Data diverse software fault tolerance techniques

Size: px
Start display at page:

Download "Data diverse software fault tolerance techniques"

Transcription

1 Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the same software o those poits i the program data space, ad the usig a decisio algorithm to determie the resultig output Uses data re-expressio expressio algorithms (DRA) to obtai their iput data

2 Data diverse software fault tolerace techiques Retry block (RtB) N-copy programmig (NCP) Two-pass adjudicators (TPA)

3 Retry blocks (RtB) Categorized as a dyamic techique Data diverse complemet of RcB Uses acceptace tests ad backward recovery to accomplish fault tolerace Typically uses oe DRA, oe algorithm, ad a watch dog timer (WDT)

4 RtB operatio esure by else by else by else by else Acceptace Test Primary Algorithm (Origial Iput) Primary Algorithm (Re-expressed expressed Iput) Primary Algorithm (Re-expressed expressed Iput) [Deadlie Expires] Backup Algorithm (Origial Iput) failure exceptio

5 RtB structure ad operatio RtB etry Establish checkpoit Execute algorithm Yes New DRA exists ad deadlie ot expired No Exceptio sigals Evaluate AT Fail Restore checkpoit Ivoke backup Pass Discard checkpoit Pass Evaluate AT for backup RtB exit Fail Failure exceptio

6 Abbreviatios AT: Acceptace test ATB: Acceptace test for the backup (may be the same as AT) B: Backup algorithm DRA i : Data re-expressio expressio algorithm i (whe there are multiple DRA, or the i th re-expressio expressio of the iput if a sigle DRA is used) P: Primary algorithm RtB: Retry block WDT: Watchdog timer WP: Expected maximum wait time for a acceptable result from P

7 Failure-free operatio Upo etry to the RtB, the executive performs the followig: a checkpoit (or recovery poit) is established, a call to P is formatted, ad the WDT is set to WP P is executed. No exceptio or time-out occurs durig executio of P The results of P are submitted to the AT P s s results are o time ad pass the AT Cotrol returs to the executive The executive discards the checkpoit, clears the WDT, the results are passed outside the RtB, ad the RtB is exited

8 Exceptio i primary algorithm Upo etry to the RtB, the executive performs the followig: a checkpoit c (or recovery poit) is established, a call to P is formatted, ad d the WDT is set to WP P is executed. A exceptio occurs durig executio of P Cotrol returs to the executive. The executive checks to esure the deadlie for acceptable results has ot expired ad checks if there is a DRA optio available that has ot bee attempted o this iput The executive restores the checkpoit, the calls the DRA with the t origial iput data as its argumet The executive formats a call to P usig the re-expressed expressed iput P is executed. No exceptio or time-out occurs durig executio of P with the re-expressed expressed iput The result of P are submitted to the AT P s s results are o time ad pass the AT Cotrol returs to the executive The executive discards the checkpoit, clears the WDT, the results are passed outside the RtB, ad the RtB is exited

9 Primary s s results are o time, but fail AT, successful executio with re-expressed expressed iputs Upo etry to the RtB, the executive performs the followig: a checkpoit c (or recovery poit) is established, a call to P is formatted, ad the e WDT is set to WP P is executed. No exceptio or time-out occurs durig executio of P with the re- expressed iput The result of P are submitted to the AT P s s results fail the AT Cotrol returs to the executive. The executive checks to esure the deadlie for acceptable results has ot expired ad checks if there is a DRA optio available that has ot bee attempted o this iput The executive restores the checkpoit, the calls the DRA with the t origial iput data as its argumet The executive formats a call to P usig the re-expressed expressed iput P is executed. No exceptio or time-out occurs durig executio of P with the re- expressed iput The result of P are submitted to the AT P s s results are o time ad pass the AT Cotrol returs to the executive The executive discards the checkpoit, clears the WDT, the results are passed outside the RtB, ad the RtB is exited

10 All data re-expressio expressio algorithms are used without success; successful backup executio P s s results fail the AT Cotrol returs to the executive. The executive checks to esure the deadlie for acceptable results has ot expired ad checks if there is a DRA optio available that has ot bee attempted o this iput The executive restores the checkpoit, the calls the DRA 2 with the origial iput data as its argumet The executive formats a call to P usig the re-expressed expressed iput P is executed. No exceptio or time- out occurs durig executio of P with the re-expressed expressed iput The result of P are submitted to the AT P s s results are o time but fail the AT Cotrol returs to the executive. The executive checks to esure the deadlie for acceptable results has ot expired ad checks if there is a DRA optio available that has ot bee attempted o this iput The executive restores the checkpoit, formats a call to the backup, B, usig the origial iputs, ad ivokes B B is executed. No exceptio occurs durig executio of B The result of B are submitted to the ATB B s s results are o time ad pass the ATB Cotrol returs to the executive The executive discards the checkpoit, clears the WDT, the results are passed outside the RtB, ad the RtB is exited

11 All data re-expressio expressio algorithms are used without success; backup executes, but fails ATB Cotrol returs to the executive. The executive checks to esure the deadlie for acceptable results has ot expired ad checks if there is a DRA optio available that has ot bee attempted o this iput The executive restores the checkpoit, formats a call to the backup, B, usig the origial iputs, ad ivokes B B is executed. No exceptio occurs durig executio of B The result of B are submitted to the ATB B s s results are o time, but fail the ATB Cotrol returs to the executive The executive discards the checkpoit, clears the WDT; a failure exceptio is raised, ad the RtB is exited

12 Augmetatios to RtB operatio Use a DRA executio couter Used whe the primary fails o the origial iput ad primary executio is attempted with re-expressed expressed iputs Idicates the maximum umber of times to execute the primary with differet re-expressed expressed iputs Provides the ability to have a meas of imposig a deadlie without usig a timer Use a more detailed AT comprised of several tests

13 Multiuse sigle vs. multiple data re-expressio expressio algorithms 1st use of DRA durig executio withi RtB block x x DRA DRA 1 th use of DRA durig executio withi RtB block x x DRA DRA DRA(x) 1 DRA 1 (x) 1 2d use of DRA durig executio withi RtB block x x DRA(x) DRA(x) j DRA(x) k, j k DRA (x) DRA i (x) j DRA i (x) k, j k DRA DRA 2 DRA(x) 2 DRA 2 (x) 2

14 RtB example x ad y are measured by sesors with a tolerace of The origial program should ot receive a iput of x=0.0 because of the ature of the algorithm (our assumptio) y x Potetial divide-by-zero error domai

15 RtB example (1e -10, 2.2) (1e , 2.2) Checkpoit Primary algorithm f(x,y) Divide-by-zero error usig origial iputs Restore checkpoit usig reexpressed iputs AT: f(x,y) DRA 1: R1(x) = x Pass

16 RtB issues ad discussio (-)) Time overhead (-)) Service is iterrupted durig recovery (+) It is aturally applicable to software modules, as opposed to whole systems (same as RcBs) The success of data diverse software fault tolerace techiques depeds o the performace of the re- expressio algorithm used Actually, selectio of DRA is more importat tha selectio of the approach! (-)) DRAs are very applicatio depedet Not easy to automate them! (-)) Ca suffer from domio effect (hope you remember it?)

17 N-copy programmig (NCP) Categorized as a static techique Data diverse complemet of NVP Use DM ad forward recovery to accomplish fault tolerace

18 NCP programmig operatio ru DRA 1, DRA 2,,, DRA ru Copy 1 (result of DRA 1), Copy 2 (result of DRA 2),, Copy (result of DRA ) if (Decisio Mechaism (Result 1, Result 2,,, Result )) retur Result else failure exceptio

19 NCP structure ad operatio NCP etry Distribute iputs DRA 1 DRA 2 DRA Copy 1 Copy 2 Copy Gather results Output selected DM Exceptio raised NCP exit Failure exceptio

20 Abbreviatios C i : Copy i DM: Decisio mechaism DRA i : Data re-expressio expressio algorithm i : The umber of copies NCP: N-copy N programmig R i : Results of C i x: Origial iput y i : Re-expressed expressed iput, y i = DRA i (x)

21 Failure-free operatio Upo etry to NCP, the executive seds the iput, x, to the DRA to be re-expressed expressed The DRA ru their re-expressio expressio algorithms o x, yieldig the re- expressed iputs y i = DRA i (x) The executive gathers the re-expressed expressed iput, formats calls to the copies ad through those calls distributes the re-expressed expressed iputs to the copies Each copy, C i, executes. No failures occur durig their executio The results of the copy executios (R i ) are gathered by the executive ad submitted to the exact majority DM The R i are equal to oe aother, so the DM selects R2 (radomly, sice the results are equal), as the correct result Cotrol returs to the executive The executive passes the correct result outside the NCP, ad the NCP module is exited

22 Failure sceario icorrect results Upo etry to NCP, the executive seds the iput, x, to the DRA to be re-expressed expressed The DRA ru their re-expressio expressio algorithms o x, yieldig the re-expressed expressed iputs y i = DRA i (x) The executive gathers the re-expressed expressed iput, formats calls to the copies ad through those calls distributes the re-expressed expressed iputs to the copies Each copy, C i, executes The results of the copy executios (R i ) are gathered by the executive ad submitted to the exact majority DM Noe of the R i are equal. The DM caot determie a correct result, ad it sets a flag idicatig this fact Cotrol returs to the executive The executive raises a exceptio ad the NCP module is exited

23 Failure sceario copy does ot execute Upo etry to NCP, the executive seds the iput, x, to the DRA to be re-expressed expressed The DRA ru their re-expressio expressio algorithms o x, yieldig the re- expressed iputs y i = DRA i (x) The executive gathers the re-expressed expressed iput, formats calls to the copies ad through those calls distributes the re-expressed expressed iputs to the copies The copies, C i, begi executio. Oe of more copies do ot complete executio for some reaso (e.g., stuck i a edless loop) op) The executive caot retrieve all copy results i a timely maer. The executive submits the results it does have to the DM The DM expects results, but receives -1 1 (or, -2, etc) results. The basic exact majority voter caot hadle fewer tha results ad sets a flag idicates its failure to select a correct result Cotrol returs to the executive The executive raises a exceptio ad the NCP module is exited

24 Augmetatios to NCP operatio Usig a differet DM tha the basic majority voter (such as?) Votig o the results as each copy completes executio as opposed to waitig o all copies to complete Combiatio with other techiques

25 NCP example x ad y are measured by sesors with a tolerace of The origial program should ot receive a iput of x=0.0 because of the ature of the algorithm y x Potetial divide-by-zero error domai

26 NCP example Distribute iputs (1e -10, 2.2) DRA 1: Pass-through R 1 (x)=x DRA 2: R 2 (x)=x DRA 3: R 3 (x)=x (1e -10, 2.2) ( e -10, 2.2) ( e -10, 2.2) Copy 1: f(x,y) Copy 2: f(x,y) = Copy 3: f(x,y) = divide-by-zero error ø DM: Majority tolerace Δ= = 0.51<

27 NCP example Upo etry to NCP, the executive seds the iput, (1e -10, 2.2), to the three DRAs to be re-expressed expressed The DRAs ru their re-expressio expressio algorithms o the iput yieldig the followig re-expressed expressed iputs: DRA 1 (1e -10, 2.2) = (1e -10, 2.2) Pass-through DRA DRA 2 (1e -10, 2.2) = ( e -10, 2.2) DRA 3 (1e -10, 2.2) = ( e -10, 2.2) The executive gathers the re-expressed expressed iputs, formats calls to the =3 copies ad through those calls distributes the re-expressed expressed iputs to the copies Each copy, C i (i=1,2,3), executes The results of the copy executios (r( i, i=1, ) are gathered by the executive ad submitted to the DM The DM examies the results. The adjudicated result is (radomly selected from those copy results matchig withi the tolerace) Cotrol returs to the executive The executive passes the correct result, , outside the NCP,, ad the NCP module is exited

28 NCP issues ad discussio The fault tolerace of a system employig data diversity depeds upo the ability of the DRA to produce data poits outside a failure regio, give a iitial data poit that is withi a failure regio Oe way to improve the performace of NCP is to use DMs that are appropriate for the problem solutio domai (e.g., cosesus votig)

29 Two-pas adjudicators (TPA) Combiatio of data ad desig diverse software fault tolerace techiques Also a combiatio of static ad dyamic techiques The hardware fault tolerace architecture related to the techique is N-modular N redudacy Uses DM, ad both forward ad backward recovery Operates like NVP uless ad util the DM caot determie a correct result give the variat results

30 TPA operatio Pass 1: ru Variat 1 (origial iput), Variat 2 (origial iput),, Variat (origial iput) if (Decisio Mechaism (Result(Pass 1, Variat 1), Result(Pass 1, Variat 2),, Result(Pass 1, Variat ) retur Result else Pass 2: ru DRA 1, DRA 2,,, DRA ru Variat 1(result of DRA 1), Variat 2(result of DRA 2),, Variat (result of DRA ) if (Decisio Mechaism (Result(Pass 2, Variat 1), Result(Pass 2, Variat 2),, Result(Pass 2, Variat ) retur Result else failure exceptio

31 Abbreviatios V i : Variat i, i=1,,, DM: Decisio mechaism DRA i : Data re-expressio expressio algorithm i : The umber of variats TPA: Two-pass adjudicator Rk i : Result of Vi for Pass k, i=1,,;,; k=1,2 x: Origial iput y i : Re-expressed expressed iput, y i = DRA i (x), i=1,,,

32 TPA structure ad operatio TPA etry Clear re-expressio flag, store ad distribute iputs Variat 1 Variat 2 Variat Gather results Re-express iputs, set re-expressio flag Yes Perform postexecutio adjustmet of results, if ecessary Formal majority voter Formal majority voter No Noe selected Output selected Data reexpressed? Yes No Multiple correct or icorrect results TPA exit Failure exceptio

33 Failure-free operatio Upo etry to the TPA, the executive sets the re- expressio flag to 0 (idicatig that these iputs are origial), stores the origial iputs, formats calls to the variats, ad through those calls distributes the iputs Each variat, V i, executes. No failures occur durig their executio The results of the Pass 1 variat executios (R 1i, i=1,,),) are gathered by the executive ad submitted to the tolerace DM The R 1i are equal to oe aother, so the DM selects R 12 (radomly, sice the results are equal), as the correct result Cotrol returs to the executive The executive passes the correct result outside the TPA, ad the TPA module is exited

34 Partial failure sceario icorrect results o first pass The R 1i differ sigificatly from oe aother. The DM caot determie a correct result, ad it sets a flag idicatig this fact Cotrol returs to the executive. The executive checks the re-expressio expressio flag to see if the iputs have bee re-expressed. expressed. They have ot The executive retrieves the stored iput, x, seds it to the DRA D to be re-expressed expressed (via a exact DRA), ad sets the re-expressio expressio flag to 1 (idicatig the iput has bee re-expressed) expressed) The DRA ru their re-expressed expressed algorithms o x, yieldig the re-expressed expressed iputs y i = DRA i (x) The executive gathers the re-expressed expressed iput, formats calls to the variats ad through those calls distributes the re-expressed expressed iputs to the variats Each variat, V i, executes The results of the Pass 2 variat executios (R 2i, i=1,,),) are gathered by the executive ad submitted to the tolerace DM The R 2i are equal to oe aother, so the DM selects R 23 (radomly, sice the results are equal), as the correct result Cotrol returs to the executive The executive passes the correct result outside the TPA, ad the TPA module is exited

35 Failure-sceario icorrect results o both passes The R 1i differ sigificatly from oe aother. The DM caot determie a correct result, ad it sets a flag idicatig this fact Cotrol returs to the executive. The executive checks the re-expressio expressio flag to see if the iputs have bee re-expressed. expressed. They have ot The executive retrieves the stored iput, x, seds it to the DRA D to be re-expressed expressed (via a exact DRA), ad sets the re-expressio expressio flag to 1 (idicatig the iput has bee re-expressed) expressed) The DRA ru their re-expressed expressed algorithms o x, yieldig the re-expressed expressed iputs y i = DRA i (x) The executive gathers the re-expressed expressed iput, formats calls to the variats ad through those calls distributes the re-expressed expressed iputs to the variats Each variat, V i, executes The results of the Pass 2 variat executios (R 2i, i=1,,),) are gathered by the executive ad submitted to the tolerace DM The R 1i differ sigificatly from oe aother. The DM caot determie a correct result, ad it sets a flag idicatig this fact Cotrol returs to the executive. The executive checks the re-expressio expressio flag to see if the iputs have bee re-expressed. expressed. They have bee The executive raises a exceptio ad the TPA module is exited

36 TPA ad MCR TPA is origially developed to hadle MCR Three coditios from which MCR arise Applicatios correctly resultig i multiple solutios Use of fiite-precisio arithmetic The existece of the CCP The TPA techique s s set of solutios Provides a solutio to the MCR problem Yields a higher probability tha the NVP majority voter of detectig ad selectig correct results icludig MCR Is relatively simple ad easy to uderstad ad implemet

37 MCR solutio category matrix System Type With History MCR Case Without History With Nocoverge t States With Coverget States Applicatio has MCR I II III Fiite-precisio IV V VI CCP VII VIII IX

38 Category I MCR case matrix System Embedded Close Use fiite-precisio detectio techiques Results Not Close/Distict Igore the curret frame. No eed to distiguish Stad-aloe aloe Use fiite-precisio detectio techiques Need to distiguish. Use data diverse techique

39 TPA example t=2.7 1 t=1.3 5 t=2.6 t=4.1 t=2.0 2 t=3.6 t= t=1.5

40 Routes meetig problem requiremets Route Cities Visited Total Time Commet A MCR B MCR C D E F G H

41 TPA example Cosider the case i which oe of the variats fails ad the resultig decisio vector is (A,B,C) Suppose the TPA category I detectio techique is used Data re-expressio expressio yields a iput domai outside the failure regio of variat 3 If data re-expressio expressio does ot yield a correct result ad result is (A,B,D) If user is i-the the-loop, results of each pass are output to the user, ad user ca see that it is likely that A ad B are correct If the user is ot i the loop, the a time-rage check o preferred maximum travel time ca be used Aother meas of selectig amog MCR is the use of a priori preferece or utility iformatio

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Enhancing Efficiency of Software Fault Tolerance Techniques in Satellite Motion System

Enhancing Efficiency of Software Fault Tolerance Techniques in Satellite Motion System Joural of Iformatio Systems ad Telecommuicatio, Vol. 2, No. 3, July-September 2014 173 Ehacig Efficiecy of Software Fault Tolerace Techiques i Satellite Motio System Hoda Baki Departmet of Electrical ad

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor Advanced Issues

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor Advanced Issues COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 4 The Processor Advaced Issues Review: Pipelie Hazards Structural hazards Desig pipelie to elimiate structural hazards.

More information

Using VTR Emulation on Avid Systems

Using VTR Emulation on Avid Systems Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit

More information

Chapter 4 The Datapath

Chapter 4 The Datapath The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Chapter 3. Floating Point Arithmetic

Chapter 3. Floating Point Arithmetic COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 3 Floatig Poit Arithmetic Review - Multiplicatio 0 1 1 0 = 6 multiplicad 32-bit ALU shift product right multiplier add

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization Ed Semester Examiatio 2013-14 CSE, III Yr. (I Sem), 30002: Computer Orgaizatio Istructios: GROUP -A 1. Write the questio paper group (A, B, C, D), o frot page top of aswer book, as per what is metioed

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria.

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria. Computer Sciece Foudatio Exam August, 005 Computer Sciece Sectio A No Calculators! Name: SSN: KEY Solutios ad Gradig Criteria Score: 50 I this sectio of the exam, there are four (4) problems. You must

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Review: The ACID properties

Review: The ACID properties Recovery Review: The ACID properties A tomicity: All actios i the Xactio happe, or oe happe. C osistecy: If each Xactio is cosistet, ad the DB starts cosistet, it eds up cosistet. I solatio: Executio of

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 20 Itroductio to Trasactio Processig Cocepts ad Theory Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Trasactio Describes local

More information

Recursion. Computer Science S-111 Harvard University David G. Sullivan, Ph.D. Review: Method Frames

Recursion. Computer Science S-111 Harvard University David G. Sullivan, Ph.D. Review: Method Frames Uit 4, Part 3 Recursio Computer Sciece S-111 Harvard Uiversity David G. Sulliva, Ph.D. Review: Method Frames Whe you make a method call, the Java rutime sets aside a block of memory kow as the frame of

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Cocurrecy Threads ad Cocurrecy i Java: Part 1 What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

Threads and Concurrency in Java: Part 1

Threads and Concurrency in Java: Part 1 Threads ad Cocurrecy i Java: Part 1 1 Cocurrecy What every computer egieer eeds to kow about cocurrecy: Cocurrecy is to utraied programmers as matches are to small childre. It is all too easy to get bured.

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Single-Cycle Disadvantages & Advantages COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 4 The Processor Pipeliig Sigle-Cycle Disadvatages & Advatages Clk Uses the clock cycle iefficietly the clock cycle must

More information

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS) CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Introduction. Nature-Inspired Computing. Terminology. Problem Types. Constraint Satisfaction Problems - CSP. Free Optimization Problem - FOP

Introduction. Nature-Inspired Computing. Terminology. Problem Types. Constraint Satisfaction Problems - CSP. Free Optimization Problem - FOP Nature-Ispired Computig Hadlig Costraits Dr. Şima Uyar September 2006 Itroductio may practical problems are costraied ot all combiatios of variable values represet valid solutios feasible solutios ifeasible

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Definitions. Error. A wrong decision made during software development

Definitions. Error. A wrong decision made during software development Debuggig Defiitios Error A wrog decisio made durig software developmet Defiitios 2 Error A wrog decisio made durig software developmet Defect bug sometimes meas this The term Fault is also used Property

More information

A graphical view of big-o notation. c*g(n) f(n) f(n) = O(g(n))

A graphical view of big-o notation. c*g(n) f(n) f(n) = O(g(n)) ca see that time required to search/sort grows with size of We How do space/time eeds of program grow with iput size? iput. time: cout umber of operatios as fuctio of iput Executio size operatio Assigmet:

More information

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 10: Caches Prof. Yajig Li Uiversity of Chicago Midterm Recap Overview ad fudametal cocepts ISA Uarch Datapath, cotrol Sigle cycle, multi cycle Pipeliig Basic idea,

More information

DATA STRUCTURES. amortized analysis binomial heaps Fibonacci heaps union-find. Data structures. Appetizer. Appetizer

DATA STRUCTURES. amortized analysis binomial heaps Fibonacci heaps union-find. Data structures. Appetizer. Appetizer Data structures DATA STRUCTURES Static problems. Give a iput, produce a output. Ex. Sortig, FFT, edit distace, shortest paths, MST, max-flow,... amortized aalysis biomial heaps Fiboacci heaps uio-fid Dyamic

More information

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0 Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity

More information

MOTIF XF Extension Owner s Manual

MOTIF XF Extension Owner s Manual MOTIF XF Extesio Ower s Maual Table of Cotets About MOTIF XF Extesio...2 What Extesio ca do...2 Auto settig of Audio Driver... 2 Auto settigs of Remote Device... 2 Project templates with Iput/ Output Bus

More information

CS : Programming for Non-Majors, Summer 2007 Programming Project #3: Two Little Calculations Due by 12:00pm (noon) Wednesday June

CS : Programming for Non-Majors, Summer 2007 Programming Project #3: Two Little Calculations Due by 12:00pm (noon) Wednesday June CS 1313 010: Programmig for No-Majors, Summer 2007 Programmig Project #3: Two Little Calculatios Due by 12:00pm (oo) Wedesday Jue 27 2007 This third assigmet will give you experiece writig programs that

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a 4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset

More information

Weston Anniversary Fund

Weston Anniversary Fund Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue

More information

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 4 Procedural Abstractio ad Fuctios That Retur a Value Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 4.1 Top-Dow Desig 4.2 Predefied Fuctios 4.3 Programmer-Defied Fuctios 4.4

More information

Computer Systems - HS

Computer Systems - HS What have we leared so far? Computer Systems High Level ENGG1203 2d Semester, 2017-18 Applicatios Sigals Systems & Cotrol Systems Computer & Embedded Systems Digital Logic Combiatioal Logic Sequetial Logic

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

EE 435. Lecture 26. Data Converters. Architectures. Characterization

EE 435. Lecture 26. Data Converters. Architectures. Characterization EE 435 Lecture 26 Data Coverters Architectures Characterizatio . Review from last lecture. Data Coverters Types: A/D (Aalog to Digital) Coverts Aalog Iput to a Digital Output D/A (Digital to Aalog) Coverts

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Overview. Chapter 18 Vectors and Arrays. Reminder. vector. Bjarne Stroustrup

Overview. Chapter 18 Vectors and Arrays. Reminder. vector. Bjarne Stroustrup Chapter 18 Vectors ad Arrays Bjare Stroustrup Vector revisited How are they implemeted? Poiters ad free store Destructors Iitializatio Copy ad move Arrays Array ad poiter problems Chagig size Templates

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

CMSC Computer Architecture Lecture 15: Multi-Core. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 15: Multi-Core. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 15: Multi-Core Prof. Yajig Li Uiversity of Chicago Course Evaluatio Very importat Please fill out! 2 Lab3 Brach Predictio Competitio 8 teams etered the competitio,

More information

L6: FSMs and Synchronization

L6: FSMs and Synchronization L6: FSMs ad Sychroizatio Ackowledgemets: Materials i this lecture are courtesy of the followig sources ad are used with permissio. Rex Mi J. Rabaey, A. Chadrakasa, B. Nikolic. igital Itegrated Circuits:

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza

More information

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

COP4020 Programming Languages. Compilers and Interpreters Prof. Robert van Engelen

COP4020 Programming Languages. Compilers and Interpreters Prof. Robert van Engelen COP4020 mig Laguages Compilers ad Iterpreters Prof. Robert va Egele Overview Commo compiler ad iterpreter cofiguratios Virtual machies Itegrated developmet eviromets Compiler phases Lexical aalysis Sytax

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

Module Instantiation. Finite State Machines. Two Types of FSMs. Finite State Machines. Given submodule mux32two: Instantiation of mux32two

Module Instantiation. Finite State Machines. Two Types of FSMs. Finite State Machines. Given submodule mux32two: Instantiation of mux32two Give submodule mux32two: 2-to- MUX module mux32two (iput [3:] i,i, iput sel, output [3:] out); Module Istatiatio Fiite Machies esig methodology for sequetial logic -- idetify distict s -- create trasitio

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

CMPT 125 Assignment 2 Solutions

CMPT 125 Assignment 2 Solutions CMPT 25 Assigmet 2 Solutios Questio (20 marks total) a) Let s cosider a iteger array of size 0. (0 marks, each part is 2 marks) it a[0]; I. How would you assig a poiter, called pa, to store the address

More information

Filter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design

Filter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design Filter desig Desig cosideratios: a framework C ı p ı p H(f) Aalysis of fiite wordlegth effects: I practice oe should check that the quatisatio used i the implemetatio does ot degrade the performace of

More information

Project 2.5 Improved Euler Implementation

Project 2.5 Improved Euler Implementation Project 2.5 Improved Euler Implemetatio Figure 2.5.10 i the text lists TI-85 ad BASIC programs implemetig the improved Euler method to approximate the solutio of the iitial value problem dy dx = x+ y,

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

the beginning of the program in order for it to work correctly. Similarly, a Confirm

the beginning of the program in order for it to work correctly. Similarly, a Confirm I our sytax, a Assume statemet will be used to record what must be true at the begiig of the program i order for it to work correctly. Similarly, a Cofirm statemet is used to record what should be true

More information

Data Structures Week #9. Sorting

Data Structures Week #9. Sorting Data Structures Week #9 Sortig Outlie Motivatio Types of Sortig Elemetary (O( 2 )) Sortig Techiques Other (O(*log())) Sortig Techiques 21.Aralık.2010 Boraha Tümer, Ph.D. 2 Sortig 21.Aralık.2010 Boraha

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Optimum Solution of Quadratic Programming Problem: By Wolfe s Modified Simplex Method

Optimum Solution of Quadratic Programming Problem: By Wolfe s Modified Simplex Method Volume VI, Issue III, March 7 ISSN 78-5 Optimum Solutio of Quadratic Programmig Problem: By Wolfe s Modified Simple Method Kalpaa Lokhade, P. G. Khot & N. W. Khobragade, Departmet of Mathematics, MJP Educatioal

More information

Fire Recognition in Video. Walter Phillips III Mubarak Shah Niels da Vitoria Lobo.

Fire Recognition in Video. Walter Phillips III Mubarak Shah Niels da Vitoria Lobo. Fire Recogitio i Video Walter Phillips III Mubarak Shah Niels da Vitoria Lobo {wrp65547,shah,iels}@cs.ucf.edu Computer Visio Laboratory Departmet of Computer Sciece Uiversity of Cetral Florida Orlado,

More information

TRANSITION TO AND WAKE-UP FROM STANDBY MODES

TRANSITION TO AND WAKE-UP FROM STANDBY MODES Fujitsu Microelectroics Europe Applicatio Note FMEMCU-AN-900058-21 F²MC-16L/16LX FAMILIES 16-BIT MICROCONTROLLER ALL SERIES TRANSITION TO AND WAKE-UP FROM STANDBY MODES APPLICATION NOTE Revisio Histor

More information

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access

More information

3.1 Overview of MySQL Programs. These programs are discussed further in Chapter 4, Database Administration. Client programs that access the server:

3.1 Overview of MySQL Programs. These programs are discussed further in Chapter 4, Database Administration. Client programs that access the server: 3 Usig MySQL Programs This chapter provides a brief overview of the programs provided by MySQL AB ad discusses how to specify optios whe you ru these programs. Most programs have optios that are specific

More information

ISSN (Print) Research Article. *Corresponding author Nengfa Hu

ISSN (Print) Research Article. *Corresponding author Nengfa Hu Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 2016; 4(5):249-253 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.saspublisher.com

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

COMP Parallel Computing. PRAM (1): The PRAM model and complexity measures

COMP Parallel Computing. PRAM (1): The PRAM model and complexity measures COMP 633 - Parallel Computig Lecture 2 August 24, 2017 : The PRAM model ad complexity measures 1 First class summary This course is about parallel computig to achieve high-er performace o idividual problems

More information

CMSC22200 Computer Architecture Lecture 9: Out-of-Order, SIMD, VLIW. Prof. Yanjing Li University of Chicago

CMSC22200 Computer Architecture Lecture 9: Out-of-Order, SIMD, VLIW. Prof. Yanjing Li University of Chicago CMSC22200 Computer Architecture Lecture 9: Out-of-Order, SIMD, VLIW Prof. Yajig Li Uiversity of Chicago Admiistrative Stuff Lab2 due toight Exam I: covers lectures 1-9 Ope book, ope otes, close device

More information

top() Applications of Stacks

top() Applications of Stacks CS22 Algorithms ad Data Structures MW :00 am - 2: pm, MSEC 0 Istructor: Xiao Qi Lecture 6: Stacks ad Queues Aoucemets Quiz results Homework 2 is available Due o September 29 th, 2004 www.cs.mt.edu~xqicoursescs22

More information

Bluespec-3: Modules & Interfaces. Bluespec: State and Rules organized into modules

Bluespec-3: Modules & Interfaces. Bluespec: State and Rules organized into modules Bluespec-3: Modules & Iterfaces Arvid Computer Sciece & Artificial Itelligece Lab Massachusetts Istitute of Techology Based o material prepared by Bluespec Ic, Jauary 2005 February 28, 2005 L09-1 Bluespec:

More information

Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell

Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.

More information

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1 CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()

More information

Appendix A. Use of Operators in ARPS

Appendix A. Use of Operators in ARPS A Appedix A. Use of Operators i ARPS The methodology for solvig the equatios of hydrodyamics i either differetial or itegral form usig grid-poit techiques (fiite differece, fiite volume, fiite elemet)

More information