Preserving Referential Constraints in XML Document Association Relationship Update

Size: px
Start display at page:

Download "Preserving Referential Constraints in XML Document Association Relationship Update"

Transcription

1 Preserving Referentil Constrints in XML Document Assocition Reltionshi Udte Eric Prdede 1, J. Wenny Rhyu 1, Dvid Tnir 2 1 Dertment of Comuter Science nd Comuter Engineering, L Trobe University, Bundoor VIC 3083, Austrli ekrdede, wenny}@cs.ltrobe.edu.u 2 School of Business System, Monsh University, Clyton VIC 3800, Austrli Dvid.Tnir@infotech.monsh.edu.u Abstrct. In this er we roose the usge of W3C-stndrdized query lnguge, XQuery, to ccommodte XML Udte. Our min im is to enble the udte without violting the semntic constrint of the documents. The focus of the udte is on the ssocition reltionshi. Therefore, we distinguish the reltionshi tye bsed on the number of rticints, crdinlity, nd dhesion. We lso roose the ming of the ssocition reltionshi in the concetul level to the XML Schem. We use XML Schem for structure vlidtion, even though the lgorithm cn be used by ny schem lnguges. 1 Introduction In the lst few yers the interest in storing XML Documents in the ntive XML Dtbses (NXD) hs emerged ridly. The min ide is to store the documents in their nturl tree form. However, it is well-known tht mny users still refer to use DBMS tht re bsed on estblished dt models such s Reltionl Model for their document storge. One reson is the incomleteness of NXD query lnguge. Mny rorietry XML query lnguges nd even W3C-stndrdized lnguges still hve limittions comred to the Reltionl Model SQL. One of the most imortnt limittions is the lck of the udte oertions suort [8]. Different NXD lies different strtegies for XML udtes. Very frequently fter udte oertions, the XML document contins mny dngling references, loses the key ttribute, hs unnecessry dulictions, nd mny other roblems tht indicte very low dtbse integrity. In our best knowledge, there is no XML query lnguge tht hs considered the integrity issues tht emerge from the udte oertions. We suggest this s n imortnt issue to rise nd to investigte further. This er rooses the XQuery [11] for udte oertions. It is bsed on the bsic oertions firstly mentioned in [9]. Our min contribution is tht we hve included semntic constrints in the oertions. It focuses on the udte for ssocition reltionshi, which cn be defined s reference reltionshi between one to nother

2 node/document in n XML tree. We will distinguish different ssocition tye bsed on the number of rticints nd on the crdinlity. The XQuery udte considers different trget contents whether it is key node or key reference node. By doing this, we remove the ossibilities of low integrity dt fter ech udte oertion. For XML udte we need structure vlidtion nd we roose the use of XML Schem [10]. Thus, rt of the er is llocted to develoing trnsformtion on the ssocition reltionshi into XML Schem, in wy tht suits our roosed XQuery. 2 XML Document Udte: An Overview There re severl strtegies for udting XML documents in NXDs [1][8]. At the time of writing, there re three min strtegies: (i) use rorietry udte lnguge tht will llow udting within the server [3][7], (ii) use XUdte, the stndrd roosed by XML DB inititive for udting distinct rt of document [2][5], nd (iii) use XML API fter retrieve the document out of the dtbse [4]. It is imortnt to mention tht none of these re concerned with the semntic constrint of the udted XML document. Different strtegies hve limited the dtbse interchngebility. To unite these different strtegies, [9] hs tried to roose the udte rocesses for XML Documents into n XML lnguge. These rocesses re embedded into XQuery nd thus, cn be used for ny NXD tht hs suorted this lnguge. In [9] the udte is embedded in the XQuery FLOWR exression. Note the difference between the originl XQuery (Fig.1) nd its extension [ (Fig. 2). The UPDATE cluse secifies the node trgets tht will be udted. Inside the UPDATE cluse, we determine the oertion tyes. FOR $binding1 IN th exression LET $binding := th exression WHERE redicte, ORDER BY redicte, results Fig. 1. XQuery FLOWR Exressions FOR...LET...WHERE... UPDATE $trget DELETE $child INSERT content [BEFORE AFTER $child] REPLACE $child WITH $content,subo}* } Fig. 2. XQuery UPDATE Extensions Nonetheless, even with this roosl there is bsic question to nswer. We do not know how the udte oertions cn ffect the semntic correctness of the udted XML Documents. Secificlly for the ssocition reltionshi, this roosl does not mintin the referentil constrint between the ssocited nodes/documents. This fct hs motivted us to tke the toic ste further.

3 3 Assocition Reltionshis in XML Document Assocition reltionshi is reference reltionshi between one object with nother object in system. For n XML document, the object is node or document. Semnticlly, this reltionshi tye cn be distinguished by some constrints such s number of rticint tye, crdinlity, nd dhesion. These constrints cn be esily identified in XML Dt Model such s in Semntic Network Digrm [2]. We will show running exmle describing different ssocition reltionshi constrints (see Fig. 3). FcultyID FACULTY FcultyNme [1..N] SubjCode SubjNme SubjDesc SUBJECT TechBy (reference Stff) s[0..n] wek dhesion SubjPrereq (reference Subject) StffNme s[0..n] wek dhesion StffAddress [1..N] STAFF StffOffice (reference Office) s[0..1] wek dhesion s[0..n] wek dhesion [1..N] OfficeNumber StffReserch (reference Reserch) OFFICE OfficeLoc StffID [1..N] OfficePhone ReserchCode RESEARCH ReserchNme [1..N] ReserhMember (reference Stff) ReserchDesc Fig. 3. Assocition Tyes in XML Document Tree The number of rticints cn be distinguished into unry nd binry. In the former, n object refers to nother object of the sme tye. For exmle, there is one unry reltionshi, where node SubjPrereq in Subject document refers to nother subject. In the binry reltionshi, the rticints come from different tyes. In our exmle bove, there re: Subject:Stff, Stff:Office, nd Stff:Reserch. Assocition crdinlity identifies the number of objects of the sme tye to which single object cn relte. For exmle, stff cn tech no subject t ll to mny subjects [0..N]. In the digrm the defult crdinlity is [1..1]. Finlly, ssocition dhesion identifies whether the ssocited objects must or must not coexist nd dhere to ech other. In the digrm the defult dhesion is strong dhesion. For exmle, Stff hs wek dhesion ssocition to Subject, which mens tht the former does not require the ltter to exist.

4 4 Ming Assocition Reltionshi to XML Schem XQuery udte will require schem to vlidte the document structure. We select XML Schem becuse s well s its recision in defining the dt tye, XML Schem hs n effective bility to define the semntic constrints of document. It includes the crdinlity, dhesion, nd referentil integrity constrint deicted in Fig. 3. First, the crdinlity constrint is very strightforwrd nd well-known. We cn determine the minoccurs nd mxoccurs fter n element declrtion. It is generl rctice tht these constrints re not used for ttribute. A rticulr ttribute will er, t most, once in n object/instnce. Second, the dhesion constrint cn esily be indicted by the use constrint. A strong dhesion hs use required nd wek dhesion hs use otionl. However, in rctice the use constrint cn only be ttched in ttribute. We will find roblem if, for exmle, the dhesion constrint is lied to n element. Fortuntely, we cn utilize the crdinlity constrint to define the dhesion constrint s well. Crdinlity [0..1] or [0..N] indictes wek dhesion, while [1..1] or [1..N] indictes strong dhesion. For consensus we rovide tble combining the two constrints tht cn be very useful for the next section. Tble 1. Adhesion nd Crdinlity Constrints in XML Schem Adhesion Crdinlity Wht to Use Strong 1:1 Attribute (use = required ) 1:N Element (minoccurs= 1 mxoccurs= unbounded ) N:N Element (minoccurs= <2.. > mxoccurs= unbounded ) Wek 0:1 Attribute (use = otionl ) 0:N Element (minoccurs= 0 mxoccurs= unbounded ) Thirdly, for the referentil integrity constrint, XML Schem rovides two otions ID/IDREF nd key/keyref. We hve chosen to use the ltter for severl resons: (i) key hs no restriction on the lexicl sce [10], (ii) key cnnot be dulicted nd thus fcilitte the unique semntic of key node, nd (iii) key/keyref cn be defined in secific element nd, thereby, heling the imlementer to mintin the reference. For our design, we roose to crete secific element under the root element clled GrouKey to store ll keys nd keyrefs. It is required to trck the th of the ssocited elements once n udte is erformed. We cnnot just declre the key/keyref inside the element where they re ered. We will exerience roblems in trcking n ssocited element since keyref cn only trce the key declred in the sme element or in its direct redecessor. For exmle, if we declre the keyref TechBy inside subject element nd key StffID inside stff element, the keyref cnnot trce the key nd thus, if we udte stff, there is no checking done to ensure the subject refers to the rticulr stff. In unry reltionshi, the key nd keyref ttribute/element is locted under one element. In binry reltionshi we hve to determine the loction of the keyref t-

5 tribute/element. The dhesion constrint is used for this urose. Locte the keyref ttribute/element under the ssocited element tht hs strong dhesion towrds the other. In the cse where both ssocited elements re in strong dhesion, the keyref ttribute/element will be dded in both elements. For exmle (see Fig.3), in the reltionshi between stff nd reserch, we dd reference ReserchMember inside reserch element tht refers to StffID, nd reference StffReserch inside reserch element tht refers to ReserchCode. 5 Proosed XQuery Udte Now we hve shown how to m the concetul model into logicl XML Schem, we cn begin to roose the XQuery for Udte rocesses. The udte cn be differentited into three min rts: deletion, insertion, nd relcement. 5.1 XQuery for Delete Oertion Deletion is the simlest udte oertion, esecilly if we wnt to delete n ttribute/element tht contins simle dt. In this cse we only require the binding to the rent nd the child. We do not need to erform redicte checking on instnces. However, if the ttribute nd element lso hve roles s key/keyref the checking on instnces is required to mintin the referentil integrity constrint. For our roosed XQuery, we differentite the oertion for key nd keyref since we ut focus on the ssocition reltionshi. For deletion however, there is no constrint checking required for keyref node since it is treted like simle dt content. The following XQuery shows functions used for redictes in key deletion. Function checkkeyrefnode checks whether the trget key node hs keyref node referred to it. This function highlights one reson why we select key/keyref insted of ID/IDREF. Now the imlementer cn check only the th where the keyref is defined. Since we hve groued ll key nd keyref declrtions in the GrouKey element, we only need to check the GrouKey element. Under condition (see the function), the checkkeyrefnode function roceeds to function checkkeyrefinstnce. This function checks tht there is no instnce tht hs keyref ttribute/element referring to the trget key content. This is the reson we lso need to ss the content of the trget key node. If the function returns flse, we cnnot erform the deletion. FUNCTION checkkeyrefnode($gkbindingpth, $keynme, $keycontent) BOOLEAN LET $gkref := $gkbindingpth/keyref/[@refer] IF $gkref = $keynme THEN getkeyrefinstnce($gkbindingpth, $keynme, $keycontent) ELSE TRUE}

6 FUNCTION checkkeyrefinstnce($gkbindingpth, $keynme, $keycontent) BOOLEAN FOR $keyrefbinding IN LET $keyrefpth:=$keyrefbinding/selector/xth "$keycontent"] IF exists ($keyrefinstnce) THEN FALSE ELSE TRUE} Exmle: FOR $g IN document("fculty.xml")/fculty/groukey $ IN document("fculty.xml")/fculty/subject(@subjcode = "ADB41") $c IN $/SubjCode LET $ccontent := ADB21 WHERE checkkeyref($g, "SubjCode", $ccontent) DELETE $ (:delete the key nd the siblings:) }}} The exmle following the functions shows the key deletion Subjcode in document Fculty.xml of instnce with SubjCode equls to ADB41. We know tht there is node SubjPrereq tht refers to SubjCode. Thus, if there is ny instnce where SubjPrereq vlue refers to SubjCode ADB41, the deletion should be restricted. Note tht if the checkkeyref function returns TRUE, we will delete whole elements nd not only the key SubjCode. This is becuse we do not hve trigger-bsed delete, which will delete the whole element if the key is deleted. 5.2 XQuery for Insert Oertion Unlike deletion, insertion requires the constructor of new ttribute or new element. Beside the XQuery for key insertion, we hve to roose insertion for keyref s well, to mke sure tht the new keyref ctully refers to n existent key. Function checkkeydulicte returns TRUE if the trget is not dulicting n existing instnce. The exmle following the function shows the checking if we wnt to insert SubjCode with content ADB41. FUNCTION checkkeydulicte($bindingpth) BOOLEAN IF EXISTS($bindingPth) THEN FALSE ELSE TRUE} Exmle: FOR $g IN document("fculty.xml")/fculty(@fcid = "FSTE") $ IN $g/subject(@subjcode="adb41") LET $c:= SubjCode $ccontent:= ADB41 WHERE checkkeydulicte($) INSERT new_tt($c, $ccontent)

7 }} For keyref insertion, we roose three dditionl functions. The first is for the referentil integrity constrint nd the following two re for the crdinlity constrint. The crdinlity is required since keyref cn ctully refer to more thn one key instnce. Function checkkeyinstnce sses the keyref nme nd content, nd then checks the key being referred. Function getmxoccurs nd checkmxoccurs re used to clculte the mxoccurs constrint of keyref node. If the rticulr instnce hs the mximum number of keyref, we will disble the insertion of nother keyref content. FUNCTION checkkeyinstnce($gkbindingpth, $keyrefnme, $keyrefcontent) BOOLEAN FOR $keyrefbinding IN = $keyrefnme], LET $keypth:=$gkeyrefbinding/selector/xth, "$keyrefcontent") IF EXISTS($KeyInstnce) THEN TRUE} FUNCTION getmxoccurs($xsnme, $rentnme, $childnme) INTEGER FOR $Def IN $cdef IN LET $cmxoccurs:=$cdef/mxoccurs, $cmxoccurs} FUNCTION checkmxoccurs($bindingpth, $cmxoccurs) BOOLEAN LET $instnceoccurs:=count($bindingpth) IF $cmxoccurs >= $instnceoccurs + 1 THEN FALSE ELSE TRUE} 5.3 XQuery for Relce Oertion Since relcement cn be seen s combintion of deletion nd insertion, we cn reuse the functions we hve lredy described in the lst two sub-sections. In fct, we do not need the functions for crdinlity constrints during keyref relcement s well. For relcement of key, we hve to check whether the new key content does not dulicte ny existing instnce. For relcement of keyref, we just need to check whether the new keyref content refers to vlid instnce. No crdinlity checking is required since to ccommodte new keyref, we hve deleted nother keyref. XQuery below shows the exmle of relcement for keyref TechBy element. FOR $g IN document("fculty.xml")/fculty/groukey $ IN document("fculty.xml")/fculty/subject(@subjcode = "ADB41") $c IN $/TechBy LET $cnme := TechBy $ccontent := WR01 WHERE checkkeyinstnce($g, $cnme, $ccontent)

8 REPLACE $c WITH <TechBy>WR01</TechBy> }} 6 Conclusion In this er, we roose extending XQuery to reserve semntic constrints during n XML udte. The udte oertions re divided into deletion, insertion, nd relcement. The focus in the er is on the ssocition reltionshi tye, thus ech oertion considers the key nd key reference trget node. By doing this, we cn void dtbse nomlies tht might occur using conventionl XQuery. Since Udte requires document structure vlidtion, we lso roose the trnsformtion of the reltionshi into XML Schem. The constrints ctured re crdinlity, dhesion, nd referentil integrity constrint. With this extension, XML query lnguges (in the form of XQuery) re becoming more owerful. Concurrently, it cn increse the otentil of using tree-form XML reository such s Ntive XML Dtbse. References 1. Bourett, R.: XML nd Dtbses. htt:// (2003) 2. Feng, L., Chng, E., Dillon, T.S.: A Semntic Network-Bsed Design Methodology for XML Documents. ACM Trns. Informtion System, Vol. 20, No. 4. (2002) Iedo.: Iedo XML Dtbse, htt:// (2004) 4. Jgdish, H. V., Al-Khlif, S., Chmn, A., Lkhsmnn, L. V. S., Niermn, A., Prizos, S., Ptel, J. M., Srivstv, D., Wiwttn, N., Wu, Y., Yu, C.: TIMBER: A ntive XML dtbse. VLDB Journl, Vol. 11, No. 4. (2002) Meier, W.M.: exist Ntive XML Dtbse. In Chuduri, A.B., Rwis, A., Zicri, R. (eds): XML Dt Mngement: Ntive XML nd XML-Enbled Dtbse System. Addison Wesley (2003) Robie, J.: XQuery: A Guided Tour. In Kttz, H. (ed.): XQuery from the Exerts. Addison Wesley (2004) SODA Technology.: SODA. htt:// (2004) 8. Stken, K.: Introduction to Ntive XML Dtbses. htt:// (2001) 9. Ttrinov, I., Ives, Z.G., Hlevy, A. Y., Weld, D. S.: Udting XML. ACM SIGMOD (2001) Vlist, E. V-D.: XML Schem, O Reilly, Sebstool (2002) 11. W3C: XQuery 1.0: An XML Query Lnguge. htt:// (2001) 12. XML DB: XUdte XML Udte Lnguge, htt:// (2004)

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

On Using Collection for Aggregation and Association Relationships in XML Object-Relational Storage

On Using Collection for Aggregation and Association Relationships in XML Object-Relational Storage 2004 ACM Symosium on Alied Comuting On Using Collection for Aggregtion nd Assocition Reltionshis in XML Object-Reltionl Storge Eric Prdede, J.Wenny Rhyu Dertment of Comuter Science nd Comuter Eng. L Trobe

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

CPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls

CPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls Redings for Next Two Lectures Text CPSC 213 Switch Sttements, Understnding Pointers - 2nd ed: 3.6.7, 3.10-1st ed: 3.6.6, 3.11 Introduction to Computer Systems Unit 1f Dynmic Control Flow Polymorphism nd

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

High Priority Traffic in HCF on Wireless Networks

High Priority Traffic in HCF on Wireless Networks High Priority Trffic in HC on Wireless Networks Mo Add, Amnd Pert, Gordon Erly School of Comuting, University of Portsmouth, Lion Terrce, Portsmouth, UK {mo.dd, mnd.ert, gordon.erly }@ort.c.uk Abstrct

More information

EECS 281: Homework #4 Due: Thursday, October 7, 2004

EECS 281: Homework #4 Due: Thursday, October 7, 2004 EECS 28: Homework #4 Due: Thursdy, October 7, 24 Nme: Emil:. Convert the 24-bit number x44243 to mime bse64: QUJD First, set is to brek 8-bit blocks into 6-bit blocks, nd then convert: x44243 b b 6 2 9

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Uninformed Search. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 31 Jan 2012

Uninformed Search. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 31 Jan 2012 1 Hl Dumé III (me@hl3.nme) Uninformed Serch Hl Dumé III Comuter Science University of Mrylnd me@hl3.nme CS 421: Introduction to Artificil Intelligence 31 Jn 2012 Mny slides courtesy of Dn Klein, Sturt

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012 Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

Data sharing in OpenMP

Data sharing in OpenMP Dt shring in OpenMP Polo Burgio polo.burgio@unimore.it Outline Expressing prllelism Understnding prllel threds Memory Dt mngement Dt cluses Synchroniztion Brriers, locks, criticl sections Work prtitioning

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

CS201 Discussion 10 DRAWTREE + TRIES

CS201 Discussion 10 DRAWTREE + TRIES CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

Linear Lists. Linked List Mechanics. Sequential Lists. Linked Lists. 6. LL Mechanics. 6. LL Mechanics. Slides

Linear Lists. Linked List Mechanics. Sequential Lists. Linked Lists. 6. LL Mechanics. 6. LL Mechanics. Slides Lked Lt Mechnics 6. LL Mechnics 1 Ler Lts 6. LL Mechnics 2 Slides 1. Tble Contents 2. Ler Lts 3. Lt Node Design 4. Self Referencg Structures 5. Lt Formtion Exmle 6. Lt Trversl 7. Lked Lt Oertions 8. Dt

More information

Control-Flow Analysis and Loop Detection

Control-Flow Analysis and Loop Detection ! Control-Flow Anlysis nd Loop Detection!Lst time! PRE!Tody! Control-flow nlysis! Loops! Identifying loops using domintors! Reducibility! Using loop identifiction to identify induction vribles CS553 Lecture

More information

Introduction to Integration

Introduction to Integration Introduction to Integrtion Definite integrls of piecewise constnt functions A constnt function is function of the form Integrtion is two things t the sme time: A form of summtion. The opposite of differentition.

More information

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1 vcloud Director Service Provider Admin Portl Guide vcloud Director 9. vcloud Director Service Provider Admin Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

1 Quad-Edge Construction Operators

1 Quad-Edge Construction Operators CS48: Computer Grphics Hndout # Geometric Modeling Originl Hndout #5 Stnford University Tuesdy, 8 December 99 Originl Lecture #5: 9 November 99 Topics: Mnipultions with Qud-Edge Dt Structures Scribe: Mike

More information

Misrepresentation of Preferences

Misrepresentation of Preferences Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

Semistructured Data Management Part 2 - Graph Databases

Semistructured Data Management Part 2 - Graph Databases Semistructured Dt Mngement Prt 2 - Grph Dtbses 2003/4, Krl Aberer, EPFL-SSC, Lbortoire de systèmes d'informtions réprtis Semi-structured Dt - 1 1 Tody's Questions 1. Schems for Semi-structured Dt 2. Grph

More information

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer.

Elena Baralis, Silvia Chiusano Politecnico di Torino. Pag. 1. Query optimization. DBMS Architecture. Query optimizer. Query optimizer. DBMS Architecture SQL INSTRUCTION OPTIMIZER Dtbse Mngement Systems MANAGEMENT OF ACCESS METHODS BUFFER MANAGER CONCURRENCY CONTROL RELIABILITY MANAGEMENT Index Files Dt Files System Ctlog DATABASE 2 Query

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

Functor (1A) Young Won Lim 10/5/17

Functor (1A) Young Won Lim 10/5/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

Fall 2018 Midterm 1 October 11, ˆ You may not ask questions about the exam except for language clarifications.

Fall 2018 Midterm 1 October 11, ˆ You may not ask questions about the exam except for language clarifications. 15-112 Fll 2018 Midterm 1 October 11, 2018 Nme: Andrew ID: Recittion Section: ˆ You my not use ny books, notes, extr pper, or electronic devices during this exm. There should be nothing on your desk or

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 Introduction to EsyMP Multi PC Projection 5 EsyMP Multi PC Projection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 Introduction to EsyMP Network Projection EsyMP Network Projection Fetures... 5 Disply Options... 6 Multi-Screen Disply Function... 6 Movie Sending Mode...

More information

pdfapilot Server 2 Manual

pdfapilot Server 2 Manual pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:

More information

Fall 2018 Midterm 2 November 15, 2018

Fall 2018 Midterm 2 November 15, 2018 Nme: 15-112 Fll 2018 Midterm 2 November 15, 2018 Andrew ID: Recittion Section: ˆ You my not use ny books, notes, extr pper, or electronic devices during this exm. There should be nothing on your desk or

More information

CSE 401 Midterm Exam 11/5/10 Sample Solution

CSE 401 Midterm Exam 11/5/10 Sample Solution Question 1. egulr expressions (20 points) In the Ad Progrmming lnguge n integer constnt contins one or more digits, but it my lso contin embedded underscores. Any underscores must be preceded nd followed

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

Functor (1A) Young Won Lim 8/2/17

Functor (1A) Young Won Lim 8/2/17 Copyright (c) 2016-2017 Young W. Lim. Permission is grnted to copy, distribute nd/or modify this document under the terms of the GNU Free Documenttion License, Version 1.2 or ny lter version published

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-188 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

Lists in Lisp and Scheme

Lists in Lisp and Scheme Lists in Lisp nd Scheme Lists in Lisp nd Scheme Lists re Lisp s fundmentl dt structures, ut there re others Arrys, chrcters, strings, etc. Common Lisp hs moved on from eing merely LISt Processor However,

More information

Complexities In DSP Software Compilation: Performance, Code Size, Power, Retargetability

Complexities In DSP Software Compilation: Performance, Code Size, Power, Retargetability 1060-3425/98 $1000 (C) 1998 IEEE Comlexities In DSP Softwre Comiltion: Performnce, Code Size, Power, Retrgetbility Ctherine H Gebotys Robert J Gebotys Dertment of Electricl nd Comuter Engineering University

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011 CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the

More information

Sample Midterm Solutions COMS W4115 Programming Languages and Translators Monday, October 12, 2009

Sample Midterm Solutions COMS W4115 Programming Languages and Translators Monday, October 12, 2009 Deprtment of Computer cience Columbi University mple Midterm olutions COM W4115 Progrmming Lnguges nd Trnsltors Mondy, October 12, 2009 Closed book, no ids. ch question is worth 20 points. Question 5(c)

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Mid-term exam. Scores. Fall term 2012 KAIST EE209 Programming Structures for EE. Thursday Oct 25, Student's name: Student ID:

Mid-term exam. Scores. Fall term 2012 KAIST EE209 Programming Structures for EE. Thursday Oct 25, Student's name: Student ID: Fll term 2012 KAIST EE209 Progrmming Structures for EE Mid-term exm Thursdy Oct 25, 2012 Student's nme: Student ID: The exm is closed book nd notes. Red the questions crefully nd focus your nswers on wht

More information

05-247r2 SAT: Add 16-byte CDBs and PIO modes 1 September 2005

05-247r2 SAT: Add 16-byte CDBs and PIO modes 1 September 2005 To: T10 Technicl Committee From: Robert Sheffield, Intel (robert.l.sheffield@intel.com) Dte: 1 September 2005 Subject: 05-247r2 SAT: Add 16-byte CDBs nd PIO modes Revision history Revision 0 (16 June 2005)

More information

Copyright (C) 1997, 1998 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for

Copyright (C) 1997, 1998 by the Association for Computing Machinery, Inc. Permission to make digital or hard copies of part or all of this work for Coyright (C) 1997, 1998 by the Assocition for Comuting Mchinery, Inc. Permission to mke digitl or hrd coies of rt or ll of this work for ersonl or clssroom use is grnted without fee rovided tht coies re

More information

Epson iprojection Operation Guide (Windows/Mac)

Epson iprojection Operation Guide (Windows/Mac) Epson iprojection Opertion Guide (Windows/Mc) Contents 2 Introduction to Epson iprojection 5 Epson iprojection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters nd Projection

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

Section 3.1: Sequences and Series

Section 3.1: Sequences and Series Section.: Sequences d Series Sequences Let s strt out with the definition of sequence: sequence: ordered list of numbers, often with definite pttern Recll tht in set, order doesn t mtter so this is one

More information

Rank-Maximal Matchings

Rank-Maximal Matchings Rnk-Mximl Mtchings Robert W. Irving Telikelli Kvith Kurt Mehlhorn Dimitrios Michil Ktrzyn Pluch Abstrct Suose tht ech member of set A of licnts rnks subset of set P of osts in n order of reference, ossibly

More information

Epson Projector Content Manager Operation Guide

Epson Projector Content Manager Operation Guide Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time

More information

Page. Harsh Reality. Dynamic Memory Allocation. Malloc Package. Process Memory Image. Assumptions. Malloc Example

Page. Harsh Reality. Dynamic Memory Allocation. Malloc Package. Process Memory Image. Assumptions. Malloc Example Hrsh Relity Memory Mtters Memory is not unbounded It must be llocted nd mnged 1 Mny lictions re memory dominted Esecilly those bsed on comlex, grh lgorithms Memory referencing bugs esecilly ernicious Effects

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

How to Design REST API? Written Date : March 23, 2015

How to Design REST API? Written Date : March 23, 2015 Visul Prdigm How Design REST API? Turil How Design REST API? Written Dte : Mrch 23, 2015 REpresenttionl Stte Trnsfer, n rchitecturl style tht cn be used in building networked pplictions, is becoming incresingly

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

A Scalable and Reliable Mobile Agent Computation Model

A Scalable and Reliable Mobile Agent Computation Model A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper

More information

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl

More information

9.1 apply the distance and midpoint formulas

9.1 apply the distance and midpoint formulas 9.1 pply the distnce nd midpoint formuls DISTANCE FORMULA MIDPOINT FORMULA To find the midpoint between two points x, y nd x y 1 1,, we Exmple 1: Find the distnce between the two points. Then, find the

More information

Integration. October 25, 2016

Integration. October 25, 2016 Integrtion October 5, 6 Introduction We hve lerned in previous chpter on how to do the differentition. It is conventionl in mthemtics tht we re supposed to lern bout the integrtion s well. As you my hve

More information

binary trees, expression trees

binary trees, expression trees COMP 250 Lecture 21 binry trees, expression trees Oct. 27, 2017 1 Binry tree: ech node hs t most two children. 2 Mximum number of nodes in binry tree? Height h (e.g. 3) 3 Mximum number of nodes in binry

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3.5.1 Single slit diffrction Wves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. We will consider this lter.

More information

MIPS I/O and Interrupt

MIPS I/O and Interrupt MIPS I/O nd Interrupt Review Floting point instructions re crried out on seprte chip clled coprocessor 1 You hve to move dt to/from coprocessor 1 to do most common opertions such s printing, clling functions,

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

Angle Properties in Polygons. Part 1 Interior Angles

Angle Properties in Polygons. Part 1 Interior Angles 2.4 Angle Properties in Polygons YOU WILL NEED dynmic geometry softwre OR protrctor nd ruler EXPLORE A pentgon hs three right ngles nd four sides of equl length, s shown. Wht is the sum of the mesures

More information

Geometric transformations

Geometric transformations Geometric trnsformtions Computer Grphics Some slides re bsed on Shy Shlom slides from TAU mn n n m m T A,,,,,, 2 1 2 22 12 1 21 11 Rows become columns nd columns become rows nm n n m m A,,,,,, 1 1 2 22

More information

Class Overview. Database Design. Database Design Process. Database Design. Introduction to Data Management CSE 414

Class Overview. Database Design. Database Design Process. Database Design. Introduction to Data Management CSE 414 Introution to Dt Mngement CSE 44 Unit 6: Coneptul Design E/R Digrms Integrity Constrints BCNF Introution to Dt Mngement CSE 44 E/R Digrms ( letures) CSE 44 Autumn 08 Clss Overview Dtse Design Unit : Intro

More information

Midterm I Solutions CS164, Spring 2006

Midterm I Solutions CS164, Spring 2006 Midterm I Solutions CS164, Spring 2006 Februry 23, 2006 Plese red ll instructions (including these) crefully. Write your nme, login, SID, nd circle the section time. There re 8 pges in this exm nd 4 questions,

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

CS 241. Fall 2017 Midterm Review Solutions. October 24, Bits and Bytes 1. 3 MIPS Assembler 6. 4 Regular Languages 7.

CS 241. Fall 2017 Midterm Review Solutions. October 24, Bits and Bytes 1. 3 MIPS Assembler 6. 4 Regular Languages 7. CS 241 Fll 2017 Midterm Review Solutions Octoer 24, 2017 Contents 1 Bits nd Bytes 1 2 MIPS Assemly Lnguge Progrmming 2 3 MIPS Assemler 6 4 Regulr Lnguges 7 5 Scnning 9 1 Bits nd Bytes 1. Give two s complement

More information

Example: 2:1 Multiplexer

Example: 2:1 Multiplexer Exmple: 2:1 Multiplexer Exmple #1 reg ; lwys @( or or s) egin if (s == 1') egin = ; else egin = ; 1 s B. Bs 114 Exmple: 2:1 Multiplexer Exmple #2 Normlly lwys include egin nd sttements even though they

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X 4. Mon, Sept. 30 Lst time, we defined the quotient topology coming from continuous surjection q : X! Y. Recll tht q is quotient mp (nd Y hs the quotient topology) if V Y is open precisely when q (V ) X

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers? 1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection

More information

A Comparison of the Discretization Approach for CST and Discretization Approach for VDM

A Comparison of the Discretization Approach for CST and Discretization Approach for VDM Interntionl Journl of Innovtive Reserch in Advnced Engineering (IJIRAE) Volume1 Issue1 (Mrch 2014) A Comprison of the Discretiztion Approch for CST nd Discretiztion Approch for VDM Omr A. A. Shib Fculty

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3..1 Single slit diffrction ves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. e will consider this lter. Tke

More information

MATH 2530: WORKSHEET 7. x 2 y dz dy dx =

MATH 2530: WORKSHEET 7. x 2 y dz dy dx = MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl

More information

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following:

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following: Chpter 7 Routing with Frme Rely, X.25, nd SNA This chpter discusses Frme Rely, X.25, nd SNA Routing. Also see the following: Section 4.2, Identifying the BANDIT in the Network Section 4.3, Defining Globl

More information