The Rest of the Course More DFA and Model Checking

Size: px
Start display at page:

Download "The Rest of the Course More DFA and Model Checking"

Transcription

1 The Rest of the Course More DFA and Model Checking Tuesday, Dec. 6: Guest Lecture Thursday, Dec. 8: Guest Lecture Final Exam Wednesday, Dec. 10:30-12:30 Prof. Leon Osterweil CS Fall Semester 2011 High- Level Architecture of FSV Systems System" System! Translator" System Model" Proerty" Proerty! Translator! Proerty Reresentation Reasoning Engine! Proerty Verified" Counter Examles for Model" System Model Deends on roerty being verified Eliminate informawon that does not imact the reasoning To kee the model as small as ossible AbstracWon techniues allow states in the model to be reduced/collased Only kee track of the variables that are imortant to the roerty Use slicing Abstract values whenever ossible x<0, x=0, x>0 But add in informawon when needed to imrove the recision of the reasoning Alhabet Refinement: Model reducwon based on relevant events foo foo bar Can remove a node from the grah if it does not have an event associated with it, AND does not affect the flow of events through the grah foo foo bar Results in ConservaWve Analysis If roerty verified, roerty holds for all ossible execuwons of the system If roerty not verified: An error found (in the system or in the roerty) OR A surious result System model abstracts informawon to be tractable ConservaWve abstracwons usually over- aroximate behavior If inconsistency relies uon over- aroximawons, then a surious result e.g. every counterexamle corresonds to an infeasible ath Page 1

2 Recall our Previous Examle Produced this Result 1: if 1 2: oen 3: if 3 5: move 3 With this Surious Defect 2: oen 1: if How to address these kinds of roblems abributable to Lack of recision? 3: if 5: move Imroving Precision Imroving Precision Use constraints to imrove recision Given a CFG G, a roerty P, Add constraints C 1,,C n that can be used to avoid roagawon down infeasible aths Then use DFA to determine whether (L(G) L(C 1 ) L(C n )) L(P) Alhabet refine G wrt (Σ P Σ C1 Σ Cn ) System" Proerty FSA Trace Flow Grah" System! Translator" Proerty" Secification" Proerty! Translator! State Proagation! Constraints"..." Proerty Verified" Counter Examle Trace through TFG" Page 2

3 System" Imroving Precision Proerty FSA Trace Flow Grah" System! Translator" Proerty" Secification" Proerty! Translator! State Proagation! Constraints" Can add constraints incrementally as needed..." Proerty Verified" Counter Examle Trace through TFG" Constraints Are reresented as FSAs Describe condiwons necessary for feasible execuwon Have a secial viola&on state that is entered when an infeasible ath is detected ViolaWon is a tra state; once it is entered, never leave that state Boolean Variable Constraint Boolean Variable Constraint t v How do constraints affect the data flow euawons IN and OUT are now sets of tules of FSA states Merge is swll union Transfer funcwon now has to look at each FSA state in the in- tule when comuwng the out- tule Proerty states not roagated when any constraint automaton is in the violawon state Result looks at aths that are feasible with resect to the constraints The roerty state is the same as before Every constraint must be in an accewng state Elevator Revisited 1: if 2: S==t 4: S==f Page 3

4 State ProagaWon State ProagaWon 1: if 4: S==f 5: if 6: S==t State ProagaWon 1 State ProagaWon 1 t f t f State ProagaWon 1 Model Checking: An AlternaWve to DFA t f ProerWes usually exressed in a temoral logic System reresented as a (ossibly abstracted ) reachability grah State based=>show the values of all the relevant variables Reasoning engine roagates valid subformulas through the grah Page 4

5 DFA Aroach Model Checking Aroach Proerty" Proerty" System" System! Translator" Flowgrah System Model" Proerty! Translator! Proerty Reresentation Reasoning Engine! Finite State Machine Or Quantified Regular Ex. Proerty Verified" System" System! Translator" Reachability Grah System Model" Proerty! Translator! Proerty Reresentation Reasoning Engine! Temoral Logic Secification Proerty Verified" Counter Examles for Model" Counter Examles for Model" Reachability- based Model Checking: some history Originally roosed for hardware Early 80 s: E. Clarke and Emerson; Quielle and Sifakis Late 80 s: Imroved algorithms and roerty notawons (E. Clarke, Emerson, Sistla) 90 s: Symbolic Model Checking (SMV) and other owmizawons (Burch, E. Clarke, Dill, Long, and McMillan) Current: Hybrid aroaches that combine model checking with Theorem roving techniues Symbolic execuwon OWmizaWon techniues (e.g., oints to analysis) A Biased View Model Checking starts by building a very large reresentawon, then reduces it in size DFA starts with a small reresentawon, then grows it larger as needed DFA is an older aroach overtaken by Model Checking To be fair model checking research has led to much smaller reresentawons The two aroaches are now uite similar But MODEL CHECKING is the term you will hear used in racwce The Reachability Grah Models enwre rogram state sace Each node reresents a ossible state in a system States reresent the values of all the variables, including the rogram counter and other relevant state informawon (can be uite sizeable, esecially for concurrent systems) Each edge reresents rogress down an execuwon ath Only contains states that are oten&ally reachable from the start state Reachability Grah Examle task control flow grahs T1 T2 b1 e1 T2.Q end b2 e2 Accet Q end waiting for? Need to distinguish before a rendezvous from after a rendezvous Reachability grah,b2 e1, b1,b2, e1,e2 b1,,e2 Page 5

6 Reachability Grah Examle (clarified) task control flow grahs T1 T2 b1 e1 T2.Q end b2 e2 Accet Q end Reachability grah b_,b2 b1,b2 r(, ) b1,b_ Temoral Logic Path uanwfiers A, E Temoral uanwfiers Assume, are atomic roosiwons G - is globally true or always true F - holds somewme in the future or eventually X- holds in the next state U - holds unwl holds R - is released from being true if is true b_ means that a task is blocked at e1,,e2 r(, ) means that the rendezvous between and occurs e1,e2 Examles of Temoral ProosiWons That are True at the Root AG EG A(U) More Examles E(U) AF EF AX EX A(R), More examles R - is released from being true if is true ( is not reuired to become true) E(R) More Familiar Examles The variable defined here is eventually subseuently used It is globally true that door is closed on moving elevator If the elevator stos, the next event is always oen If a file is oened then it is always eventually closed Page 6

7 ProagaWng ProosiWons: AX and EX X - in the next state, is true ProagaWng ProosiWons: AF F - at some time in the future, is true Consider AX AX Consider EX EX EX AF AF AF AF To roagate AF : Mark nodes where is true with AF If all of a node s successors are marked with AF, mark that node Reeat Ste 2 until a fixed oint is reached Only need to look at the successors of the node of interest ProagaWng ProosiWons: EF F - at some time in the future, is true EF EF EF EF EF EF To roagate EF : Mark nodes where is true with EF If at least one of a node s successors are marked with EF, mark that node Reeat Ste 2 until a fixed oint is reached ProagaWon rules Different rule for each formula tye A roerty is true for a grah if it holds in the iniwal node(s) Need a reachability grah that shows the states (i.e., the values) of the relevant variables Examle: rocess 1 can be null, trying to obtain the lock, or in its criwcal region (n1, t1, c1) rocess 2 can be null, trying to obtain the lock, or in its criwcal region (n2, t2, c2) turn is a variable that indicates which rocess can obtain the lock (0,1,2) Power and Value of These Aroaches as Best Seen when Alied to Concurrent Systems Concurrent sooware is much harder, more comlicated Reuires very owerful analysis Model checking and DFA shine in this domain Concurrency fine grain Parallelism usually suorted by secial urose mulwrocessors massive arallelism ooen have shared memory secial urose languages- - Parallel FORTRAN Concurrent systems usually imlemented in a rogramming language that rovides constructs for synchronizawon and shared data (e.g., Ada, Java monitors) could be imlemented on a single rocessor or mulwle rocessors Distributed systems autonomous rocessors that do not share memory usually suorted by oerawng system commands RPC, RMI, message assing, event based nowficawon, etc. coarse grain tightly couled loosely couled Page 7

8 Why use concurrency? To imrove erformance because comutawon can occur in arallel N rocesses does not result in an N fold imrovement To rocess informawon concurrently Process different streams of informawon as each arrives To imrove availability No single oint of failure redundancy To increase flexibility Loose interacwon models allow different rocesses to be added and modified with minimal intrusion Shared data monitors InteracWon models TransacWons Remote rocedure call Rendezvous Message assing asynchronous and synchronous oint- to- oint, broadcast, mulwcast Event- based nowficawon/ublish- subscribe Monitor TransacWon model Process i 1 rocess at a time monitor Process j Start transacwon(s) Decide to commit transacwon or throw out results TransacWons aear to be atomic acwons- - all or nothing TransacWons are ooen used in data bases for very short comutawons E.g. udate saving account informawon Call foo. remote rocedure call foo return Task T1 is Task T2 is T2.A; rendezvous accet A; end T1; end T2; Rendezvous model Page 8

9 Non- determinism Select among waiting tasks non-deterministically Message assing P1 P2 select when NOT_FULL accet Put(C: inchar); end; or when NOT_EMPTY accet Get(C: out char); end; end select; if both guards are true, nondeterministically select a rendezvous send (2, info)... receive (1, info)... Asynchronous: P1 conwnues without waiwng for an acknowledgement P2 may block waiwng for a message from P1 P1 send (2, info)... Message assing ack P2 receive (1, info)... Synchronous- P1 waits for an acknowledgement (and erhas data) before conwnuing P1 may block waiwng for an ack P2 may block waiwng for a message from P1 Event based nowficawon/imlicit invocawon Sender does not indicate actual receivers Receivers register their interest in being nowfied about events Provides very loose couling between senders and receivers Registered for a, b, e Event e Registered for a, b, c Registered for e Point- to- Point, MulWcast, Broadcast Rendezvous Remote rocedure call Message assing Event based nowficawon Monitors Point- to- oint Point- to- oint Point- to- oint, MulWcast MulWcast Point- to- oint Concurrent systems are comlex Non- determinism means that the same inuts might roduce different oututs on different execuwons When reasoning about a system there are numerous alternawves to consider Usually more than a human can reasonably consider In addiwon to the roblems that can arise with seuenwal rograms, have roblems that are uniue to concurrent systems Data access roblems SynchronizaWon roblems Page 9

10 Data Access Anomalies Tyically you want mutual exclusion shared resource (e.g., data) that should only have a single access at a Wme e.g., don t want two travel agents assigning the last seat on a lane Tyically you don t want race condiwons order of execuwon affects results undesirable nondeterminism task A!!task B! x := x + 1; write x;!!x := x - 1;!!write x;! if initially x =5, then could outut (6, 5), (4, 5), or (5, 5) Interleaved Model of ExecuWon; Examles task A! x := x + 1;! write x;!! task B! x := x - 1;! write x;! task B x := x - 1; task A x := x + 1; write x;!! write x;! task B! x := x - 1;! write x;! task A x := x + 1; write x;!! task A! task B! x := x + 1;! x := x - 1;! write x;!! write x;! SynchronizaWon Problems: Infinite wait anomalies StarvaWon At least one task does not make rogress on abaining a goal May conwnue to execute reeat select when not_ready or clean- u; when ready accet Goal; end select; unwl forever; Infinite wait anomalies (conwnued) Deadlock set of tasks mutually waiwng on each other; none can advance Ooen tasks hold resources that other tasks need Also called, deadly embrace dining hilosohers roblem Livelock execuwon does not come to a standswll but none of the tasks can advance Deadlock handling has been inveswgated extensively Deadlock revenwon techniues reassign all resources before ning a task if all resources are not available, then assign none less efficient use of resources since not all may be needed at once reemt a rocess that holds a needed resource But, not all resources can be reemted Deadlock (conwnued) deadlock avoidance only allocate a resource if there is a deadlock free ath through the system hard to determine deadlock free aths must maintain global resource informawon not freuently used because cost is so high deadlock detecwon use stawc analysis techniues to determine if there is a otenwal resource allocawon cycle may be comutawonally exensive and may return surious results Page 10

11 Analyzing concurrent systems Dynamic analysis StaWc analysis Dynamic analysis ReeaWng an execuwon with the same test cases may roduce different values execuwon order may deend on system load, Wme of day, rocessors selected for execuwon, etc. much harder to do debugging much harder to do regression teswng task A!!task B! x := x +1;!x := x - 1;! write x!!write x! Dynamic analysis aroaches for concurrent systems Monitor and relay Coverage criteria SecificaWon based result evaluawon Monitor and relay Monitor execuwon Provide an execuwon harness so that exactly the same decisions can be made on subseuent execuwons Try to minimize number of robes to reduce overhead Monitoring and forcing decisions somewmes erturbs rogram behavior Coverage criteria Coverage criteria All aths taking concurrency into account Exlodes: Must consider each interleaving All synchronizawons Execute each synch statement Included with all stmt coverage Execute each send with at least one receive Similar to all- defs Execute each send and receive air Similar to all- uses Extend deendence analysis to include synchronizawon control deendence informawon 1 T2.Q! 2 T2.Q! 3 end 4! 5 6 Accet Q! 7 end! 9 8 Accet Q! Page 11

12 Event- based monitoring Insert robes and monitor event seuences Comare event seuence to a secificawon of desired behavior (sec- based teswng) ush o o not_emty -o Imlied violation state SecificaWon- based teswng Event- based nowficawon makes monitoring relawvely easy Disatcher must send all events that occur in the roerty secificawon to the secificawon checker Other interacwon models usually reuire inserwng robes into the tasks or into the runwme system SecificaWon based monitoring SecificaWon based monitoring Secification violations Secification Disatcher Disatcher Sec checker NotaWons for secifying concurrent behavior QuanWfied Regular Exressions DeterminisWc Finite- State Automata Temoral Logics StaWc analysis Concurrent & distributed systems are inherently more difficult to analyze Alias resoluwon in addiwon to array references and ointers, can have dynamically allocated tasks e.g., Accet T.i Path feasibility inconsistent ath condiwons infeasible synchronizawon a" a " a" a " Page 12

13 StaWc analysis aroaches for concurrent systems SecificaWon aroaches QuanWfied regular exressions DeterminisWc Finite State Automata Temoral logics - - an extension to classical logic that suorts statements about seuences and Wme Reachability grahs and reachability analysis Petri nets and Petri net based analysis Finite- State VerificaWon Data- flow analysis Extended to distributed systems Model checking Flow euawons reresent necessary condiwons for all or some rogram execuwons Page 13

Static Analysis! Prof. Leon J. Osterweil! CS 520/620! Spring 2013! Characteristics of! System to be! built must! match required! characteristics!

Static Analysis! Prof. Leon J. Osterweil! CS 520/620! Spring 2013! Characteristics of! System to be! built must! match required! characteristics! Static Analysis! Prof. Leon J. Osterweil! CS 50/60! Spring 01! Requirements Spec.! Design! Test Results must! match required behavior! Characteristics of! System to be! built must! match required! characteristics!

More information

Static Analysis! Summary of Dynamic Testing! Some References for Testing! Prof. Leon J. Osterweil! CS 520/620! Spring 2013! DEVELOPMENT PHASES!

Static Analysis! Summary of Dynamic Testing! Some References for Testing! Prof. Leon J. Osterweil! CS 520/620! Spring 2013! DEVELOPMENT PHASES! Requirements Spec. Design Static Analysis Prof. Leon J. Osterweil CS 50/60 Spring 0 Characteristics of System to be built must match required characteristics Test Results must match required behavior Hi

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

COMP30172: Advanced Algorithms Notes and Exercises on Automata-based Verification

COMP30172: Advanced Algorithms Notes and Exercises on Automata-based Verification COMP30172: Advanced Algorithms Notes and Exercises on Automata-based Verification Howard Barringer Rm2.20: Kilburn Building Email: Howard.Barringer@manchester.ac.uk March 2010 ii Contents Preface v 1 Model

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

Distributed Algorithms

Distributed Algorithms Course Outline With grateful acknowledgement to Christos Karamanolis for much of the material Jeff Magee & Jeff Kramer Models of distributed comuting Synchronous message-assing distributed systems Algorithms

More information

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Verification Options. To Store Or Not To Store? Inside the UPPAAL tool. Inactive (passive) Clock Reduction. Global Reduction

Verification Options. To Store Or Not To Store? Inside the UPPAAL tool. Inactive (passive) Clock Reduction. Global Reduction Inside the UPPAAL tool Data Structures DBM s (Difference Bounds Matrices) Canonical and Minimal Constraints Algorithms Reachability analysis Liveness checking Termination Verification Otions Verification

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Constrained Path Optimisation for Underground Mine Layout

Constrained Path Optimisation for Underground Mine Layout Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground

More information

Using Standard AADL for COMPASS

Using Standard AADL for COMPASS Using Standard AADL for COMPASS (noll@cs.rwth-aachen.de) AADL Standards Meeting Aachen, Germany; July 5 8, 06 Overview Introduction SLIM Language Udates COMPASS Develoment Roadma Fault Injections Parametric

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching Mitigating the Imact of Decomression Latency in L1 Comressed Data Caches via Prefetching by Sean Rea A thesis resented to Lakehead University in artial fulfillment of the requirement for the degree of

More information

ACM 2007 Turing Award Edmund Clarke, Allen Emerson, and Joseph Sifakis Model Checking: Algorithmic Verification and Debugging

ACM 2007 Turing Award Edmund Clarke, Allen Emerson, and Joseph Sifakis Model Checking: Algorithmic Verification and Debugging ACM 2007 Turing Award Edmund Clarke, Allen Emerson, and Joseh Sifakis Model Checking: Algorithmic Verification and Debugging ACM Turing Award Citation In 1981, Edmund M. Clarke and E. Allen Emerson, working

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

1.5 Case Study. dynamic connectivity quick find quick union improvements applications

1.5 Case Study. dynamic connectivity quick find quick union improvements applications . Case Study dynamic connectivity quick find quick union imrovements alications Subtext of today s lecture (and this course) Stes to develoing a usable algorithm. Model the roblem. Find an algorithm to

More information

search(i): Returns an element in the data structure associated with key i

search(i): Returns an element in the data structure associated with key i CS161 Lecture 7 inary Search Trees Scribes: Ilan Goodman, Vishnu Sundaresan (2015), Date: October 17, 2017 Virginia Williams (2016), and Wilbur Yang (2016), G. Valiant Adated From Virginia Williams lecture

More information

A Survey on Formal Verification Techniques for Safety-Critical Systems-on-Chip

A Survey on Formal Verification Techniques for Safety-Critical Systems-on-Chip electronics Review A Survey on Formal Verification Techniques for Safety-Critical Systems-on-Chi Tomás Grimm 1, * ID, Djones Lettnin 2 and Michael Hübner 1 1 Chair of Embedded Systems for Information Technology,

More information

Object and Native Code Thread Mobility Among Heterogeneous Computers

Object and Native Code Thread Mobility Among Heterogeneous Computers Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

CS649 Sensor Networks IP Track Lecture 6: Graphical Models

CS649 Sensor Networks IP Track Lecture 6: Graphical Models CS649 Sensor Networks IP Track Lecture 6: Grahical Models I-Jeng Wang htt://hinrg.cs.jhu.edu/wsn06/ Sring 2006 CS 649 1 Sring 2006 CS 649 2 Grahical Models Grahical Model: grahical reresentation of joint

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

turing lecture Turing Lecture from the winners of the 2007 ACM A.M. Turing Award.

turing lecture Turing Lecture from the winners of the 2007 ACM A.M. Turing Award. doi:10.1145/1592761.1592781 Turing Lecture from the winners of the 2007 ACM A.M. Turing Award. In 1981, Edmund M. Clarke and E. Allen Emerson, working in the USA, and Joseh Sifakis working indeendently

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

TOPP Probing of Network Links with Large Independent Latencies

TOPP Probing of Network Links with Large Independent Latencies TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1

More information

Model-Based Annotation of Online Handwritten Datasets

Model-Based Annotation of Online Handwritten Datasets Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

Simple example. Analysis of programs with pointers. Points-to relation. Program model. Points-to graph. Ordering on points-to relation

Simple example. Analysis of programs with pointers. Points-to relation. Program model. Points-to graph. Ordering on points-to relation Simle eamle Analsis of rograms with ointers := 5 tr := @ *tr := 9 := rogram S1 S2 S3 S4 deendences What are the deendences in this rogram? Problem: just looking at variable names will not give ou the correct

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

Efficiently building a parse tree from a regular expression?

Efficiently building a parse tree from a regular expression? ACTA Informatica ManuscritNr. (will be inserted by hand later) Efficiently building a arse tree from a regular exression? Danny Dubé and Marc Feeley?? Université de Montréal C.P. 6128, succ. centreville,

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification Using Rational Numbers and Parallel Comuting to Efficiently Avoid Round-off Errors on Ma Simlification Maurício G. Grui 1, Salles V. G. de Magalhães 1,2, Marcus V. A. Andrade 1, W. Randolh Franklin 2,

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Recap: Consensus. CSE 486/586 Distributed Systems Mutual Exclusion. Why Mutual Exclusion? Why Mutual Exclusion? Mutexes. Mutual Exclusion C 1

Recap: Consensus. CSE 486/586 Distributed Systems Mutual Exclusion. Why Mutual Exclusion? Why Mutual Exclusion? Mutexes. Mutual Exclusion C 1 Reca: Consensus Distributed Systems Mutual Exclusion Steve Ko Comuter Sciences and Engineering University at Buffalo On a synchronous system There s an algorithm that works. On an asynchronous system It

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

Chapter 8: Adaptive Networks

Chapter 8: Adaptive Networks Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Introduction to Visualization and Computer Graphics

Introduction to Visualization and Computer Graphics Introduction to Visualization and Comuter Grahics DH2320, Fall 2015 Prof. Dr. Tino Weinkauf Introduction to Visualization and Comuter Grahics Grids and Interolation Next Tuesday No lecture next Tuesday!

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model COMP 6 - Parallel Comuting Lecture 6 November, 8 Bulk-Synchronous essing Model Models of arallel comutation Shared-memory model Imlicit communication algorithm design and analysis relatively simle but

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

REAL NUMBERS. 1.1 Introduction

REAL NUMBERS. 1.1 Introduction REAL NUMBERS 1 REAL NUMBERS 1 1.1 Introduction In Class IX, you began your exloration of the world of real numbers and encountered irrational numbers. We continue our discussion on real numbers in this

More information

Distributed Systems (5DV147)

Distributed Systems (5DV147) Distributed Systems (5DV147) Mutual Exclusion and Elections Fall 2013 1 Processes often need to coordinate their actions Which rocess gets to access a shared resource? Has the master crashed? Elect a new

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

SIMULATION SYSTEM MODELING FOR MASS CUSTOMIZATION MANUFACTURING

SIMULATION SYSTEM MODELING FOR MASS CUSTOMIZATION MANUFACTURING Proceedings of the 2002 Winter Simulation Conference E. Yücesan, C.-H. Chen, J. L. Snowdon, and J. M. Charnes, eds.. SIMULATION SYSTEM MODELING FOR MASS CUSTOMIATION MANUFACTURING Guixiu Qiao Charles McLean

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

10. Multiprocessor Scheduling (Advanced)

10. Multiprocessor Scheduling (Advanced) 10. Multirocessor Scheduling (Advanced) Oerating System: Three Easy Pieces AOS@UC 1 Multirocessor Scheduling The rise of the multicore rocessor is the source of multirocessorscheduling roliferation. w

More information

Non-Strict Independence-Based Program Parallelization Using Sharing and Freeness Information

Non-Strict Independence-Based Program Parallelization Using Sharing and Freeness Information Non-Strict Indeendence-Based Program Parallelization Using Sharing and Freeness Information Daniel Cabeza Gras 1 and Manuel V. Hermenegildo 1,2 Abstract The current ubiuity of multi-core rocessors has

More information

Simulating Ocean Currents. Simulating Galaxy Evolution

Simulating Ocean Currents. Simulating Galaxy Evolution Simulating Ocean Currents (a) Cross sections (b) Satial discretization of a cross section Model as two-dimensional grids Discretize in sace and time finer satial and temoral resolution => greater accuracy

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

The Spatial Skyline Queries

The Spatial Skyline Queries The Satial Skyline Queries Mehdi Sharifzadeh Comuter Science Deartment University of Southern California Los Angeles, CA 90089-078 sharifza@usc.edu Cyrus Shahabi Comuter Science Deartment University of

More information

Continuous Visible k Nearest Neighbor Query on Moving Objects

Continuous Visible k Nearest Neighbor Query on Moving Objects Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,

More information

Query-Directed Adaptive Heap Cloning for Optimizing Compilers

Query-Directed Adaptive Heap Cloning for Optimizing Compilers Query-Directed Adative Hea Cloning for Otimizing Comilers Yulei Sui Yue Li Jingling Xue Programming Languages and Comilers Grou School of Comuter Science and Engineering University of New South Wales,

More information

CMSC 754 Computational Geometry 1

CMSC 754 Computational Geometry 1 CMSC 754 Comutational Geometry 1 David M. Mount Deartment of Comuter Science University of Maryland Fall 2002 1 Coyright, David M. Mount, 2002, Det. of Comuter Science, University of Maryland, College

More information

Time and Coordination in Distributed Systems. Operating Systems

Time and Coordination in Distributed Systems. Operating Systems Time and Coordination in Distributed Systems Oerating Systems Clock Synchronization Physical clocks drift, therefore need for clock synchronization algorithms Many algorithms deend uon clock synchronization

More information

Lecture 7: Objects (Chapter 15) CS 1110 Introduction to Computing Using Python

Lecture 7: Objects (Chapter 15) CS 1110 Introduction to Computing Using Python htt://www.cs.cornell.edu/courses/cs1110/2018s Lecture 7: Objects (Chater 15) CS 1110 Introduction to Comuting Using Python [E. Andersen, A. Bracy, D. Gries, L. Lee, S. Marschner, C. Van Loan, W. White]

More information

CardS4: Modal Theorem Proving on Java Smartcards

CardS4: Modal Theorem Proving on Java Smartcards CardS4: Modal Theorem Proving on Java Smartcards Rajeev Prabhakar Goré and Phuong Thê Nguyên Abstract We describe a successful imlementation of a theorem rover for modal logic S4 that runs on a Java smart

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

Models for Advancing PRAM and Other Algorithms into Parallel Programs for a PRAM-On-Chip Platform

Models for Advancing PRAM and Other Algorithms into Parallel Programs for a PRAM-On-Chip Platform Models for Advancing PRAM and Other Algorithms into Parallel Programs for a PRAM-On-Chi Platform Uzi Vishkin George C. Caragea Bryant Lee Aril 2006 University of Maryland, College Park, MD 20740 UMIACS-TR

More information

CASCH - a Scheduling Algorithm for "High Level"-Synthesis

CASCH - a Scheduling Algorithm for High Level-Synthesis CASCH a Scheduling Algorithm for "High Level"Synthesis P. Gutberlet H. Krämer W. Rosenstiel Comuter Science Research Center at the University of Karlsruhe (FZI) HaidundNeuStr. 1014, 7500 Karlsruhe, F.R.G.

More information

Multi-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case

Multi-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case Multi-robot SLAM with Unknown Initial Corresondence: The Robot Rendezvous Case Xun S. Zhou and Stergios I. Roumeliotis Deartment of Comuter Science & Engineering, University of Minnesota, Minneaolis, MN

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

Control plane and data plane. Computing systems now. Glacial process of innovation made worse by standards process. Computing systems once upon a time

Control plane and data plane. Computing systems now. Glacial process of innovation made worse by standards process. Computing systems once upon a time Classical work Architecture A A A Intro to SDN A A Oerating A Secialized Packet A A Oerating Secialized Packet A A A Oerating A Secialized Packet A A Oerating A Secialized Packet Oerating Secialized Packet

More information

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE This version of the software has been retired Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

Chapter 7, Part B Sampling and Sampling Distributions

Chapter 7, Part B Sampling and Sampling Distributions Slides Preared by JOHN S. LOUCKS St. Edward s University Slide 1 Chater 7, Part B Samling and Samling Distributions Samling Distribution of Proerties of Point Estimators Other Samling Methods Slide 2 Samling

More information

Recognizing Convex Polygons with Few Finger Probes

Recognizing Convex Polygons with Few Finger Probes Pattern Analysis and Alications manuscrit No. (will be inserted by the editor) Recognizing Convex Polygons with Few Finger Probes Sumanta Guha Kiêu Trọng Khánh Received: date / Acceted: date Abstract The

More information

Static Analysis! Prof. Leon J. Osterweil! CS 520/620! Fall 2012! Characteristics of! System to be! built must! match required! characteristics!

Static Analysis! Prof. Leon J. Osterweil! CS 520/620! Fall 2012! Characteristics of! System to be! built must! match required! characteristics! Static Analysis! Prof. Leon J. Osterweil! CS 520/620! Fall 2012! Requirements Spec.! Design! Test Results must! match required behavior! Characteristics of! System to be! built must! match required! characteristics!

More information