Design and Implementation of a Concurrency Control Mechanism in an Object-Oriented Database System

Size: px
Start display at page:

Download "Design and Implementation of a Concurrency Control Mechanism in an Object-Oriented Database System"

Transcription

1 Vol.ll No.4 J. of Comput. Sci. & Techol. Jul 1996 Desig ad Implemetatio of a Cocurrec Cotrol Mechaism i a Object-Orieted Database Sstem Qu Yuao (~~), Tia Zegpig (~il~), Wag Yuju (t-~n) ad Shi Baile (N ~ ~) Departmet of Computer Sciece, Fuda Uiversit, Shaghai Received Ma 10, 1995; revised Jauar 24, Abstract This paper presets a practical cocurrec cotrol mechaism ~ Object- Lockig i OODBMS. Object-Lockig ca schedule trasactios, each of them ca be cosidered as a sequece of high level operatios defied o classes. B the properties of parallelit ad commutativit betwee high level operatios, proper lock modes for each operatio axe desiged ad the compatibilit matrix is costructed. With these lock modes, phatoms are kept awa from databases ad a high degree of cocurrec is achieved. Kewords: Cocurrec cotrol, object-orieted database, trasactio maagemet. Itroductio Recet ears have see dramatic research ad developmet progress i the area of OODB (e.g., Orio, 02, Iris, Gemstoe, etc.[]'2]). Much effort has bee devoted to models, laguages, architecture, ad data maagemet [3], but few publishmet have appeared o desigig cocurrec cotrol mechaisms. For the ext geeratio iformatio sstem, cocurrec cotrol mechaisms are required to hadle High level operatios o complex objects ad to meet high throughput demads. For example, ma applicatios such as Office Iformatio Sstem, CAD/CAM, Software Egieerig, etc., require high performace ad support of complex iformatio. Traditioal cocurrec cotrol mechaisms i DBMS where the operatios are just Read ad Write, do ot support these applicatios well. Sematics-based cocurrec cotrol techiques have bee widel studied [4-7]. It could exploit richer sematic iformatio from objects ad high level operatios to get a higher degree of cocurrec. Hece, ma researchers believe that this kid of cocurrec cotrol is best suited for the trasactio maagemet of OODB sstems [3-5'7-9,]. Nevertheless a umber of sematics-based cocurrec cotrol schemes proposed for object-orieted sstems cosidered ol some special Abstract Data Tpes, e.g., Stack ad Queue [4,5'7]. Noe of them deal with a practical sstem. I this paper, we demostrate the desig ad implemetatio of a sematicsbased cocurrec cotrol mechaism i a OODB sstem ~ FOODB. FOODB is

2 338 J. of Comput. Sci. & Techol. Vol.11 a OODBMS, which was developed b the Computer Sciece Departmet of Fuda Uiversit. The cocurrec cotrol mechaism is desiged to schedule trasactios composed of high level operatios. There are three kids of operatios i FOODB: Schema operatios, Statistical operatios, ad Istace operatios. Schema operatios iclude querig or updatig the structure of a class. Statistical operatios iclude querig or updatig a set of objects (istaces) satisfig some coditios. Istace operatios iclude fidig, updatig or deletig a istace from a class, or isertig a istace to a class. 2 The FOODB Sstem 2.1 Architecture FOODB is a object-orieted database sstem. It has a cliet/server architecture. Database is stored o the server. All database operatios of the cliets are delivered to the server, where those operatios are executed. The uit of data trasfer betwee cliet ad server is object. The trasactio maager is resposible for cocurrec cotrol ad recover. The object maager is resposible for maagig objects i buffer, swappig objects betwee disks ad memor, ad packig or upackig objects for trasfer. Trasferrig objects betwee cliet ad server is the task of the commuicatio sstem. GUI(Graphical User Iterface) icludes a iteractive iterface ad a programmig iterface ad a set of sstem maiteace tools. Users ma use Object SQL (OSQL) or Exteded C++ to quer or update database i iteractive or programmig eviromet respectivel. 2.2 Data Model FOODB supports fudametal object-orieted cocepts: class, attribute, method, object, object idetit (OID), ecapsulatio, iheritace(sigle or multiple iheritace), polmorphism, etc. Complex objects are costructed through OID refereces betwee objects. Three tpes of refereces are used: (1) shared referece: the object ma be refereced b several objects; (2) exclusive referece: the object ma be refereced b ol oe object; (3) depedet referece: the referece is exclusive ad if X refereces Y the the existece of object Y depeds o the existece of object X. I FOODB, we also regard a class as a object. Schema operatios ad statistical operatios are set to this kid of objects. Operatios i the sstem are classified as follows. (1) Schema operatios 9 Schema quer: quer the structure of a class; 9 Schema evolutio: modif the structure of a class, e.g., add or drop a class, chage the superclass/subclass relatioship betwee a pair of classes, etc. We stipulate that the structure of a superclass caot be modified i its subclasses.

3 No.4 Cocurrec Cotrol Mechaism i a O-O Database Sstem 339 (2) Statistical operatios Statistical operatios operate o a set of istaces satisfig some give coditios. For example, selectig emploees (from a class) aged over 60 is a statistical operatio. (3) Istace operatios Istace operatios iclude: isert a object to a class, delete a object from a class, quer or update a object i a class. 2.3 Trasactio Model A trasactio is a sequece of database operatios. Users iteract with database b ivokig trasactios. A trasactio ca access a object or modif the state of a object ol b ivokig operatios (methods) defied for that object. Operatios scheduled b the trasactio maager are ot ol simple read or write, but also various high level operatios of classes. Users' trasactios i a sstem axe a successio of method ivocatios. Begi Oidl.M1... Oidi.Mi... Oid.M~ Ed Oidi: object idetifier, Mi: ame of a method 3 Commutativit ad Parallelit Parallelism allowed b a cocurrec cotrol mechaism depeds to a large extet o the properties of parallelit ad commutativit betwee the operatios defied o objects. Let X be a object that is usable through operatios Oi ad Oj. The pair of operatios (O~, O) has the propert of Parallellt if whatever is the iitim state of object X, for the cocurret executios of the two operatios b two differet trasactios, the effects o object X ad the trasactios are the same. I other words, two parallel operatios ma be performed cocurretl without havig to be cotrolled. For example, two quer operatios are parallel. Whe two operatios axe ot parallel, Commutativit ma be used, which is a weaker propert. The pair of operatios (Oi, Oj) has the propert of Commutativit if, whatever is the state of object X, executio of operatio O~ b trasactio Ti followed b executio of operatio Oj b trasactio Tj has the same fial effects o object X ad the same results for the trasactios as the executio i the reverse order (Oj followed b Oi). Let S be a database state, O be a operatio. State (O, S) is a state that is produced b the executio O o state S. Retur (O, S) is the retur value of operatio O executed o state S. We assume that ever operatio will retur a value, at least a status or coditio code (e.g. read operatio ma retur a value read b the operatio, write operatio ma retur a status idicatig success or failure of its executio). The above operatio O ma also be a sequece of operatios. Thus,

4 340 J. of Comput. Sci. & Techol. Vol.ll i this case, state (O, S) is the state produced after the executio of the operatios i O;.retur (O, S) is the retur value set of operatios i O executed o S. Let 01//02 mea that operatios O1 ad 02 execute i parallel. O102 meas that operatio 02 is executed followig the executio of O1. Defiitio 1. Two operatios 01 ad 02 are parallel if 01 ad 02 ca be executed cocurretl without a cotrol o the order of executio of their lower level operatios, ad/or all states S, state(01//02, S)=state(0102,S), state(01// 02,S)=state(0201,S), retur(01////02,s)=retur(ol02, S), retur(o1//// O2,S)= retur(0201,s). Defiitio 2. Two operatios O1 ad 02 are commutative if, for all states S, state(olo2,s)=state(0201,s), retur(0102, S)=retur(0201, S). It is obvious that if two operatios are parallel the the are commutative. I this paper, for simplicit, we schedule parallel operatios ad commutative operatios i the same maer (i fact, we ca exploit higher cocurrec from parallelit tha from commutativit). We call two operatios to be Coditioall Commutative, if the must satisf some coditios to commute. For example, for database state S = {x = 1,.-.}, there is a itegrit costrait: x > 0. Two operatios, O1: x = x+c, 02 : x = x-d. O1 ad 02 are commutative if the coditio 1 > d is true, otherwise the do ot commute. B coditioal commutativit, the cocurrec cotrol mechaism ca exploit more sematic iformatio for cocurrec. I OODBS, there are ma such sematic data i operatios ad objects [4'51. Therefore, how to exploit them is importat for the efficiec of a sstem. Defiitio 3. Two operatios are coflict iff the are ot commutative. 4 Lockig Techiques 4.1 Class Hierarch Lockig From the operatioal sematics i OODB, we kow that if a operatio operates o class C, the it ma also operate o the subclasses of C. The itetio lock mode ad simple graularit lockig protocol are satisfactor, if ol sigle iheritace relatioships are permitted. But this does ot work for a class hierarch i which a class ma have more tha oe superclass. Fig.1 is a multiple iheritace class hierarch. Class C has two superclasses C1, C2, ad oe subclass S C. C1 ad C2 have superclasses SC1 ad SC2 respectivel. Suppose a trasactio T1 sets a readlock o C1 ad a itetio lock o SC1, implicitl lockig subclasses C ad SC i readlock mode. Now aother trasactio T2 sets a writelock o C2 ad a itetio lock o SC2. T2 will also lock class C ad SC i writelock mode implicitl. The coflict o class C ad SC betwee T1 ad T2 is ot detected. This meas that settig itetio lock o the superclasses of the class beig locked is ot sufficiet to detect all coflictig requests from differet trasactios. To solve the above problems ad make lockig mechaisms more efficiet, for ever class C, we maitai a list L that records all C's subclasses that have more tha oe superclass.

5 No.4 Cocurrec Cotrol Mechaism i a 0-O Database Sstem 341 We ow give the class hierarch lockig protocol. (1) Lock class C. (2) Lock those of C's superclasses alog a oe superclass chai i itetio lock mode. (3) Fid the set S~ of C's subclasses with more tha oe superclass through L, for ever e 6 Si, lock e. Fig.1 Fig Complex Object Lockig I OODB, the uit of access to a database is a object, that is, the smallest uits of lockig are objects. Objects are usuall complex, i.e. the ca be costructed from other objects. Moreover, these objects ma also be shared b several differet objects. So, object lockig is a complicated task. The geeral techiques of complex object lockig have bee studied i [7,10]. I this paper, i order to exploit structural sematics of objects, we use referetial sematics to improve cocurrec i additio to usig commutativit propert betwee operatios. Now let's see the impacts of complex object lockig. X, Y, ad Z are objects costructed from subobjects x,, z as show i Fig.2. Object is shared b X, Y, Z. Trasactios are TI: O1(X)O2(Z) Is: O3(V) Suppose oe schedule S for TI ad T2 is S: OI(X)O3(Y)O2(Z) If we ol lock X, Y, ad Z, but do ot lock their subobjects x,, z, the it seems that T1 ad T2 do ot coflict, so, S is permitted. I fact, the high level operatios 01(X), O2(Z), ad O3(Y) must be coverted ito suboperatios o x, ad z: o (x) o2(z) o2()o (z) o3(v) o3() So, the schedule S becomes S t. s': If both operatio pairs (01(),o3()) ad (03(),o2()) do ot commute, the S' is ot serializable. Hece S is ot correct.

6 342 J. of Comput. Sci. & Techol. Vol.11 The problem here is that the coflicts at subobjects are igored! So, whe lockig complex objects, ot ol should we cosider the objects, but also their subobjects. If, i the above example, the referetial tpe of Y to is exclusive, that is, caot be refereced b X ad Z, the S must be serializable. I order to lock complex objects correctl ad efficietl, we ma use the referetial sematics i the lockig protocol. We stipulate that if object X refereces object Y exclusivel, the, for ever object Z refereced b Y, the referetial tpe of Y to Z is also exclusive. Now we give the complex object lockig protocol. (1) Lock object X. (2) If X refereces object Y i shared tpe, the lock Y. B this complex object lockig protocol, it is uecessar to lock the subobjects that are refereced exclusivel. Operatios ad Lock Modes Operatios i classes are the uits of schedulig b cocurrec cotrol mechaism i FOODB. For ever operatio, there is a correspodig lock mode. Whe a operatio begis to operate o object X, the cocurrec cotrol mechaism should lock X i its correspodig lock mode before it is executed. All operatios i FOODB are classified as three tpes. 1) Schema operatio This tpe of operatios icludes querig or updatig class hierarch. (1) quer the structure of a class (2) create or drop a class (3) add (drop) a attribute to (from) a class (4) add (drop) a iheritace relatioship to (from) a class (5) add (drop) a method to (from) a class 2) Statistical operatio This tpe of operatios icludes querig or updatig a set of istaces that satisf some give coditios. (1) quer a set of istaces that satisf a give coditio (2) update a set of istaces that satisf a give coditio (3) delete a set of istaces that satisf a give coditio 3) Istace operatio (1) fid a istace from a class (2) update a istace i a class (3) isert a istace to a class (4) delete a istace from a class The lock modes are desiged as follows. 1) Class lock (1) c-qh class quer lock (2) c-uh class update lock 2) Istace lock (1) i-sl: istace set quer lock (2) i-ql(ob): istace quer lock

7 No.4 Cocurrec Cotrol Mechaism i a O-O Database Sstem 343 (3) i-ul(ob): istace update lock (4) i-il(ob): istace isert lock (5) i-dl(ob): istace delete lock The i-ql, i-ul, i-il ad i-dl have a parameter ob idicatig the Oid of the object beig locked. Lock Mode c-ql c-ul i-sl i-ql(ob) i-ul(ob) i-il(ob) i-dl(ob) Operatios schema operatio(l) schema operatio(2)--(5), statistical operatio(2)--(3) statistical operatio(l) istace operatio(l) istace operatio(2) istace operatio(3) istace operatio(4) Fig.3 c-ql c-ul i-sl "i-ql(ob) i-ul(ob) i-il(ob) i-dl(ob) c-ql c-ul i-sl ob=obq i-ql(ob') i-ul(ob') i-il(ob') i-dl(ob') Y Y Y Y c c c C C C C c c c C C C C c="", ob # ob': c--", Fig.4 Ever operatio has a correspodig lock mode. The operatios ad their correspodig lock modes are described i Fig.3. I order to reduce the umber of locks set o objects to oe at a time, statistical operatios (2) ad (3) use the same lock mode as schema evolutio operatios. To get a higher degree of cocurrec, we desig a i-sl lock mode for statistical operatio (1). B the sematics of operatios ad commutativit betwee them, we summarize the compatibilit matrix of lock modes as Fig.4. If two lock modes are compatible, the their correspodig operatios ca be executed cocurretl. The "d ~ i matrix meas that two lock modes are coditioall compatible, that is, their correspodig operatios are coditioall commutative. For example, if two deletio operatios delete two differet objects the the ca be executed cocurretl. If a object, which is iserted or deleted b oe trasactio T1, ma also be operated b aother trasactio T2, the we sa that the object is a Phatom for T2, otherwise it is ot a phatom object for T2. I Orio, phatom problems

8 344 J. of Comput. Sci. & Techol. Vol.ll were ot cosidered, whereas i [3], i order to avoid phatoms, isert or delete operatio coflicted with all operatios. B our scheme, phatoms are avoided, ad the operatio pairs (isert, isert), (isert, delete) ad (delete, delete) ca be executed i parallel or coditioall parallel. 6 Desig ad Implemetatio of Cocurrec Cotrol Mechaism -- Object-Lockig I this sectio, we desig ad implemet the cocurrec cotrol mechaism -- Object-Lockig o the basis of above discussios. Fig.5 is the descriptio of Object-Lockig. It is a two-phase lockig procedure, that is, oce a trasactio releases a lock, it ever obtais locks agai. Ol whe trasactio's commit or abort operatios are received, ca the trasactio's locks be released. Sice deadlock detectig procedure is used, Object-Lockig is deadlockfree. Object-Lockig Iput: trasactio's operatio Oi Output: decisio of whether Oi ca be executed or ot Method: Do Case Case Oi # commit ad Oi #abort lock the object i a proper lock mode depedig o the tpe of O/ if lockig succeeds the retur(execute O/) else begi put Oi i wait-queue call WFG-adjust/*adjust WFG */ call deadlock-detect if there is a circle i WFG the begi call trasactio abort(ti) call WFG-adjust awake some trasactios i wait-queue retur ed ed susped Ti util T/is awaked Case Oi=abort call trasactio abort(ti) call WFG-adjust awake some trasactios i wait queue Case Oi =coxmit call buffer-write(t/) call WFG-adjust call lock-release(t/) awake some trasactios i wait queue EdCase Fig.5

9 No.4 Cocurrec Cotrol Mechaism i a O-O Database Sstem 345 A operatio Oi o a give object coflicts if it is ot commutative with other operatios executed o this object b still active trasactios, i.e. those trasactios that have ot bee committed or aborted. Whe a operatio coflicts, the trasactio requests that the operatio be blocked, ad deadlock detectio eeds to be iitiated. The process of checkig for deadlock is achieved b usig a walt-for-graph. Whe a trasactio issues a request to execute a operatio, the cocurrec cotrol mechaism, b usig the compatibilit matrix ad lockig process, determies whether the operatio request coflicts or ot. If the request coflicts, the trasactio is made to wait. The correspodig wait-for edges are added ad a circle detectio algorithm is iitiated. If a circle is foud, the trasactio makig the request is aborted. Whe a trasactio termiates successfull or usuccessfull, the ode that correspods to the termiatig trasactio together with the edges associated with the ode is removed from the WFG. The results of the trasactio are writte back to database or discarded simpl. All locks used b the trasactio are released. 7 Discussio (1) High level operatios as schedulig uits More ad more researchers believe that high level operatios as schedulig uits of cocurrec cotrol are preferable i OODB or other egieerig eviromets [4-s]. Because rich sematics of the operatios ca be exploited to improve cocurrec, the cocurrec cotrol mechaism ca be made more efficiet. I this paper, there are three kids of operatios: schema operatios, statistical operatios, ad istace operatios. Usig the sematics of these operatios, we ca schedule them i a more appropriate wa. For example, two isert operatios ca alwas be executed cocurretl, deletio ad isertio operatios ca be executed coditioall cocurretl, etc. Moreover, the phatoms ca be described clearl ad avoided ratioall, whereas the simple lower level operatio-based (read, write) trasactio model caot achieve this so clearl ad coveietl. (2) Recover The high level operatio- based trasactio model ecessitates further researches i recover methods[s,9]. Covetioal recover techiques based o log, for example, are ot adequate for the ew trasactio model. Whe simpl istallig the database, the "before image" of update doe b aborted trasactio is ot correct sometimes. I [8], the authors defied the otio of "strictess" for histories cotaiig high level operatios, ad gave a recover rule b simpl executig their "iverse" operatios. I [9], the authors developed a uified trasactio model icludig both data operatios ad termiatio operatios (commit, abort), which allows reasoig about the correctess of cocurrec cotrol ad recover withi the same framework. The future importat work is how to embed these techiques to real OODB sstems.

10 346 J. of Comput. Sci. & Techol. Vol.ll 8 Coclusio We have developed a practical cocurrec cotrol mechaism i OODBMS ad give the trasactio model based o three kids of high level operatios: schema operatios, statistical operatios, istace operatios. B the properties of parallelit ad commutativit betwee these operatios, the proper lock mode for each operatio has bee desiged ad the compatibilit matrix is costructed. With these lock modes, phatoms are preveted ad a high degree of cocurrec is achieved. Refereces [1] Berstei P A, Hazilacos V, Goodma N. Cocurrec Cotrol ad Recover i Database Sstem. Addiso-Wesle, Readig, MA, [2] Wo Kim. Itroductio to Object-Orieted Database. MIT Press, Cambridge, [3] Cart M, Feeri J. Itegratig Cocurrec Cotrol. I Buildig a Object-Orieted Database/The Stor of OP, Bacilho F, Claude Delobel, Paris Kaellakis, (eds.), Morga Kaufla Publishers, Sa Mateo, Califoria, [4] Paos K Chrsathis et al. Extractig cocurrec from objects: A methodolog. ACM. PODS [5] Badriath B, Ramamritham K. Sematics-based cocurrec cotrol: Beod commutativit. ACM PODS, [6] Badriath B, Ramamritham K. Performace evaluatio of sematics-based multilevel cocurrec cotrol protocols. I Proc. of ACM SIGMOD, [7] Weihl W. Commutativit-based cocurrec cotrol for abstract data tpes. IEEE Tras. o Computers, Dec [8] Rajeev Rastogi, Korth H F, Avi Silberschatz. Strict histories i object-based database sstem. ACM PODS, [9] Has-Jorg Schek, Gerhard Weikum, Haia Ye. Towards a uified theor of cocurrec cotrol ad recover. ACM PODS, [10] Jorge F Garza, Wo Kim. Trasactio maagemet i object orieted database sstem. I Proc. of ACM SIGMOD, Qu Yuao is a Associate Professor i Departmet of Computer Sciece, Fuda Uiversit. His curret research iterests iclude trasactio processig ad distributed Database. Tia Zegpig is a Ph.D. cadidate i Departmet of Computer Sciece, Fuda Uiversit. His curret research iterests iclude i Multimedium Database. Wag Yuju is a Ph.D. cadidate i Departmet of Computer Sciece, Fuda Uiversit. His curret research iterests are data model ad quer laguage. Shi Baile is a Professor i Departmet of Computer Sciece, Fuda Uiversit. His curret research iterests iclude database theor ad applicatio, software egieerig.

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 20 Itroductio to Trasactio Processig Cocepts ad Theory Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Trasactio Describes local

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

TRANSACTION MANAGEMENT [CH 16]

TRANSACTION MANAGEMENT [CH 16] Sprig 2017 TRANSACTION MANAGEMENT [CH 16] 4/25/17 CS 564: Database Maagemet Systems; (c) Jigesh M. Patel, 2013 1 Trasactio Maagemet Read (A); Check (A > $25); Pay ($25); A = A 25; Write (A); Yes You Read

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Review: The ACID properties

Review: The ACID properties Recovery Review: The ACID properties A tomicity: All actios i the Xactio happe, or oe happe. C osistecy: If each Xactio is cosistet, ad the DB starts cosistet, it eds up cosistet. I solatio: Executio of

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig

More information

Automatic Generation of Minimal and Safe Transactions in Conceptual Database Design

Automatic Generation of Minimal and Safe Transactions in Conceptual Database Design Automatic Geeratio of Miimal ad Safe Trasactios i Coceptual Database Desig M. A. Pastor, M. Celma-Giméez, L. Mota-Herraz Departameto de Sistemas Iformáticos y Computació; Uiversidad Politécica de Valecia

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs Dyamic Aalysis ad Desig Patter Detectio i Java Programs Outlie Lei Hu Kamra Sartipi {hul4, sartipi}@mcmasterca Departmet of Computig ad Software McMaster Uiversity Caada Motivatio Research Problem Defiitio

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Empirical Validate C&K Suite for Predict Fault-Proneness of Object-Oriented Classes Developed Using Fuzzy Logic.

Empirical Validate C&K Suite for Predict Fault-Proneness of Object-Oriented Classes Developed Using Fuzzy Logic. Empirical Validate C&K Suite for Predict Fault-Proeess of Object-Orieted Classes Developed Usig Fuzzy Logic. Mohammad Amro 1, Moataz Ahmed 1, Kaaa Faisal 2 1 Iformatio ad Computer Sciece Departmet, Kig

More information

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Recursion. Recursion. Mathematical induction: example. Recursion. The sum of the first n odd numbers is n 2 : Informal proof: Principle:

Recursion. Recursion. Mathematical induction: example. Recursion. The sum of the first n odd numbers is n 2 : Informal proof: Principle: Recursio Recursio Jordi Cortadella Departmet of Computer Sciece Priciple: Reduce a complex problem ito a simpler istace of the same problem Recursio Itroductio to Programmig Dept. CS, UPC 2 Mathematical

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

Outline n Introduction n Background o Distributed DBMS Architecture

Outline n Introduction n Background o Distributed DBMS Architecture Outlie Itroductio Backgroud o Distributed DBMS Architecture Datalogical Architecture Implemetatio Alteratives Compoet Architecture o Distributed DBMS Architecture o Distributed Desig o Sematic Data Cotrol

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization Ed Semester Examiatio 2013-14 CSE, III Yr. (I Sem), 30002: Computer Orgaizatio Istructios: GROUP -A 1. Write the questio paper group (A, B, C, D), o frot page top of aswer book, as per what is metioed

More information

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de

More information

Goals of the Lecture UML Implementation Diagrams

Goals of the Lecture UML Implementation Diagrams Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

Lazy Type Changes in Object-oriented Database. Shan Ming Woo and Barbara Liskov MIT Lab. for Computer Science December 1999

Lazy Type Changes in Object-oriented Database. Shan Ming Woo and Barbara Liskov MIT Lab. for Computer Science December 1999 Lazy Type Chages i Object-orieted Database Sha Mig Woo ad Barbara Liskov MIT Lab. for Computer Sciece December 1999 Backgroud wbehavior of OODB apps compose of behavior of persistet obj wbehavior of objects

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 4 Procedural Abstractio ad Fuctios That Retur a Value Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 4.1 Top-Dow Desig 4.2 Predefied Fuctios 4.3 Programmer-Defied Fuctios 4.4

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

A Reservation-Based Extended Transaction Protocol

A Reservation-Based Extended Transaction Protocol Clevelad State Uiversity EgagedScholarship@CSU Electrical Egieerig & Computer Sciece Faculty Publicatios Electrical Egieerig & Computer Sciece Departmet 2-2008 A Reservatio-Based Exteded Trasactio Protocol

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Cocurrecy Threads ad Cocurrecy i Java: Part 1 What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

top() Applications of Stacks

top() Applications of Stacks CS22 Algorithms ad Data Structures MW :00 am - 2: pm, MSEC 0 Istructor: Xiao Qi Lecture 6: Stacks ad Queues Aoucemets Quiz results Homework 2 is available Due o September 29 th, 2004 www.cs.mt.edu~xqicoursescs22

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Threads ad Cocurrecy i Java: Part 1 1 Cocurrecy What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Goals of this Lecture Activity Diagram Example

Goals of this Lecture Activity Diagram Example Goals of this Lecture Activity Diagram Example Object-Orieted Aalysis ad Desig - Fall 998 Preset a example activity diagram Ð Relate to requiremets, use cases, ad class diagrams Also, respod to a questio

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

COP4020 Programming Languages. Functional Programming Prof. Robert van Engelen

COP4020 Programming Languages. Functional Programming Prof. Robert van Engelen COP4020 Programmig Laguages Fuctioal Programmig Prof. Robert va Egele Overview What is fuctioal programmig? Historical origis of fuctioal programmig Fuctioal programmig today Cocepts of fuctioal programmig

More information

Operating System Concepts. Operating System Concepts

Operating System Concepts. Operating System Concepts Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

Customer Portal Quick Reference User Guide

Customer Portal Quick Reference User Guide Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is

More information

Solving Fuzzy Assignment Problem Using Fourier Elimination Method

Solving Fuzzy Assignment Problem Using Fourier Elimination Method Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

ISSN (Print) Research Article. *Corresponding author Nengfa Hu

ISSN (Print) Research Article. *Corresponding author Nengfa Hu Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 2016; 4(5):249-253 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.saspublisher.com

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

IMPLEMENTATION OF TRANSACTION AND CONCURRENCY CONTROL SUPPORT IN A TEMPORAL DBMS

IMPLEMENTATION OF TRANSACTION AND CONCURRENCY CONTROL SUPPORT IN A TEMPORAL DBMS IMPLEMENTATION OF TRANSACTION AND CONCURRENCY CONTROL SUPPORT IN A TEMPORAL DBMS COSTAS VASSILAKIS 1, NIKOS LORENTZOS 2, PANAGIOTIS GEORGIADIS 1 1 Departmet of Iformatics, Uiversity of Athes, TYPA Builds.,

More information

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria.

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria. Computer Sciece Foudatio Exam August, 005 Computer Sciece Sectio A No Calculators! Name: SSN: KEY Solutios ad Gradig Criteria Score: 50 I this sectio of the exam, there are four (4) problems. You must

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information

BEA Tuxedo. Creating CORBA Server Applications

BEA Tuxedo. Creating CORBA Server Applications BEA Tuxedo Creatig CORBA Server Applicatios BEA Tuxedo Release 8.0 Documet Editio 8.0 Jue 2001 Copyright Copyright 2001 BEA Systems, Ic. All Rights Reserved. Restricted Rights Leged This software ad documetatio

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Today s objectives. CSE401: Introduction to Compiler Construction. What is a compiler? Administrative Details. Why study compilers?

Today s objectives. CSE401: Introduction to Compiler Construction. What is a compiler? Administrative Details. Why study compilers? CSE401: Itroductio to Compiler Costructio Larry Ruzzo Sprig 2004 Today s objectives Admiistrative details Defie compilers ad why we study them Defie the high-level structure of compilers Associate specific

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 26 Ehaced Data Models: Itroductio to Active, Temporal, Spatial, Multimedia, ad Deductive Databases Copyright 2016 Ramez Elmasri ad Shamkat B.

More information

Topics. Instance object. Instance object. Fundamentals of OT. Object notation. How do objects collaborate? Pearson Education 2007 Appendix (RASD 3/e)

Topics. Instance object. Instance object. Fundamentals of OT. Object notation. How do objects collaborate? Pearson Education 2007 Appendix (RASD 3/e) Appedix (RASD 3/e) MACIASZEK, L.A. (2007): Requiremets Aalysis ad System Desig, 3 rd ed. Addiso Wesley, Harlow Eglad ISBN 978-0-321-44036-5 Appedix Fudametals of Object Techology Pearso Educatio Limited

More information

Chapter 2 Distributed Information Systems Architecture

Chapter 2 Distributed Information Systems Architecture Prof. Dr.-Ig. Stefa Deßloch AG Heterogee Iformatiossysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@iformatik.ui-kl.de Chapter 2 Distributed Iformatio Systems Architecture Chapter Outlie (Distributed)

More information

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers

Outline. CSCI 4730 Operating Systems. Questions. What is an Operating System? Computer System Layers. Computer System Layers Outlie CSCI 4730 s! What is a s?!! System Compoet Architecture s Overview Questios What is a?! What are the major operatig system compoets?! What are basic computer system orgaizatios?! How do you commuicate

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

State-space feedback 6 challenges of pole placement

State-space feedback 6 challenges of pole placement State-space feedbac 6 challeges of pole placemet J Rossiter Itroductio The earlier videos itroduced the cocept of state feedbac ad demostrated that it moves the poles. x u x Kx Bu It was show that whe

More information

Definitions. Error. A wrong decision made during software development

Definitions. Error. A wrong decision made during software development Debuggig Defiitios Error A wrog decisio made durig software developmet Defiitios 2 Error A wrog decisio made durig software developmet Defect bug sometimes meas this The term Fault is also used Property

More information

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU) Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Schema for the DCE Security Registry Server

Schema for the DCE Security Registry Server Schema for the Security egistry Server Versio Date: 0/20/00 For questios or commets cocerig this documet, sed a email ote to dce-ldap@opegroup.org or call Doa Skibbie at 52 838-3896. . Itroductio...3 2.

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

Modern Systems Analysis and Design Seventh Edition

Modern Systems Analysis and Design Seventh Edition Moder Systems Aalysis ad Desig Seveth Editio Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Desigig Databases Learig Objectives ü Cocisely defie each of the followig key database desig terms: relatio,

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

Goals of the Lecture Object Constraint Language

Goals of the Lecture Object Constraint Language Goals of the Lecture Object Costrait Laguage Object-Orieted Aalysis ad Desig - Fall 1998 Preset the Object Costrait Laguage Ð As best as possible, with the limited iformatio available from UML i a Nutshell

More information