OE Example: Events and Roles

Size: px
Start display at page:

Download "OE Example: Events and Roles"

Transcription

1 OE Example: Events and Roles Events in Cyc Roles and Event Predicates Actor Slots Sub-events This section will survey Cyc s representation of events. This section will tie up with later sections where we ll see how components of events are related to events in Cyc by roles, such as actor slots and sub-events. 1

2 Events in Cyc Events are represented as individuals that: have components (are not empty space or time) are situations have temporal extent are dynamic Events are classified in Cyc collections #$Reading, #$Communicating, #$Drowning, #$Travel-TripEvent, #$WagingWar, #$Negotiating, #$Earthquake, #$SalesActivity, #$PoliticalCampaign Events in Cyc are represented as individuals that belong to a collection called #$Event. These individuals have components; that is, they re not empty stretches of space or time, they have parts. They are also situations. By situation we mean any configuration or arrangement, such as a group of people, their equipment, etc., in a room, at a specific time; or just that computer sitting on the table; or some birds flying outside. Situations have structure, precise or fuzzy. Events also have temporal extent. That is, they occur over time. So they re different from arrangements such as geometric configurations or abstract mathematical series, which are also configurations of individuals, but they re not extended temporally. Finally, events are dynamic. That means that they can change over time. Most individual events in Cyc are classified, not just as instances of #$Event, but as instances of a more specialized collection of #$Event. So you wouldn t see #$Event001 reified in the Cyc KB, you d more likely see #$Reading001, #$Negotiating001, or #$PoliticalCampaign001, or some other instance of some more specialized collection. 2

3 Partial hierarchy for #$Event #$Situation #$Situation- Temporal #$RelationalStructure <& other abstract situations> #$StaticSituation #$Event <other specs> #$Event-Organized #$ConflictEvent #$Information- TransferEvent #$BusinessEvent #$NaturalDisaster #$WagingWar #$Reading #$PoliticalCampaign #$Communicating #$SalesActivity #$Earthquake This slide provides a glimpse of the #$genls hierarchy of the collections surrounding #$Event. As you can see, #$Event is indeed a specialization of #$Situation-Temporal, and that s how Cyc knows events are arrangements of objects that extend over time. Also, you can see that #$Event is not a specialization of #$RelationalStructure, and that s how Cyc knows that events are different from abstract geometric or mathematical series. Events are dynamic, so #$StaticSituation is a sibling collection for #$Event. #$StaticSituation collects situations that are extended in time but don t change, whereas the collection #$Event collects the situations that are extended in time but do change. Under #$Event you see some of the more general specializations of event. This is really just the tip of the iceberg. There are many many more specializations of #$Event. 3

4 Why Reify Events? Makes it easy to add (or modify) components of individual situations and events Enables use of the #$genls hierarchy to inherit general knowledge about kinds of events Roles harness the inferential power of CycL predicates Roles are specialized predicates relating events to their components Why do we reify individual events (instances of #$Event) in Cyc? If our knowledge changes about an event, having a reified data structure to represent the event enables us to add information or alter the representation in Cyc very easily. Also, because kinds of events are related to each other in the #$genls hierarchy, we can use that hierarchy to inherit knowledge downward from the more general types of events to the more specialized types of events. So for instance, if we have the general event collection, #$TransportationEvent, and we state about that collection that anything that travels during a transportation event moves from an origin to a destination, then Cyc will know that this is also true of specializations of #$Transportation event, such as #$SubmarineTransportationEvent or #$BicycleTransportationEvent. More specialized knowledge will also hold in those cases. We ll know that for an instance of the #$BicycleTransportationEvent the device used was a bicycle, and still the more general assertions hold. As we will see, roles too have a hierarchy that extends Cyc s ability to reason about the components the participants and sub-parts of events. 4

5 Components of events Events involve various things as parts performers, objects, instruments sub-events, stages or processes locations or destinations How do we attach events to the things involved? There are all kinds of things that can be components of events. Events can have performers, and there can be devices that performers use during the events. Events can have sub-events, or sub-stages. Events can occur at places, and those places are somehow involved in the events. Events take place at time, and times of events are also somehow involved in events (we have special predicates to relate times to events). We state how components of events are involved in events with roles predicates predicates that are instances of the collection #$Role. 5

6 Using Roles Abu Qir Bay Year 1798 Napoleon s Egyptian Fleet Horatio Nelson British Attack Battle of the Nile De Breuys L Orient Nelson s Mediterranean Squadron Sinking of L Orient French Defense Linking events and things involved:??? For example, consider the event that is the Battle of the Nile. It is a fairly complex event in which a number of things are involved. In a sense, the year 1798 is involved in the Battle of the Nile, because that s the year in which the battle occurred. Abu Qir Bay is in involved in the event, because that s where the event occurs. Horatio Nelson is an actor in the event. The British Attack is a sub-event of the battle, as is the French Defense. And so on. 6

7 Roles and Events CycL uses predicates called roles to relate individual events to their components Predicate constraints help to characterize kinds of events and kinds of components Relations between predicates enrich Cyc s knowledge about things involved in events In CycL we use special predicates called roles to relate reified events to their components. We build a lot of knowledge into the construction of role predicates to help Cyc understand how these roles function to relate components of events to reified events. 7

8 Summary Events in Cyc Why Reify Events? Relations between predicates enrich Cyc s knowledge about things involved in events Components of events: Predicate constraints help to characterize kinds of events and kinds of components Using Roles Roles and Events: CycL uses predicates called roles to relate individual events to their components In summary, events are a certain kind of individual that we find useful to reify in order to increase inferential efficiency. Events are the sorts of things that have components. We use roles to relate components of events to events. 8

OE Example: Events and Roles

OE Example: Events and Roles OE Example: Events and Roles Events in Cyc Roles and Event Predicates Actor Slots Sub-events This is the third lesson on Events and Roles. It will discuss the concept of Actor Slots. 1 Actor slots Every

More information

Overview. COMP 4200: Expert Systems. Knowledge Representation 2. Knowledge Representation 1

Overview. COMP 4200: Expert Systems. Knowledge Representation 2. Knowledge Representation 1 Overview COMP 4200: Expert Systems Dr. Christel Kemke Department of Computer Science University of Manitoba Knowledge Representation for XPS Associative Nets and Frame Systems (Jackson, Chapter 6) Object-oriented

More information

Object-based representation. Objects

Object-based representation. Objects Object-based representation Luger, Part III, 6.0, 6.1, 6.2.2-6.2.4, 6.4 (skim) Objects Two basic forms of Structured Objects Semantic Nets Frames Semantic Nets (Associative Nets) Components Nodes - represent

More information

Grade 6 Math Circles November 6 & Relations, Functions, and Morphisms

Grade 6 Math Circles November 6 & Relations, Functions, and Morphisms Faculty of Mathematics Waterloo, Ontario N2L 3G1 Centre for Education in Mathematics and Computing Relations Let s talk about relations! Grade 6 Math Circles November 6 & 7 2018 Relations, Functions, and

More information

Exercises 6 - Virtual vs. Physical Memory, Cache

Exercises 6 - Virtual vs. Physical Memory, Cache Questions 1. Consider a (very old!) computer with a hard disk of only 1 GB, main memory of 16 MB, and a cache with 512 blocks of 8 words each. Suppose the hard disk and main memory are partitioned into

More information

Unit 1: Working With Tables

Unit 1: Working With Tables Unit 1: Working With Tables Unit Overview This unit covers the basics of working with Tables and the Table wizard. It does not include working with fields, which is covered in Units 3 and 4. It is divided

More information

We have already seen the transportation problem and the assignment problem. Let us take the transportation problem, first.

We have already seen the transportation problem and the assignment problem. Let us take the transportation problem, first. Advanced Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture 19 Network Models In this lecture, we will discuss network models. (Refer

More information

Computer Graphics and Linear Algebra Rebecca Weber, 2007

Computer Graphics and Linear Algebra Rebecca Weber, 2007 Computer Graphics and Linear Algebra Rebecca Weber, 2007 Vector graphics refers to representing images by mathematical descriptions of geometric objects, rather than by a collection of pixels on the screen

More information

Lecture 4: Inheritence and Abstract Classes

Lecture 4: Inheritence and Abstract Classes Integrated Introduction to Computer Science Fisler, Nelson Contents 1 Abstracting over Common Methods in Different Classes 1 2 Inheritence 2 2.1 Simplifying the Boa/Dillo Classes.............................

More information

(Refer Slide Time: 00:01:30)

(Refer Slide Time: 00:01:30) Digital Circuits and Systems Prof. S. Srinivasan Department of Electrical Engineering Indian Institute of Technology, Madras Lecture - 32 Design using Programmable Logic Devices (Refer Slide Time: 00:01:30)

More information

B+ TREES Examples. B Trees are dynamic. That is, the height of the tree grows and contracts as records are added and deleted.

B+ TREES Examples. B Trees are dynamic. That is, the height of the tree grows and contracts as records are added and deleted. B+ TREES Examples B Trees. B Trees are multi-way trees. That is each node contains a set of keys and pointers. A B Tree with four keys and five pointers represents the minimum size of a B Tree node. A

More information

Multi-Methods in Racket

Multi-Methods in Racket Multi-Methods in Racket António Menezes Leitão April, 18, 2013 1 Introduction Multi-methods are an advanced concept that extends the single dispatch approach that is used in the majority of object-oriented

More information

CMPSC 250 Analysis of Algorithms Spring 2018 Dr. Aravind Mohan Shortest Paths April 16, 2018

CMPSC 250 Analysis of Algorithms Spring 2018 Dr. Aravind Mohan Shortest Paths April 16, 2018 1 CMPSC 250 Analysis of Algorithms Spring 2018 Dr. Aravind Mohan Shortest Paths April 16, 2018 Shortest Paths The discussion in these notes captures the essence of Dijkstra s algorithm discussed in textbook

More information

In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more

In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more detail in CS 168, and many slides are taken from there.

More information

Sets. Margaret M. Fleck. 15 September 2010

Sets. Margaret M. Fleck. 15 September 2010 Sets Margaret M. Fleck 15 September 2010 These notes cover set notation, operations on sets, and how to prove claims involving sets (Rosen sections 2.1 and 2.2). They also cover some logic subtleties that

More information

Basic Reliable Transport Protocols

Basic Reliable Transport Protocols Basic Reliable Transport Protocols Do not be alarmed by the length of this guide. There are a lot of pictures. You ve seen in lecture that most of the networks we re dealing with are best-effort : they

More information

Fundamentals of Operations Research. Prof. G. Srinivasan. Department of Management Studies. Indian Institute of Technology, Madras. Lecture No.

Fundamentals of Operations Research. Prof. G. Srinivasan. Department of Management Studies. Indian Institute of Technology, Madras. Lecture No. Fundamentals of Operations Research Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture No. # 13 Transportation Problem, Methods for Initial Basic Feasible

More information

CS419: Computer Networks. Lecture 10, Part 2: Apr 11, 2005 Transport: TCP mechanics (RFCs: 793, 1122, 1323, 2018, 2581)

CS419: Computer Networks. Lecture 10, Part 2: Apr 11, 2005 Transport: TCP mechanics (RFCs: 793, 1122, 1323, 2018, 2581) : Computer Networks Lecture 10, Part 2: Apr 11, 2005 Transport: TCP mechanics (RFCs: 793, 1122, 1323, 2018, 2581) TCP as seen from above the socket The TCP socket interface consists of: Commands to start

More information

Putting the fun in functional programming

Putting the fun in functional programming CM20167 Topic 4: Map, Lambda, Filter Guy McCusker 1W2.1 Outline 1 Introduction to higher-order functions 2 Map 3 Lambda 4 Filter Guy McCusker (1W2.1 CM20167 Topic 4 2 / 42 Putting the fun in functional

More information

Object Relationships

Object Relationships Object Relationships Objects can work together in three different types of relationships: Uses: An object can use another to do some work (association). Composition: A complex object may be composed of

More information

4.1 COMPUTATIONAL THINKING AND PROBLEM-SOLVING

4.1 COMPUTATIONAL THINKING AND PROBLEM-SOLVING 4.1 COMPUTATIONAL THINKING AND PROBLEM-SOLVING 4.1.2 ALGORITHMS ALGORITHM An Algorithm is a procedure or formula for solving a problem. It is a step-by-step set of operations to be performed. It is almost

More information

This is a book about using Visual Basic for Applications (VBA), which is a

This is a book about using Visual Basic for Applications (VBA), which is a 01b_574116 ch01.qxd 7/27/04 9:04 PM Page 9 Chapter 1 Where VBA Fits In In This Chapter Describing Access Discovering VBA Seeing where VBA lurks Understanding how VBA works This is a book about using Visual

More information

Knowledge Representation

Knowledge Representation Knowledge Engineering Course Department of Electronics - Politecnico di Milano http://www.dei.polimi.it/people/bonarini Academic Year 2010-2011 Let s start from history... 1956 - Birth of Artificial Intelligence

More information

Study of Fuzzy Set Theory and Its Applications

Study of Fuzzy Set Theory and Its Applications IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765X. Volume 12, Issue 4 Ver. II (Jul. - Aug.2016), PP 148-154 www.iosrjournals.org Study of Fuzzy Set Theory and Its Applications

More information

Organize Your iphone: Icons and Folders

Organize Your iphone: Icons and Folders 227 Chapter 7 Organize Your iphone: Icons and Folders Your new iphone is very customizable. In this chapter we will show you how to move icons around and put your favorite icons just where you want them.

More information

First-Class Sprites in Snap!

First-Class Sprites in Snap! First-Class Sprites in Snap! Jens Mönig May 2 2016 Snap s standard microworld - derived from MIT Scratch - revolves around controlling cartoonish 2D actors called sprites living in a presentation area

More information

The pre-processor (cpp for C-Pre-Processor). Treats all # s. 2 The compiler itself (cc1) this one reads text without any #include s

The pre-processor (cpp for C-Pre-Processor). Treats all # s. 2 The compiler itself (cc1) this one reads text without any #include s Session 2 - Classes in C++ Dr Christos Kloukinas City, UoL http://staff.city.ac.uk/c.kloukinas/cpp (slides originally produced by Dr Ross Paterson) A C++ source file may contain: include directives #include

More information

ni.com Using OOP in Measurement Systems

ni.com Using OOP in Measurement Systems Using OOP in Measurement Systems Common Problem: Software becomes difficult to maintain over time Initial investment in software architecture, training and processes Why OOP is an Answer When you want

More information

Adding content to your Blackboard 9.1 class

Adding content to your Blackboard 9.1 class Adding content to your Blackboard 9.1 class There are quite a few options listed when you click the Build Content button in your class, but you ll probably only use a couple of them most of the time. Note

More information

Lecture 4: Goals and Scenarios. System context. Usage facet. IT system facet. Core activities. Negotiation. Requirements artefacts

Lecture 4: Goals and Scenarios. System context. Usage facet. IT system facet. Core activities. Negotiation. Requirements artefacts Lecture 4: Goals and Scenarios Stakeholders Identifying the problem owners Goals Identifying the success criteria Scenarios Identifying how it works 1 System context Subject facet Usage facet IT system

More information

Conceptual Design. The Entity-Relationship (ER) Model

Conceptual Design. The Entity-Relationship (ER) Model Conceptual Design. The Entity-Relationship (ER) Model CS430/630 Lecture 12 Slides based on Database Management Systems 3 rd ed, Ramakrishnan and Gehrke Database Design Overview Conceptual design The Entity-Relationship

More information

Tips & Tricks for Microsoft Word

Tips & Tricks for Microsoft Word T 330 / 1 Discover Useful Hidden Features to Speed-up Your Work in Word For what should be a straightforward wordprocessing program, Microsoft Word has a staggering number of features. Many of these you

More information

Internet Explorer 6 and 7 Users

Internet Explorer 6 and 7 Users Internet Explorer 6 and 7 Users How and Why to Clear Your Cache Often referred to as the cache, the Temporary Internet Files folder contains a kind of travel record of the items you have seen, heard, or

More information

GPU 101. Mike Bailey. Oregon State University. Oregon State University. Computer Graphics gpu101.pptx. mjb April 23, 2017

GPU 101. Mike Bailey. Oregon State University. Oregon State University. Computer Graphics gpu101.pptx. mjb April 23, 2017 1 GPU 101 Mike Bailey mjb@cs.oregonstate.edu gpu101.pptx Why do we care about GPU Programming? A History of GPU Performance vs. CPU Performance 2 Source: NVIDIA How Can You Gain Access to GPU Power? 3

More information

GPU 101. Mike Bailey. Oregon State University

GPU 101. Mike Bailey. Oregon State University 1 GPU 101 Mike Bailey mjb@cs.oregonstate.edu gpu101.pptx Why do we care about GPU Programming? A History of GPU Performance vs. CPU Performance 2 Source: NVIDIA 1 How Can You Gain Access to GPU Power?

More information

Knowledge Base for Business Intelligence

Knowledge Base for Business Intelligence Knowledge Base for Business Intelligence System for population and linking of knowledge bases dealing with data, information and knowledge comming from heterogeneous data sources to provide pluggable Business

More information

Informatics 1: Data & Analysis

Informatics 1: Data & Analysis Informatics 1: Data & Analysis Lecture 3: The Relational Model Ian Stark School of Informatics The University of Edinburgh Tuesday 24 January 2017 Semester 2 Week 2 https://blog.inf.ed.ac.uk/da17 Lecture

More information

Asset and network modeling in HP ArcSight ESM and Express

Asset and network modeling in HP ArcSight ESM and Express Asset and network modeling in HP ArcSight ESM and Express Till Jäger, CISSP, CEH EMEA ArcSight Architect, HP ESP Agenda Overview Walkthrough of asset modeling in ArcSight ESM More inside info about the

More information

PHOTOSHOP 7 BASIC USER MANUAL

PHOTOSHOP 7 BASIC USER MANUAL Multimedia Module PHOTOSHOP 7 BASIC USER MANUAL For information and permission to use these training modules, please contact: Limell Lawson - limell@u.arizona.edu - 520.621.6576 or Joe Brabant - jbrabant@u.arizona.edu

More information

CS 457 Networking and the Internet. Network Overview (cont d) 8/29/16. Circuit Switching (e.g., Phone Network) Fall 2016 Indrajit Ray

CS 457 Networking and the Internet. Network Overview (cont d) 8/29/16. Circuit Switching (e.g., Phone Network) Fall 2016 Indrajit Ray 8/9/6 CS 457 Networking and the Internet Fall 06 Indrajit Ray Network Overview (cont d) Circuit vs. Packet Switching Best Effort Internet Model Circuit Switching (e.g., Phone Network) Step : Source establishes

More information

Taskbar: Working with Several Windows at Once

Taskbar: Working with Several Windows at Once Taskbar: Working with Several Windows at Once Your Best Friend at the Bottom of the Screen How to Make the Most of Your Taskbar The taskbar is the wide bar that stretches across the bottom of your screen,

More information

Agent Design Example Problems State Spaces. Searching: Intro. CPSC 322 Search 1. Textbook Searching: Intro CPSC 322 Search 1, Slide 1

Agent Design Example Problems State Spaces. Searching: Intro. CPSC 322 Search 1. Textbook Searching: Intro CPSC 322 Search 1, Slide 1 Searching: Intro CPSC 322 Search 1 Textbook 3.0 3.3 Searching: Intro CPSC 322 Search 1, Slide 1 Lecture Overview 1 Agent Design 2 Example Problems 3 State Spaces Searching: Intro CPSC 322 Search 1, Slide

More information

Why memory hierarchy? Memory hierarchy. Memory hierarchy goals. CS2410: Computer Architecture. L1 cache design. Sangyeun Cho

Why memory hierarchy? Memory hierarchy. Memory hierarchy goals. CS2410: Computer Architecture. L1 cache design. Sangyeun Cho Why memory hierarchy? L1 cache design Sangyeun Cho Computer Science Department Memory hierarchy Memory hierarchy goals Smaller Faster More expensive per byte CPU Regs L1 cache L2 cache SRAM SRAM To provide

More information

BPC Competition Entry and Image Upload Page

BPC Competition Entry and Image Upload Page BPC Competition Entry and Image Upload Page The image upload page can be accessed via the large green button at the bottom of the Club Rules page called Competition Upload on the BPC website at http://www.buxtonphotographicclub.co.uk/club_rules.html

More information

Database Use & Design

Database Use & Design Database Use & Design 1 Important Terms and Definitions Database A collection of information organized in such a way that a computer program can quickly select desired pieces of data. Field Form Primary

More information

Predicates and Denotational Functions

Predicates and Denotational Functions Predicates and Denotational Functions The Basics Arity Argument Types Second-Order Predicates More on Functions Now, let s talk a little more about predicates and go into further details. 1 Second-Order

More information

Wondering about either OWL ontologies or SKOS vocabularies? You need both!

Wondering about either OWL ontologies or SKOS vocabularies? You need both! Making sense of content Wondering about either OWL ontologies or SKOS vocabularies? You need both! ISKO UK SKOS Event London, 21st July 2008 bernard.vatant@mondeca.com A few words about Mondeca Founded

More information

Electronic Assembly and Test System with Part Transfers. 1)Open INDE 504 website and download arena Lab 5.doe

Electronic Assembly and Test System with Part Transfers. 1)Open INDE 504 website and download arena Lab 5.doe Electronic Assembly and Test System with Part Transfers 1)Open INDE 504 website and download arena Lab 5.doe Simulation with Arena, 5th ed. Chapter 4 Modeling Basic Operations and Inputs Electronic Assembly

More information

CIS 45, The Introduction. What is a database? What is data? What is information?

CIS 45, The Introduction. What is a database? What is data? What is information? CIS 45, The Introduction I have traveled the length and breadth of this country and talked with the best people, and I can assure you that data processing is a fad that won t last out the year. The editor

More information

Object-Oriented Analysis and Design Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology-Kharagpur

Object-Oriented Analysis and Design Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology-Kharagpur Object-Oriented Analysis and Design Prof. Partha Pratim Das Department of Computer Science and Engineering Indian Institute of Technology-Kharagpur Lecture 06 Object-Oriented Analysis and Design Welcome

More information

Computer Science 210 Data Structures Siena College Fall Topic Notes: Priority Queues and Heaps

Computer Science 210 Data Structures Siena College Fall Topic Notes: Priority Queues and Heaps Computer Science 0 Data Structures Siena College Fall 08 Topic Notes: Priority Queues and Heaps Heaps and Priority Queues From here, we will look at some ways that trees are used in other structures. First,

More information

Replacing an Advanced Power and Cooling (APC) Unit

Replacing an Advanced Power and Cooling (APC) Unit Replacing an Advanced Power and Cooling (APC) Unit You must replace a failed APC unit as quickly as possible (within minutes) to maintain correct airflow and cooling. Failed APC units can be hot-swapped.

More information

ebird 202: Advanced tips and tricks

ebird 202: Advanced tips and tricks ebird 202: Advanced tips and tricks In ebird 101 we showed you the basics behind submitting checklists and exploring the data. In the second instalment, ebird 202, we built on what we learned in ebird

More information

Career Connections Student & Alumni User Guide

Career Connections Student & Alumni User Guide Career Connections Student & Alumni User Guide SIT proudly presents a career tool that enables SIT students and alumni to manage their career searches and apply for up to date vacancies all in one account.

More information

The first program: Little Crab

The first program: Little Crab Chapter 2 The first program: Little Crab topics: concepts: writing code: movement, turning, reacting to the screen edges source code, method call, parameter, sequence, if-statement In the previous chapter,

More information

Multi-Level Feedback Queues

Multi-Level Feedback Queues CS 326: Operating Systems Multi-Level Feedback Queues Lecture 8 Today s Schedule Building an Ideal Scheduler Priority-Based Scheduling Multi-Level Queues Multi-Level Feedback Queues Scheduling Domains

More information

Microsoft SharePoint 2010

Microsoft SharePoint 2010 BrainStorm Quick Start Card for Microsoft SharePoint 2010 Getting Started Microsoft SharePoint 2010 brings together your organization s people, documents, information, and ideas in a customizable space

More information

CS5412: CONSENSUS AND THE FLP IMPOSSIBILITY RESULT

CS5412: CONSENSUS AND THE FLP IMPOSSIBILITY RESULT 1 CS5412: CONSENSUS AND THE FLP IMPOSSIBILITY RESULT Lecture XII Ken Birman Generalizing Ron and Hermione s challenge 2 Recall from last time: Ron and Hermione had difficulty agreeing where to meet for

More information

Engage Meeting Manager. User guide

Engage Meeting Manager. User guide Engage Meeting Manager User guide Contents 1. Navigating the Engage Meeting Manager grid 3 1.1 Menu 3 1.2 Date and directory control 4 1.3 Site list 4 1.4 Grid 5 1.5 Daily meeting summary 5 2. Creating

More information

Multi-event IDS Categories. Introduction to Misuse Intrusion Detection Systems (IDS) Formal Specification of Intrusion Signatures and Detection Rules

Multi-event IDS Categories. Introduction to Misuse Intrusion Detection Systems (IDS) Formal Specification of Intrusion Signatures and Detection Rules Formal Specification of Intrusion Signatures and Detection Rules By Jean-Philippe Pouzol and Mireille Ducassé 15 th IEEE Computer Security Foundations Workshop 2002 Presented by Brian Kellogg CSE914: Formal

More information

Algorithmic problem-solving: Lecture 2. Algorithmic problem-solving: Tractable vs Intractable problems. Based on Part V of the course textbook.

Algorithmic problem-solving: Lecture 2. Algorithmic problem-solving: Tractable vs Intractable problems. Based on Part V of the course textbook. Algorithmic problem-solving: Lecture 2 Algorithmic problem-solving: Tractable vs Intractable problems Based on Part V of the course textbook. Algorithmic techniques Question: Given a computational task,

More information

Lecture 25 Notes Spanning Trees

Lecture 25 Notes Spanning Trees Lecture 25 Notes Spanning Trees 15-122: Principles of Imperative Computation (Spring 2016) Frank Pfenning 1 Introduction The following is a simple example of a connected, undirected graph with 5 vertices

More information

Dissecting a keyboard

Dissecting a keyboard Dissecting a keyboard The keyboard on Jacky s PC died. Another opportunity to take something apart and admire its design and construction. I turned it over and pulled out all the screws. The back wouldn

More information

Déjà Vu: A Hierarchical Case-Based Reasoning System for Software Design

Déjà Vu: A Hierarchical Case-Based Reasoning System for Software Design Déjà Vu: A Hierarchical Case-Based Reasoning System for Software Design Barry Smyth Hitachi Dublin Laboratory Trinity College Dublin 2 Ireland. Tel. 01-6798911 Fax. 01-6798926 E-mail: bsmyth@vax1.tcd.ie

More information

HOW TO ACCESS ROTARY CLUB CENTRAL

HOW TO ACCESS ROTARY CLUB CENTRAL HOW TO ACCESS ROTARY CLUB CENTRAL 1 Go to My Rotary and select Sign In or Register. Or go to rotary.org/clubcentral to reach the site directly. You ll be prompted to sign in to My Rotary or create an account

More information

HOW TO ACCESS ROTARY CLUB CENTRAL

HOW TO ACCESS ROTARY CLUB CENTRAL HOW TO ACCESS ROTARY CLUB CENTRAL 1 Go to My Rotary and select Sign In or Register. Or go to rotary.org/clubcentral to reach the site directly. You ll be prompted to sign in to My Rotary or create an account

More information

1 Interlude: Is keeping the data sorted worth it? 2 Tree Heap and Priority queue

1 Interlude: Is keeping the data sorted worth it? 2 Tree Heap and Priority queue TIE-0106 1 1 Interlude: Is keeping the data sorted worth it? When a sorted range is needed, one idea that comes to mind is to keep the data stored in the sorted order as more data comes into the structure

More information

CS12020 (Computer Graphics, Vision and Games) Worksheet 1

CS12020 (Computer Graphics, Vision and Games) Worksheet 1 CS12020 (Computer Graphics, Vision and Games) Worksheet 1 Jim Finnis (jcf1@aber.ac.uk) 1 Getting to know your shield First, book out your shield. This might take a little time, so be patient. Make sure

More information

Lab 16: Data Busses, Tri-State Outputs and Memory

Lab 16: Data Busses, Tri-State Outputs and Memory Lab 16: Data Busses, Tri-State Outputs and Memory UC Davis Physics 116B Rev. 0.9, Feb. 2006 1 Introduction 1.1 Data busses Data busses are ubiquitous in systems which must communicate digital data. Examples

More information

Arrays. myints = new int[15];

Arrays. myints = new int[15]; Arrays As you know from COMP 202 (or equivalent), an array is a data structure that holds a set of elements that are of the same type. Each element in the array can be accessed or indexed by a unique number

More information

Creating Universally Designed Word 2010 Documents - Quick Start Guide

Creating Universally Designed Word 2010 Documents - Quick Start Guide Creating Universally Designed Word 2010 Documents - Quick Start Guide Overview Creating accessible documents ones that work well with all sorts of technology can be a daunting task. The purpose of this

More information

Kinematics: Intro. Kinematics is study of motion

Kinematics: Intro. Kinematics is study of motion Kinematics is study of motion Kinematics: Intro Concerned with mechanisms and how they transfer and transform motion Mechanisms can be machines, skeletons, etc. Important for CG since need to animate complex

More information

Chapter 8: Elevation Data

Chapter 8: Elevation Data Chapter 8: Elevation Data SADA permits user s to bring in elevation data into their analysis. The same types of grid file formats for importing gridded data discussed in the previous chapter apply to elevation

More information

Inherence and Nonsubstantial Particulars: An Object-Oriented View Samuel H. Kenyon

Inherence and Nonsubstantial Particulars: An Object-Oriented View Samuel H. Kenyon Inherence and Nonsubstantial Particulars: An Object-Oriented View Samuel H. Kenyon 09/29/04 Kenyon 2 Introduction In order to tackle the meanings, assumptions, and inconsistencies in Aristotle s Categories[1],

More information

Intro to the Apple Macintosh Operating System, OSX

Intro to the Apple Macintosh Operating System, OSX Intro to the Apple Macintosh Operating System, OSX Introduction. The Apple Macintosh Operating system or OS, is one of the oldest operating systems in use on a personal computer 1. It has been designed

More information

CS3DB3/SE4DB3/ SE6DB3 TUTORIAL YU HUANG

CS3DB3/SE4DB3/ SE6DB3 TUTORIAL YU HUANG CS3DB3/SE4DB3/ SE6DB3 TUTORIAL YU HUANG 2015-01-28 Outline (many-to-one)at least one primary key, candidate key, super key foreign key is-a relationship review DB2 command; at least one(many-to-one) all

More information

Guide - The limitations in screen layout using the Item Placement Tool

Guide - The limitations in screen layout using the Item Placement Tool Guide - The limitations in screen layout using the Item Placement Tool 1/8 Guide - The limitations in screen layout using the Item Placement Tool I the B1 Usability Package we have the Item Placement Tool

More information

How likely are you to recommend venue name to a friend?

How likely are you to recommend venue name to a friend? NPS SURVEY NPS stands for Net Promoter Score, this is an index ranging from -100 to 100 that measures the willingness of customers to recommend a company s product or services to others. As the questions

More information

6.001 Notes: Section 6.1

6.001 Notes: Section 6.1 6.001 Notes: Section 6.1 Slide 6.1.1 When we first starting talking about Scheme expressions, you may recall we said that (almost) every Scheme expression had three components, a syntax (legal ways of

More information

Thanks for your cooperation! The Questionnaire of the Developers' Experiment 1

Thanks for your cooperation! The Questionnaire of the Developers' Experiment 1 The Questionnaire of the Developers' Experiment 1 This experiment deals with comparative analysis of two variability representation notations: Application-based DOmain Modeling (ADOM), which is a UML-based

More information

CS/ENGRD 2110 FALL Lecture 7: Interfaces and Abstract Classes

CS/ENGRD 2110 FALL Lecture 7: Interfaces and Abstract Classes CS/ENGRD 2110 FALL 2017 Lecture 7: Interfaces and Abstract Classes http://courses.cs.cornell.edu/cs2110 1 Announcements 2 A2 is due tomorrow night (17 February) Get started on A3 a method every other day.

More information

Semantic Web. Ontology Engineering and Evaluation. Morteza Amini. Sharif University of Technology Fall 95-96

Semantic Web. Ontology Engineering and Evaluation. Morteza Amini. Sharif University of Technology Fall 95-96 ه عا ی Semantic Web Ontology Engineering and Evaluation Morteza Amini Sharif University of Technology Fall 95-96 Outline Ontology Engineering Class and Class Hierarchy Ontology Evaluation 2 Outline Ontology

More information

CS61C : Machine Structures

CS61C : Machine Structures inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structures Lecture #24 Cache II 27-8-6 Scott Beamer, Instructor New Flow Based Routers CS61C L24 Cache II (1) www.anagran.com Caching Terminology When we try

More information

(Refer Slide Time: 4:00)

(Refer Slide Time: 4:00) Principles of Programming Languages Dr. S. Arun Kumar Department of Computer Science & Engineering Indian Institute of Technology, Delhi Lecture - 38 Meanings Let us look at abstracts namely functional

More information

Anatomy of a Depth Survey Part III The Re-survey. Tom O Donnell, AP Miles River Squadron

Anatomy of a Depth Survey Part III The Re-survey. Tom O Donnell, AP Miles River Squadron 1 Anatomy of a Depth Survey Part III The Re-survey Tom O Donnell, AP Miles River Squadron 2 As mentioned in Part I, the real purpose of depth surveys is to detect previously uncharted shoaling which might

More information

GOSSIP User Manual gossip-sim

GOSSIP User Manual gossip-sim GOSSIP User Manual gossip-sim Marius Vollmer Copyright c 2000 Marius Vollmer. Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission

More information

Chapter 18 Indexing Structures for Files. Indexes as Access Paths

Chapter 18 Indexing Structures for Files. Indexes as Access Paths Chapter 18 Indexing Structures for Files Indexes as Access Paths A single-level index is an auxiliary file that makes it more efficient to search for a record in the data file. The index is usually specified

More information

MA 1128: Lecture 02 1/22/2018

MA 1128: Lecture 02 1/22/2018 MA 1128: Lecture 02 1/22/2018 Exponents Scientific Notation 1 Exponents Exponents are used to indicate how many copies of a number are to be multiplied together. For example, I like to deal with the signs

More information

1 Introduction to Networking

1 Introduction to Networking 1 Introduction to Networking 1.1 What are networks? That seems like an appropriate question to start with. Pretty much anything that s connected to anything else in some way can be described as a network.

More information

Knowledge Representation

Knowledge Representation Knowledge Representation References Rich and Knight, Artificial Intelligence, 2nd ed. McGraw-Hill, 1991 Russell and Norvig, Artificial Intelligence: A modern approach, 2nd ed. Prentice Hall, 2003 Outline

More information

2SKILL. Variables Lesson 6. Remembering numbers (and other stuff)...

2SKILL. Variables Lesson 6. Remembering numbers (and other stuff)... Remembering numbers (and other stuff)... Let s talk about one of the most important things in any programming language. It s called a variable. Don t let the name scare you. What it does is really simple.

More information

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc.

b) Diverse forms of physical connection - all sorts of wired connections, wireless connections, fiber optics, etc. Objectives CPS221 Lecture: Layered Network Architecture last revised 6/22/10 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information

Lecture 7: Primitive Recursion is Turing Computable. Michael Beeson

Lecture 7: Primitive Recursion is Turing Computable. Michael Beeson Lecture 7: Primitive Recursion is Turing Computable Michael Beeson Closure under composition Let f and g be Turing computable. Let h(x) = f(g(x)). Then h is Turing computable. Similarly if h(x) = f(g 1

More information

Character Recognition

Character Recognition Character Recognition 5.1 INTRODUCTION Recognition is one of the important steps in image processing. There are different methods such as Histogram method, Hough transformation, Neural computing approaches

More information

PORTA-JIB EXPLORER. Jib Arm details and assembly instructions

PORTA-JIB EXPLORER. Jib Arm details and assembly instructions Our lightest, most versatile Jib for camera systems with front weight of 22 lbs (10 kg.) or less. Canon 7D Camera with matte box, follow focus, external battery, Marshall monitor, balanced monitor bracket,

More information

Strongly Connected Components. Andreas Klappenecker

Strongly Connected Components. Andreas Klappenecker Strongly Connected Components Andreas Klappenecker Undirected Graphs An undirected graph that is not connected decomposes into several connected components. Finding the connected components is easily solved

More information

CS125 : Introduction to Computer Science. Lecture Notes #38 and #39 Quicksort. c 2005, 2003, 2002, 2000 Jason Zych

CS125 : Introduction to Computer Science. Lecture Notes #38 and #39 Quicksort. c 2005, 2003, 2002, 2000 Jason Zych CS125 : Introduction to Computer Science Lecture Notes #38 and #39 Quicksort c 2005, 2003, 2002, 2000 Jason Zych 1 Lectures 38 and 39 : Quicksort Quicksort is the best sorting algorithm known which is

More information

RAD-IT Tool Training. June 2017

RAD-IT Tool Training. June 2017 Welcome to overview of the RAD-IT Output. This training is designed for transportation professionals who want to understand how to use RAD-IT tool to create regional and project ITS architectures. The

More information

CPS221 Lecture: Layered Network Architecture

CPS221 Lecture: Layered Network Architecture CPS221 Lecture: Layered Network Architecture Objectives last revised 9/8/14 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:

More information