A. Udaya Shankar. Distributed Programming. and Practice. Theory. 4^1 Springer
|
|
- Lesley Adams
- 5 years ago
- Views:
Transcription
1 A. Udaya Shankar Distributed Programming Theory and Practice 4^1 Springer
2 Contents 1 Introduction Objective Programs and Services Correctness Properties and Assertional Reasoning Services and Systems Framework (SESF) Programs in SESF Input Assumptions Platforms Atomicity Assumptions About the Platform and Effective Atomicity Progress Assumptions About the Platform Aggregate Systems Composite Systems Producer-Consumer-Lock Example Service Programs Distributed Services Implements Definition Using Services to Design Programs Background to SESF Organization of This Book Introducing SESF by Examples (Chaps. 2-5) Theory of SESF (Chaps. 6-8) More Applications of SESF (Chap. 9 Onwards) 32 References 34 2 Simple Lock Introduction Conventions Lock Program Fault-Freedom and Effective Atomicity Lock Service Program 45 XI
3 xii Contents 2.4 Implements Conditions Proving the Implements Conditions Proving the Safety Condition: B Proving the Progress Condition: S -B Assertional Proof of Inv C\ Assertional Proof of Do Producer and Consumer Using Lock Service Concluding Remarks 59 Exercises 60 References 61 3 Bounded Buffer Introduction Conventions Bounded-Buffer Service Bounded-Buffer Service Inverse Awaits Bounded-Buffer Implementation Using Awaits Locks and Condition Variables Bounded-Buffer Implementation Using Locks and Condition Variables Semaphores Bounded-Buffer Implementation Using Semaphores Increasing Parallelism Technique Technique Bounded-Buffer Service with Cancelable Put and Get Concluding Remarks 82 Exercises 85 References 87 4 Message-Passing Services Introduction Conventions Connection-less Fifo Channels Weaker Progress Assumption Termination and RX Cancellation Fifo Channel Inverse Connection-less Lossy Channels Connection-less LRD Channels Connection-oriented Fifo Channel Multiplexing Ports onto Channels Concluding Remarks Conventions 106 References 109
4 Contents xiii 5 Fifo Channels from Unreliable Channels Ill 5.1 Introduction Ill Conventions Distributed Sliding Window Program: Algorithm Level Source Sink Effective Atomicity of SwpDist Analysis of the Sliding Window Algorithm Correct Interpretation Conditions Achieving Correct Interpretation over Lossy Channel Achieving Correct Interpretation over LRD Channel Achieving Progress Distributed Sliding Window Program Source and Sink Programs with Awaits Source and Sink Programs with Locks and Condition Variables Increasing Parallelism Data Transfer Protocol Proving That DtpDist Implements FifoChannel Graceful-Closing Data Transfer Protocol Abortable Data Transfer Protocol Concluding Remarks 134 Exercises 135 References Programs, Semantics and Effective Atomicity Introduction Programs Inputs and Outputs Input Assumptions Service Programs Input Functions Output Functions Atomicity and Progress Assumptions Usability and Fault-Freedom State Transition Semantics of Systems States Transitions Evolutions Predicates and their Evaluation Assertions and Their Evaluation Splitting and Stitching of Evolutions Auxiliary Variables 156
5 xiv Contents 6.9 Effective Atomicity Defining Effective Atomicity Commuting Statements Some Simple Sufficient Conditions Proof Rules Hoare-Triples Proof Rules for Safety Assertions Proof Rules for Progress Assertions Concluding Remarks 165 References Implements and Compositionality Introduction Conventions Implements Compositionality Program Version of Implements for Services without Internal Parameters Program Version of Implements for Services with Internal Parameters Proof of Theorem Proof of Safety Parts of Theorem Proof of Progress Parts oftheorem Proof of Theorem Proof of Theorems 7.3 and Concluding Remarks 187 Exercises 188 References SESF for Time-Constrained Programs Introduction Time-Constrained Programs Modeling Time Constraints Modeling Timing Assumptions Time-Constrained Service Programs Implements and Compositionality Program Version of Implements Timing Assumptions for Implementation Programs Transforming Timing Constructs into Blocking Conditions Time-Constrained Implementation Program Concluding Remarks 203 Exercises 203 References Lock Using Peterson's Algorithm Introduction 207
6 Contents xv 9.2 Lock Program and Implements Conditions Proving the Implements Conditions Proving the Safety Condition: K Proving the Progress Condition: Y2-Y Concluding Remarks 212 Exercises 212 References Lock Using the Bakery Algorithm Introduction Simplified Bakery Lock Program and Implements Conditions Proving the Implements Conditions for Simplified Bakery Proving the Safety Condition: Y\ Proving the Progress Condition: Y2-Y Original Bakery Lock Program and Implements Conditions Proving the Implements Condition for Original Bakery Proving the Safety Condition: Y] Proving the Progress Condition: Y2-Y Concluding Remarks 222 Exercises 224 References Distributed Lock Service Introduction Service Program Service Inverse Concluding Remarks 227 Exercises 229 References Distributed Lock Using Timestamps Introduction Request Scheduling Problem and Solution Using Timestamps Distributed Lock Program: Algorithm Level Analysis Distributed Lock Program Proving the Implements Conditions Using Cyclic Timestamps Analysis Concluding Remarks 245 Exercises 246 References Channel with Termination Detection Service Introduction Service Program Concluding Remarks 250
7 xvj Contents Exercises 253 References Termination Detection for Diffusing Computations Introduction Conventions Distributed Program: Algorithm Level Analysis Distributed Program Proving the Implements Conditions Proof of C,-C Proof of C3-C Concluding Remarks 266 Exercises 266 References Object-Transfer Service Introduction Service Program Concluding Remarks 273 Exercises 273 References Object Transfer Using Path Reversal Introduction Conventions Distributed Path-Reversal Program Serial Evolutions with at Most One Hungry System at Any Time Serial Evolutions with Multiple Hungry Systems at a Time Non-serial Evolutions Algorithm Analysis: Safety Properties Digraph LR Digraph Pr Algorithm Analysis: Monotonic Progress Metric Algorithm Analysis: Serializability Distributed Program Implementing Object-Transfer Service Proving the Implements Conditions Assertions from Path Reversal Analysis Assertions Concerning objbuff and reqbuff Proof of Inv F,-F Proof of E3-E Concluding Remarks 296 Exercises 297 References 298
8 Contents xv" 17 Distributed Shared Memory Service Introduction Service Program Concluding Remarks 300 Exercises 302 References A Single-Copy Distributed Shared Memory Introduction Distributed Program Proving the Implements Conditions Proving Safety: A i Proving Progress: A2-A Concluding Remarks 311 Exercises 312 References A Multi-copy Distributed Shared Memory Introduction Distributed Program Concluding Remarks 316 Exercises 316 References Reliable Transport Service Introduction Service Overview Function j.connect(k) Function j.accepto Functions j.tx(k.msg) and j.rx(k) Function j.close(k) Service Program Concluding Remarks 328 Exercises 329 References Reliable Transport Protocol Introduction Graceful-Closing dtp Program Protocol Overview Handling Message Losses Handling Old Messages Overlapping Handshakes Buffering Incoming CCR Messages in Server Mode Program Tp with Unbounded Incarnation Numbers Establishing the Implements Condition Assertions to Be Proved 353
9 xviii Contents Proof of B1-B5 and C1-C Proof of fl6-b8 and C6-C Using Cyclic Incarnation Numbers Program Tp with Modulo-N Endpoint Numbers Conclusion 361 Exercises 362 References 362 A Conventions 371 A.l Predicates and Assertions 371 A.2 Referencing System Quantities 372 A.3 Types 372 A.4 Sids 372 A.5 Tids 373 A.6 Sets 373 A.7 Bags 374 A.8 Sequences 374 A.9 Maps 376 A. 10 Channels 376 A. 11 Graphs 377 A. 12 Miscellaneous 378 Index 379
Concurrent Programming: Algorithms, Principles, and Foundations
Concurrent Programming: Algorithms, Principles, and Foundations Algorithms, Principles, and Foundations Bearbeitet von Michel Raynal 1. Auflage 2012. Buch. xxxii, 516 S. Hardcover ISBN 978 3 642 32026
More informationEnabling Flexibility in Process-Aware
Manfred Reichert Barbara Weber Enabling Flexibility in Process-Aware Information Systems Challenges, Methods, Technologies ^ Springer Part I Basic Concepts and Flexibility Issues 1 Introduction 3 1.1 Motivation
More informationAn Annotated Language
Hoare Logic An Annotated Language State and Semantics Expressions are interpreted as functions from states to the corresponding domain of interpretation Operators have the obvious interpretation Free of
More informationContents. Chapter 1 SPECIFYING SYNTAX 1
Contents Chapter 1 SPECIFYING SYNTAX 1 1.1 GRAMMARS AND BNF 2 Context-Free Grammars 4 Context-Sensitive Grammars 8 Exercises 8 1.2 THE PROGRAMMING LANGUAGE WREN 10 Ambiguity 12 Context Constraints in Wren
More informationSimple Lock Program and Service
Simple Lock Program and Service Shankar September 18, 2014 Outline lock program Simple Lock Program Simple Lock Service Proving Lock Implements Service Producer-Consumer using Lock Service Program SimpleLock(N)
More informationAsynchronous Models. Chapter Asynchronous Processes States, Inputs, and Outputs
Chapter 3 Asynchronous Models 3.1 Asynchronous Processes Like a synchronous reactive component, an asynchronous process interacts with other processes via inputs and outputs, and maintains an internal
More informationThe alternator. Mohamed G. Gouda F. Furman Haddix
Distrib. Comput. (2007) 20:21 28 DOI 10.1007/s00446-007-0033-1 The alternator Mohamed G. Gouda F. Furman Haddix Received: 28 August 1999 / Accepted: 5 July 2000 / Published online: 12 June 2007 Springer-Verlag
More informationMichel Raynal. Distributed Algorithms for Message-Passing Systems
Michel Raynal Distributed Algorithms for Message-Passing Systems Contents Part I Distributed Graph Algorithms 1 Basic Definitions and Network Traversal Algorithms... 3 1.1 DistributedAlgorithms... 3 1.1.1
More informationThe Formal Semantics of Programming Languages An Introduction. Glynn Winskel. The MIT Press Cambridge, Massachusetts London, England
The Formal Semantics of Programming Languages An Introduction Glynn Winskel The MIT Press Cambridge, Massachusetts London, England Series foreword Preface xiii xv 1 Basic set theory 1 1.1 Logical notation
More informationGeometric Algebra for Computer Graphics
John Vince Geometric Algebra for Computer Graphics 4u Springer Contents Preface vii 1 Introduction 1 1.1 Aims and objectives of this book 1 1.2 Mathematics for CGI software 1 1.3 The book's structure 2
More informationEnabling Flexibility in Process-Aware Information Systems
Enabling Flexibility in Process-Aware Information Systems Challenges, Methods, Technologies Bearbeitet von Manfred Reichert, Barbara Weber 1. Auflage 2012. Buch. xviii, 518 S. Hardcover ISBN 978 3 642
More informationAN INTRODUCTION TO FUZZY SETS Analysis and Design. Witold Pedrycz and Fernando Gomide
AN INTRODUCTION TO FUZZY SETS Analysis and Design Witold Pedrycz and Fernando Gomide A Bradford Book The MIT Press Cambridge, Massachusetts London, England Foreword - Preface Introduction xiii xxv xxi
More informationProcess Synchronization. Mehdi Kargahi School of ECE University of Tehran Spring 2008
Process Synchronization Mehdi Kargahi School of ECE University of Tehran Spring 2008 Producer-Consumer (Bounded Buffer) Producer Consumer Race Condition Producer Consumer Critical Sections Structure of
More informationIntroductory Combinatorics
Introductory Combinatorics Third Edition KENNETH P. BOGART Dartmouth College,. " A Harcourt Science and Technology Company San Diego San Francisco New York Boston London Toronto Sydney Tokyo xm CONTENTS
More informationAXIOMS FOR THE INTEGERS
AXIOMS FOR THE INTEGERS BRIAN OSSERMAN We describe the set of axioms for the integers which we will use in the class. The axioms are almost the same as what is presented in Appendix A of the textbook,
More informationConcurrent Reading and Writing of Clocks
Concurrent Reading and Writing of Clocks LESLIE LAMPORT Digital Equipment Corporation As an exercise in synchronization without mutual exclusion, algorithms are developed to implement both a monotonic
More informationIntroductory logic and sets for Computer scientists
Introductory logic and sets for Computer scientists Nimal Nissanke University of Reading ADDISON WESLEY LONGMAN Harlow, England II Reading, Massachusetts Menlo Park, California New York Don Mills, Ontario
More informationDiscrete Mathematics SECOND EDITION OXFORD UNIVERSITY PRESS. Norman L. Biggs. Professor of Mathematics London School of Economics University of London
Discrete Mathematics SECOND EDITION Norman L. Biggs Professor of Mathematics London School of Economics University of London OXFORD UNIVERSITY PRESS Contents PART I FOUNDATIONS Statements and proofs. 1
More informationConcurrent & Distributed Systems Supervision Exercises
Concurrent & Distributed Systems Supervision Exercises Stephen Kell Stephen.Kell@cl.cam.ac.uk November 9, 2009 These exercises are intended to cover all the main points of understanding in the lecture
More informationHoare logic. A proof system for separation logic. Introduction. Separation logic
Introduction Hoare logic Lecture 6: Examples in separation logic In the previous lecture, we saw how reasoning about pointers in Hoare logic was problematic, which motivated introducing separation logic.
More informationIntroduction to Formal Methods
2008 Spring Software Special Development 1 Introduction to Formal Methods Part I : Formal Specification i JUNBEOM YOO jbyoo@knokuk.ac.kr Reference AS Specifier s Introduction to Formal lmethods Jeannette
More informationLOGIC AND DISCRETE MATHEMATICS
LOGIC AND DISCRETE MATHEMATICS A Computer Science Perspective WINFRIED KARL GRASSMANN Department of Computer Science University of Saskatchewan JEAN-PAUL TREMBLAY Department of Computer Science University
More informationFuzzy Systems Handbook
The Fuzzy Systems Handbook Second Edition Te^hnische Universitat to instmjnik AutomatisiaMngstechnlk Fachgebi^KQegelup^stheorie und D-S4283 Darrftstadt lnvfentar-ngxc? V 2^s TU Darmstadt FB ETiT 05C Figures
More informationHoare Logic and Model Checking
Hoare Logic and Model Checking Kasper Svendsen University of Cambridge CST Part II 2016/17 Acknowledgement: slides heavily based on previous versions by Mike Gordon and Alan Mycroft Introduction In the
More informationThe Rule of Constancy(Derived Frame Rule)
The Rule of Constancy(Derived Frame Rule) The following derived rule is used on the next slide The rule of constancy {P } C {Q} {P R} C {Q R} where no variable assigned to in C occurs in R Outline of derivation
More informationBinary Relations McGraw-Hill Education
Binary Relations A binary relation R from a set A to a set B is a subset of A X B Example: Let A = {0,1,2} and B = {a,b} {(0, a), (0, b), (1,a), (2, b)} is a relation from A to B. We can also represent
More informationHoare Logic and Model Checking. A proof system for Separation logic. Introduction. Separation Logic
Introduction Hoare Logic and Model Checking In the previous lecture we saw the informal concepts that Separation Logic is based on. Kasper Svendsen University of Cambridge CST Part II 2016/17 This lecture
More informationClassical concurrency control: topic overview 1 In these lectures we consider shared writeable data in main memory
Classical concurrency control: topic overview 1 In these lectures we consider shared writeable data in main memory Controlling access by concurrent processes to shared writeable data has been studied as
More informationMATHEMATICAL STRUCTURES FOR COMPUTER SCIENCE
MATHEMATICAL STRUCTURES FOR COMPUTER SCIENCE A Modern Approach to Discrete Mathematics SIXTH EDITION Judith L. Gersting University of Hawaii at Hilo W. H. Freeman and Company New York Preface Note to the
More informationThe Designer's Guide to VHDL Second Edition
The Designer's Guide to VHDL Second Edition Peter J. Ashenden EDA CONSULTANT, ASHENDEN DESIGNS PTY. VISITING RESEARCH FELLOW, ADELAIDE UNIVERSITY Cl MORGAN KAUFMANN PUBLISHERS An Imprint of Elsevier SAN
More informationMPI: A Message-Passing Interface Standard
MPI: A Message-Passing Interface Standard Version 2.1 Message Passing Interface Forum June 23, 2008 Contents Acknowledgments xvl1 1 Introduction to MPI 1 1.1 Overview and Goals 1 1.2 Background of MPI-1.0
More informationPrinciples of Program Analysis. Lecture 1 Harry Xu Spring 2013
Principles of Program Analysis Lecture 1 Harry Xu Spring 2013 An Imperfect World Software has bugs The northeast blackout of 2003, affected 10 million people in Ontario and 45 million in eight U.S. states
More information2. Time and Global States Page 1. University of Freiburg, Germany Department of Computer Science. Distributed Systems
2. Time and Global States Page 1 University of Freiburg, Germany Department of Computer Science Distributed Systems Chapter 3 Time and Global States Christian Schindelhauer 12. May 2014 2. Time and Global
More informationDistributed Algorithms. Partha Sarathi Mandal Department of Mathematics IIT Guwahati
Distributed Algorithms Partha Sarathi Mandal Department of Mathematics IIT Guwahati Thanks to Dr. Sukumar Ghosh for the slides Distributed Algorithms Distributed algorithms for various graph theoretic
More informationDynamic Logic David Harel, The Weizmann Institute Dexter Kozen, Cornell University Jerzy Tiuryn, University of Warsaw The MIT Press, Cambridge, Massac
Dynamic Logic David Harel, The Weizmann Institute Dexter Kozen, Cornell University Jerzy Tiuryn, University of Warsaw The MIT Press, Cambridge, Massachusetts, 2000 Among the many approaches to formal reasoning
More informationVerifying Java Programs Verifying Java Programs with KeY
Verifying Java Programs Verifying Java Programs with KeY Wolfgang Schreiner Wolfgang.Schreiner@risc.jku.at Research Institute for Symbolic Computation (RISC) Johannes Kepler University, Linz, Austria http://www.risc.jku.at
More informationAn Introduction to Parallel Programming
F 'C 3 R'"'C,_,. HO!.-IJJ () An Introduction to Parallel Programming Peter S. Pacheco University of San Francisco ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
More informationSTRUCTURES AND STRATEGIES FOR STATE SPACE SEARCH
Slide 3.1 3 STRUCTURES AND STRATEGIES FOR STATE SPACE SEARCH 3.0 Introduction 3.1 Graph Theory 3.2 Strategies for State Space Search 3.3 Using the State Space to Represent Reasoning with the Predicate
More informationr=1 The Binomial Theorem. 4 MA095/98G Revision
Revision Read through the whole course once Make summary sheets of important definitions and results, you can use the following pages as a start and fill in more yourself Do all assignments again Do the
More informationProgramming Languages Third Edition
Programming Languages Third Edition Chapter 12 Formal Semantics Objectives Become familiar with a sample small language for the purpose of semantic specification Understand operational semantics Understand
More information6.852: Distributed Algorithms Fall, Class 12
6.852: Distributed Algorithms Fall, 2009 Class 12 Today s plan Weak logical time and vector timestamps Consistent global snapshots and stable property detection. Applications: Distributed termination.
More informationMODERN FACTOR ANALYSIS
MODERN FACTOR ANALYSIS Harry H. Harman «ö THE pigj UNIVERSITY OF CHICAGO PRESS Contents LIST OF ILLUSTRATIONS GUIDE TO NOTATION xv xvi Parti Foundations of Factor Analysis 1. INTRODUCTION 3 1.1. Brief
More informationDigital VLSI Design with Verilog
John Williams Digital VLSI Design with Verilog A Textbook from Silicon Valley Technical Institute Foreword by Don Thomas Sprin ger Contents Introduction xix 1 Course Description xix 2 Using this Book xx
More informationShared Objects. Shared Objects
Shared Objects Shared Objects Invoked operations have a non-zero duration Invocations can overlap Useful for: modeling distributed shared memory Objects can be combined together to implement higher level
More informationShared Variables and Interference
Illinois Institute of Technology Lecture 24 Shared Variables and Interference CS 536: Science of Programming, Spring 2018 A. Why Parallel programs can coordinate their work using shared variables, but
More informationLectures 20, 21: Axiomatic Semantics
Lectures 20, 21: Axiomatic Semantics Polyvios Pratikakis Computer Science Department, University of Crete Type Systems and Static Analysis Based on slides by George Necula Pratikakis (CSD) Axiomatic Semantics
More informationTorben./Egidius Mogensen. Introduction. to Compiler Design. ^ Springer
Torben./Egidius Mogensen Introduction to Compiler Design ^ Springer Contents 1 Lexical Analysis 1 1.1 Regular Expressions 2 1.1.1 Shorthands 4 1.1.2 Examples 5 1.2 Nondeterministic Finite Automata 6 1.3
More informationCSC 501 Semantics of Programming Languages
CSC 501 Semantics of Programming Languages Subtitle: An Introduction to Formal Methods. Instructor: Dr. Lutz Hamel Email: hamel@cs.uri.edu Office: Tyler, Rm 251 Books There are no required books in this
More informationLogic and its Applications
Logic and its Applications Edmund Burke and Eric Foxley PRENTICE HALL London New York Toronto Sydney Tokyo Singapore Madrid Mexico City Munich Contents Preface xiii Propositional logic 1 1.1 Informal introduction
More informationCOURSE: DATA STRUCTURES USING C & C++ CODE: 05BMCAR17161 CREDITS: 05
COURSE: DATA STRUCTURES USING C & C++ CODE: 05BMCAR17161 CREDITS: 05 Unit 1 : LINEAR DATA STRUCTURES Introduction - Abstract Data Types (ADT), Arrays and its representation Structures, Stack, Queue, Circular
More informationTo Everyone... iii To Educators... v To Students... vi Acknowledgments... vii Final Words... ix References... x. 1 ADialogueontheBook 1
Contents To Everyone.............................. iii To Educators.............................. v To Students............................... vi Acknowledgments........................... vii Final Words..............................
More informationCSE 486/586 Distributed Systems
CSE 486/586 Distributed Systems Mutual Exclusion Steve Ko Computer Sciences and Engineering University at Buffalo CSE 486/586 Recap: Consensus On a synchronous system There s an algorithm that works. On
More informationPlanar Graphs. 1 Graphs and maps. 1.1 Planarity and duality
Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter
More informationCoordination and Agreement
Coordination and Agreement Nicola Dragoni Embedded Systems Engineering DTU Informatics 1. Introduction 2. Distributed Mutual Exclusion 3. Elections 4. Multicast Communication 5. Consensus and related problems
More information1 Introduction... 1 1.1 A Database Example... 1 1.2 An Example from Complexity Theory...................... 4 1.3 An Example from Formal Language Theory................. 6 1.4 An Overview of the Book.................................
More informationThe angle measure at for example the vertex A is denoted by m A, or m BAC.
MT 200 ourse notes on Geometry 5 2. Triangles and congruence of triangles 2.1. asic measurements. Three distinct lines, a, b and c, no two of which are parallel, form a triangle. That is, they divide the
More informationLesson 19: The Graph of a Linear Equation in Two Variables is a Line
Lesson 19: The Graph of a Linear Equation in Two Variables is a Line Classwork Exercises Theorem: The graph of a linear equation y = mx + b is a non-vertical line with slope m and passing through (0, b),
More informationFónfix Repair Logging System
Fónfix Repair Logging System Fónfix have developed a new web-based Repair System for Stores. The new system will be held on the Fónfix server and will be managed and maintained by Fónfix. To access the
More informationShared Variables and Interference
Solved Shared Variables and Interference CS 536: Science of Programming, Fall 2018 A. Why Parallel programs can coordinate their work using shared variables, but it s important for threads to not interfere
More informationComputers as Components Principles of Embedded Computing System Design
Computers as Components Principles of Embedded Computing System Design Third Edition Marilyn Wolf ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY
More informationMulti-User-Synchronization
Chapter 10 Multi-User-Synchronization Database Systems p. 415/569 Why Run TAs Concurrently? We could run all TAs serially (one after the other) This would prevent all unwanted side effects However, this
More informationDATABASE THEORY. Lecture 11: Introduction to Datalog. TU Dresden, 12th June Markus Krötzsch Knowledge-Based Systems
DATABASE THEORY Lecture 11: Introduction to Datalog Markus Krötzsch Knowledge-Based Systems TU Dresden, 12th June 2018 Announcement All lectures and the exercise on 19 June 2018 will be in room APB 1004
More informationLecture 9: Midterm Review
Project 1 Due at Midnight Lecture 9: Midterm Review CSE 120: Principles of Operating Systems Alex C. Snoeren Midterm Everything we ve covered is fair game Readings, lectures, homework, and Nachos Yes,
More informationComputer Architecture
Computer Architecture Pipelined and Parallel Processor Design Michael J. Flynn Stanford University Technische Universrtat Darmstadt FACHBEREICH INFORMATIK BIBLIOTHEK lnventar-nr.: Sachgebiete: Standort:
More informationIntroduction xvii. Assessment Test xxxiii
Contents at a Glance Introduction xvii Assessment Test xxxiii Chapter 1 The Components of a Juniper Networks Router 1 Chapter 2 Interfaces 61 Chapter 3 Protocol-Independent Routing 107 Chapter 4 Routing
More informationFault Tolerance. Distributed Software Systems. Definitions
Fault Tolerance Distributed Software Systems Definitions Availability: probability the system operates correctly at any given moment Reliability: ability to run correctly for a long interval of time Safety:
More information3. Concurrency Control for Transactions Part One
3. Concurrency Control for Transactions Part One CSEP 545 Transaction Processing Philip A. Bernstein Copyright 2012 Philip A. Bernstein 1/11/2012 1 Outline 1. A Simple System Model 2. Serializability Theory
More informationSECTION A. (i) The Boolean function in sum of products form where K-map is given below (figure) is:
SECTION A 1. Fill in the blanks: (i) The Boolean function in sum of products form where K-map is given below (figure) is: C B 0 1 0 1 0 1 A A (ii) Consider a 3-bit error detection and 1-bit error correction
More informationWait-Free Regular Storage from Byzantine Components
Wait-Free Regular Storage from Byzantine Components Ittai Abraham Gregory Chockler Idit Keidar Dahlia Malkhi July 26, 2006 Abstract We consider the problem of implementing a wait-free regular register
More informationIntroduction to Axiomatic Semantics (1/2)
#1 Introduction to Axiomatic Semantics (1/2) How s The Homework Going? Remember: just do the counterexample guided abstraction refinement part of DPLL(T). If you notice any other errors, those are good
More informationIntegrating Arrays into the Heap-Hop program prover
Integrating Arrays into the Heap-Hop program prover Ioana Cristescu under the supervision of Jules Villard Queen Mary University of London 7 September 2011 1 / 29 Program verification using Heap-Hop Program
More informationMain Goal. Language-independent program verification framework. Derive program properties from operational semantics
Main Goal Language-independent program verification framework Derive program properties from operational semantics Questions: Is it possible? Is it practical? Answers: Sound and complete proof system,
More information6.033: Fault Tolerance: Isolation Lecture 17 Katrina LaCurts,
6.033: Fault Tolerance: Isolation Lecture 17 Katrina LaCurts, lacurts@mit.edu 0. Introduction - Last time: Atomicity via logging. We're good with atomicity now. - Today: Isolation - The problem: We have
More informationA Simplified Abstract Syntax for the Dataflow Algebra. A. J. Cowling
Verification and Testing Research Group, Department of Computer Science, University of Sheffield, Regent Court, 211, Portobello Street, Sheffield, S1 4DP, United Kingdom Email: A.Cowling @ dcs.shef.ac.uk
More informationTranslation Validation for a Verified OS Kernel
To appear in PLDI 13 Translation Validation for a Verified OS Kernel Thomas Sewell 1, Magnus Myreen 2, Gerwin Klein 1 1 NICTA, Australia 2 University of Cambridge, UK L4.verified sel4 = a formally verified
More informationLecture 7: Mutual Exclusion 2/16/12. slides adapted from The Art of Multiprocessor Programming, Herlihy and Shavit
Principles of Concurrency and Parallelism Lecture 7: Mutual Exclusion 2/16/12 slides adapted from The Art of Multiprocessor Programming, Herlihy and Shavit Time Absolute, true and mathematical time, of
More informationPrinciples of Network Economics
Hagen Bobzin Principles of Network Economics SPIN Springer s internal project number, if known unknown Monograph August 12, 2005 Springer Berlin Heidelberg New York Hong Kong London Milan Paris Tokyo Contents
More informationConcurrent Computing
Concurrent Computing Introduction SE205, P1, 2017 Administrivia Language: (fr)anglais? Lectures: Fridays (15.09-03.11), 13:30-16:45, Amphi Grenat Web page: https://se205.wp.imt.fr/ Exam: 03.11, 15:15-16:45
More information4&5 Binary Operations and Relations. The Integers. (part I)
c Oksana Shatalov, Spring 2016 1 4&5 Binary Operations and Relations. The Integers. (part I) 4.1: Binary Operations DEFINITION 1. A binary operation on a nonempty set A is a function from A A to A. Addition,
More informationAnalysis of Panel Data. Third Edition. Cheng Hsiao University of Southern California CAMBRIDGE UNIVERSITY PRESS
Analysis of Panel Data Third Edition Cheng Hsiao University of Southern California CAMBRIDGE UNIVERSITY PRESS Contents Preface to the ThirdEdition Preface to the Second Edition Preface to the First Edition
More informationNotes for Lecture 20
U.C. Berkeley CS170: Intro to CS Theory Handout N20 Professor Luca Trevisan November 13, 2001 Notes for Lecture 20 1 Duality As it turns out, the max-flow min-cut theorem is a special case of a more general
More informationProgram Design in PVS. Eindhoven University of Technology. Abstract. Hoare triples (precondition, program, postcondition) have
Program Design in PVS Jozef Hooman Dept. of Computing Science Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands e-mail: wsinjh@win.tue.nl Abstract. Hoare triples (precondition,
More informationOPERATING SYSTEMS DESIGN AND IMPLEMENTATION Third Edition ANDREW S. TANENBAUM ALBERT S. WOODHULL. Chap. 2.2 Interprocess Communication
OPERATING SYSTEMS DESIGN AND IMPLEMENTATION Third Edition ANDREW S. TANENBAUM ALBERT S. WOODHULL Chap. 2.2 Interprocess Communication Annotated by B. Hirsbrunner, University of Fribourg, 2011 Lecture 5,
More informationMemory management, part 2: outline
Memory management, part 2: outline Page replacement algorithms Modeling PR algorithms o Working-set model and algorithms Virtual memory implementation issues 1 Page Replacement Algorithms Page fault forces
More informationTemporal Refinement Using SMT and Model Checking with an Application to Physical-Layer Protocols
Temporal Refinement Using SMT and Model Checking with an Application to Physical-Layer Protocols Lee Pike (Presenting), Galois, Inc. leepike@galois.com Geoffrey M. Brown, Indiana University geobrown@cs.indiana.edu
More informationCSE 153 Design of Operating Systems
CSE 153 Design of Operating Systems Winter 2018 Midterm Review Midterm in class on Monday Covers material through scheduling and deadlock Based upon lecture material and modules of the book indicated on
More informationExercises on Concurrency Control (part 2)
Exercises on Concurrency Control (part 2) Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Antonio Ruberti Università di Roma La Sapienza Anno Accademico 2017/2018 http://www.dis.uniroma1.it/~lenzerin/index.html/?q=node/53
More informationList of Examples List of Figures List of Tables. Acknowledgments 1. VERIFICATION GUIDELINES 1
Contents List of Examples List of Figures List of Tables Preface Acknowledgments xiii xxvii xxix xxxi xxxvii 1. VERIFICATION GUIDELINES 1 1.1 The Verification Process 2 1.2 The Verification Methodology
More informationAnalyzing Real-Time Systems
Analyzing Real-Time Systems Reference: Burns and Wellings, Real-Time Systems and Programming Languages 17-654/17-754: Analysis of Software Artifacts Jonathan Aldrich Real-Time Systems Definition Any system
More informationContents. 3 Vector Quantization The VQ Advantage Formulation Optimality Conditions... 48
Contents Part I Prelude 1 Introduction... 3 1.1 Audio Coding... 4 1.2 Basic Idea... 6 1.3 Perceptual Irrelevance... 8 1.4 Statistical Redundancy... 9 1.5 Data Modeling... 9 1.6 Resolution Challenge...
More informationContents. Acknowledgments Parachutes: Coda. About the Author. Presentation Conventions. PART ONE Foundations 1
fm01.qxd 5/24/07 11:16 AM Page ix Preface Aims Subject Matter Structure Supplementary Material Acknowledgments Parachutes: Coda About the Author Prologue A Dichotomy of Character Principles of UNIX Programming
More information1) What is the role of information technology in modern organizations? 2) Discuss the memory and storage devices.
(DMCA 101) ASSIGNMENT - 1, MAY-2014. PAPER- I : INFORMATION TECHNOLOGY 1) What is the role of information technology in modern organizations? 2) Discuss the memory and storage devices. 3) What is software?
More informationUsing SeSFJava in Teaching Introductory Network Courses
Using SeSFJava in Teaching Introductory Network Courses Tamer Elsharnouby Department of Computer Science, University of Maryland, College Park, MD 20742 sharno@cs.umd.edu A. Udaya Shankar Department of
More informationEXTENDING THE PRIORITY CEILING PROTOCOL USING READ/WRITE AFFECTED SETS MICHAEL A. SQUADRITO A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE
EXTENDING THE PRIORITY CEILING PROTOCOL USING READ/WRITE AFFECTED SETS BY MICHAEL A. SQUADRITO A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER
More information1 Elementary number theory
Math 215 - Introduction to Advanced Mathematics Spring 2019 1 Elementary number theory We assume the existence of the natural numbers and the integers N = {1, 2, 3,...} Z = {..., 3, 2, 1, 0, 1, 2, 3,...},
More informationFormal Verification of MIX Programs
Formal Verification of MIX Programs Jean-Christophe Filliâtre CNRS LRI, Univ Paris-Sud, Orsay F-91405 INRIA Futurs, ProVal, Orsay F-91893 Abstract We introduce a methodology to formally verify MIX programs.
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 10
CPSC 536N: Randomized Algorithms 011-1 Term Prof. Nick Harvey Lecture 10 University of British Columbia In the first lecture we discussed the Max Cut problem, which is NP-complete, and we presented a very
More informationM.C.A. DEGREE EXAMINATION, MAY First Year Paper - I : INFORMATION TECHNOLOGY. Time : 03 Hours Maximum Marks : 75
M.C.A. DEGREE EXAMINATION, MAY - 2013 First Year Paper - I : INFORMATION TECHNOLOGY (DMCA 101) Time : 03 Hours Maximum Marks : 75 Section - A (3 15 = 45) Answer any Three of the following 1) What is the
More informationPart I Components and Component-based Development
Contents The Griffin... Acknowledgements... vii ix 1 Introduction... 1 1.1 A ClearDrop... 2 1.1.1 Testing Components and Recording Approximations...... 2 1.1.2 SynthesizingaSystem... 5 1.1.3 DiscussionoftheExample...
More informationMath 205B - Topology. Dr. Baez. January 19, Christopher Walker. p(x) = (cos(2πx), sin(2πx))
Math 205B - Topology Dr. Baez January 19, 2007 Christopher Walker Theorem 53.1. The map p : R S 1 given by the equation is a covering map p(x) = (cos(2πx), sin(2πx)) Proof. First p is continuous since
More information