Assured Graceful Degrada/on with Discrete Controller Synthesis

Size: px
Start display at page:

Download "Assured Graceful Degrada/on with Discrete Controller Synthesis"

Transcription

1 Assured Graceful Degrada/on with Discrete Controller Synthesis Kenji Tei Na/onal Ins/tute of Informa/cs Joint work with Kazuya Aizawa, Waseda University Nicolas D Ippolito, Universidad de Buenos Aires

2 Assurance at development /me control controller (so.ware) monitor environment goal M E = G

3 Modeling approach : LTS and FLTL M and E : labeled transi:on system (LTS) G : fluent linear temporal logic (FLTL) M controllable ac:ons (c1,c2,c3,c4) E G c4 u4 c1 u1 u2 c2 c1 c4 c3 u4 u1 u2 c2 p1 p2 p3 uncontrollable ac:ons (u1,u2,,u4)

4 Example : Automated Warehouse move.e arrive.m controller (so.ware) move.e arrive.e pickup environment pickup- success

5 Modeling an environment by LTS E = (MAP W_ROBOT). MAP=(arrive[ w] - > MAP[ w]), MAP[ w]=( move[ e] - > arrive[ m] - > MAP[ m] move[ w] - > arrive[ w] - > MAP[ w] putdown - > putsuccess - > MAP[ w] pickup - > pickupfail - > MAP[ w]), MAP[ m]=( move[ e] - > arrive[ e] - > MAP[ e] move[ w] - > arrive[ w] - > MAP[ w] putdown - > pu^ail - > MAP[ m] pickup - > pickupfail - > MAP[ m]), MAP[ e]=( move[ e] - > arrive[ e] - > MAP[ e] move[ w] - > arrive[ m] - > MAP[ m] putdown - > pu^ail - > MAP[ e] pickup - > pickupsuccess - > MAP[ e]). W_ROBOT=(arrive[ w] - > ROBOT), ROBOT= (move[direc/on] - > arrive[loca/ons] - > ROBOT pickup - > (pickupsuccess - > ROBOT pickupfail - > ROBOT) putdown - > (putsuccess - > ROBOT pu^ail - > ROBOT) ended - > reset - > ROBOT). Modeling how the state of the env. is changed and how the env. will react

6 Specifying Goals by FLTL []((AT[ w] && X(move[ e])) - > X(!arrive[ w] W pickupsuccess)) []((AT[ e] && X(move[ w])) - > X(!arrive[ e] W putsuccess)) [](putdown- >AT[ w]) []!(!<pickupsuccess,putsuccess> && putdown) [](pickup- >AT[ e]) []!(<pickupsuccess,putsuccess> && pickup) [](<ended,reset> - > (<pickupsuccess,{reset}> && <putsuccess,{reset}>)) fluent AT[x:Loca/ons] = <arrive[x],{move[direc/on]}\{move[x]}>

7 A way to generate M with assurance discrete controller synthesis [D Ippolito, 2010] [D Ippolito, 2011] solve a control problem <E,G> to find an LTS M E G c1 c4 c3 u4 p1 p2 p3 u2 c2 Controller Synthesizer c4 u4 c1 u2 c2 M

8 E may be invalid at run/me control controller (so.ware) monitor environment goal M E = G System may no longer work, or may con4nue, but without any assurances

9 Assuming More Realis/c... MAP[ w]=( move[ e] - > arrive[ m] - > MAP[ m] move[ w] - > arrive[ w] - > MAP[ w] putdown - > putsuccess - > MAP[ w] pickup - > pickupfail - > MAP[ w]),... []((AT[ w]0&&0x(move[ e]))07>0x(!arrive[ w]0w0pickupsuccess))0 []((AT[ e]0&&0x(move[ w]))07>0x(!arrive[ e]0w0putsuccess))0 [](putdown7>at[ w])0 []!(!<pickupsuccess,putsuccess>0&&0putdown)0 [](pickup7>at[ e])0 []!(<pickupsuccess,putsuccess>0&&0pickup)0 [](<ended,reset>07>0(<pickupsuccess,{reset}>0&&0<putsuccess,{reset}>))0... MAP[ w]=( move[ e] - > (arrive[ m] - > MAP[ m] (arrive[ w] - > MAP[ w]) move[ w] - > arrive[ w] - > MAP[ w] putdown - > putsuccess - > MAP[ w] pickup - > pickupfail - > MAP[ w]),... []((AT[ w]0&&0x(move[ e]))07>0x(!arrive[ w]0w0pickupsuccess))0 []((AT[ e]0&&0x(move[ w]))07>0x(!arrive[ e]0w0putsuccess))0 [](putdown7>at[ w])0 []!(!<pickupsuccess,putsuccess>0&&0putdown)0 [](pickup7>at[ e])0 []!(<pickupsuccess,putsuccess>0&&0pickup)0 [](<ended,reset>07>0(<pickupsuccess,{reset}>0&&0<putsuccess,{reset}>))0

10 How much should we assume? high E op:mis:c G rich rich risk Everything works ideally Everything can go wrong func:onality low E pessimis:c G poor poor

11 Graceful Degrada/on by Self- adapta/on M E G adapta/on engine M E G controller (so.ware) control monitor environment goal relaxed goal

12 Ques/ons How can the system be made to degrade gracefully with assurance? How can the system determine how much it should degrade?

13 Objec/ve We propose a framework for adapta/on engine enabling graceful degrada/on G G M E = G M simulate M Avoiding too much degrada:on should not degrade the system too much Providing assurance should assure that the system aoer degrada/on sa/sfies a selected level of goals Performing degrada:on seamlessly should not stop or restart the system M should simulate M

14 Approach : Models@Run./me Revising environment model at run/me to fit the environment Genera/ng behavior specifica/on with assurance at run/me by using algorithmic techniques, in par/cular discrete controller synthesis Change behavior of the system in accordance with the generated model

15 Overall architecture func/onality level selec/on G 1 G N Analyzer Adapta:on Engine 2. determine func. level G i cached controllers Planner discrete controller synthesis 1. update env. model E knowledge M 3. generate controller Monitor Executer env. model learning execu:on traces enactment M control 4. hot- swap controller enactor System

16 0. Ini/aliza/on 1. Specify levels of func:onali:es G 1... G N 2. Describe the ini:al environment model E 0 c4 c3 u2 c2 c1 u4 3. Select a func. level and construct the ini:al controller c1 u4 G i M 0 c4 u2 c2

17 1. Monitor: Environment Model Updates update E t to generate E t+1 so that E t+1 can explain execu/on traces of the system find and add unmodeled uncontrollable transi/ons When a robot performed move.w ac/on at e, the environment will respond arrive.m or arrive.e rule learning for environment model update[sykes,2013] c1 u4 '#()*+,&! 01/2$/*+,-3,45,%! 9346,%,&8$#,4:1#034),7,)4 " #! 0(0<,64 0"#%&")),&>! -)(##,&! c4 c3 u2 c2 E t E t+1 Δ t+1 Monitor c1 c4 c3 u4 u2 c (%,4,#7348"6,)4!"#$%"&! %'%()*+,- $./(%#!!! $! B#"?),6A,!,#(0%8,#%! 0"#%&")),&4./,01%,&! ;34<"%=>?(54 0"#%&")),&4 execu:ng trace 0"#%&")!!"#$%&!

18 2. Analysis: Func/onality- level Selec/on Determine a func/onality level G j from {G 1,...G N } G j can be sa/sfied in E t+1 The system can degrade to G j without stopping or restar/ng itself Func/onality level selec/on (will be explained later) 01/2$/*+,-3,45,%! 9346,%,&8$#,4:1#034),7,)4 0(0<,64 0"#%&")),&>! G 1... current level E t+1 c1 G i c4 u4 u2 G N c2 Analyzer G j '#()*+,&! (%,4,#7348"6,)4!"#$%"&! %'%()*+,- $./(%#! " #!!! $! B#"?),6A,!,#(0%8,#%! $! 0"#%&")!!"#$%&! 0"#%&")),&4./,01%,&! ;34<"%=>?(54 0"#%&")),&4 c3

19 3. Plan: Discrete Controller Synthesis Generate an LTS M t+1 guaranteeing sa/sfac/on of G j in E t+1 Discrete controller synthesis [D Ippolito, 2010] [D Ippolito, 2011] solve a control problem <E,G> to find an LTS M E t+1 u4 c1 M u2 t+1 c4 c2 u4 c3 c1 Planner c4 G j u2 c2 '#()*+,&! (%,4,#7348"6,)4!"#$%"&! %'%()*+,- $./(%#! 01/2$/*+,-3,45,%! 9346,%,&8$#,4:1#034),7,)4 " #!!! $! B#"?),6A,!,#(0%8,#%! $! 0"#%&")!!"#$%&! 0(0<,64 0"#%&")),&>! 0"#%&")),&4./,01%,&! ;34<"%=>?(54 0"#%&")),&4

20 4. Execute: Enactor Hot- swap controller model from M t to M t+1 It can be done without stopping the system because M t+1 simulates M t Enactment framework [Braberman, 2013] interpret LTS and orchestrate high- level opera/ons provided by the system E t+1 c4 u4 c1 u2 c2 Executer '#()*+,&! 01/2$/*+,-3,45,%! 9346,%,&8$#,4:1#034),7,)4 " #! 0(0<,64 0"#%&")),&>! -)(##,&! u4 c1 c4 u1 c2 u2 enactor (%,4,#7348"6,)4!"#$%"&! %'%()*+,- $./(%#!!! $! 0"#%&")),&4./,01%,&! ;34<"%=>?(54 0"#%&")),&4 $! System 0"#%&")!!"#$%&!

21 Q: How can the system determine how much it should degrade? 01/2$/*+,-3,45,%! 9346,%,&8$#,4:1#034),7,)4 0(0<,64 0"#%&")),&>! G 1... current level E t+1 G i u4 c1 u1 u2 c4 c3 G N c2 Analyzer How does the system find the highest level? M t+1 exists such that (1) M t+1 E t+1 = G j (provide assurance) G j '#()*+,&! (%,4,#7348"6,)4!"#$%"&! %'%()*+,- $./(%#! G j " #!!! $! B#"?),6A,!,#(0%8,#%! $! 0"#%&")!!"#$%&! 0"#%&")),&4./,01%,&! ;34<"%=>?(54 0"#%&")),&4 (2) M t+1 simulate M t (perform degrada:on seamlessly)

22 Naive Strategy : Synthesize, then check Solve a control problem <E t+1,g i > [synthesized] Pick up G j [!synthesized] Check M t+1 sim. M t Simple and straigh^orward synthesized controller M t+1 can be used for the next controller Computa/onally inefficient N control problems should be solved at worst [simulate] [!simulate] G j M t+1

23 Advanced Strategy: Check without Synthesis Pick up G i Update winning region for E t+1 and G j Check whether M t forces E t+1 to the winning region winning region W Gi,Et the set of all states s such that no system forces E t to sa/sfy G i from s controller strategy should avoid the winning region e.g. a winning region for G i = p a10 u W Gi a7 c a1 x u a6 v z c a5 u a3 c p a9 a4 u a8 c y u a2 w c [!reached] G j [reached] update winning region W Gi,Et+1 is obtained from W Gi,Et and Δ t+1 determine states newly added in the region by checking updated part in env. model

24 Advanced Strategy: Check without Synthesis Et+1 Pick up G i Update winning region for E t+1 and G j M t a10 u W Gi a7 c a1 x u a6 v z c a5 u a3 c p a9 a4 u a8 c y u a2 w c Check whether M t forces E t+1 to the winning region Does M t E t+1 reach to W Gi,Et+1? if yes, M t+1 does not exist such that M t+1 E t+1 = G j [reached] M t+1 simulate M t [!reached] G j

25 Case studies automated warehouse produc/on cell

26 Automated Warehouse!"!#$%&'(%)!(*+!#,! '!!" &#!" &!!" %#!" %!!" $#!" 012(342)5678"5+9+5"*+5+(342" (427:455+:"*827;+*6*" For func. selec/on!! '" &#$" For func. selec/on + controller synthesis!! #!!" +!" *!" $!!" #!" &" )!" (!"!"!#$%&'(%)!(*+!#,! '!!" &#!" &!!" %#!" %!!" $#!" $!!"!" ()*+$" 012(342)5678"5+9+5"*+5+(342" (427:455+:"*827;*6*" Naive strategy ()*+%" ()*+&" ()*+'" ()*+#" ()*+," ()*+-" ()*+." ()*+/" ()*+$!" ()*+$$" ()*+$%" ()*+$&" ()*+$'" ()*+$#" %#$" %"!#$"!" ()*"+,-./0-)1234"15651" 7515./0-" 0.7% in the worst % on average '!" &!" %!" $!" #!"!",-."/0123" 35.8% in the worst 13.6% on average #!"!" ()*+$" ()*+%" Advanced strategy ()*+&" ()*+'" ()*+#" ()*+," ()*+-" ()*+." ()*+/" ()*+$!" ()*+$$" ()*+$%" ()*+$&" ()*+$'" ()*+$#"

27 Produc/on Cell '#!!!" 012(342)5678"5+9+5"*+5+(342"!"!#$%&'(%)!(*+!#,! '!!!!" &!!!" %!!!" $!!!" (427:455+:"*827;+*6*" For func. selec/on!!!#!'"!#!&$" For func. selec/on + controller synthesis!! #!!" +!" *!" #!!!"!#!&" )!"!" '#!!!" ()*+'" 012(342)5678"5+9+5"*+5+(342" ()*+#" ()*+," ()*+$" ()*+-" ()*+%" ()*+." ()*+&" ()*+/" ()*+'!" ()*+''" ()*+'#" Naive strategy ()*+'," ()*+'$" ()*+'-"!#!%$"!#!%" (!" '!" &!" %!" '!!!!" (427:455+:"*827;+*6*"!#!!$" $!"!"!#$%&'(%)!(*+!#,! &!!!" %!!!" $!!!" #!!!"!" ()*"+,-./0-)1234" 15651"7515./0-" 2.5% in the worst 0.176% on average #!"!",-."/0123" 99.2% in the worst 44.9% on average!" ()*+'" ()*+#" Advanced strategy ()*+," ()*+$" ()*+-" ()*+%" ()*+." ()*+&" ()*+/" ()*+'!" ()*+''" ()*+'#" ()*+'," ()*+'$" ()*+'-"

28 Conclusion How does the system cope with development /me uncertainty? How do we select appropriate level of func/onality considering risks and func/onality? We propose a framework enabling graceful degrada/on revise environment run/me generate behavior specifica/on with run/me change behavior of the run/me We introduce two strategies to find the highest level of func/onality that can be guarantee and to which the system can seamlessly degrade

Kenji Tei Associate Professor National Institute of Informatics, Japan

Kenji Tei Associate Professor National Institute of Informatics, Japan Kenji Tei Associate Professor National Institute of Informatics, Japan tei@nii.ac.jp http://researchmap.jp/teikenji/?lang=english Joint work with Moeka Tanabe, Ezequiel Castellano, Leandro Nahabedian,

More information

Virtualization. Introduction. Why we interested? 11/28/15. Virtualiza5on provide an abstract environment to run applica5ons.

Virtualization. Introduction. Why we interested? 11/28/15. Virtualiza5on provide an abstract environment to run applica5ons. Virtualization Yifu Rong Introduction Virtualiza5on provide an abstract environment to run applica5ons. Virtualiza5on technologies have a long trail in the history of computer science. Why we interested?

More information

Using Classical Planners for Tasks with Con5nuous Ac5ons in Robo5cs

Using Classical Planners for Tasks with Con5nuous Ac5ons in Robo5cs Using Classical Planners for Tasks with Con5nuous Ac5ons in Robo5cs Stuart Russell Joint work with Siddharth Srivastava, Lorenzo Riano, Pieter Abbeel Using Classical Planners for Tasks with Con5nuous Ac5ons

More information

Approach starts with GEN and KILL sets

Approach starts with GEN and KILL sets b -Advanced-DFA Review of Data Flow Analysis State Propaga+on Computer Science 5-6 Fall Prof. L. J. Osterweil Material adapted from slides originally prepared by Prof. L. A. Clarke A technique for determining

More information

What were his cri+cisms? Classical Methodologies:

What were his cri+cisms? Classical Methodologies: 1 2 Classifica+on In this scheme there are several methodologies, such as Process- oriented, Blended, Object Oriented, Rapid development, People oriented and Organisa+onal oriented. According to David

More information

RV: A Run'me Verifica'on Framework for Monitoring, Predic'on and Mining

RV: A Run'me Verifica'on Framework for Monitoring, Predic'on and Mining RV: A Run'me Verifica'on Framework for Monitoring, Predic'on and Mining Patrick Meredith Grigore Rosu University of Illinois at Urbana Champaign (UIUC) Run'me Verifica'on, Inc. (joint work with Dongyun

More information

Founda'ons of So,ware Engineering. Lecture 11 Intro to QA, Tes2ng Claire Le Goues

Founda'ons of So,ware Engineering. Lecture 11 Intro to QA, Tes2ng Claire Le Goues Founda'ons of So,ware Engineering Lecture 11 Intro to QA, Tes2ng Claire Le Goues 1 Learning goals Define so;ware analysis. Reason about QA ac2vi2es with respect to coverage and coverage/adequacy criteria,

More information

UNIT V: CENTRAL PROCESSING UNIT

UNIT V: CENTRAL PROCESSING UNIT UNIT V: CENTRAL PROCESSING UNIT Agenda Basic Instruc1on Cycle & Sets Addressing Instruc1on Format Processor Organiza1on Register Organiza1on Pipeline Processors Instruc1on Pipelining Co-Processors RISC

More information

Fluxo. Improving the Responsiveness of Internet Services with Automa7c Cache Placement

Fluxo. Improving the Responsiveness of Internet Services with Automa7c Cache Placement Fluxo Improving the Responsiveness of Internet Services with Automac Cache Placement Alexander Rasmussen UCSD (Presenng) Emre Kiciman MSR Redmond Benjamin Livshits MSR Redmond Madanlal Musuvathi MSR Redmond

More information

Design Principles & Prac4ces

Design Principles & Prac4ces Design Principles & Prac4ces Robert France Robert B. France 1 Understanding complexity Accidental versus Essen4al complexity Essen%al complexity: Complexity that is inherent in the problem or the solu4on

More information

Computer Programming-I. Developed by: Strawberry

Computer Programming-I. Developed by: Strawberry Computer Programming-I Objec=ve of CP-I The course will enable the students to understand the basic concepts of structured programming. What is programming? Wri=ng a set of instruc=ons that computer use

More information

CSE Opera,ng System Principles

CSE Opera,ng System Principles CSE 30341 Opera,ng System Principles Synchroniza2on Overview Background The Cri,cal-Sec,on Problem Peterson s Solu,on Synchroniza,on Hardware Mutex Locks Semaphores Classic Problems of Synchroniza,on Monitors

More information

Proofs about Programs

Proofs about Programs Proofs about Programs Program Verification (Rosen, Sections 5.5) TOPICS Program Correctness Preconditions & Postconditions Program Verification Assignment Statements Conditional Statements Loops Composition

More information

Automated Generation of Adaptive Test Plans for Self- Adaptive Systems. Erik Fredericks and Be'y H. C. Cheng May 19 th, 2015

Automated Generation of Adaptive Test Plans for Self- Adaptive Systems. Erik Fredericks and Be'y H. C. Cheng May 19 th, 2015 Automated Generation of Adaptive Test Plans for Self- Adaptive Systems Erik Fredericks and Be'y H. C. Cheng May 19 th, 2015 Motivation Run- 9me tes9ng provides assurance for self- adap9ve systems (SAS)

More information

Automa'c Test Genera'on

Automa'c Test Genera'on Automa'c Test Genera'on First, about Purify Paper about Purify (and PurifyPlus) posted How do you monitor reads and writes: insert statements before and a?er reads, writes in code can s'll be done with

More information

Planning. Outside Materials (see Materials page)

Planning. Outside Materials (see Materials page) Planning Outside Materials (see Materials page) What is Planning? Given: A way to describe the world An ini

More information

: Advanced Compiler Design. 8.0 Instruc?on scheduling

: Advanced Compiler Design. 8.0 Instruc?on scheduling 6-80: Advanced Compiler Design 8.0 Instruc?on scheduling Thomas R. Gross Computer Science Department ETH Zurich, Switzerland Overview 8. Instruc?on scheduling basics 8. Scheduling for ILP processors 8.

More information

CSc 120. Introduc/on to Computer Programming II. 02: Problem Decomposi1on and Program Development. Adapted from slides by Dr.

CSc 120. Introduc/on to Computer Programming II. 02: Problem Decomposi1on and Program Development. Adapted from slides by Dr. CSc 120 Introduc/on to Computer Programming II Adapted from slides by Dr. Saumya Debray 02: Problem Decomposi1on and Program Development A common student lament "I have this big programming assignment.

More information

CISC327 - So*ware Quality Assurance

CISC327 - So*ware Quality Assurance CISC327 - So*ware Quality Assurance Lecture 8 Introduc

More information

Vulnerability Analysis (III): Sta8c Analysis

Vulnerability Analysis (III): Sta8c Analysis Computer Security Course. Vulnerability Analysis (III): Sta8c Analysis Slide credit: Vijay D Silva 1 Efficiency of Symbolic Execu8on 2 A Sta8c Analysis Analogy 3 Syntac8c Analysis 4 Seman8cs- Based Analysis

More information

CS 4604: Introduc0on to Database Management Systems. B. Aditya Prakash Lecture #17: Transac0ons 1: Intro. to ACID

CS 4604: Introduc0on to Database Management Systems. B. Aditya Prakash Lecture #17: Transac0ons 1: Intro. to ACID CS 4604: Introduc0on to Database Management Systems B. Aditya Prakash Lecture #17: Transac0ons 1: Intro. to ACID Why Transac0ons? Database systems are normally being accessed by many users or processes

More information

Searching and Sorting (Savitch, Chapter 7.4)

Searching and Sorting (Savitch, Chapter 7.4) Searching and Sorting (Savitch, Chapter 7.4) TOPICS Algorithms Complexity Binary Search Bubble Sort Insertion Sort Selection Sort What is an algorithm? A finite set of precise instruc6ons for performing

More information

CSE Opera+ng System Principles

CSE Opera+ng System Principles CSE 30341 Opera+ng System Principles Lecture 2 Introduc5on Con5nued Recap Last Lecture What is an opera+ng system & kernel? What is an interrupt? CSE 30341 Opera+ng System Principles 2 1 OS - Kernel CSE

More information

What is an algorithm?

What is an algorithm? /0/ What is an algorithm? Searching and Sorting (Savitch, Chapter 7.) TOPICS Algorithms Complexity Binary Search Bubble Sort Insertion Sort Selection Sort A finite set of precise instrucons for performing

More information

CS 5614: (Big) Data Management Systems. B. Aditya Prakash Lecture #6: Transac/ons 1: Intro. to ACID

CS 5614: (Big) Data Management Systems. B. Aditya Prakash Lecture #6: Transac/ons 1: Intro. to ACID CS 5614: (Big) Data Management Systems B. Aditya Prakash Lecture #6: Transac/ons 1: Intro. to ACID Project dates Proposal due: Feb 23 Milestone due: Mar 28 Final report/posters etc: May 2 (last class)

More information

Discrete Processes

Discrete Processes FRTN20 Market-Driven Systems Marknadsstyrda System FRTN20 Lecture 2: Discrete Produc@on 1 Discrete Produc@on Processes General Characteris@cs of discrete produc@on processes: Discon@nuous produc@on of

More information

Database design and implementation CMPSCI 645. Lectures 18: Transactions and Concurrency

Database design and implementation CMPSCI 645. Lectures 18: Transactions and Concurrency Database design and implementation CMPSCI 645 Lectures 18: Transactions and Concurrency 1 DBMS architecture Query Parser Query Rewriter Query Op=mizer Query Executor Lock Manager Concurrency Control Access

More information

VHDL: Concurrent Coding vs. Sequen7al Coding. 1

VHDL: Concurrent Coding vs. Sequen7al Coding. 1 VHDL: Concurrent Coding vs. Sequen7al Coding talarico@gonzaga.edu 1 Concurrent Coding Concurrent = parallel VHDL code is inherently concurrent Concurrent statements are adequate only to code at a very

More information

Manipula0on Algorithms Mo0on Planning. Mo#on Planning I. Katharina Muelling (NREC, Carnegie Mellon University) 1

Manipula0on Algorithms Mo0on Planning. Mo#on Planning I. Katharina Muelling (NREC, Carnegie Mellon University) 1 16-843 Manipula0on Algorithms Mo0on Planning Mo#on Planning I Katharina Muelling (NREC, Carnegie Mellon University) 1 Configura0on Space Obstacles Star Algorithm Convex robot, transla#on C obs : convex

More information

What is Search For? CS 188: Ar)ficial Intelligence. Constraint Sa)sfac)on Problems Sep 14, 2015

What is Search For? CS 188: Ar)ficial Intelligence. Constraint Sa)sfac)on Problems Sep 14, 2015 CS 188: Ar)ficial Intelligence Constraint Sa)sfac)on Problems Sep 14, 2015 What is Search For? Assump)ons about the world: a single agent, determinis)c ac)ons, fully observed state, discrete state space

More information

MapReduce. Tom Anderson

MapReduce. Tom Anderson MapReduce Tom Anderson Last Time Difference between local state and knowledge about other node s local state Failures are endemic Communica?on costs ma@er Why Is DS So Hard? System design Par??oning of

More information

Ways to implement a language

Ways to implement a language Interpreters Implemen+ng PLs Most of the course is learning fundamental concepts for using PLs Syntax vs. seman+cs vs. idioms Powerful constructs like closures, first- class objects, iterators (streams),

More information

A Petri Net based approach for the Synthesis of Parts' Controllers for. Reconfigurable Manufacturing Systems

A Petri Net based approach for the Synthesis of Parts' Controllers for. Reconfigurable Manufacturing Systems SICE-ICASE Internaonal Joint Conference 2006 Oct. 18-2 1, 2006 in Bexco, Busan, Korea A Petri Net based approach for the Synthesis of Parts' Controllers for Reconfigurable Manufacturing Systems Eun Joo

More information

CSCI 360 Introduc/on to Ar/ficial Intelligence Week 2: Problem Solving and Op/miza/on. Instructor: Wei-Min Shen

CSCI 360 Introduc/on to Ar/ficial Intelligence Week 2: Problem Solving and Op/miza/on. Instructor: Wei-Min Shen CSCI 360 Introduc/on to Ar/ficial Intelligence Week 2: Problem Solving and Op/miza/on Instructor: Wei-Min Shen Status Check and Review Status check Have you registered in Piazza? Have you run the Project-1?

More information

BBM 101 Introduc/on to Programming I Fall 2014, Lecture 5. Aykut Erdem, Erkut Erdem, Fuat Akal

BBM 101 Introduc/on to Programming I Fall 2014, Lecture 5. Aykut Erdem, Erkut Erdem, Fuat Akal BBM 101 Introduc/on to Programming I Fall 2014, Lecture 5 Aykut Erdem, Erkut Erdem, Fuat Akal 1 Today Itera/on Control Loop Statements for, while, do- while structures break and con/nue Some simple numerical

More information

CISC327 - So*ware Quality Assurance. Lecture 13 Black Box Unit

CISC327 - So*ware Quality Assurance. Lecture 13 Black Box Unit CISC327 - So*ware Quality Assurance Lecture 13 Black Box Unit Tes@ng Black Box Unit Tes@ng Black box method tes@ng Test harnesses Role of code- level specifica@ons (asser@ons) Automa@ng black box unit

More information

New World BGP. Geoff Huston January2010 APNIC

New World BGP. Geoff Huston January2010 APNIC New World BGP Geoff Huston January2010 APNIC 16- bit AS Number Map 16- bit AS Number Map Unadvertised AS Numbers RIR Pool AS Numbers Advertised AS Numbers IANA Pool 16- bit AS Number Map Unadvertised AS

More information

Compiler: Control Flow Optimization

Compiler: Control Flow Optimization Compiler: Control Flow Optimization Virendra Singh Computer Architecture and Dependable Systems Lab Department of Electrical Engineering Indian Institute of Technology Bombay http://www.ee.iitb.ac.in/~viren/

More information

CISC327 - So*ware Quality Assurance

CISC327 - So*ware Quality Assurance CISC327 - So*ware Quality Assurance Lecture 12 Black Box Tes?ng CISC327-2003 2017 J.R. Cordy, S. Grant, J.S. Bradbury, J. Dunfield Black Box Tes?ng Outline Last?me we con?nued with black box tes?ng and

More information

Fixed- Parameter Evolu2onary Algorithms

Fixed- Parameter Evolu2onary Algorithms Fixed- Parameter Evolu2onary Algorithms Frank Neumann School of Computer Science University of Adelaide Joint work with Stefan Kratsch (U Utrecht), Per Kris2an Lehre (DTU Informa2cs), Pietro S. Oliveto

More information

Through Python. "Nel mezzo del cammin di nostra vita mi ritrovai per una selva oscura..." Dante Alighieri

Through Python. Nel mezzo del cammin di nostra vita mi ritrovai per una selva oscura... Dante Alighieri Through Python "Nel mezzo del cammin di nostra vita mi ritrovai per una selva oscura..." Dante Alighieri Syllabus Variables vs object Float representa2on The importance of syntax operator overloading built-in

More information

F.P. Brooks, No Silver Bullet: Essence and Accidents of Software Engineering CIS 422

F.P. Brooks, No Silver Bullet: Essence and Accidents of Software Engineering CIS 422 The hardest single part of building a software system is deciding precisely what to build. No other part of the conceptual work is as difficult as establishing the detailed technical requirements...no

More information

OpenMP Tasking Concepts

OpenMP Tasking Concepts UT Aus?n TACC OpenMP Tasking Concepts TACC OpenMP Team milfeld/lars/agomez@tacc.utexas.edu Sides at:?nyurl.com/tacc-openmp or portal.tacc.utexas.edu/training click View Details Learning Objec?ve -- Tasking

More information

Document Databases: MongoDB

Document Databases: MongoDB NDBI040: Big Data Management and NoSQL Databases hp://www.ksi.mff.cuni.cz/~svoboda/courses/171-ndbi040/ Lecture 9 Document Databases: MongoDB Marn Svoboda svoboda@ksi.mff.cuni.cz 28. 11. 2017 Charles University

More information

CSSE232 Computer Architecture I. Datapath

CSSE232 Computer Architecture I. Datapath CSSE232 Computer Architecture I Datapath Class Status Reading Sec;ons 4.1-3 Project Project group milestone assigned Indicate who you want to work with Indicate who you don t want to work with Due next

More information

Last Time. integer/float/string. import math math.sqrt() math.pi. Python Programming, 2/e 2

Last Time. integer/float/string. import math math.sqrt() math.pi. Python Programming, 2/e 2 1 Last Time integer/float/string import math math.sqrt() math.pi Python Programming, 2/e 2 Extra Ques:on from Lab 2 Using loops and two print statements, have Python print out the following: * * * * *

More information

Decision making for autonomous naviga2on. Anoop Aroor Advisor: Susan Epstein CUNY Graduate Center, Computer science

Decision making for autonomous naviga2on. Anoop Aroor Advisor: Susan Epstein CUNY Graduate Center, Computer science Decision making for autonomous naviga2on Anoop Aroor Advisor: Susan Epstein CUNY Graduate Center, Computer science Overview Naviga2on and Mobile robots Decision- making techniques for naviga2on Building

More information

Sequen&al Consistency and Linearizability

Sequen&al Consistency and Linearizability Sequen&al Consistency and Linearizability (Or, Reasoning About Concurrent Objects) Acknowledgement: Slides par&ally adopted from the companion slides for the book "The Art of Mul&processor Programming"

More information

Chapter 1 Introduc0on

Chapter 1 Introduc0on Lecture slides for Automated Planning: Theory and Practice Chapter 1 Introduc0on Dana S. Nau University of Maryland Updated 3:03 PM December 14, 2013 1 Some Dic0onary Defini0ons of Plan plan n. 1. A scheme,

More information

Virtual Memory B: Objec5ves

Virtual Memory B: Objec5ves Virtual Memory B: Objec5ves Benefits of a virtual memory system" Demand paging, page-replacement algorithms, and allocation of page frames" The working-set model" Relationship between shared memory and

More information

Automated System Analysis using Executable SysML Modeling Pa8erns

Automated System Analysis using Executable SysML Modeling Pa8erns Automated System Analysis using Executable SysML Modeling Pa8erns Maged Elaasar* Modelware Solu

More information

Opera&ng Systems ECE344

Opera&ng Systems ECE344 Opera&ng Systems ECE344 Lecture 10: Scheduling Ding Yuan Scheduling Overview In discussing process management and synchroniza&on, we talked about context switching among processes/threads on the ready

More information

Caching and Demand- Paged Virtual Memory

Caching and Demand- Paged Virtual Memory Caching and Demand- Paged Virtual Memory Defini8ons Cache Copy of data that is faster to access than the original Hit: if cache has copy Miss: if cache does not have copy Cache block Unit of cache storage

More information

CSE 1310: Introduction Mariottini UT Arlington

CSE 1310: Introduction Mariottini UT Arlington Kind of obvious, but a computer is something that does computa0on. What is interes8ng in it is what is going to be computed. In the 1960 s, when computers were becoming popular, they were commonly called

More information

SQL- Updates, Asser0ons and Views

SQL- Updates, Asser0ons and Views SQL- Updates, Asser0ons and Views Data Defini0on, Constraints, and Schema Changes Used to CREATE, DROP, and ALTER the descrip0ons of the tables (rela0ons) of a database CREATE TABLE In SQL2, can use the

More information

How to sleep *ght and keep your applica*ons running on IPv6 transi*on. The importance of IPv6 Applica*on Tes*ng

How to sleep *ght and keep your applica*ons running on IPv6 transi*on. The importance of IPv6 Applica*on Tes*ng How to sleep *ght and keep your applica*ons running on IPv6 transi*on The importance of IPv6 Applica*on Tes*ng About this presenta*on It presents a generic methodology to test the IPv6 func*onality of

More information

An Economic Perspec.ve on IPv6 Transi.on

An Economic Perspec.ve on IPv6 Transi.on An Economic Perspec.ve on IPv6 Transi.on Geoff Huston APNIC The Fine Print: I am not a economist in terms of my professional qualifications or by virtue of my work experience. Worse still, I think I fit

More information

Opera&ng Systems CMPSCI 377 Garbage Collec&on. Emery Berger and Mark Corner University of Massachuse9s Amherst

Opera&ng Systems CMPSCI 377 Garbage Collec&on. Emery Berger and Mark Corner University of Massachuse9s Amherst Opera&ng Systems CMPSCI 377 Garbage Collec&on Emery Berger and Mark Corner University of Massachuse9s Amherst Ques

More information

CISC327 - So*ware Quality Assurance

CISC327 - So*ware Quality Assurance CISC327 - So*ware Quality Assurance Lecture 12 Black Box Tes?ng CISC327-2003 2017 J.R. Cordy, S. Grant, J.S. Bradbury, J. Dunfield Black Box Tes?ng Outline Last?me we con?nued with black box tes?ng and

More information

Threads. COMP 401 Fall 2017 Lecture 22

Threads. COMP 401 Fall 2017 Lecture 22 Threads COMP 401 Fall 2017 Lecture 22 Threads As a generic term Abstrac>on for program execu>on Current point of execu>on. Call stack. Contents of memory. The fundamental unit of processing that can be

More information

Quan%ta%ve Verifica%on: Formal Guarantees for Timeliness, Reliability and Performance

Quan%ta%ve Verifica%on: Formal Guarantees for Timeliness, Reliability and Performance Quan%ta%ve Verifica%on: Formal Guarantees for Timeliness, Reliability and Performance Dave Parker University of Birmingham FMICS 2014, Florence, September 2014 Quan%ta%ve Verifica%on: Formal Guarantees

More information

Programming Languages and Techniques (CIS120)

Programming Languages and Techniques (CIS120) Programming Languages and Techniques (CIS120) Lecture 21 March 6 th, 2015 Transi@on to Java CIS 120 Overview Declara@ve (Func@onal) programming persistent data structures recursion is main control structure

More information

Tutorial II Using the adap3ve mesh refinement & spherical shell geometry. Juliane Dannberg

Tutorial II Using the adap3ve mesh refinement & spherical shell geometry. Juliane Dannberg Tutorial II Using the adap3ve mesh refinement & spherical shell geometry Juliane Dannberg Overview At the end of this tutorial, you should be able to: Set up a model with Earth- like geometry and temperature

More information

A Distributed Data- Parallel Execu3on Framework in the Kepler Scien3fic Workflow System

A Distributed Data- Parallel Execu3on Framework in the Kepler Scien3fic Workflow System A Distributed Data- Parallel Execu3on Framework in the Kepler Scien3fic Workflow System Ilkay Al(ntas and Daniel Crawl San Diego Supercomputer Center UC San Diego Jianwu Wang UMBC WorDS.sdsc.edu Computa3onal

More information

Using Sequen+al Run+me Distribu+ons for the Parallel Speedup Predic+on of SAT Local Search

Using Sequen+al Run+me Distribu+ons for the Parallel Speedup Predic+on of SAT Local Search Using Sequen+al Run+me Distribu+ons for the Parallel Speedup Predic+on of SAT Local Search Alejandro Arbelaez - CharloBe Truchet - Philippe Codognet JFLI University of Tokyo LINA, UMR 6241 University of

More information

Sec$on 4: Parallel Algorithms. Michelle Ku8el

Sec$on 4: Parallel Algorithms. Michelle Ku8el Sec$on 4: Parallel Algorithms Michelle Ku8el mku8el@cs.uct.ac.za The DAG, or cost graph A program execu$on using fork and join can be seen as a DAG (directed acyclic graph) Nodes: Pieces of work Edges:

More information

Transac.on Management. Transac.ons. CISC437/637, Lecture #16 Ben Cartere?e

Transac.on Management. Transac.ons. CISC437/637, Lecture #16 Ben Cartere?e Transac.on Management CISC437/637, Lecture #16 Ben Cartere?e Copyright Ben Cartere?e 1 Transac.ons A transac'on is a unit of program execu.on that accesses and possibly updates rela.ons The DBMS s view

More information

BIL 682 Ar+ficial Intelligence Week #2: Solving problems by searching. Asst. Prof. Aykut Erdem Dept. of Computer Engineering HaceDepe University

BIL 682 Ar+ficial Intelligence Week #2: Solving problems by searching. Asst. Prof. Aykut Erdem Dept. of Computer Engineering HaceDepe University BIL 682 Ar+ficial Intelligence Week #2: Solving problems by searching Asst. Prof. Aykut Erdem Dept. of Computer Engineering HaceDepe University Today Search problems Uninformed search Informed (heuris+c)

More information

Secure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek

Secure Server Project. Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek Secure Server Project Xen Project Developer Summit 2013 Adven9um Labs Jason Sonnek 1 Outline I. Mo9va9on, Objec9ves II. Threat Landscape III. Design IV. Status V. Roadmap 2 Mo9va9on In a nutshell: Secure

More information

CS 61C: Great Ideas in Computer Architecture Introduc=on to C, Part I. We are here!

CS 61C: Great Ideas in Computer Architecture Introduc=on to C, Part I. We are here! Agenda CS 61C: Great Ideas in Computer Architecture Introduc=on to C, Part I Instructors: Krste Asanovic Randy H. Katz hgp://inst.eecs.berkeley.edu/~cs61c/f12 Review Compile vs. Interpret Python vs. Java

More information

Opera&ng Systems ECE344

Opera&ng Systems ECE344 Opera&ng Systems ECE344 Lecture 8: Paging Ding Yuan Lecture Overview Today we ll cover more paging mechanisms: Op&miza&ons Managing page tables (space) Efficient transla&ons (TLBs) (&me) Demand paged virtual

More information

Redundancy and Dependability Evalua2on. EECE 513: Design of Fault- tolerant Systems

Redundancy and Dependability Evalua2on. EECE 513: Design of Fault- tolerant Systems Redundancy and Dependability Evalua2on EECE 513: Design of Fault- tolerant Systems Learning Objec2ves At the end of this lecture, you will be able to Define combinatorial models of reliability Evaluate

More information

Why Transac'ons? Database systems are normally being accessed by many users or processes at the same 'me.

Why Transac'ons? Database systems are normally being accessed by many users or processes at the same 'me. Transac'ons 1 Why Transac'ons? Database systems are normally being accessed by many users or processes at the same 'me. Both queries and modifica'ons. Unlike opera'ng systems, which support interac'on

More information

SQLite with a Fine-Toothed Comb. John Regehr Trust-in-So1 / University of Utah

SQLite with a Fine-Toothed Comb. John Regehr Trust-in-So1 / University of Utah SQLite with a Fine-Toothed Comb John Regehr Trust-in-So1 / University of Utah Feasible states for a system we care about No execu

More information

Evalua&ng Secure Programming Knowledge

Evalua&ng Secure Programming Knowledge Evalua&ng Secure Programming Knowledge Ma6 Bishop, UC Davis Jun Dai, Cal State Sacramento Melissa Dark, Purdue University Ida Ngambeki, Purdue University Phillip Nico, Cal Poly San Luis Obispo Minghua

More information

Kaseya Fundamentals Workshop DAY TWO. Developed by Kaseya University. Powered by IT Scholars

Kaseya Fundamentals Workshop DAY TWO. Developed by Kaseya University. Powered by IT Scholars Kaseya Fundamentals Workshop DAY TWO Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day One Review IT- Scholars Virtual LABS System Management Organiza@on

More information

CISC327 - So*ware Quality Assurance

CISC327 - So*ware Quality Assurance CISC327 - So*ware Quality Assurance Lecture 19 Regression Tes?ng CISC327-2003- 2017 J.R. Cordy, S. Grant, J.S. Bradbury, J. Dunfield Regression Tes?ng Today we look at regression tes?ng Purpose of regression

More information

MapReduce, Apache Hadoop

MapReduce, Apache Hadoop NDBI040: Big Data Management and NoSQL Databases hp://www.ksi.mff.cuni.cz/ svoboda/courses/2016-1-ndbi040/ Lecture 2 MapReduce, Apache Hadoop Marn Svoboda svoboda@ksi.mff.cuni.cz 11. 10. 2016 Charles University

More information

Mugshot: Recording and Replaying JavaScript Applica9ons. James Mickens

Mugshot: Recording and Replaying JavaScript Applica9ons. James Mickens Mugshot: Recording and Replaying JavaScript Applica9ons James Mickens Jeremy Elson Jon Howell I ALREADY LEARNED THIS TO YOU. XOXO, JAMES Modern web sites: eventdriven func9onality via JavaScript mapitem.onclick

More information

MapReduce, Apache Hadoop

MapReduce, Apache Hadoop Czech Technical University in Prague, Faculty of Informaon Technology MIE-PDB: Advanced Database Systems hp://www.ksi.mff.cuni.cz/~svoboda/courses/2016-2-mie-pdb/ Lecture 12 MapReduce, Apache Hadoop Marn

More information

Jinn: Synthesizing Dynamic Bug Detectors for Foreign Language Interfaces

Jinn: Synthesizing Dynamic Bug Detectors for Foreign Language Interfaces Jinn: Synthesizing Dynamic Bug Detectors for Foreign Language Interfaces Byeongcheol Lee Ben Wiedermann Mar>n Hirzel Robert Grimm Kathryn S. McKinley B. Lee, B. Wiedermann, M. Hirzel, R. Grimm, and K.

More information

By Aftab A. Siddiqui Cyber Internet Services (Pvt.) Ltd IPv6 Task Force Pakistan

By Aftab A. Siddiqui Cyber Internet Services (Pvt.) Ltd IPv6 Task Force Pakistan By Aftab A. Siddiqui Cyber Internet Services (Pvt.) Ltd IPv6 Task Force Pakistan Introduction IPv6 delegation in Pakistan Pakistan s IPv6 prefixes visibility IPv6 Task Force Introduction Pakistan v6core

More information

Design pa*erns. Based on slides by Glenn D. Blank

Design pa*erns. Based on slides by Glenn D. Blank Design pa*erns Based on slides by Glenn D. Blank Defini6ons A pa#ern is a recurring solu6on to a standard problem, in a context. Christopher Alexander, a professor of architecture Why would what a prof

More information

CS 61C: Great Ideas in Computer Architecture (Machine Structures) Lecture 32: Pipeline Parallelism 3

CS 61C: Great Ideas in Computer Architecture (Machine Structures) Lecture 32: Pipeline Parallelism 3 CS 61C: Great Ideas in Computer Architecture (Machine Structures) Lecture 32: Pipeline Parallelism 3 Instructor: Dan Garcia inst.eecs.berkeley.edu/~cs61c! Compu@ng in the News At a laboratory in São Paulo,

More information

Automa'c, Efficient, and General Repair of So8ware Defects using Lightweight Program Analyses

Automa'c, Efficient, and General Repair of So8ware Defects using Lightweight Program Analyses Automa'c, Efficient, and General Repair of So8ware Defects using Lightweight Program Analyses Disserta'on Proposal Claire Le Goues September 22, 2010 So8ware Errors Are Expensive Everyday, almost 300 bugs

More information

Op#mizing MapReduce for Highly- Distributed Environments

Op#mizing MapReduce for Highly- Distributed Environments Op#mizing MapReduce for Highly- Distributed Environments Abhishek Chandra Associate Professor Department of Computer Science and Engineering University of Minnesota hep://www.cs.umn.edu/~chandra 1 Big

More information

Towards Integrating Work1low and Database Provenance

Towards Integrating Work1low and Database Provenance IPAW 12 Interna'onal Provenance and Annota'on Workshop Towards Integrating Work1low and Database Provenance Fernando Chiriga- and Juliana Freire Polytechnic Ins4tute of NYU Database Provenance Fine- grained

More information

INDEX. Gibsat s MINI2 IPTV Box GS Final User Guide. 1. How to prepare your MINI 2 for PVR and Timeshi, use. 2. How to use your MINI 2 PVR Service.

INDEX. Gibsat s MINI2 IPTV Box GS Final User Guide. 1. How to prepare your MINI 2 for PVR and Timeshi, use. 2. How to use your MINI 2 PVR Service. Document Revision GSFUG-IPTV-H256-Rev 1.2e Document Descrip"on MINI 2 IPTV Box - PVR and Timeshi Manual INDEX 1. How to prepare your MINI 2 for PVR and Timeshi, use. 1. Installing your USB device on IPTV

More information

ques4ons? Midterm Projects, etc. Path- Based Sta4c Analysis Sta4c analysis we know Example 11/20/12

ques4ons? Midterm Projects, etc. Path- Based Sta4c Analysis Sta4c analysis we know Example 11/20/12 Midterm Grades and solu4ons are (and have been) on Moodle The midterm was hard[er than I thought] grades will be scaled I gave everyone a 10 bonus point (already included in your total) max: 98 mean: 71

More information

Scalability in a Real-Time Decision Platform

Scalability in a Real-Time Decision Platform Scalability in a Real-Time Decision Platform Kenny Shi Manager Software Development ebay Inc. A Typical Fraudulent Lis3ng fraud detec3on architecture sync vs. async applica3on publish messaging bus request

More information

10/27/11. Is The Queue Correct? Concurrent Computaton. Objects. A Concurrent FIFO Queue head. A Concurrent FIFO Queue head

10/27/11. Is The Queue Correct? Concurrent Computaton. Objects. A Concurrent FIFO Queue head. A Concurrent FIFO Queue head DD2451 Parallel and Distributed Computing --- FDD3008 Distributed Algorithms Lecture 2 Concurrent Objects memory Concurrent Computaton Mads Dam Autumn/Winter 2011 object object Art of Mul/processor 2 Objects

More information

Ensemble- Based Characteriza4on of Uncertain Features Dennis McLaughlin, Rafal Wojcik

Ensemble- Based Characteriza4on of Uncertain Features Dennis McLaughlin, Rafal Wojcik Ensemble- Based Characteriza4on of Uncertain Features Dennis McLaughlin, Rafal Wojcik Hydrology TRMM TMI/PR satellite rainfall Neuroscience - - MRI Medicine - - CAT Geophysics Seismic Material tes4ng Laser

More information

Developing an IDE4L Grid

Developing an IDE4L Grid Developing an IDE4L Grid Presenter: Antonino Riccobono, Ph.D. RWTH Aachen University Project Coordinator: Prof. Sami Repo Tampere University of Technology 5 th November 2014 SLIDE 2 Contents Overview of

More information

CS 465 Final Review. Fall 2017 Prof. Daniel Menasce

CS 465 Final Review. Fall 2017 Prof. Daniel Menasce CS 465 Final Review Fall 2017 Prof. Daniel Menasce Ques@ons What are the types of hazards in a datapath and how each of them can be mi@gated? State and explain some of the methods used to deal with branch

More information

Overview of IPTV Forum Japan s Hybridcast Technical SpecificaAon

Overview of IPTV Forum Japan s Hybridcast Technical SpecificaAon The fourth Web and TV Workshop Overview of IPTV Forum Japan s Hybridcast Technical SpecificaAon Kinji Matsumura, NHK 1 What is Technology pladorm for broadcast and broadband hybrid service that uses HTML5

More information

TC-308, TC-616 TC-308-VM, TC-616-VM TC-616-NHR, TC-616-NHR-VM

TC-308, TC-616 TC-308-VM, TC-616-VM TC-616-NHR, TC-616-NHR-VM TeleCraft Hybrid Key Telephone Communication System User s Manual Version 6.02 Models: TC-308, TC-616 TC-308-VM, TC-616-VM TC-616-NHR, TC-616-NHR-VM About This Manual We wrote this manual with you, the

More information

Lecture 18: Planning and plan execution, applications

Lecture 18: Planning and plan execution, applications Lecture 18: Planning and plan execution, applications Planning, plan execution, replanning Planner as a part of an autonomous robot: robot architectures The subsumption architecture The 3-tier architecture:

More information

Today s Lecture. CS 61C: Great Ideas in Computer Architecture (Machine Structures) Map Reduce

Today s Lecture. CS 61C: Great Ideas in Computer Architecture (Machine Structures) Map Reduce CS 61C: Great Ideas in Computer Architecture (Machine Structures) Map Reduce 8/29/12 Instructors Krste Asanovic, Randy H. Katz hgp://inst.eecs.berkeley.edu/~cs61c/fa12 Fall 2012 - - Lecture #3 1 Today

More information

Introduction to Mobile Robotics Multi-Robot Exploration

Introduction to Mobile Robotics Multi-Robot Exploration Introduction to Mobile Robotics Multi-Robot Exploration Wolfram Burgard, Cyrill Stachniss, Maren Bennewitz, Kai Arras Exploration The approaches seen so far are purely passive. Given an unknown environment,

More information

Main Points. Address Transla+on Concept. Flexible Address Transla+on. Efficient Address Transla+on

Main Points. Address Transla+on Concept. Flexible Address Transla+on. Efficient Address Transla+on Address Transla+on Main Points Address Transla+on Concept How do we convert a virtual address to a physical address? Flexible Address Transla+on Segmenta+on Paging Mul+level transla+on Efficient Address

More information