A GENERAL PURPOSE FiYl=ERTEXT A6STRACT MACHINE

Size: px
Start display at page:

Download "A GENERAL PURPOSE FiYl=ERTEXT A6STRACT MACHINE"

Transcription

1 A GENERAL PURPOSE FiY=ERTEXT A6STRACT MACHNE BRAD CAMPBELL and JOSEPH M. GOODMAN The HAM is a transaction-based server for a hypertext storage system. The seruer is designed to hande mutipe uses in a networked environment. The storage system consists of a coection of contexts, nodes, inks, and attributes that make up a hypertext graph. The versatiity of the HAh4 can be iustrated by showing how Guide buttons, ntermedia webs, and NoteCard FieBoxes can be impemented using its storage mode. The Hypertext Abstract Machine [HAM) is a generapurpose, transaction-based, muti-user server for a hypertext storage system. The HAM is based on the abstract machine Norm Deise and Mayer Schwartz used in their Neptune system deveoped at Tektronix Computer Research Laboratory []. Because the HAM is a ow-eve storage engine, it provides a genera and fexibe mode that can be used in severa different hypertext iappications. For exampe, the HAM, combined with the Neptune user interface, provides a prototype system for a software engineering environment. The HAM stores a of the information it manages in graphs, or databases, on a host machine s fie systems. Graphs are stored in a centraized area and can be accessed in a distributed environment. The HAM typicay communicates with an appication through a byte stream protoco [athough it may aternatey be staticay inked with an appication). The appication may or may not run on the same machine as the HAM. Appications normay communicate with the outside wor d through a common user interface. The interface shoud be window-based and highy interactive to provide a suitabe environment for a hypertext system. Figure shows the typica organization of a system using the HAM. 0198e ACM OOO-0782/88/0700-OS56 $1.50 HAM FEATURES The HAM storage mode is based on five objects: graphs, contexts, nodes, inks, and attributes. The HAM maintains history for these objects, aows seective access through a fitering mechanism, and can aow for access restrictions through a data security mechanism. HAM Objects A graph contains contexts, nodes, inks, and attributes. These objects are organized hierarchicay and carry the foowing descriptions: A graph is the highest eve HAM object. t normay contains a of the information regarding a genera topic, such as the information for a software project. A graph contains one or more contexts. Contexts partition the data within a graph. Contexts can be used to support configurations, private workspaces, and version history trees [6]. Each context has one parent context and zero or more chid contexts. When a graph is created, a root context begins the tree. A context which contains zero or more nodes and inks does not depend on information contained in its parent context. A node contains arbitrary data that can be stored as text or as fixed-ength binary bocks. A node can be cassified as archived, nonarchived, or append-ony. When an archived node is updated, a new version of 556 Comnzunications of the ACM Juy 1988 Voume 31 Number 7

2 the node is created using the new contents. Previous versions of an archived node can be retrieved. When a nonarchived node is updated, the previous contents are repaced by the new contents. When an append-ony node is updated, the new contents are appended to the previous contents. Append-ony nodes are usefu for ogging the actions performed by an appication. A node s contents can be searched for the occurrence of user-specified reguar expressions. The search mechanism aows a versions of a node to be searched. Nodes are reated by inks. A ink defines a reationship between a source node and a destination node and can be foowed in either direction. A cross-context ink reates two nodes in different contexts and is usefu for sharing data between two contexts. The generaity provided by ink attributes aows appication writers to define their own notions of ink types or ink end-point attachment schemes. Attributes can be attached to contexts, nodes, or inks. Attribute vaues can be strings, integers, foating-point numbers, or user-defined types. Attribute/vaue pairs give semantics to HAM objects. They can represent appication-specific properties of objects or contain information that further describes an object. Attributes are aso used in the predicates that are part of the HAM fiters. USER NTERFACE APPLCATON TOOLS FLE HOST SYSTEMS FGURE 1. Generic Hypertext System Architecture Version History The HAM provides an automatic version history mechanism. The version history for a HAM object is updated each time that object is modified. Because each access to an object contains a version time, previous versions of objects can be viewed. The HAM aso provides operations to destroy undesired versions. Fiters The HAM provides a fitering mechanism that aows subsets of HAM objects to be extracted from arge graphs. Fiters aow the user to specify visibiity predicates, which are expressions reating attributes and their vaues. HAM fiters ony return objects that satisfy the predicates. Fiters aso aow the user to specify a version time so that earier versions of a graph can be examined. The HAM fiters the foowing items: Contexts in a graph Nodes in a context Links in a context nstances of a node in specified contexts nstances of a ink in specified contexts A set of nodes and inks in specified contexts based on a specific ink ordering Data Security The HAM provides security for the data contained in a graph through its access contro ist (ACL) mechanism. Attaching an ACL to an object is optiona. An ACL entry consists of a user or group name and a set of permissions. A user is anyone who has access to the graph. A group is a ist of users. The avaiabe permissions are access, annotate, update, and destroy. The permissions associated with an ACL entry are additive. Access permission aows the user or group to view the data associated with the object. Annotate permission aows inks to be attached to a node. Update permission aows the user or group to perform nondestructive updates on an object. Destroy permission aows the destruction of an object. HAM OPERATONS To provide a consistent, simpe interface, HAM operations are grouped into seven categories. Operations within a category behave simiary, regardess of the object on which they operate. Create operations create new HAM objects. A create operation takes object-dependent data and returns an object index and a version time. The object index represents a unique identifier for the newy created object, and the version time denotes the time at which the object was created. Deete operations mark objects as deeted but retain historica information. A deete operation takes an object index and a version time, and returns a new version time. The object index specifies the unique identifier for the object being deeted. The returned version time represents the time the object was deeted. Destroy operations free a space required for an object. The object does not have to be deeted to be destroyed. A destroy operation takes an object index and a version time, and returns a new version time. The object index specifies the unique identifier for the object being destroyed. The returned version time represents the time the object was destroyed. Change operations modify data associated with an existing object. A change operation takes an object index, a version time, and object-dependent data and returns a version time. The object index specifies the unique identifier for the object being modified. The returned version time represents the time the object was modified. ;.- E SPE 1.N SSUE ]uy 1988 Voume 31 Number 7 Communications of the ACM 057

3 i SPECAL SSUE 0 1 a- Get operations retrieve data from existing objects. A get operation takes an object index and a version time, and returns the data that existed at the specified time. The object index specifies a unique identifier for the object from which data is being retrieved. The version time is a time range for the data retrieva. Fiter (and inearize) operations seectivey retrieve information from a graph. A fiter operation takes a predicate, a version time, and a ist of attributes. These operations return a ist of objects that satisfy the predicate and a ist of requested attributes attached to each object. The version time specifies the time at which the fiter is to search for the information. Each fiter operation aso has unique parameters in addition to those aready specified. Specia operations are those that do not fit into any of these categories. They incude functions such as searching for strings in node contents, merging contexts, and managing transactions. EXAMPLE HAM APPLCATONS Because the HAM is a genera-purpose hypertext engine, it can serve many types of hypertext systems. To iustrate this point we wi mode three hypertext structures using the HAM s storage mode: Guide buttons, ntermedia webs, and NoteCards FieBoxes. Guide Buttons Guide is a hypertext product deveoped for the Macintosh by OWL nternationa, nc. of Beevue, Washington [3]. t is a too for writing and reading eectronic documents. Guide uses buttons-specia areas on a screen-to represent inks in a document between the information on the screen and reated information. When a button is seected, by cicking the mouse, Guide foows the ink to dispay the reate d information. Repacement buttons repace the button icon dispayed on the screen with the information associated with that button. nquiries are sets of two or more mutuay excusive repacement buttons. Reference buttons dispay the information associated with the button in a new window. This window remains visibe unti the user returns to the document window. Note buttons dispay information associated with the button in a new window that disappears when the user reeases the mouse button. To mode Guide, the HAM equates a document with a node. The various button reationships are modeed as inks. Link attributes determine which type of button the ink represents. The appication uses these ink attributes to determine which type of window to open when a button is seected. Figure 2 shows an exampe of a note button. The Document Browser contains the text being examined; the icon within the browser represents the note button. The Note Browser contains the note associated with the note button. The Button Attribute Browser s:hows the attributes associated with the ink representing the note button, as we as the vaue of the LinkType attribute. The button type is stored in the ink attribute Link- Type; its vaue is Repacement, nquiry, Reference, or Note. A buttons aso maintain the ink attributes Name and DocumentLocation. Name represents the name associated with the button, and DocumentLocation defines the ocation reative to the beginning of the document where the button was created. The vaue of DocumentLocation corresponds to Guide s ocation of its button icon. Guide considers the information associated with a button to be an atomic entity. Therefore, the other end of the ink representing the button can point to the entire node that contains the button s information. A buttons aso maintain the ink attributes Name and Document- DocumeniLocation FGURE 2. Possibe Representation for a Guide Note Button f a repacement button is part of an inquiry, the vaue of LinkType is set to nquiry. A ink that represents part of an inquiry aso has an attribute named Grouping, which contains the identification of a specia node. This node contains the identification of a inks (repacement buttons) that make up the inquiry. Figure 3 shows the HAM storage mode for an inquiry named Exampe nquiry. The Storage Representation window shows the nodes and inks. invoved in the inquiry. n this exampe, the inks have the same name as their destination nodes. The node Exampe 35.--A Guide is a trademark of OWL nternationa. nc. Macintosh is a trademark of Appe Computer. nc. FGURE 3. nquiry Storage Representation 858 Communications of the ACM ]uy 1988 Voume C Number 7

4 L Th. fhtt Rsfsrenc. MPnua, FGURE 4. Mai Web HAM Appications is the document node. The nodes Guide Buttons, ntermedia Webs, and NoteCards FieBoxes contain the information associated with the repacement buttons that make up the inquiry. The node Exampe nquiry contains the names of the repacement buttons in the inquiry; its contents are shown in the Exampe nquiry browser. The Button Attribute Browser dispays the attributes attached to one of the inks invoved in the inquiry and shows that the vaue of the Grouping attribute is Exampe nquiry. [] ntermedia Webs ntermedia, the system deveoped at the nstitute for Research in nformation and Schoarship at Brown University [2], [7], is one of the newer and more innovative hypertext systems. The basic hypertext concepts in ntermedia are very simiar to those found in the HAM. ntermedia uses the term web to refer to a database that contains both references to a set of documents and the inks associated with those documents [5]. A bock is the piece of a document to which a ink is anchored and can be any egitimate seection in the appication. The attributes provided by the HAM aow the fexibiity to efficienty mode these reationships. To mode an ntermedia web, the HAM represents a web as a coection of nodes and inks. A document is represented as a node. An ntermedia ink is equivaent to a HAM ink. Bocks are determined by using ink attributes to define the anchor seections for both the source and destination ends of each ink. UNX manua pages provide a convenient exampe of how the HAM can mode ntermedia webs. The manua page for the mai command is used to create a sma web of information. UNX is a registered trademark of AT&T Be Laboratories. Excerpts from the UNX Programmer s Manua, Berkeey Distribution. are used for purposes of iustration. ; SPECA D a* SSUE FLES: usrepoomai* -mbox -/.mairc tmprw /usr/ib/ma.hep /usr/ibmai.rc Message post office your od ma fie giving nta ma commands temporary for edtor escape hep fies aystem intazation fie temporary for editing messages SEE ALSO Source Extent Source Offset fmt(), newaases(), aiases(s), maaddr(7), sendma(8) The Ma Reference Manua NAME binmai - send or receive ma among users SYNOPSS /bnma [ + ] [ - ] [ person ]... /bin/mai [ + ] [ 4 ] -f fife Owner Baxnga Updated Juy 20, Q87 Created June 8, 1987 DESCRPTON Note: This is the od version 7 UNX system ma program. The defauft ma command s described n mai(), and ts binary s n the directory usrucb. L Destnaton Offset 122 Destinaton Extent 7 FGURE 5. Defining a Bock ]uy 1988 Voume 31 Number 7 Communications of the ACM 859

5 1 i spzcw 1.w SSUE Each document (manua page) is represented as a HAM node. The web is defined by attaching an attribute named Web to each ink. The vaue of this attribute contains the name of the web to which the ink beon,gs. A ink fiter is appied using the predicate Web = ma to et users view a map of the web. This fiter returns ony those nodes that are part of mai. Figure 4 shows the mai web defined by creating inks :from the mai command to commands in the manua page s SEE ALSO section. To define a bock, the HAM uses the attribute pairs!5ourceoffset/sourceextent and DestinationOffset/ DestinationExtent. A bock is determined by the vaue of the attribute pair attached to the ink. For exampe, the source bock of a ink is represented by the attributes SourceOffset and SourceExtent. The vaues of these attributes are integers that contain the byte offset from the beginning of the node and the ength of the bock. NoteCards FieBoxes NoteCards is a genera-purpose idea-processing hypertext system deveoped at Xerox PARC [4]. NoteCards supports the concept of FieBoxes. Every notecard must be stored in one or more FieBoxes. A FieBc x which is arranged as a directed acycic graph, can contain notecards and other FieBoxes. FieBoxes can be represented in the HAM using nodes, inks, and attributes. Both FieBoxes and notecards are equivaent to nodes. The mode uses a node attribute to determine whether a node is a FieBox or a notecard. Links show which notecards (or FieBoxes) are in a particuar FieBox. Link attributes determine which inks refer to other FieBoxes and notecards. This mode aows nodes to reside in more than one FieBox. The exampe shown in Figure 6 heps to carify the NoteCards FieBox mode. The FieBox named Hypertext 87 contains a of,r:r;r;;jes~~~~~~~~~~~~,~~~~~~~~~~~~~~ ;..;;...:,:;..:.:,.:....: ;.:.....:.:,..>.: :..,:.: :.: >.7...,..,...,.:.::,,:;., 1.. y.: y>y.::.::.::.:..: 1.: Because the Hypertext Abstract Machine is designed as a genera-purpose engine, it can be used as a base engine for other hypertext systems. Exampe HAM Appications 1 :, :;:;.A N#f$cjjfa&.;,.,.,.,. >,.;,.,..,..,.,.;,.,.,. Narne Owner Updated Created NodeType Name Owner Updated Created NodeType ( FieBox 1 FGURE 6. NoteCards Representation Each bock is defined by the offset and extent attri- the FieBoxes and notecards that make up this artice. butes. The offset provides an insertion point for the As shown in the Features NoteCard Attribute bock, and the extent determines the end point of the Browser, the Features node is a FieBox. \Yhen a user bock. browses this node, the NoteCards-ike appication ex- Figure 6 shows the vaue of the SourceOffset and amines the nodetype attribute, determines that the SourceExtent attributes attached to ink BinMai. The node is a FieBox, and opens a new FieBox browser. highighted area shows the bock these attributes The contents of the Features node are inks to a of defin e. the FieBoxes and notecards that it contains. t shoud 660 Communications of the ACM ]uy 1988 Voume 31 Number 7

6 be noted that References is contained in both Fie- Boxes. The Concusion NoteCard Attribute Browser shows that the Concusion node is a NoteCard. When a user browses this node, the appication examines the nodetype attribute, determines that the node is a NoteCard, and opens a NoteCard browser. CONCLUSON Because the Hypertext Abstract Machine is designed as a genera-purpose hypertext engine, it can be used as a base engine for other hypertext systems. Most current hypertext systems emphasize the appication and user interface ayers. Whie these ayers are very important an appropriate storage mode is essentia. We beieve the HAM provides such a mode. Athough the HAM is not a panacea for hypertext data storage probems, it is an important first step. As new hypertext appications are deveoped, we wi earn more about the data representation probems hypertext presents. f a storage mode standard deveops from this work, it may ead to the deveopment of a standard terminoogy and base engine that coud improve immeasuraby the progress of hypertext technoogy. Acknowedgments. We wish to thank Norm Deise and Mayer Schwartz of the Tektronix Computer Research Laboratory for their hepfu comments. We woud aso ike to thank Victor Riey and Lee Thomas for their contributions to the HAM project. Lasty, we woud ike to thank Amy River0 and Rich Davenport for their editing and iustration assistance. ati REFERENCES 1. Dei&, N. and Schwartz. M. Neptune: A hypertext system for CAD appications. n Proceedings ACM SGMCJD 86 (Washington. D.C.. May X-30,1966) Garrett. N., Smith, K., and Meyrowitz. N. ntermedia: ssues, strategies, and tactics in the design of a hypermedia document system. n Proceedings of the Conference on Computer Supported Cooperative Work (Austin. Tex., December ) Guide: Hypertext for the Macintosh Manua. OWL nternationa. nc., Beevue, Wash., Haasz. F.. Moran, T., and Trigg. R. N&Cards in a nutshe. n CH + C Conference Proceedings (Toronto, Ontario. Canada. Apri 5-9, 1967) Meyrowitz, N. ntermedia: The architecture and construction of an object-oriented hypermedia system and appications framework. n OOPSLA 86 Proceedings (Portand. Or.. Sept. 29-Oct , Schwartz. M. and Dei&. N. Contexts-A partitioning concept for hypertext. ACM Trans. on Office nformation Systems 5. 2 (Apri 19871, Yankeovich. N.. Meyrowitz. N.. and van Dam, A. Reading and writing the eectronic book. Computer [Oct. 1965) CR Categories and Subject Descriptors: H.2.6 [Database Management]: Database Machines; H.3.4 [nformation Storage and Retrieva]: Systems and Software; K.6.3 [Management of Computing and nformation Systems]: Software Management Genera Terms: Design, Management Additiona Key Words and Phrases: Abstract machines, hypertext systems Authors Present Addresses: Brad Campbe, CASE Division, Mentor Graphics Corp SW. Creekside Pace, Beaverton, OR 97005; Joseph M. Goodman, Quantitative Technoogy Corp., 6700 S.W. Creekside Pace, Suite D. Beaverton, OR Permission to copy without fee a or part of this materia is granted provided that the copies are not made or distributed for direct commercia advantage, the ACM copyright notice and the tite of the pubication and its date appear. and notice is given that copying is by permission of the Association for Computing Machinery. To copy otherwise. or to repubish, requires a fee and/or specific permission. D ; SPE 1 SSUE JOURNAL OF THE ASSOCATON FOR COMPUTNG MACHNERY Subscriptions $15,00/year for ACM members; $fs.oo/year for nonmembers. (Members pease incude member #) An exceent source to information on computer theory and research in.. Agorithm & compexity theory Artificia inteigence Combinatorics & graph theory Computer organization & design Systems modeing & anaysis Database theory & structures Distributed computing Forma anguages Computationa modes Numerica anaysis Operating systems and research Programming anguages & reated methodoogy Computationa theory Pubished four times a year (SSN ) Write for an order form and your ACM Pubications Cataog to: Catherine YUnqUe, ACM, 11 West 42nd Street, New York, NY Juy 1988 Voume 31 Number 7 Communications of the ACM 661

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

Chapter 3: Introduction to the Flash Workspace

Chapter 3: Introduction to the Flash Workspace Chapter 3: Introduction to the Fash Workspace Page 1 of 10 Chapter 3: Introduction to the Fash Workspace In This Chapter Features and Functionaity of the Timeine Features and Functionaity of the Stage

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

Operating Avaya Aura Conferencing

Operating Avaya Aura Conferencing Operating Avaya Aura Conferencing Reease 6.0 June 2011 04-603510 Issue 1 2010 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete

More information

Infinity Connect Web App Customization Guide

Infinity Connect Web App Customization Guide Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

1. INTRODUCTION 1.1 Product Introduction 1.2 Product Modes 1.3 Product Package 1.4 Network Printing Architecture 1.5 Network Printing Environment 1.6

1. INTRODUCTION 1.1 Product Introduction 1.2 Product Modes 1.3 Product Package 1.4 Network Printing Architecture 1.5 Network Printing Environment 1.6 Links for mode 504058 (1-Port UTP/BNC Parae Pocket Print Server): Downoads & inks http://www.inteinet-network.com/htm/d-pserver.htm This manua http://inteinet-network.com/mk2/manuas/502993_manua.zip Instructions

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Quick Start Instructions

Quick Start Instructions Eaton Power Xpert Gateway Minisot (PXGMS) UPS Card Quick Start Instructions Ethernet 10/100 Status DHCP EMP + - CMN 100 Act Ident Power PXGMS UPS Restart TX Setup RX Package Contents Power Xpert Gateway

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

Data Management Updates

Data Management Updates Data Management Updates Jenny Darcy Data Management Aiance CRP Meeting, Thursday, November 1st, 2018 Presentation Objectives New staff Update on Ingres (JCCS) conversion project Fina IRB cosure at study

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina

More information

NCH Software Express Delegate

NCH Software Express Delegate NCH Software Express Deegate This user guide has been created for use with Express Deegate Version 4.xx NCH Software Technica Support If you have difficuties using Express Deegate pease read the appicabe

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia: OWNER S MANUAL

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia:   OWNER S MANUAL Guardian 365 Pro App Guide For more exciting new products pease visit our website: Austraia: www.uniden.com.au OWNER S MANUAL Privacy Protection Notice As the device user or data controer, you might coect

More information

NCH Software Spin 3D Mesh Converter

NCH Software Spin 3D Mesh Converter NCH Software Spin 3D Mesh Converter This user guide has been created for use with Spin 3D Mesh Converter Version 1.xx NCH Software Technica Support If you have difficuties using Spin 3D Mesh Converter

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1 Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

.County of San Mateo

.County of San Mateo -- - -- -- - -- - - --- a - -- w---- a- -- : m- I - -- -- -- --., I -- I.a, e mzzcm.county of San Mateo InterneUIntranet Web Page Design Guideines. September 30,1997 fabe of Corntents Purpose... Approach....

More information

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

A study of comparative evaluation of methods for image processing using color features

A study of comparative evaluation of methods for image processing using color features A study of comparative evauation of methods for image processing using coor features FLORENTINA MAGDA ENESCU,CAZACU DUMITRU Department Eectronics, Computers and Eectrica Engineering University Pitești

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

AgreeYa Solutions. Site Administrator for SharePoint User Guide

AgreeYa Solutions. Site Administrator for SharePoint User Guide AgreeYa Soutions Site Administrator for SharePoint 5.2.4 User Guide 2017 2017 AgreeYa Soutions Inc. A rights reserved. This product is protected by U.S. and internationa copyright and inteectua property

More information

SPT: Storyboard Programming Tool

SPT: Storyboard Programming Tool SPT: Storyboard Programming Too The MIT Facuty has made this artice openy avaiabe. Pease share how this access beneits you. Your story matters. Citation As Pubished Pubisher Singh, Rishabh, and Armando

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

Bridge Talk Release Notes for Meeting Exchange 5.0

Bridge Talk Release Notes for Meeting Exchange 5.0 Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

OF SCIENTIFIC DATABASES

OF SCIENTIFIC DATABASES CHAR4mCS OF SCIENTIFIC DATABASES Arie Shoshani, Frank Oken, and Harry K.T. Wong Computer Science Research Department University of Caifornia, Lawrence Berkeey Laboratory Berkeey, Caifornia 94720 The purpose

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup Specia Edition Using Microsoft Office 2000 - Chapter 7 - Sharing Documents Within a.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Office 2000-7 - Sharing

More information

Brad A. Myers Human Computer Interaction Institute Carnegie Mellon University Pittsburgh, PA

Brad A. Myers Human Computer Interaction Institute Carnegie Mellon University Pittsburgh, PA PAPERS CHI 98. 18-23 APRIL 1998 Scripting Graphica Appications ABSTRACT Writing scripts (often caed macros ) can be hepfu for automating repetitive tasks. Scripting faciities for text editors ike Emacs

More information

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition MCSE TestPrep SQL Server 6.5 Design & Impementation - Data Definition Page 1 of 38 [Figures are not incuded in this sampe chapter] MCSE TestPrep SQL Server 6.5 Design & Impementation - 3- Data Definition

More information

W3QS: A Query System for the World-Wide Web

W3QS: A Query System for the World-Wide Web W3QS: A Query System for the Word-Wide Web David Konopnicki konop&s.technion.ac.il Computer Science Department Technion, Haifa, 32000. Israe Oded Shmuei oshmu@cs.technion.ac.il Computer Science Department

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Extracting semistructured data from the Web: An XQuery Based Approach

Extracting semistructured data from the Web: An XQuery Based Approach EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. Extracting semistructured data from the Web: An XQuery Based Approach Gies Nachouki Université de Nantes - Facuté des Sciences, IRIN, 2, rue de a Houssinière,

More information

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of

More information

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0 IBC DOCUMENT SA/STA SERIES User's Guide V7.0 Page 2 New Features for Version 7.0 Mutipe Schedues This version of the SA/STA firmware supports mutipe schedues for empoyees. The mutipe schedues are impemented

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Automatic, Look-and-Feel Independent Dialog Creation for Graphical User Interfaces

Automatic, Look-and-Feel Independent Dialog Creation for Graphical User Interfaces CHI 90 Prcmedings Apri 1990 Automatic, Look-and-Fee Independent Diaog Creation for Graphica User Interfaces Brad Vander Zanden Brad A. Myers Schoo of Computer Science Carnegie Meon University Pittsburgh,

More information

Lecture 3. Jamshaid Yousaf Department of Computer Sciences Cristian college of Business, Arts and Technology Gujranwala.

Lecture 3. Jamshaid Yousaf Department of Computer Sciences Cristian college of Business, Arts and Technology Gujranwala. Lecture 3 Jamshaid Yousaf jamshaid.yousaf@ccbat.com.pk Department of Computer Sciences Cristian coege of Business, Arts and Technoogy Gujranwaa. Overview Importance of text in a mutimedia presentation.

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Simba MongoDB ODBC Driver with SQL Connector. Installation and Configuration Guide. Simba Technologies Inc.

Simba MongoDB ODBC Driver with SQL Connector. Installation and Configuration Guide. Simba Technologies Inc. Simba MongoDB ODBC Driver with SQL Instaation and Configuration Guide Simba Technoogies Inc. Version 2.0.1 February 16, 2016 Instaation and Configuration Guide Copyright 2016 Simba Technoogies Inc. A Rights

More information

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node

More information

Computing devices have become increasingly mobile at the client end, and the

Computing devices have become increasingly mobile at the client end, and the Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized

More information

ngenius Instrumentation Overview

ngenius Instrumentation Overview ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark

More information

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir Aaborg Universitet Interference Spins Popovski, Petar; Simeone, Osvado; Niesen, Jimmy Jessen; Stefanovic, Cedomir Pubished in: I E E E Communications Letters DOI (ink to pubication from Pubisher): 10.1109/LCOMM.2014.2387166

More information

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events DMS PDMG-RH Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Automatic PD faut cassification High resoution Seectabe UHF fiters and

More information

Hands-free system (for cellular phone)

Hands-free system (for cellular phone) Hands-free system (for ceuar phone) With navigation system Owners of modes equipped with a navigation system shoud refer to the Navigation System Owner s Manua. Without navigation system This system supports

More information

May 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home]

May 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home] "Using Python": a Book Preview May 13, 1995 Mark Lutz Bouder, Coorado utz@kapre.com (303) 546-8848 [work] (303) 684-9565 [home] Introduction. This paper is a brief overview of the upcoming Python O'Reiy

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

Introducing a Target-Based Approach to Rapid Prototyping of ECUs

Introducing a Target-Based Approach to Rapid Prototyping of ECUs Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

CylanceOPTICS. Frequently Asked Questions

CylanceOPTICS. Frequently Asked Questions CyanceOPTICS Frequenty Asked Questions Question What is CyanceOPTICS? CyanceOPTICS is an AI driven endpoint detection and response component providing consistent visibiity, root cause anaysis, scaabe threat

More information

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers Meeting Exchange 4.1 Service Pack 2 Reease Notes for the S6200/S6800 Servers The Meeting Exchange S6200/S6800 Media Servers are SIP-based voice and web conferencing soutions that extend Avaya s conferencing

More information

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5 LCD Video Controer LCD Video Controer Introduction... 3 Safety Precautions... 4 Indentifying the Components... 5 Main Board... 5 Main Board ASIC Features... 6 LVDS Transmitter... 8 Backight Inverter...

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

Relational Model. Lecture #6 Autumn, Fall, 2001, LRX

Relational Model. Lecture #6 Autumn, Fall, 2001, LRX Reationa Mode Lecture #6 Autumn, 2001 #06 Reationa Mode HUST,Wuhan,China 121 Reationa Mode Tabe = reation. Coumn headers = attributes. Row = tupe Reation schema = name(attributes). Exampe: Beers(name,

More information

Basic segmentation from CT: proximal femur

Basic segmentation from CT: proximal femur Chapter 7 Basic segmentation from CT: proxima femur This tutoria wi demonstrate how to import DICOM data from a CT scan of a dry cadaveric femur and appy different fiters and segmentation toos. 7.1 What

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

l A set is a collection of objects of the same l {6,9,11,-5} and {11,9,6,-5} are equivalent. l There is no first element, and no successor of 9.

l A set is a collection of objects of the same l {6,9,11,-5} and {11,9,6,-5} are equivalent. l There is no first element, and no successor of 9. Sets & Hash Tabes Week 13 Weiss: chapter 20 CS 5301 Spring 2018 What are sets? A set is a coection of objects of the same type that has the foowing two properties: - there are no dupicates in the coection

More information

Link Registry Protocol Options

Link Registry Protocol Options Link Registry Protoco Options Norman Finn, March 2017 HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN At east two obvious choices for P802.1CS Link Registration Protoco An IS-IS-ike protoco. TCP (Transmission

More information

Chapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies.

Chapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies. Chapter 3: KDE Page 1 of 31 Chapter 3: KDE In This Chapter What Is KDE? Instaing KDE Seecting KDE Basic Desktop Eements Running Programs Stopping KDE KDE Capabiities Configuring KDE with the Contro Center

More information

Computers and processors

Computers and processors T224 Computers and processors Reference manua Author: Mirabee Waker This pubication forms part of an Open University course T224, Computers and Processors. Detais of this and other Open University courses

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Avaya Aura Call Center Elite Multichannel Application Management Service User Guide

Avaya Aura Call Center Elite Multichannel Application Management Service User Guide Avaya Aura Ca Center Eite Mutichanne Appication Management Service User Guide Reease 6.3 October 2013 2014 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts have been made to ensure that the

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

3GPP TS V7.1.0 ( )

3GPP TS V7.1.0 ( ) TS 29.199-7 V7.1.0 (2006-12) Technica Specification 3rd Generation Partnership Project; Technica Specification Group Core Network and Terminas; Open Service Access (OSA); Paray X Web Services; Part 7:

More information

Look Bigger to Grow Bigger

Look Bigger to Grow Bigger May 2013 Look Bigger to Grow Bigger Using Virtua Office to hep grow your business Presented by 8x8 2012 NASDAQ-LISTED: EGHT Using Virtua Office to Hep Grow Your Business This webinar wi show you how to

More information

NCH Software Express Accounts Accounting Software

NCH Software Express Accounts Accounting Software NCH Software Express Accounts Accounting Software This user guide has been created for use with Express Accounts Accounting Software Version 5.xx NCH Software Technica Support If you have difficuties using

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

From i* to istar 2.0: An Evolving Social Modelling Language

From i* to istar 2.0: An Evolving Social Modelling Language From i* to istar 2.0: An Evoving Socia Modeing Language Lin Liu 1 Schoo of Software, Tsinghua University, Beijing, 100084, China iniu@tsinghua.edu.cn Abstract. Conceptua Modeing, as a thought too, heps

More information

(12) United States Patent

(12) United States Patent US006697794B1 (12) United States Patent (10) Patent N0.: Miby (45) Date of Patent: Feb. 24, 2004 (54) PROVDNG DATABASE SYSTEM NATVE 6,285,996 B1 * 9/2001 Jou et a1...... 707/2 OPERATONS FOR USER DEFNED

More information

ECL Portal. Standardized SCADA solution for ECL Comfort 310. Data sheet. Description

ECL Portal. Standardized SCADA solution for ECL Comfort 310. Data sheet. Description Standardized SCADA soution for ECL Comfort 310 Description The is an effective turnkey SCADA (Supervisory Contro And Data Acquisition) too for professiona users ike service personne of district energy

More information

Realization of GGF DAIS Data Service Interface for Grid Access to Data Streams

Realization of GGF DAIS Data Service Interface for Grid Access to Data Streams Reaization of GGF DAIS Data Interface for Grid Access to Data Streams Ying Liu, Beth Pae, Nithya Vijayakumar Indiana University Boomington, IN IU-CS TR 613 ABSTRACT As the computation power of hardware

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information