptions, but hve uncler execution semntics, which hve led to severl vrints. Colored Petri Nets re widely used for nlysis nd modeling of concurrent systems, nd verifiction techniques hve been developed to check for their equivlence [5]. Forml methods, developed for hrdwre verifiction, hve been pplied to embedded systems like bounded model checking [2] nd theorem proving [9]. The problem with most stte bsed pproches, s bove, is tht their complexity increses exponentilly with design size. Our gol is to correctly derive detiled system level models, so tht we cn leve the functionl verifiction tsk for only the specifiction model. Correct by construction techniques hve been widely pplied t RT Level to prove the correctness of high level synthesis steps [9] [1]. A complete methodology for correct digitl design hs been proposed in [7], but they only consider synchronous models which re insufficient t system level. The rest of the pper is orgnized s follows. Section II gives the definition of MA. In Section III we demonstrte how to represent hierrchicl system level models in MA. In Section IV we present the forml execution semntics nd notions for functionl equivlence of models in MA. Section V presents functionlity preserving trnsformtions on models nd in Section VI we show how these trnsformtions my enble useful refinements during system level design. II. Model Algebr The objects of MA cn be defined s the tuple < B, C, I, V >, where B is the set of behviors C is the set of chnnels I is the behvior interfce V is the set of vribles We lso define subset B I of B representing the set of identity behviors. Identity behviors re those behviors tht, upon execution, produce n output tht is identicl to their input. We define the subset Q to be the set of ll
2 boolen functions on V. A. Ports Ech behvior hs n ssocited object clled its interfce. The interfce crries the dt ports of the behvior. In the cse of hierrchicl behvior, the ports re identified by ssocition of vrible to the interfce. Hence, to sub-behviors of hierrchicl behvior, the port is seen s I < p >, where p V. The port is treted like ny other locl vrible except tht we llow only one kind of i/o opertion on it. Locl behviors cn either write to port, in which cse it is known s the out-port, or they my red from the port, in which cse it is clled the inport. When the sme port p is ccessed from outside the behvior, it is identified by its ssocition to the behvior. For exmple, in our cse, port p of behvior b would be written s b < p >, s seen by externl behviors. B. Addressing Behviors executing concurrently use synchronized dt trnsctions mongst themselves for communiction. Chnnels serve s the medi for such trnsctions. Ech trnsction uses n ddress to identify the sender nd the receiver behviors. The trnsctions cn, thus, be visulized to tke plce over virtul links, tht re lbeled by distinct ddresses. Ech of the links is ssocited with chnnel. Hence, such link my be identified s c < >, where the link uses chnnel c nd hs the ddress. Two trnsctions on chnnel cnnot shre link if they might tke plce simultneously. In other words, ll trnsctions on single link must be totlly ordered in time. C. Composition Rules Composition rules on the bove objects re defined s reltions in MA. Ech composition cretes term in MA. 1. Control flow: A control flow composition (R c )determines the execution order of behviors during model simultion. We write the reltion s q : b 1 &b 2 &...&b n b, where i, 1 i nb, b i B I, q Q. The composition rule implies tht b executes fter ll the behviors b 1 through b n, clled predecessors in the reltion, hve completed nd q evlutes to TRUE. R c is sid to led to b under the condition q, implying tht b must wit for ll predecessors. 2. Non-blocking write: This composition rule (R nw ) is used to indicte tht behvior writes to vrible or n out-port of its prent behvior. In the cse of write to dt vrible, we use the expression b < p > v, where b < p > is the out-port of the writing behvior nd v indictes the memory into which the dt is written. In its other mnifesttion, this composition rule cn be used to crete port connection, written s b < p > I < p >, In this cse, the composition rule indictes n out-port-mp. 3. Non-blocking red: This composition rule (R nr ) is used to indicte tht behvior reds dt from vrible or through n in-port of its prent behvior. In the cse of red from dt vrible, we use the expression v b < p >, where b < p > is the in-port of the reding behvior nd v indictes the memory from which the dt is red. In its other mnifesttion, this composition rule cn be used to crete port connection, written s I < p > b < p >, In this cse, the composition rule indictes n in-port-mp. 4. Chnnel trnsction: This composition rule (R t ) indictes dt trnsfer link from the sender behvior to one or more receiver behvior(s) over chnnel. The semntics of the composition rule ensure rendezvous communiction mechnism. We write this reltion s c < >: b < p > b 1 < p 1 > &b 2 < p 2 >...&b n < p n >, where b < p > is the outport of the sending behvior nd b 1 < p 1 > through b n < p n > re the in-ports of the receiving behviors. The trnsction tkes plce over chnnel c nd uses the link ddressed by c < >. Also, ny two trnsctions over the sme chnnel re mutully exclusive in time. 5. Blocking write: This composition rule (R bw ) is used to indicte the port connection for the sender prt of trnsction. The sender behvior writes to the out-port of its prent behvior through one of its own out-ports. We represent blocking write by the expression b < p > I < p >, where b < p > is the out-port of the writing behvior nd I < p > is n out-port on the prent of b. 6. Blocking red: This composition rule (R br ) is used to indicte the port connection for the receiver prt of trnsction link. The receiving behvior(s) red(s) from the in-port of their prent behvior through one of their own in-ports. We represent blocking red by the expression < >: I < p > b 1 < p 1 > &b 2 < p 2 >...&b n < p n >, where b 1 < p 1 > through b n < p n > re the in-port(s) of the receiving behvior(s) nd I < p > is n in-port on the prent of b. The ddress of the virtul link (< >) will be used for binding this port. 7. Grouping: This composition rule (R g )is used to indicte collection of compositions. Essentilly, grouping is used to crete hierrchy of behviors, by collecting the vrious compositions of sub-behviors, locl chnnels nd locl vribles. This commuttive reltion is written s r 1.r 2...r n, where i, 1 i n nd r i {R c, R nw, R nr, R t, R bw, R br, R g }. III. Model Construction with MA In this section, we look t how to construct hierrchicl system models s expressions in MA. A given hierrchicl behvior b hs unique virtul strting point(vsp)
3 nd the virtul terminting point(vtp). The VSP is the identity behvior vsp b tht is the first to execute inside b. Other sub-behviors of b re executed fter vsp b, depending on outgoing control reltions from vsp b. Due to its nture, VSP behvior would only hve outgoing control edges to other sub-behviors of b. Similrly, the identity behvior vtp b is the lst behvior to execute inside b. In other words, the completion of b is indicted by the execution of vtp b. Due to its nture, the VTP behvior will only hve incoming edges from other sub-behviors of b. bpr vsp b pr b 1 b 2 b 1 vtp b pr () bfsm q' 1 vsp b fsm q 1 b 2 q' 2 vtp b fsm (b) Fig. 1. ()Prllel nd (b)fsm style compositions of behviors A. Prllel nd Conditionl Execution Most SLDLs provide for specil lnguge constructs to crete different types of behviorl hierrchies. The common ones re prllel composition nd fsm-style composition. A sequentil composition is simply degenerte form of the fsm-composition. In MA, we cn relize both these types of composition by using control reltions. Figure 1() shows prllel composition of behviors b 1 nd b 2. A typicl SLDL my llow construction of prllel composition using sttement like pr {run b 1 ; run b 2 }. Let the resulting behvior be clled b pr. The execution of b pr indictes tht both b 1 nd b 2 re redy to execute. The execution of b pr completes when both b 1 nd b 2 hve completed. In the corresponding MA expression, vsp bpr nd vtp bpr serve s the strting nd terminting points, respectively, of the hierrchicl behvior b pr. We cn see, tht inside b pr, b 1 nd b 2 re llowed to strt simultneously. This is ensured by the control reltions vsp bpr b 1.vsp bpr b 2 Hence, the prllelism is relized by orthogonlity of the execution of behviors b 1 nd b 2. The control reltion t the end (b 1 &b 2 vtp bpr ) ensures tht both b 1 nd b 2 must complete their execution before vtp bpr executes. The execution of vtp bpr indictes the completion of the hierrchicl behvior b pr. A typicl FSM style composition of behviors is shown in Figure 1(b). The control flow between behviors is typiclly expressed using switch-cse or goto constructs in SLDLs. A simple pseudo code exmple for hierrchicl behvior b fsm is s follows l1: run b 1 ; if q 1 == 1 goto l2 else brek; q 2 l2: run b 2 ; if q 2 == 1 goto l1 else brek; The control reltions of b fsm cn be written s follows vsp bfsm b 1.q 1 : b 1 b 2.q 1 : b 1 vtp bfsm. q 2 : b 2 b 1.q 2 : b 2 vtp bfsm bhier v2 out b p2 b 1 p1 b 2 in Fig. 2. Using ports for non-blocking dt flow B. Vrible Access vi Ports In MA, s in most SLDLs, vrible is directly visible only to the behviors tht re t the sme level of hierrchy s the vrible itself. Therefore, in order to ccess vribles t higher levels of hierrchy, dt ports re used. As shown in Figure 2, behvior b 1 reds vrible v 1 present in b hier vi the port in of its prent b. Hence, to relized this port connection, we use the non-blocking reltion v 1 b < in >. At the level of b, we crete port connection from the interfce of b to b 1 using the term I < in > b 1 < p 1 >. The dul of red port connection is the write port connection s shown by the ccess of vrible v 2 from behvior b 2 in figure 2. In this cse, the port out of b is used to relize the vrible ccess. The term t the level of b hier is b < out > v 2, while the term t the level of b is b 2 < p 2 > I < out >. b 1 b' 1 p1' p1 c Fig. 3. Blocking dt flow bound to chnnel C. Chnnel Access vi Ports v1 p2 b 2 p2' b' 2 As in the cse of non-blocking reds nd write, MA provides mechnism for blocking reds nd writes vi ports. For instnce, in Figure 3, we see chnnel trnsction from b 1 to b 2 over c. After zooming into the hierrchy of b 1 nd b 2, we see tht the trnsction is tking plce from b 1 to b 2. The port p 1 of b 1 mkes the chnnel c visible to b 1. Therefore, using the reltion < >: b 1 < p 1 > I < p 1 > behvior b 1 cn ccess chnnel c. However, this requires p 1 to be bound to the virtul link ddressed by. Similrly, on the other side, sub-behvior b 2 inside b 2, uses the blocking reltion < >: I < p 2 > b 2 < p 2 > to ccess the red method of c vi port p 2. In this cse, port p 2 mkes the chnnel c visible to b 2. As before, p 2 must be bound to the virtul link ddressed by.
4 b hier vspb hier 1 b1 p11 p12 p1 b1_queue b 1 b1_'_queue b1_qn'_queue ' p2 ' p22 b2 1 vtp bhier p21 v qm qn' b k Fig. 5. The firing semntics of BCG nodes bk_qn_queue Fig. 4. A hierrchicl behvior with locl objects nd reltions D. Internl nd Interfce Terms Figure 4 shows hierrchicl behvior b hier. The expression for the hierrchicl behvior is written using compositions involving locl objects nd the interfce. The grouping of reltions between locl objects will be referred to s the internl terms of hierrchicl behvior. Similrly, the grouping of reltions involving the interfce will be referred to s the interfce terms of the hierrchicl behvior. We cn write the hierrchicl behvior s grouping of ll its internl nd interfce terms, long with the internl terms of its sub-behviors. The grouping of internl terms for given behvior b is represented s [b]. Thus, we cn write [b hier ] = [vsp bhier ].[b 1 ].[b 2 ].[vtp bhier ].vsp bhier b 1. q 1 : b 1 b 2.q 1 : b 1 vtp bhier.b 2 vtp bhier. b 1 < p 12 > v.v b 2 < p 21 > The interfce terms of b hier is represented by b hier. From figure 4, we cn see tht b hier =< >: I < p 1 > b 1 < p 11 >. b 2 < p 22 > I < p 2 > Finlly, we write the hierrchicl behvior s grouping of its internl nd interfce terms. Therefore, we get b hier = ([b hier ]. b hier ) IV. Execution Semntics nd Equivlence Before we ttempt to estblish equivlence notions for models expressed in MA, we must clerly define the execution semntics of such models. The control dependencies in the model re cptured using the Behvior Control Grph (BCG), which is similr to the populr computtion model of Khn process network (KPN) [6]. The chnnels in the model re bstrcted wy nd replced by corresponding control dependencies, resulting from their rendezvous semntics. A. Behvior Control Grph The BCG is directed grph (N,E) with two types of nodes, nmely behvior nodes(n B ) nd control nodes(n Q ). The behvior nodes, s the nme suggests, indicte behvior execution, while the control nodes evlute control conditions tht led to further behvior executions. Directed edges re llowed from behvior nodes to control nodes nd vice vers. Also, control node cn hve one, nd only one, out going edge. The execution of behvior node, nd similrly, evlution in control node, will be referred to s firing. Node firings re fcilitted by tokens tht circulte in the queues of the BCG s shown in Figure 5. Ech behvior node (shown by rounded edged box) in the BCG hs one queue, for instnce b1 queue for behvior node b 1. All incoming edges to behvior node represent the vrious writers to the queue. A behvior node blocks on n empty queue nd fires if there is t lest one token in its queue. Upon firing, one token is dequeued from the node s queue. The control node (shown by circulr node), on the other hnd, hs s mny queues s the number of incoming edges. For instnce q n hs k queues, one ech for edges from b 1 through b k. A control node, sequentilly checks ll its queues nd blocks on empty queues. If the queue is not empty, it dequeues token from the queue nd proceeds to check the next queue. The node fires fter it hs dequeued one token from ech of its queues. After firing, behvior node genertes s mny tokens s its out-degree, nd ech token is written to the corresponding queue of the destintion control node in nonblocking fshion. Upon firing, the control node evlutes its condition. If the condition evlutes to TRUE, then token is generted nd written to the queue of the destintion behvior node. B. Chnnel Semntics e1 b1 c q2 e2 b2 e1 b1 Fig. 6. Resolution of chnnels into control dependencies The rendezvous property of chnnel would ensure tht ny behvior following the sender behvior would not execute until the receiver behvior hs executed nd e2 b2 q2
5 ny behvior following the receiver behvior would not execute until the sender behvior hs executed. If we were to optimize wy the chnnel to extrct only the control dependencies, the result will be s shown in figure 6. As per the bove premises, behvior b 1 following sender e 1 cnnot strt until e 2 hs completed. This is gurnteed by including the term q 1 : e 1 &e 2 b 1 In the dul of the bove cse, b 2 following e 2 is blocked until the sender e 1 hs executed. This premise is ensured by the term q 2 : e 2 &e 1 b 2 C. Notion of Functionl Equivlence Our notion of functionl equivlence is bsed on the trce of vlues tht the vribles hold during model execution. In prticulr, we re interested in the vribles tht re written to by non-identity behviors. We will refer to such vribles s observed vribles. The resoning is tht vribles tht re connected to the output ports of identity behviors re simply copy of nother vrible. Informlly speking, we consider two models to be functionlly equivlent, if they hve identicl observed vribles nd the trce of vlues ssumed by those vribles during model execution is identicl, given the sme initil ssignment.formlly, Given model M, let I(M) be the initil ssignment of observed vribles in M. v, wr(v) N B (BCG(M)) Let d i, i > 0 be the vlue written to v fter the i th execution of wr(v). Let d 0 be the initil ssignment vlue of v. We define the ordered set τ(v, M, I(M)) = {d 0, d 1, d 2,...} We clim tht two models M nd M re equivlent iff v, I(M) = I(M ) τ(v, M, I(M)) = τ(v, M, I(M )) V. Functionlity Preserving Trnsformtions In this section, we present some lws of MA tht llow us to define functionlity preserving model trnsformtions. A. Behvior Flttening Lws Hierrchy is only modeling rtifct, without ny influence on functionlity. Hence, it my be optimized wy. By the semntics of the VSP, ny control reltion leding to b hier is effectively leding to vsp bhier. Similrly, in ny control reltion where b hier is predecessor, it my be replced by vtp bhier. Thus, we hve L 1 q : x b = q : x vsp b L 2 q : b x = q : vtp b x We lso hve the following lws for port optimiztion during behvior flttening. L 3 (...y I < p >...) < p > x = y x L 4 x (...I < p > y...) < p >= x y > L 5 c < >: x (... < >: I < p > y...) < p >= c < >: x y > L 6 c < >: (... < >: y I < p >...) < p > x = c < >: y x > B. Identity Elimintion Lws The identity behvior does not modify ny vrible, so it my be optimized wy using pproprite trnsformtions to control nd dt flow reltions in model. L 7 q 1 : x e.q 2 : e y = q 1 q 2 : x y L 8 x < p > v 1.v 1 e < in >.e < out > v 2 = x < p > v 2 L 9 c < >: e 1 < out > e 2 < in >.e 2 < out > v = e 1 < out > v L 10 c < >: e 1 < out > e 2 < in >.c < >: e 2 < out > e 3 < in >= c < >: e 1 < out > e 3 < in > C. Control Relxtion Lws Control dependencies between two behviors, sy x nd y do not influence the functionlity of the model if there is no dt dependence between x nd y. Thus control dependence q : x y my be removed if v such tht x < p > v.v y < p > or q depends on v. Under these conditions, we cn sy L 11 R.q : x y = R L 12 R.q : x 1 &x 2 &...&x y = R.q : x 1 &x 2 &... y VI. System Level Design nd Verifiction Methodology In our system level design methodology, the following design steps re encountered s we strt from functionl specifiction model nd produce scheduled bus trnsction level model. 1. Behvior prtitioning: During behvior prtitioning, we choose the number of PEs tht will be needed to implement the design nd the mpping of lef behviors in the specifiction to those PEs. The output is prllel composition of hierrchicl PE behviors. Ech PE behvior is composed from the lef level behviors tht were mpped to it. Hence, the trnsformtion produces rerrngement of behviors. Additionl chnnels re dded for synchroniztion mongst behviors to preserve the originl order of execution of the lef behviors. The dt flow reltions re modified to reflect the loclity of memory in ech PE. The originl dt trnsfers between lef behviors, mpped to different PEs, will now go cross PEs, nd needs to be routed vi identity behviors using chnnels. The trnsformtions to derive the output prtitioned model use the identity elimintion nd flttening lws (in either direction).
6 2. Sttic scheduling: Sttic scheduling is performed in system level models either due to resource constrints or timing optimiztion. Behviors mpped to HW re typiclly trgeted for implementtion with single controller. As result, ny prllelism in the HW PEs must be serilized stticlly. Reordering of behviors cn lso tke plce s result of communiction scheduling. Essentilly, we cn use the trnsformtions llowed by control relxtion lws (in either direction) to crete new schedule stticlly. 3. RTOS insertion: PEs tht implement softwre my provide for dynmic scheduling. In this cse, the nondeterminism of concurrency is resolved t execution time. The ordering of prllel behviors is performed by scheduler tht is prt of the PE s operting system. In SLDL implementtion, the scheduler is nother behvior tht models the Rel Time Operting System (RTOS).Therefore, for functionlly correct implementtion of dynmic scheduling, we need to ensure tht the scheduler behvior, nd hence the scheduling policy, stisfies the sme properties s the scheduler of the SLDL simultor. This cn be verified using property verifiction tool. If the property verifiction is successful, the scheduler behvior cn be bstrcted wy from the model. The MA expression during this SLDL trnsformtion cn, thus, remin unchnged if the dynmic scheduler of the RTOS follows the simultor s properties. 4. Bus protocol insertion: After behvior prtitioning nd scheduling, the system model consists of concurrent behviors communicting with severl chnnels. Although, the model shows the computtion structure correctly, the communiction structure still needs to be implemented. In bus-bsed SoC communiction scheme, the vrious PEs re connected to system busses. The communiction model cn thus be represented using chnnels for busses. All virtul links in the input model re shred over the new bus chnnels. The design decision in this cse is choosing the number of bus chnnels nd mpping the virtul links to the bus chnnels. Also, the ordering of trnsctions on the bus my be done using n rbitrtion policy. Trnsctions on chnnel re mutully exclusive nd the new rbiter must stisfy this property. For correct implementtion of rbitrtion policy, we hve the sme scenrio s tht in RTOS insertion. We cn use property checking to verify tht the rbitrtion policy preserves the functionlity of the model. If we cn prove tht the rbiter behvior will never cuse dedlock nd will eventully schedule trnsction request then we cn bstrct it wy. level models from more bstrct ones using correct trnsformtions. We estblished notion of functionl equivlence nd refinement using prtil order trces. The xioms nd rewriting rules of MA were then shown to be sound, which led us to defining functionlity preserving model trnsformtions. Finlly, we presented system synthesis scenrio nd showed how our formlism cn be used in system design methodology. The complexity of modern systems stresses upon the need for such forml pproch, so s to void the overhed of verifying nd debugging ll models during design spce explortion. References [1] R. Cmposno. Behvior-preserving trnsformtions for high-level synthesis. In Proceedings of the Mthemticl Sciences Institute workshop on Hrdwre specifiction, verifiction nd synthesis: mthemticl spects, pges Springer-Verlg New York, Inc., [2] X. Chen, H. Hsieh, F. Blrin, nd Y. Wtnbe. Cse studies of model checking for embedded system designs. In Third Interntionl Conference on Appliction of Concurrency to System Design, pges 20 28, June [3] D. Hrel. Sttechrts: A visul formlism for complex systems. Science of Computer Progrmming, 8(3): , June [4] C. Hore. Communicting Sequentil Processes. Prentice Hll, [5] J. Jorgensen nd L. Kristensen. Verifiction of colored petri nets using stte spces with equivlence clsses. In Proceedings of the Workshop on Petri Nets in System Engineering, pges 20 31, September [6] G. Khn. The semntics of simple lnguge for prllel progrmming. In Info. Proc., pges , August [7] Middlehoek. A methodology for the design of gurnteed correct nd efficient digitl systems. In IEEE Interntionl High Level Design Vlidtion nd Test Workshop, November [8] R. Milner. A Clculus of Communicting Systems. Springer, [9] S. Rjn. Correctness of trnsformtions in high level synthesis. In Interntionl Conference on Computer Hrdwre Description Lnguges nd their Applictions, pges , June VII. Conclusions In this pper, we introduced formlism clled Model Algebr, which is employed in deriving detiled system
Data Flow on a Queue Machine. Bruno R. Preiss. Copyright (c) 1987 by Bruno R. Preiss, P.Eng. All rights reserved.
Dt Flow on Queue Mchine Bruno R. Preiss 2 Outline Genesis of dt-flow rchitectures Sttic vs. dynmic dt-flow rchitectures Pseudo-sttic dt-flow execution model Some dt-flow mchines Simple queue mchine Prioritized
More informationSOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES
SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl
More informationComplete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li
2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min
More informationTool Vendor Perspectives SysML Thus Far
Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com
More informationMidterm 2 Sample solution
Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the
More informationFunctor (1A) Young Won Lim 8/2/17
Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published
More informationEnginner To Engineer Note
Technicl Notes on using Anlog Devices DSP components nd development tools from the DSP Division Phone: (800) ANALOG-D, FAX: (781) 461-3010, EMAIL: dsp_pplictions@nlog.com, FTP: ftp.nlog.com Using n ADSP-2181
More informationFunctor (1A) Young Won Lim 10/5/17
Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published
More informationInverting Martin Synthesis for Verification
Inverting Mrtin Synthesis for Verifiction Stephen Longfield, Jr., Rjit Mnohr School of Electricl nd omputer Engineering ornell University, Ithc, NY, 14853, U.S.A. Emil: {slongfield, rjit}@csl.cornell.edu
More informationAn introduction to model checking
An introduction to model checking Slide 1 University of Albert Edmonton July 3rd, 2002 Guy Trembly Dépt d informtique UQAM Outline Wht re forml specifiction nd verifiction methods? Slide 2 Wht is model
More informationMA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork
MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html
More informationFig.25: the Role of LEX
The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing
More informationVirtual Machine I: Stack Arithmetic
Virtul Mchine I: Stck Arithmetic Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 7: Virtul Mchine
More informationIf you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.
Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online
More informationFile Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment
File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes
More informationFrom Dependencies to Evaluation Strategies
From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute
More informationCS201 Discussion 10 DRAWTREE + TRIES
CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the
More informationAn Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization
An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction
More informationIn the last lecture, we discussed how valid tokens may be specified by regular expressions.
LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.
More informationFPGA-Based Implementation of Genetic Algorithm for the Traveling Salesman Problem and Its Industrial Application
FPGA-Bsed Implementtion of Genetic Algorithm for the Trveling Slesmn Problem nd Its Industril Appliction Ioulii Sklirov nd António B.Ferrri Deprtment of Electronics nd Telecommunictions University of Aveiro,
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-204 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More information4452 Mathematical Modeling Lecture 4: Lagrange Multipliers
Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl
More informationOn components with explicit protocols satisfying a notion of correctness by construction
On components with explicit protocols stisfying notion of correctness by construction Andrés Frís nd Mrio Südholt Déprtement Informtique École des Mines de Nntes 4, rue Alfred Kstler BP 20722 F-44307 Nntes
More informationHarmony/SE: A SysML Based Systems Engineering Process
Hrmony/SE: A SysML Bsed Systems Engineering Process Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist hoffmpe@us.ibm.com 0-0-08 Model-Bsed Systems Engineering Integrted System / Embedded Softwre Development
More informationSynchronizability of Conversations Among Web Services
1 Synchronizbility of Converstions Among Web Services Xing Fu, Tevfik Bultn, Jinwen Su Abstrct We present frmework for nlyzing interctions mong web services tht communicte with synchronous messges. We
More informationPreserving Constraints for Aggregation Relationship Type Update in XML Document
Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor
More informationIZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI
IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI Appliction Note Rel-time nd offline modultion from ETI files Generting nd nlyzing ETI files Rel-time interfce using EDI/ETI IZT DAB CONTENTSERVER
More informationDefinition of Regular Expression
Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll
More informationHow to Design REST API? Written Date : March 23, 2015
Visul Prdigm How Design REST API? Turil How Design REST API? Written Dte : Mrch 23, 2015 REpresenttionl Stte Trnsfer, n rchitecturl style tht cn be used in building networked pplictions, is becoming incresingly
More informationVisual IoT/Robotics Programming Language in -Calculus
2017 IEEE 13th Interntionl Symposium on Autonomous Decentrlized Systems Visul IoT/Robotics Progrmming Lnguge in -Clculus Gennro De Luc nd Yinong Chen School of Computing, Informtics nd Decision Systems
More informationA Scalable and Reliable Mobile Agent Computation Model
A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper
More informationOMG, Real Time Embedded Distributed Object Systems Workshop. Arlington, USA, July 15-18, 2002
OMG, Rel Time Embedded Distributed Object Systems Workshop. Arlington, USA, July 15-18, 2002 The DSSV Methodology: High Level Vlidtion of CORBA Architecture using Discrete Event Simultion Approch. Emmnuelle
More informationA New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method
A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-295 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationUNIT 11. Query Optimization
UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-188 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationParallel Square and Cube Computations
Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu
More informationAddress Register Assignment for Reducing Code Size
Address Register Assignment for Reducing Code Size M. Kndemir 1, M.J. Irwin 1, G. Chen 1, nd J. Rmnujm 2 1 CSE Deprtment Pennsylvni Stte University University Prk, PA 16802 {kndemir,mji,guilchen}@cse.psu.edu
More informationa(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X
4. Mon, Sept. 30 Lst time, we defined the quotient topology coming from continuous surjection q : X! Y. Recll tht q is quotient mp (nd Y hs the quotient topology) if V Y is open precisely when q (V ) X
More informationCOMMON HALF YEARLY EXAMINATION DECEMBER 2018
li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net.pds.pds COMMON HALF YEARLY EXAMINATION DECEMBER 2018 STD : XI SUBJECT: COMPUTER SCIENCE
More informationCS321 Languages and Compiler Design I. Winter 2012 Lecture 5
CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,
More informationLecture 10 Evolutionary Computation: Evolution strategies and genetic programming
Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting
More informationCPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls
Redings for Next Two Lectures Text CPSC 213 Switch Sttements, Understnding Pointers - 2nd ed: 3.6.7, 3.10-1st ed: 3.6.6, 3.11 Introduction to Computer Systems Unit 1f Dynmic Control Flow Polymorphism nd
More informationA Heuristic Approach for Discovering Reference Models by Mining Process Model Variants
A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl
More informationDiscovering Program s Behavioral Patterns by Inferring Graph-Grammars from Execution Traces
Discovering Progrm s Behviorl Ptterns by Inferring Grph-Grmmrs from Execution Trces Chunying Zho 1, Keven Ates 1, Jun Kong 2, Kng Zhng 1 1 The University of Texs t Dlls {cxz051000, tescomp, kzhng }@utdlls.edu
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-232 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationReducing a DFA to a Minimal DFA
Lexicl Anlysis - Prt 4 Reducing DFA to Miniml DFA Input: DFA IN Assume DFA IN never gets stuck (dd ded stte if necessry) Output: DFA MIN An equivlent DFA with the minimum numer of sttes. Hrry H. Porter,
More information9 Graph Cutting Procedures
9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric
More informationData sharing in OpenMP
Dt shring in OpenMP Polo Burgio polo.burgio@unimore.it Outline Expressing prllelism Understnding prllel threds Memory Dt mngement Dt cluses Synchroniztion Brriers, locks, criticl sections Work prtitioning
More informationOverview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases
Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture
More informationUnit 5 Vocabulary. A function is a special relationship where each input has a single output.
MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with
More informationINTRODUCTION TO SIMPLICIAL COMPLEXES
INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min
More informationPointwise convergence need not behave well with respect to standard properties such as continuity.
Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples
More informationFall 2018 Midterm 1 October 11, ˆ You may not ask questions about the exam except for language clarifications.
15-112 Fll 2018 Midterm 1 October 11, 2018 Nme: Andrew ID: Recittion Section: ˆ You my not use ny books, notes, extr pper, or electronic devices during this exm. There should be nothing on your desk or
More informationTopic 2: Lexing and Flexing
Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of
More informationΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών
ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop
More informationCoprocessor memory definition. Loic Pallardy / Arnaud Pouliquen
Coprocessor memory definition Loic Pllrdy / Arnud Pouliquen Objective 2 The gol of following slides is to sum up on-going discussion in OpenAP weekly bout Remoteproc/Rpmsg memory lloction. Following proposl
More informationControl-Flow Analysis and Loop Detection
! Control-Flow Anlysis nd Loop Detection!Lst time! PRE!Tody! Control-flow nlysis! Loops! Identifying loops using domintors! Reducibility! Using loop identifiction to identify induction vribles CS553 Lecture
More informationLecture Overview. Knowledge-based systems in Bioinformatics, 1MB602. Procedural abstraction. The sum procedure. Integration as a procedure
Lecture Overview Knowledge-bsed systems in Bioinformtics, MB6 Scheme lecture Procedurl bstrction Higher order procedures Procedures s rguments Procedures s returned vlues Locl vribles Dt bstrction Compound
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationDistributed Systems Principles and Paradigms
Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationUnit #9 : Definite Integral Properties, Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationc360 Add-On Solutions
c360 Add-On Solutions Functionlity Dynmics CRM 2011 c360 Record Editor Reltionship Explorer Multi-Field Serch Alerts Console c360 Core Productivity Pck "Does your tem resist using CRM becuse updting dt
More informationsuch that the S i cover S, or equivalently S
MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i
More informationMIPS I/O and Interrupt
MIPS I/O nd Interrupt Review Floting point instructions re crried out on seprte chip clled coprocessor 1 You hve to move dt to/from coprocessor 1 to do most common opertions such s printing, clling functions,
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-148 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationVirtual Machine (Part I)
Hrvrd University CS Fll 2, Shimon Schocken Virtul Mchine (Prt I) Elements of Computing Systems Virtul Mchine I (Ch. 7) Motivtion clss clss Min Min sttic sttic x; x; function function void void min() min()
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-245 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationTopic: Software Model Checking via Counter-Example Guided Abstraction Refinement. Having a BLAST with SLAM. Combining Strengths. SLAM Overview SLAM
Hving BLAST with SLAM Topic: Softwre Model Checking vi Counter-Exmple Guided Abstrction Refinement There re esily two dozen SLAM/BLAST/MAGIC ppers; I will skim. # # Theorem Proving Combining Strengths
More informationLR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table
TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-167 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationA Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards
A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin
More informationDr. D.M. Akbar Hussain
Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence
More informationMemory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples
EURSIP Journl on pplied Signl Processing 2003:6, 54 529 c 2003 Hindwi Publishing orportion Memory-Optimized Softwre Synthesis from tflow Progrm Grphs withlrgesizetsmples Hyunok Oh The School of Electricl
More informationAddress/Data Control. Port latch. Multiplexer
4.1 I/O PORT OPERATION As discussed in chpter 1, ll four ports of the 8051 re bi-directionl. Ech port consists of ltch (Specil Function Registers P0, P1, P2, nd P3), n output driver, nd n input buffer.
More informationVATA: A Library for Efficient Manipulation of Non-Deterministic Tree Automata
VATA: A Librry for Efficient Mnipultion of Non-Deterministic Tree Automt Ondřej Lengál 1, Jiří Šimáček 1,2, nd Tomáš Vojnr 1 1 FIT, Brno University of Technology, IT4Innovtions Centre of Excellence, Czech
More informationCS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis
CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl
More informationTransparent neutral-element elimination in MPI reduction operations
Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing
More informationElena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer.
DBMS Architecture SQL INSTRUCTION OPTIMIZER Dtbse Mngement Systems MANAGEMENT OF ACCESS METHODS BUFFER MANAGER CONCURRENCY CONTROL RELIABILITY MANAGEMENT Index Files Dt Files System Ctlog DATABASE 2 Query
More informationCS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08
CS412/413 Introduction to Compilers Tim Teitelum Lecture 4: Lexicl Anlyzers 28 Jn 08 Outline DFA stte minimiztion Lexicl nlyzers Automting lexicl nlysis Jlex lexicl nlyzer genertor CS 412/413 Spring 2008
More informationIt consists of two cold rooms, each with their own evaporator but sharing the same cooling flui d R134a system ( compressor, condenser...).
This system llows study of refrigertion systems implementtion of rmodyn mic clcultions pplied to refrigertion Its uniqueness is tht it is fully controllble vi Internet directly from web browser like Internet
More informationComputer-Aided Multiscale Modelling for Chemical Process Engineering
17 th Europen Symposium on Computer Aided Process Engineesing ESCAPE17 V. Plesu nd P.S. Agchi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Computer-Aided Multiscle Modelling for Chemicl Process
More informationScanner Termination. Multi Character Lookahead. to its physical end. Most parsers require an end of file token. Lex and Jlex automatically create an
Scnner Termintion A scnner reds input chrcters nd prtitions them into tokens. Wht hppens when the end of the input file is reched? It my be useful to crete n Eof pseudo-chrcter when this occurs. In Jv,
More informationvcloud Director Service Provider Admin Portal Guide vcloud Director 9.1
vcloud Director Service Provider Admin Portl Guide vcloud Director 9. vcloud Director Service Provider Admin Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/
More informationTries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries
Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer
More informationPARALLEL AND DISTRIBUTED COMPUTING
PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce
More informationAutomated and Quality-driven Requirements Engineering
Automted nd Qulity-driven Requirements Engineering Rolf Drechsler Mthis Soeken Robert Wille Deprtment of Mmtics nd Computer Science, University of Bremen, Germny Cyber-Physicl Systems, DFKI GmbH, Bremen,
More informationEECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining
EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more
More information9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association
9. CISC - Curriculum & Instruction Steering Committee The Winning EQUATION A HIGH QUALITY MATHEMATICS PROFESSIONAL DEVELOPMENT PROGRAM FOR TEACHERS IN GRADES THROUGH ALGEBRA II STRAND: NUMBER SENSE: Rtionl
More informationIf f(x, y) is a surface that lies above r(t), we can think about the area between the surface and the curve.
Line Integrls The ide of line integrl is very similr to tht of single integrls. If the function f(x) is bove the x-xis on the intervl [, b], then the integrl of f(x) over [, b] is the re under f over the
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-208 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationFall 2018 Midterm 2 November 15, 2018
Nme: 15-112 Fll 2018 Midterm 2 November 15, 2018 Andrew ID: Recittion Section: ˆ You my not use ny books, notes, extr pper, or electronic devices during this exm. There should be nothing on your desk or
More informationECE 468/573 Midterm 1 September 28, 2012
ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other
More informationCSCI 446: Artificial Intelligence
CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 Introduction to EsyMP Network Projection EsyMP Network Projection Fetures... 5 Disply Options... 6 Multi-Screen Disply Function... 6 Movie Sending Mode...
More informationCSEP 573 Artificial Intelligence Winter 2016
CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch
More informationChapter 2 Sensitivity Analysis: Differential Calculus of Models
Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls
More informationUNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS 1 COMPUTATION & LOGIC INSTRUCTIONS TO CANDIDATES
UNIVERSITY OF EDINBURGH COLLEGE OF SCIENCE AND ENGINEERING SCHOOL OF INFORMATICS INFORMATICS COMPUTATION & LOGIC Sturdy st April 7 : to : INSTRUCTIONS TO CANDIDATES This is tke-home exercise. It will not
More information