Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques
|
|
- Kory McCoy
- 6 years ago
- Views:
Transcription
1 Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques
2 What is testing? ing is the process of emonstrating that errors are not present. The purpose of testing is to show that a program performs its intene functions correctly. ing is the process of establishing confience that a system oes what it is suppose to o. ing is the process of fining errors.
3 Why o we nee a technique? A test technique / test strategy is use to generate tests An effective technique fins bugs ing techniques are base on requirements
4 Example: Car interior lighting system Customer requirements List of requirements: By opening the oor of the car, the interior light shoul be turne on If the oor stays open, the light keeps lightening for half an hour If the oor is close, the interior light will stay on another 15 secons an then it shoul fae out in 3 secons 4
5 Example: Car interior lighting system Automotive requirements open oor 30 min close oor OFF (Default) open oor 15 sec open oor Fae out 3 sec 5
6 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
7 Transaction Flow Moeling Technique s Description Transaction flows are a representation of the system states from the user point of view Ientifies all branches, loops, queues an processes that communicate by messages an efines test cases for these How to use it? You nee a sufficient number of transaction flowcharts to cover all possible transactions Select a sufficient number of paths through those transaction flows to assure complete coverage (every link an every ecision is being exercise at least once) 7
8 Transaction Flow Moeling Technique s Implementation Example One transaction flowchart 1 path = 1 test specification Many paths or combinations of paths to be teste OFF (Default) 1 30 min sec Q: what if a path fails? A = an example of a single path B = an example of a combination of paths 7 Fae out 3 sec 3 A OFF (Default) min 15 sec Fae out 3 sec 30 min 15 sec 30 min Fae out 3 sec OFF (Default) B OFF (Default) OFF (Default) min min 15 sec 15 sec Fae out 3 sec 30 min OFF (Default) Fae out 3 sec 30 min Fae out 3 sec OFF (Default) 8
9 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
10 All Roun-Trip Paths Technique s Description Use to traverse the graph (state machine) an to generate a transition tree Attempts to exercise roun trip paths Covers 100% of the paths roun trip paths = paths that start an en in the same state How to use it? Follow a path an when you meet again a previous state STOP an recor that path Create a test case for every resulte path 10
11 All Roun-Trip Paths Technique s Implementation Example OFF (Default) 30 min 30 min OFF (Default) 15 sec 30 min 1 15 sec Fae out 3 sec OFF (Default) 2 Fae out 3 sec 30 min 3 Fae out 3 sec 30 min 4 OFF (Default) 5 5 paths resulte with this technique => 5 test specifications (DOORS) If one path fails the other paths can pass 11
12 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
13 Loop ing Technique s Description Repetitive processes are ifficult to start or stop correctly Is effective for most graph moels that have loops loops = paths that en where they have starte How to use it? Set preconitions to start a loop Repeat loop N times Check if the results are the same after every cycle N = a etermine number 13
14 Loop ing Technique s Implementation Example Preconition Open oor: set state 30 min Description OFF (Default) 30 min 15 sec 1) Close oor: set state 15 sec 2) Wait 15 sec: set state Fae out 3 sec Fae out 3 sec 3) Open oor: set state 30 min 4) Repeat steps 1, 2, 3 for N times (N = 3) Expecte Result System is in state 30 min the interior light is on for 30 minutes 14
15 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
16 Data Flow ing Technique s Description A ata prouce in one state is expecte to be use later Information receive by a receiving state Rx has to be the same as the one sent from the transmission state Tx Information that passes from state to state is creating a ata flow State 1 i State 2 How to use it? Transmit a ata package from one state to another state Check if the information that arrives at the receiving state is correct by the action that state takes 16
17 Data Flow ing Technique s Implementation Example New requirement ae: If the light is an ignition is an the oor is close the light shoul fae out in 3 secons oor open oor close light on fae out light light off 30 min time elapse ignition on OFF (Default) 15 sec Fae out 3 sec 17
18 Data Flow ing Technique s Implementation Example 30 min 15 sec Fae out 3 sec OFF (Default) serial bus i Ignition on ata shoul be sent from state 30 min to state Fae out 3 sec through state 15 sec which is bypassing the timer
19 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
20 Equivalence Partitioning Technique s Description The input of a omain is ivie in classes of ata How to use it? The preconition is to etermine what type of input is: a value, a range, etc. Divie the input in classes, name partitions They can be: for a value, one vali an two invali partitions for a range, one vali an two invali partitions for a member of a set, one vali an one invali partition for a Boolean value, one vali an one invali partition 20
21 Equivalence Partitioning Technique s Implementation Example Time value set in EEPROM [min] invali partition vali partition invali partition Range of values that are possible to be use: [10 60] minutes All values are ivie in 3 partitions Diviing the range of values gives us the number of tests that can be mae for the bounary value analysis technique 21
22 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
23 Bounary Value Analysis Technique s Description Base on the partitions that where etermine with equivalence partitioning technique, we can etermine the tests that we have to make Bounaries an values aroun them are teste Example for 3 partitions: min-1 min min+1 max-1 max max+1 How to use it? Determine the bounary values an the values aroun them Create a test case for every relevant value Use these values to set preconitions Measure results to be accoringly with the pre-set values 23
24 Bounary Value Analysis Technique s Implementation Example Time value set in EEPROM [ ( ) ] [min] z1 < <= x <= 60 z2 > 60 Preconition 1) EEPROM time value is set to 9 2) Set state 1) EEPROM time value is set to 10 2) Set state 24 Description 1) Check light an start stopwatch 2) Stop stopwatch when light is OFF 1) Check light an start stopwatch 2) Stop stopwatch when light is OFF Expecte Result Light is for X minutes (Resolution = 1) Light is for 10 minutes (Resolution = 1)
25 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
26 Regression ing Technique s Description In a system a new feature is implemente ing the newer version of the system by using the same test cases of the previous version of the system, for the features that are not change How to use it? the system by using the test cases that alreay exist Write new test cases for the omains that inclue the new features Other testing methos can be use to cover all failure possibilities of the system Use the new test cases an test the system further on 26
27 Regression ing Technique s Implementation Example If the requirements were change by aing the Ignition / OFF conition, new tests have to be ae to the specifications The functionality of the system is change with aitional conitions, but the test cases mae for the first version can be reuse For example, the tests mae with All roun-trip paths technique are vali an can be reuse Ignition OFF Ignition For the new feature ae to the system, new test cases have to be create incluing the latest conitions OFF (Default) 30 min ( && ) 15 sec Fae out 3 sec 27
28 Positive vs. Negative ing Techniques comparison Positive ing giving as input vali ata Negative ing giving as input invali ata vali ata SYSTEM invali ata SYSTEM Remark: All tests that have been mae until now are examples of positive testing 28
29 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
30 Negative ing Technique s Description Defining as input an invali ata How to use it? Check the preconitions of the system Define some input values that coul appear, but are unspecifie an seem to be invali for the system Write test cases that uses those values as inputs 30
31 Negative ing Technique s Implementation Example After a complete cycle with the oor open the system is back to it s efault state OFF 30 min Then the oor is close There is nothing specifie in the requirements about this Q: What oes the system shoul o? OFF (Default) Fae out 3 sec 15 sec Preconition Open the oor an let it open for 31 minutes (until light goes OFF) Description 1) Close the oor 2) Check interior light Expecte Result The light shoul NOT turn after the oor is close 31
32 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
33 Error Guessing Technique s Description Base on experience an jugment of the tester Is the art of fining hien errors How to use it? Explore systems functionality Think where a location for an error coul be The errors prouce are mostly place in exceptional places The errors are actions that aren t specifie or unusual accesse 33
34 Error Guessing Technique s Implementation Example After one cycle with the oor open the system is back to it s efault state OFF Then the system is reset Q: Interior light is set to or it shoul stay in OFF state? Cycle 1 Cycle after reset OFF (Default) 30 min 15 sec Fae out 3 sec Preconition Open the oor an let it open for 31 minutes (until light goes OFF) Description 1) Reset system 2) Check interior light Expecte Result The light shoul turn if: oor open & Reset 34
35 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
36 Error Hanling ing Technique s Description A system shoul recognize an locate the error Initial State Error State 36
37 Error Hanling ing Technique s Implementation Example New requirement ae: The system shoul etect an save a DTC (Diagnostic Trouble Coe) if the light bulb is burne I A DTC If current I is 0 Amps then the DTC shoul set 37
38 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
39 Recovery ing Technique s Description A system shoul recover from it s error state to it s initial state Initial State Error State 39
40 Recovery ing Technique s Implementation Example For example, an error coul appear if the bulb is burne or if a shortcircuit was prouce The system nees to locate this error an to announce that the interior lighting system has a problem OFF (Default) 30 min DTC is not active DTC is active Next State Afterwars the bulb is replace with a goo one The system is restarte This time, the error shouln t appear anymore - the system has to recover 40
41 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
42 Stress ing Technique s Description Requires to hol the system in continuous action for a long time System shoul perform uner normal conitions, but it shoul perform uner extreme conitions, too How to use it? Repeating actions repeate times, without giving the system any breaks Every tact the system shoul process something 42
43 Stress ing Technique s Implementation Example ing the timer for the 15 sec state for 100 cycles 30 min OFF (Default) 15 sec Fae out 3 sec Preconition System is in OFF (Default) moe Description 1) Open oor (1s) 2) Close oor (1s) 3) Wait 15s 4) Check light status to be 5) Wait 3s 6) Check light status to be OFF 7) Repeat steps times Expecte Result Time while light is before is completely OFF (fae out) is 20s for every cycle
44 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
45 Loa ing Technique s Description Putting heavy eman on a system Ientifies the maximum operating capacity of a system Error conitions are the expecte result How to use it? Determine maximum operating capacity Entertain the system with continuous actions over capacity Expect errors when the system is high emane
46 Loa ing Technique s Implementation Example New requirement ae: The maximum power of the lamp is 15W 15W 20W Preconition 5W lamp is mounte Description Set state 30 min Expecte Result System functions correctly 10W (efault) lamp is mounte 15W lamp is mounte 20/25/30W lamp is mounte Set state 30 min System functions correctly Set state 30 min System functions correctly Set state 30 min System not functioning / relay is amage
47 Summary ing Techniques Transaction Flow Moeling All Roun-Trip Paths Loop ing Data Flow ing Equivalence Partitioning Bounary Value Analysis Regression ing Negative ing Error Guessing Error Hanling ing Recovery ing Stress ing Loa ing
Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationLab work #8. Congestion control
TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño
More informationFigure 1: Schematic of an SEM [source: ]
EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More information6.823 Computer System Architecture. Problem Set #3 Spring 2002
6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem
More informationEDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks
sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationSolutions to Tutorial 1 (Week 8)
The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two
More informationRecitation Caches and Blocking. 4 March 2019
15-213 Recitation Caches an Blocking 4 March 2019 Agena Reminers Revisiting Cache Lab Caching Review Blocking to reuce cache misses Cache alignment Reminers Due Dates Cache Lab (Thursay 3/7) Miterm Exam
More informationProbabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients
Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter
More informationHandling missing values in kernel methods with application to microbiology data
an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationFrom imagination to impact
From imagination to impact Kernel Design for Isolation an Assurance of Physical Memory Dhammika Elkauwe Philip Derrin Kevin Elphinstone Embee Systems Increasing functionality Increasing software complexity
More informationCS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics
CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,
More information1 Surprises in high dimensions
1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic
More informationNEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationOverview Capturing Still Images Recording Videos Various Features Advanced Features
Overview... - Viewfiner Inicators... -3 Switching s... -5 Capturing Still Images... -6 Capturing Still Images... -6 Recoring Vieos... -8 Recoring Vieos... -8 Various Features... -0 Using Smile Moe... -0
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationLocal Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction
Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut
More informationMODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services
MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationNew Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction
New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationDEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR
Mechanical Testing an Diagnosis ISSN 2247 9635, 2012 (II), Volume 4, 28-36 DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR Valentina GOLUBOVIĆ-BUGARSKI, Branislav
More informationI DT MC. Operating Manual SINAMICS S120. Verification of Performance Level e in accordance with EN ISO
I DT MC Operating Manual SINAMICS S20 Verification of Performance Level e in accorance with EN ISO 3849- Document Project Status: release Organization: I DT MC Baseline:.2 Location: Erl. F80 Date: 24.09.2009
More informationData Mining: Clustering
Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity
More informationChapter 5 Proposed models for reconstituting/ adapting three stereoscopes
Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,
More informationLearning Subproblem Complexities in Distributed Branch and Bound
Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University
More informationChapter 9 Memory Management
Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory
More information1. What is a Map (or Function)? Maps. CITS2200 Data Structures and Algorithms. Some definitions... Topic 16
1. What is a Map (or Function)? CITS2200 Data Structures an Algorithms Topic 16 Maps Definitions what is a map (or function)? Specification List-base representation (singly linke) Sorte block representation
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationShift-map Image Registration
Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy
More informationArchitecture Design of Mobile Access Coordinated Wireless Sensor Networks
Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,
More informationFeature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory
Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationRough Set Approach for Classification of Breast Cancer Mammogram Images
Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems
More informationCMSC 430 Introduction to Compilers. Spring Register Allocation
CMSC 430 Introuction to Compilers Spring 2016 Register Allocation Introuction Change coe that uses an unoune set of virtual registers to coe that uses a finite set of actual regs For ytecoe targets, can
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationMODULE VII. Emerging Technologies
MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking
More informationModifying ROC Curves to Incorporate Predicted Probabilities
Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,
More informationVerifying performance-based design objectives using assemblybased vulnerability
Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA
More informationKindly read through the below instruction set and guidelines prior filling in your DPD Registration application for
Dear Value DPD Customer, Kinly rea through the low instruction set guielines prior filling in your DPD Registration application registering with our Terminal 1 take a print out of the PDF file name DPDREG-NSICT
More informationLearning Polynomial Functions. by Feature Construction
I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate
More informationSE-330 SERIES (NEW REVISION) IEC INTERFACE
Tel: +1-800-832-3873 E-mail: techline@littelfuse.com www.littelfuse.com/se-330 SE-330 SERIES (NEW REVISION) IEC 61850 INTERFACE Revision 0-C-121117 Copyright 2018 Littelfuse Startco Lt. All rights reserve.
More informationSupporting Fully Adaptive Routing in InfiniBand Networks
XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar
More informationCS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing
CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which
More informationDepth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique
17th Worl Conference on Nonestructive Testing, 5-8 Oct 008, Shanghai, China Depth Sizing of Surface Breaking Flaw on Its Open Sie by Short Path of Diffraction Technique Hiroyuki FUKUTOMI, Shan LIN an Takashi
More informationProblem Paper Atoms Tree. atoms.pas. atoms.cpp. atoms.c. atoms.java. Time limit per test 1 second 1 second 2 seconds. Number of tests
! " # %$ & Overview Problem Paper Atoms Tree Shen Tian Harry Wiggins Carl Hultquist Program name paper.exe atoms.exe tree.exe Source name paper.pas atoms.pas tree.pas paper.cpp atoms.cpp tree.cpp paper.c
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationUnit 15. Building Wide Muxes. Building Wide Muxes. Common Hardware Components WIDE MUXES
5. 5.2 Unit 5 Common Harware Components WIE MUXE 5.3 5.4 Builing Wie Muxes Builing Wie Muxes o far muxesonly have single bit inputs I is only -bit I is only -bit What if we still want to select between
More informationFigure 1: 2D arm. Figure 2: 2D arm with labelled angles
2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of
More informationELECTRONIC SCALE WB-380. Instruction manual
ELECTRONIC SCALE WB-380 Instruction manual Temperature Range for Use : 5 C 35 C Relative Humiity : 30% 80% (without conensation) Temperature Range of Environment :
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationA Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition
ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural
More informationAn Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach
An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationMidterm Exam. ECE 448 Spring Wednesday Section. (15 points)
Miterm Exam ECE 448 Spring 2 Wenesay Section (5 points) Instructions: Please rea this entire ocument carefully before beginning! Zip all your eliverables into an archive .zip an submit it through
More informationAppearance Sensing distance Output configuration Operation mode Model. Appearance Sensing distance Output configuration Operation mode Model
Spatter-resistant Proximity Sensor EEQ CSM_EEQ_DS_E Spatter-resistant Fluororesincoate Proximity Sensor Superior spatter resistance. Long Sensing-istance s ae for sensing istances up to mm. Pre-wire Smartclick
More informationEstimating Velocity Fields on a Freeway from Low Resolution Video
Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationEvolutionary Optimisation Methods for Template Based Image Registration
Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South
More informationHow to Make E-cash with Non-Repudiation and Anonymity
How to Make E-cash with Non-Repuiation an Anonymity Ronggong Song an Larry Korba Institute for Information Technology National Research Council of Canaa Ottawa, Ontario K1A 0R6, Canaa {Ronggong.Song, Larry.Korba}@nrc.ca
More informationTopics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved.
Topics Internet concept an architecture Internet aressing Internet Protocol packets (atagrams) Datagram forwaring Aress resolution Error reporting mechanism Configuration Network aress translation Computer
More informationImproving Performance of Sparse Matrix-Vector Multiplication
Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationProving Vizing s Theorem with Rodin
Proving Vizing s Theorem with Roin Joachim Breitner March 25, 2011 Proofs for Vizing s Theorem t to be unwiely unless presente in form a constructive algorithm with a proof of its correctness an termination.
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationIndicator i 20. User manual
Inicator i 20 WWW.PRECIAMOLEN.COM User manual 04-50-00-1 MU / 10/2012 Contents 1. Forewor... 5 Documentary conventions... 5 Pictograms... 5 Terminology an abbreviations... 5 Aitional ocumentation... 5
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University
More informationEFFICIENT STEREO MATCHING BASED ON A NEW CONFIDENCE METRIC. Won-Hee Lee, Yumi Kim, and Jong Beom Ra
th European Signal Processing Conference (EUSIPCO ) Bucharest, omania, August 7-3, EFFICIENT STEEO MATCHING BASED ON A NEW CONFIDENCE METIC Won-Hee Lee, Yumi Kim, an Jong Beom a Department of Electrical
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationWaleed K. Al-Assadi. Anura P. Jayasumana. Yashwant K. Malaiya y. February Colorado State University
Dierential I DDQ Testable Static RAM Architecture Walee K. Al-Assai Anura P. Jayasumana Yashwant K. Malaiya y Technical Report CS-96-102 February 1996 Department of Electrical Engineering/ y Department
More informationOverview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links
Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular
More informationVideo-based Characters Creating New Human Performances from a Multi-view Video Database
Vieo-base Characters Creating New Human Performances from a Multi-view Vieo Database Feng Xu Yebin Liu? Carsten Stoll? James Tompkin Gaurav Bharaj? Qionghai Dai Hans-Peter Seiel? Jan Kautz Christian Theobalt?
More informationPositions, Iterators, Tree Structures and Tree Traversals. Readings - Chapter 7.3, 7.4 and 8
Positions, Iterators, Tree Structures an Reaings - Chapter 7.3, 7.4 an 8 1 Positional Lists q q q q A position acts as a marker or token within the broaer positional list. A position p is unaffecte by
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationMODULE II. Network Programming And Applications
MODULE II Network Programming An Applications Computer Networks an Internets -- Moule 2 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Internet services an communication paraigms Client-server
More information6 Gradient Descent. 6.1 Functions
6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output
More informationContributing to safety and due diligence in safety-critical interactive systems development
Contributing to safety an ue iligence in safety-critical interactive systems evelopment Harol Thimbleby Future Interaction Technology Lab Swansea University Wales harol@thimbleby.net ABSTRACT Interaction
More informationNavigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar
Navigation Aroun an nknown Obstacle for Autonomous Surface Vehicles sing a Forwar-Facing Sonar Patrick A. Plonski, Joshua Vaner Hook, Cheng Peng, Narges Noori, Volkan Isler Abstract A robotic boat is moving
More informationUC Santa Cruz UC Santa Cruz Previously Published Works
UC Santa Cruz UC Santa Cruz Previously Publishe Works Title Towars Loop-Free Forwaring of Anonymous Internet Datagrams that Enforce Provenance Permalink https://escholarship.org/uc/item/5376h1mm Author
More informationA Novel Density Based Clustering Algorithm by Incorporating Mahalanobis Distance
Receive: November 20, 2017 121 A Novel Density Base Clustering Algorithm by Incorporating Mahalanobis Distance Margaret Sangeetha 1 * Velumani Paikkaramu 2 Rajakumar Thankappan Chellan 3 1 Department of
More informationRaster Graphics Algorithms
Overview of Grahics Pieline Raster Grahics Algorithms D scene atabase traverse geometric moel transform to worl sace transform to ee sace scan conversion Line rasterization Bresenham s Mioint line algorithm
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationA Framework for Dialogue Detection in Movies
A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki
More informationComputer Graphics Inf4/MSc. Computer Graphics. Lecture 6 View Projection Taku Komura
Computer Graphics Lecture 6 View Projection Taku Komura 1 Overview 1. View transformation 2. Rasterisation Implementation of viewing. Transform into camera coorinates. Perform projection into view volume
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationDense Disparity Estimation in Ego-motion Reduced Search Space
Dense Disparity Estimation in Ego-motion Reuce Search Space Luka Fućek, Ivan Marković, Igor Cvišić, Ivan Petrović University of Zagreb, Faculty of Electrical Engineering an Computing, Croatia (e-mail:
More informationAppearance Sensing distance Output configuration Operation mode Model. Appearance Sensing distance Output configuration Operation mode Model
Spatter-resistant Proximity Sensor EEQ CSM_EEQ_DS_E Spatter-resistant Fluororesincoate Proximity Sensor Superior spatter resistance. Long Sensing-istance s ae for sensing istances up to mm. DC -Wire s.
More information