PPS: User Manual. Krishnendu Chatterjee, Martin Chmelik, Raghav Gupta, and Ayush Kanodia

Size: px
Start display at page:

Download "PPS: User Manual. Krishnendu Chatterjee, Martin Chmelik, Raghav Gupta, and Ayush Kanodia"

Transcription

1 PPS: User Mnul Krishnendu Chtterjee, Mrtin Chmelik, Rghv Gupt, nd Ayush Knodi IST Austri (Institute of Science nd Technology Austri), Klosterneuurg, Austri In this section we descrie the tool fetures, user mnul including the input file formt, nd detiled description of the exmples used. 0.1 Fetures The tool lods the input file with the POMDP nd the prity ojective. Depending on the rguments, the PPS tool cn perform the following opertions (see for further detils). Visulize the textul input POMDP using the DOT lnguge. Reduce POMDP with prity ojective, to n equivlent POMDP with cobüchi ojective ( prity ojective with only 2 priorities), nd visulize the POMDP. Given POMDP, with cobüchi ojective, it constructs its elief-oservtion POMDP Ĝ, nd visulizes it. Given the elief-oservtion POMDP Ĝ, if there exists n lmost-sure winning strtegy, it outputs finite-stte mchine, where the sttes encode the memory elements, nd trnsitions leled y ctions nd oservtions stnd for memory updtes. As efore the tool cn visulize the finite-memory strtegy. Note, tht it is possile to visulize the POMDP, using the DOT lnguge, fter performing ny of the reductions, to get the intermedite results. 0.2 User Mnul Dependencies. The following softwre will e required to run the PPS tool: Jv Runtime Environment or Jv Development Kit (version 1.7 onwrds). The PPS tool hs een developed using Jv 1.7. Downlod from downlods/jre7-downlods html JGrphT. This is the grph hndling lirry tht hs een used to work with the POMDPs, treted s directed multigrphs. The JGrphT.jr lirry is required to run the softwre. Downlod from GrphViz. This softwre is required to convert the files tht re output y the PPS tool in the dot formt for grphs, into visul grphs. Downlod from http: // The commnd for converting dot file into its corresponding grph (in the png formt) dot -Tpng source > destintion. Detiled documenttion for GrphViz cn e found t http: //

2 Running the PPS tool. To run the softwre, downlod the jr file pps.jr from Instll ll dependencies. Now issue the commnd "jv -jr pps.jr" from the commnd line terminl. The user interfce will now open. A detiled exmple of how to use the tool is presented lter. File Formt. We now present the input file formt. nme-of-input-pomdp [<Nme>]# oservtions [<os 1>,<os 2>,..., <os j>] # sttes [<stte 1>, <stte 2>,..., <stte n>]# stte { <stte nme>; <priority vlue>; <stte oservtion>; T (if this is strt stte) or F (if this is not strt stte)} # ctions [<ction 1>,<ction 2>,..., <ction k>] # trnsitions [<source stte>,<ction>, { <trget stte 1>; <trget stte 2>;...; <trget stte m> }]# The input file is treted sequence of tokens, seprted y the # chrcter. As the exct proility of trnsition is not importnt in qulittive nlysis, the file formt is designed in wy tht it stores only the support of the trnsition function. Smple POMDP Input File. In this prt we present n exmple of POMDP in the input file formt nd provide detiled description. Figure 1 shows the corresponding POMDP generted using GrphViz. NAME: [Demo POMDP] # OBSERVATIONS: [o1,o2,o3] # STATES: [{x; 1; o1; F}, {y; 2; o2; F}, {z; 1; o2; F}, {w; 2; o3; T}] # ACTIONS: [,] # TRANSITIONS: [x,,{w}] # TRANSITIONS: [x,,{z;w}] # TRANSITIONS: [y,,{z}] # TRANSITIONS: [y,,{x}] # TRANSITIONS: [z,,{x;y}] # TRANSITIONS: [z,,{x;y;z}] # TRANSITIONS: [w,,{w}] # TRANSITIONS: [w,,{w;z}] # We now explin the ove POMDP: The nme of the input POMDP is Demo POMDP The oservtions re o1, o2, o3 The sttes re x, priority 1, oservtion o1. y, priority 2, oservtion o2. z, priority 1, oservtion o2. w, priority 2, oservtion o3, which is strt stte.

3 w, Strt: true, O: o3,pr: 2 z, Strt: flse, O: o2,pr: 1 y, Strt: flse, O: o2,pr: 2 x, Strt: flse, O: o1,pr: 1 Fig. 1. The Demo POMDP generted using GrphViz The ctions re nd. The following re the set of trnsitions on given ctions, for every stte of the POMDP In stte x, on ction, the next stte is w with proility 1. In stte x, on ction, the next stte is with positive pro. z, or w. In stte y, on ction, the next stte is z with proility 1. In stte y, on ction, the next stte is x with proility 1. In stte z, on ction, the next stte is with positive pro. x, or y. In stte z, on ction, the next stte is with positive pro. x, or w, z. In stte w, on ction, the next stte is w with proility 1. In stte w, on ction, the next stte is with positive pro. w, or z. Smple Tool Usge. In this prt we show smple tool wlkthrough. We will use AlterntePOMDP.txt exmple to illustrte the wlkthrough. This input file is lso ville on the wesite long with the PPS tool on Figure 2 shows the corresponding POMDP generted using the GrphViz tool. NAME: [POMDP Alternte] # OBSERVATIONS: [o1] # STATES: [ {x; 2; o1; F}, {y; 2; o1; F}, {z; 1; o1; T}] # ACTIONS: [,] # TRANSITIONS: [x,,{y}] # TRANSITIONS: [x,,{z}] # TRANSITIONS: [y,,{z}] # TRANSITIONS: [y,,{x}] #

4 TRANSITIONS: [z,,{x;y;z}] # TRANSITIONS: [z,,{x;y;z}] # There re three sttes in the POMDP, x, y nd the initil stte z. All the sttes hve the sme oservtion o1, therefore the Plyer does not receive ny useful informtion from the ply. There re two ctions, nd. In stte x, tking ction (resp. ) rings the POMDP deterministiclly to stte y (resp. z), nd in stte y, tking ction (resp. ) rings the POMDP deterministiclly to stte x (resp. z). Plying ny ction in stte z rings the POMPD to ll three sttes with positive proility. Sttes x nd y hve priority 2 nd stte z hs priority 1. Therefore, the gol in the POMDP is to ply strtegy tht visits stte z only finitely often with proility 1. Note, tht once the POMDP reches stte x, if the plyer plys the strtegy tht lterntes etween plying followed y, then the POMDP will lwys sty in sttes x nd y, oth of which hve priority priority 2. Similrly, once the POMDP reches stte y, if the strtegy lterntes etween plying followed y, then the POMDP will lwys sty in sttes y nd x. x, Strt: flse, O: o1,pr: 2 z, Strt: true, O: o1,pr: 1 y, Strt: flse, O: o1,pr: 2 Fig. 2. POMDP Alternte generted using GrphViz In the following prt we enumerte the required steps in order to solve whether there exists finite-memory strtegy ensuring the ojective with proility Run the commnd jv -jr pps.jr. A dilog ox opens, s shown in Figure Select the POMDP input file AlterntePOMDP.txt, y clicking the utton. This will open dilog ox s in Figure In the cse of AlterntePOMDP.txt the ojective is specified only y priorities 1 nd 2, therefore we cn select the rdio utton corresponding to cobüchi ojectives to speed up the computtion. In cse the ojective hs lso other priorities, select the rdio utton corresponding Prity ojective. 4. To generte the dot formt for the input POMDP, check the first option. Click the corresponding Sve As utton to specify the loction nd the nme of the file to

5 Fig. 3. Opening Screen Fig. 4. Select Input POMDP e sved to. Figure 5 illustrtes the sme. One cn then use GrphViz to generte n imge of the file from the dot formt. Figure 2 ws generted in this wy. 5. In cse the input POMDP is specified with prity ojective, select the Output cobüchi POMDP checkox to generte the dot formt of n equivlent POMDP with cobüchi ojective. Click the corresponding Sve As utton to specify the loction nd the nme of the file to e sved to. 6. To generte the dot formt for the elief-oservtion POMDP which is generted s prt of the lgorithm, select the check ox next to Output Belief Os. POMDP. Click the corresponding Sve As utton to specify the loction nd nme of the file to e sved to. This is illustrted in Figure 6 Fig. 5. Generte Input POMDP Fig. 6. Generte elief-oservtion POMDP 7. To generte the dot formt file for the finl strtegy which is generted, select the check ox next to Generte Strtegy. Click the corresponding Sve As utton to specify the loction nd nme of the file to e sved to. This is illustrted in Figure Now click the Run utton. After witing for progrm execution, you will see dilog ox. An exmple of the sme is illustrted in Figure 8. This provides informtion out whether there exists finite-memory lmost-sure winning strtegy, nd the execution time for the progrm. The dot formt files which were selected

6 for genertion will e found t the specified loctions. This completes progrm execution. Fig. 8. Result Screen Fig. 7. Generte Strtegy Grph Now, GrphViz (See Dependencies ) must e used in order to visulize the grphs, which hve een output in the dot formt. An Explntion for the Strtegy. After the execution the tool outputs tht there exists finite-memory lmost-sure winning strtegy nd outputs the strtegy grph. Here, we provide n intuitive explntion for the strtegy which is given y the PPS tool, for the input POMDP shown in Figure 2. The output strtegy is shown in Figure 9. The finite-memory strtegy σ = (σ u, σ n, M, m 0 ) corresponding to the Figure is defined s follows: The memory set M contins four memory elements {m1, m2, m3, m4}. The initil memory is the memory element tht is successor of the strt ction from the node leled s StrtStte, i.e., the initil memory element is m1. The ction selection function σ n for memory m selects uniformly ll ctions outgoing from node m in the grph, i.e., σ n (m1) selects ction with proility 0.5 nd ction with proility 0.5, σ n (m3) selects ction with proility 1, etc. The memory updte function σ u given memory element m, ction nd oservtion o chooses the new memory uniformly from the successor sttes of stte m y edges leled y ction nd trget sttes leled with o, i.e., σ u (m1,, o1) updtes with uniform proility to m2, m3, nd m4. In cse of the memory element m3 we hve σ u (m3,, o1) updtes with proility 1 to m4. One cn see tht y plying the strtegy σ the Plyer reches the memory elements m3 nd m4 with proility 1. From these memory elements the strtegy prescries to lternte ctions nd. As ws mentioned efore, this strtegy ensures tht the initil stte z is visited only finitely often lmost-surely. 0.3 Exmple - Spce Shuttle The spce shuttle exmple originlly comes from [1], nd long with the originl POMDP we lso consider slight vrints of the model presented in [2]. We will de-

7 StrtStte strt m1 Os: o1 m2 Os: o1 m3 Os: o1 m4 Os: o1 Fig. 9. Finite-memory lmost-sure winning strtegy scrie the esiest vrint of the prolem, the remining vrints will e descried in the end of the exmple. It models simple spce shuttle docking prolem, where the shuttle must dock y cking up into one of the two spce sttions. The gol is to visit oth sttions infinitely often. Figure 10 originlly comes from [2] nd shows schemtic representtion of the model. The left most nd right most sttes in Figure 10 re the docking sttions, the most recently visited docking sttion is leled with MRV, nd the lest recently visited docking sttion is leled with LRV. The property of the model is tht whenever LRV sttion is visited it utomticlly chnges its stte to MRV. Both of the ctions go forwrd nd turn round re deterministic. Sttes: There re 11 sttes in the POMDP, corresponding to the position of the shuttle: 0 - docked in LRV; 1 - just outside spce sttion MRV, front of ship fcing sttion; 2 - spce, fcing MRV; 3 - just outside spce sttion LRV, ck of ship fcing sttion; 4 - just outside spce sttion MRV, ck of ship fcing sttion; 5 - spce, fcing LRV; 6 - just outside spce sttion LRV, front of ship fcing sttion; 7 - docked in MRV, the initil stte; 8 - successful delivery; 9 - ump into LRV; 10 - ump into MRV. Oservtions: There re 7 oservtions corresponding to wht cn e seen from the shuttle: o0 see LRV forwrd, o1, see MRV forwrd, o2 docked in MRV, o3 see nothing, o4 docked in LRV, o5 umping into docking sttion, nd finlly o6 is oserved upon successful delivery. Actions: There re three ctions tht cn e chosen: go forwrd (f), turn round (), nd ckup (). Trnsition reltion: If the shuttle is fcing sttion (sttes 1 nd 6) the ckup ction succeeds only with proility 0.3, hs no effect with proility 0.4, nd with proility 0.3 cts like turn round ction. Whenever in spce (sttes 2 nd 5) the ckup ctions succeeds with proility 0.8, hs no effect with proility 0.1, nd with the

8 remining proility 0.1 hs the sme effect s n comintion of turning round nd ckup ction. Finlly, when the shuttle is djcent to sttion nd fcing wy (sttes 3 nd 4), it hs proility of 0.7 of ctully docking to sttion, nd with the remining proility 0.3 hs no effect. In the remining sttes 8, 9, nd 10 the ction effect is deterministic. Fig. 10. Spce shuttle docking prolem Ojective. The prity ojective of the model is defined y the priority ssignment function s follows: ll sttes from 1 to 7 hve priority 3; the stte 8 which represents successful delivery into lest recently visited sttion, hs priority 2. Whenever the shuttle is fcing sttion, it should try to ckup into the sttion s trying to move forwrd results into ump into sttion represented with sttes 9 nd 10 with priority 1. Therefore, the ojective cn e intuitively explined s trying to visit oth of the sttions infinitely often, while trying to ump only finitely often with proility 1. The input file for the POMDP cn e downloded here The more complex vrints of this model differ in the numer of sttes tht re required to trvel through the spce, nd therefore hve higher uncertinty out the position of the shuttle. 0.4 Exmple - Cheese Mze The mze is shown in Figure 11 is introduced in [2]. We will descrie only the smllest vrint in detil. The gol of the plyer is to rech gol stte while trying to void poison in d sttes. The plyer is only prtilly informed, its oservtion corresponds to wht would e seen in ll four directions immeditely djcent to the loction. After the gol stte is reched the plyer is respwned with positive proility in multiple sttes of the mze nd the gme is restrted.

9 Sttes: There re 11 sttes in the POMDP tht re illustrted on Figure 11. The gme strts in stte 6. The poison is plced in sttes 8 nd 9, nd 10 is the gol stte. Oservtions: There re 7 oservtions corresponding to wht would e seen in ll four directions immeditely djcent to the loction, i.e., sttes 5, 6, nd 7 do hve the sme oservtion. The oservtions re s follows: o0, the wlls re NW; o1, the wlls re NS; o2, the wll is N; o3, the wlls re NE; o4, the wlls re WE; o5, poisoned stte; nd o6, the gol stte. Actions: There re four ctions ville corresponding to the movement in the four compss directions (north n, est e, south s, west w). Trnsition reltion: Actions tht ttempt to move outside of the mze hve no effect on the position. The rest of the moves is deterministic in ll 4 ctions. Fig. 11. Cheese mze prolem Ojective: The ojective is to visit the gol stte 10 infinitely often, while getting poisoned in sttes 8 nd 9 only finitely often. This is encoded s prity ojective with 3 priorities. Stte 10 hs priority 2, sttes 8 nd 9 hve priority 1, nd every other stte hs priority 3. Whenever the gol stte is reched, the mze is restrted with proility 1/3 to stte 0, with proility 1/3 to stte 2, nd with proility 1/3 to stte 4 in the esiest vrint of the prolem. The other vrints re medium nd difficult, nd differ in the numer of sttes the mze cn restrt to, intuitively incresing the uncertinty in the POMDP nd lso result into longer running times. We lso consider more difficult setting of the prolem y constructing n intermedite nd lrge size mzes with more sttes ut sed on the sme principle. The input file for the POMDP cn e downloded here Exmple - Grid We will descrie only the grid 4 4, the other lrger vrints of the grid only differ in size. The prolem consists of 4 y 4 grid of loctions. There is single gol stte, nd

10 multiple trp sttes tht re plced eforehnd ut not known to the plyer. Whenever gol stte is reched the gme is restrted. The gol of the plyer is to lern the position of the trps nd visit the gol infinitely often, while visiting the trp stte only finitely often with proility 1. Sttes: There re 33 sttes in the POMDP. The uncertinty out the plcement of the trps is modeled y two grids of sttes 4 4 nd n dditionl initil stte strt tht hs trnsition to oth of the grids. The coding of the sttes is s follows, the stte ijk corresponds to stte in the i-th copy, j-th row, nd k-th column. The gol stte in ech grid is the lower right corner, i.e., stte 033 nd 133 (rows nd columns re numered 0-3). x x x x x x x x Fig. 12. Trp plcement Oservtions: There re 4 oservtions, the initil stte hs oservtion o0, the trp sttes hve oservtion o2, the gol stte hs oservtion 03, nd ll the remining sttes hve oservtion o1. Actions: As in the previous exmple, there re 4 ctions ville corresponding to the movement in the four compss directions (north n, est e, south s, west w). Trnsition reltion: The initil stte of the POMDP is the stte strt, no mtter wht ction is plyed the next stte is with proility 0.5 the upper left corner in one of the grids, nd with the remining proility the upper left corner of the second grid. In the grid ll the ctions re deterministic nd ttempts to move outside of the grid hve no effect on the position. Whenever gol stte is reched the gme is restrted the the upper left corner of the sme grid (the trp sttes sty in the sme position). Ojective: The ojective is to lern in which grids the plyer is nd s in the previous exmples try to rech the gol stte infinitely often while visiting the trp sttes only finitely often with proility 1. This is encoded s prity ojective with 3 priorities, the gol stte hs priority 2, the trp sttes hve priority 1, nd ll the remining sttes hve priority 3. The plcement of the trp sttes we hve considered for the 4 4 grid is depicted on Figure 12. The other vrints differ in the size of the grid nd plcements of the trp sttes. The input file for the POMDP cn e downloded here

11 References 1. Lonnie Chrismn. Reinforcement lerning with perceptul lising: The perceptul distinctions pproch. In AAAI, pges Citeseer, M. L. Littmn, A. R. Cssndr, nd L. P. Kelling. Lerning policies for prtilly oservle environments: Scling up. In ICML, volume 95, pges Citeseer, 1995.

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Agilent Mass Hunter Software

Agilent Mass Hunter Software Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

NOTES. Figure 1 illustrates typical hardware component connections required when using the JCM ICB Asset Ticket Generator software application.

NOTES. Figure 1 illustrates typical hardware component connections required when using the JCM ICB Asset Ticket Generator software application. ICB Asset Ticket Genertor Opertor s Guide Septemer, 2016 Septemer, 2016 NOTES Opertor s Guide ICB Asset Ticket Genertor Softwre Instlltion nd Opertion This document contins informtion for downloding, instlling,

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results 1 L 1 - Counter A project is collection mechnism for n HDL design under specifiction or test. Projects in ModelSim ese interction nd re useful for orgnizing files nd specifying simultion settings. The

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08 CS412/413 Introduction to Compilers Tim Teitelum Lecture 4: Lexicl Anlyzers 28 Jn 08 Outline DFA stte minimiztion Lexicl nlyzers Automting lexicl nlysis Jlex lexicl nlyzer genertor CS 412/413 Spring 2008

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

TO REGULAR EXPRESSIONS

TO REGULAR EXPRESSIONS Suject :- Computer Science Course Nme :- Theory Of Computtion DA TO REGULAR EXPRESSIONS Report Sumitted y:- Ajy Singh Meen 07000505 jysmeen@cse.iit.c.in BASIC DEINITIONS DA:- A finite stte mchine where

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl component

More information

CMPSC 470: Compiler Construction

CMPSC 470: Compiler Construction CMPSC 47: Compiler Construction Plese complete the following: Midterm (Type A) Nme Instruction: Mke sure you hve ll pges including this cover nd lnk pge t the end. Answer ech question in the spce provided.

More information

CS 221: Artificial Intelligence Fall 2011

CS 221: Artificial Intelligence Fall 2011 CS 221: Artificil Intelligence Fll 2011 Lecture 2: Serch (Slides from Dn Klein, with help from Sturt Russell, Andrew Moore, Teg Grenger, Peter Norvig) Problem types! Fully observble, deterministic! single-belief-stte

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley AI Adjcent Fields Philosophy: Logic, methods of resoning Mind s physicl system Foundtions of lerning, lnguge, rtionlity Mthemtics Forml representtion nd proof Algorithms, computtion, (un)decidility, (in)trctility

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

CSCI 446: Artificial Intelligence

CSCI 446: Artificial Intelligence CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]

More information

YOU ARE: AND THIS IS:

YOU ARE: AND THIS IS: YOU ARE: AND THIS IS: SoHE CMS Mnul As edited August 4, 015 TABLE OF CONTENTS 3 Logging in 4 Pge types within the dshord 5-6 Exploring the toolr 7-8 Adding pge 9 Editing pge 10 Pge templtes: Met Templte

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

Languages. L((a (b)(c))*) = { ε,a,bc,aa,abc,bca,... } εw = wε = w. εabba = abbaε = abba. (a (b)(c)) *

Languages. L((a (b)(c))*) = { ε,a,bc,aa,abc,bca,... } εw = wε = w. εabba = abbaε = abba. (a (b)(c)) * Pln for Tody nd Beginning Next week Interpreter nd Compiler Structure, or Softwre Architecture Overview of Progrmming Assignments The MeggyJv compiler we will e uilding. Regulr Expressions Finite Stte

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

Simrad ES80. Software Release Note Introduction

Simrad ES80. Software Release Note Introduction Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the

More information

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed

More information

Registering as an HPE Reseller

Registering as an HPE Reseller Registering s n HPE Reseller Quick Reference Guide for new Prtners Mrch 2019 Registering s new Reseller prtner There re four min steps to register on the Prtner Redy Portl s new Reseller prtner: Appliction

More information

Topic 2: Lexing and Flexing

Topic 2: Lexing and Flexing Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of

More information

2014 Haskell January Test Regular Expressions and Finite Automata

2014 Haskell January Test Regular Expressions and Finite Automata 0 Hskell Jnury Test Regulr Expressions nd Finite Automt This test comprises four prts nd the mximum mrk is 5. Prts I, II nd III re worth 3 of the 5 mrks vilble. The 0 Hskell Progrmming Prize will be wrded

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

Registering as a HPE Reseller. Quick Reference Guide for new Partners in Asia Pacific

Registering as a HPE Reseller. Quick Reference Guide for new Partners in Asia Pacific Registering s HPE Reseller Quick Reference Guide for new Prtners in Asi Pcific Registering s new Reseller prtner There re five min steps to e new Reseller prtner. Crete your Appliction Copyright 2017 Hewlett

More information

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

CSEP 573 Artificial Intelligence Winter 2016

CSEP 573 Artificial Intelligence Winter 2016 CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch

More information

Lexical Analysis: Constructing a Scanner from Regular Expressions

Lexical Analysis: Constructing a Scanner from Regular Expressions Lexicl Anlysis: Constructing Scnner from Regulr Expressions Gol Show how to construct FA to recognize ny RE This Lecture Convert RE to n nondeterministic finite utomton (NFA) Use Thompson s construction

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

View, evaluate, and publish assignments using the Assignment dropbox.

View, evaluate, and publish assignments using the Assignment dropbox. Blckord Lerning System CE 6 Mnging Assignments Competencies After reding this document, you will e le to: Crete ssignments using the Assignment tool. View, evlute, nd pulish ssignments using the Assignment

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona CSc 453 Compilers nd Systems Softwre 4 : Lexicl Anlysis II Deprtment of Computer Science University of Arizon collerg@gmil.com Copyright c 2009 Christin Collerg Implementing Automt NFAs nd DFAs cn e hrd-coded

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Lexical Analysis. Amitabha Sanyal. (www.cse.iitb.ac.in/ as) Department of Computer Science and Engineering, Indian Institute of Technology, Bombay

Lexical Analysis. Amitabha Sanyal. (www.cse.iitb.ac.in/ as) Department of Computer Science and Engineering, Indian Institute of Technology, Bombay Lexicl Anlysis Amith Snyl (www.cse.iit.c.in/ s) Deprtment of Computer Science nd Engineering, Indin Institute of Technology, Bomy Septemer 27 College of Engineering, Pune Lexicl Anlysis: 2/6 Recp The input

More information

pdfapilot Server 2 Manual

pdfapilot Server 2 Manual pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:

More information

CS 241. Fall 2017 Midterm Review Solutions. October 24, Bits and Bytes 1. 3 MIPS Assembler 6. 4 Regular Languages 7.

CS 241. Fall 2017 Midterm Review Solutions. October 24, Bits and Bytes 1. 3 MIPS Assembler 6. 4 Regular Languages 7. CS 241 Fll 2017 Midterm Review Solutions Octoer 24, 2017 Contents 1 Bits nd Bytes 1 2 MIPS Assemly Lnguge Progrmming 2 3 MIPS Assemler 6 4 Regulr Lnguges 7 5 Scnning 9 1 Bits nd Bytes 1. Give two s complement

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem Announcements Project : erch It s live! Due 9/. trt erly nd sk questions. It s longer thn most! Need prtner? Come up fter clss or try Pizz ections: cn go to ny, ut hve priority in your own C 88: Artificil

More information

Compilers Spring 2013 PRACTICE Midterm Exam

Compilers Spring 2013 PRACTICE Midterm Exam Compilers Spring 2013 PRACTICE Midterm Exm This is full length prctice midterm exm. If you wnt to tke it t exm pce, give yourself 7 minutes to tke the entire test. Just like the rel exm, ech question hs

More information

Epson Projector Content Manager Operation Guide

Epson Projector Content Manager Operation Guide Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time

More information

McAfee Network Security Platform

McAfee Network Security Platform NTBA Applince T-200 nd T-500 Quick Strt Guide Revision B McAfee Network Security Pltform 1 Instll the mounting rils Position the mounting rils correctly nd instll them t sme levels. At the front of the

More information

CS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata

CS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata CS 432 Fll 2017 Mike Lm, Professor (c)* Regulr Expressions nd Finite Automt Compiltion Current focus "Bck end" Source code Tokens Syntx tree Mchine code chr dt[20]; int min() { flot x = 42.0; return 7;

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision D McAfee Network Security Pltform (NS5x00 Quick Strt Guide) This quick strt guide explins how to quickly set up nd ctivte your McAfee Network Security Pltform NS5100 nd NS5200 Sensors in inline

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona Implementing utomt Sc 5 ompilers nd Systems Softwre : Lexicl nlysis II Deprtment of omputer Science University of rizon collerg@gmil.com opyright c 009 hristin ollerg NFs nd DFs cn e hrd-coded using this

More information

CS201 Discussion 10 DRAWTREE + TRIES

CS201 Discussion 10 DRAWTREE + TRIES CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the

More information

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop

More information

Scanner Termination. Multi Character Lookahead. to its physical end. Most parsers require an end of file token. Lex and Jlex automatically create an

Scanner Termination. Multi Character Lookahead. to its physical end. Most parsers require an end of file token. Lex and Jlex automatically create an Scnner Termintion A scnner reds input chrcters nd prtitions them into tokens. Wht hppens when the end of the input file is reched? It my be useful to crete n Eof pseudo-chrcter when this occurs. In Jv,

More information

Stack Manipulation. Other Issues. How about larger constants? Frame Pointer. PowerPC. Alternative Architectures

Stack Manipulation. Other Issues. How about larger constants? Frame Pointer. PowerPC. Alternative Architectures Other Issues Stck Mnipultion support for procedures (Refer to section 3.6), stcks, frmes, recursion mnipulting strings nd pointers linkers, loders, memory lyout Interrupts, exceptions, system clls nd conventions

More information

ASTs, Regex, Parsing, and Pretty Printing

ASTs, Regex, Parsing, and Pretty Printing ASTs, Regex, Prsing, nd Pretty Printing CS 2112 Fll 2016 1 Algeric Expressions To strt, consider integer rithmetic. Suppose we hve the following 1. The lphet we will use is the digits {0, 1, 2, 3, 4, 5,

More information

CS 241 Week 4 Tutorial Solutions

CS 241 Week 4 Tutorial Solutions CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007 CS 88: Artificil Intelligence Fll 2007 Lecture : A* Serch 9/4/2007 Dn Klein UC Berkeley Mny slides over the course dpted from either Sturt Russell or Andrew Moore Announcements Sections: New section 06:

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 Introduction to EsyMP Network Projection EsyMP Network Projection Fetures... 5 Disply Options... 6 Multi-Screen Disply Function... 6 Movie Sending Mode...

More information

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

CSE 401 Midterm Exam 11/5/10 Sample Solution

CSE 401 Midterm Exam 11/5/10 Sample Solution Question 1. egulr expressions (20 points) In the Ad Progrmming lnguge n integer constnt contins one or more digits, but it my lso contin embedded underscores. Any underscores must be preceded nd followed

More information

Welch Allyn CardioPerfect Workstation Installation Guide

Welch Allyn CardioPerfect Workstation Installation Guide Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.6 or lter For network instlltion, plese refer to

More information

Polycom RealPresence Media Editor Quick Start

Polycom RealPresence Media Editor Quick Start Polycom RelPresence Medi Editor Quick Strt Version 5.5 Novemer 2011 3725-75201-001/A Trdemrk Informtion Polycom, the Polycom Tringles logo, nd the nmes nd mrks ssocited with Polycom s products re trdemrks

More information

Zenoss Service Impact Installation and Upgrade Guide for Resource Manager 5.x and 6.x

Zenoss Service Impact Installation and Upgrade Guide for Resource Manager 5.x and 6.x Zenoss Service Impct Instlltion nd Upgrde Guide for Resource Mnger 5.x nd 6.x Relese 5.3.1 Zenoss, Inc. www.zenoss.com Zenoss Service Impct Instlltion nd Upgrde Guide for Resource Mnger 5.x nd 6.x Copyright

More information

McAfee Network Security Platform

McAfee Network Security Platform 10/100/1000 Copper Active Fil-Open Bypss Kit Guide Revision E McAfee Network Security Pltform This document descries the contents nd how to instll the McAfee 10/100/1000 Copper Active Fil-Open Bypss Kit

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

Lexical analysis, scanners. Construction of a scanner

Lexical analysis, scanners. Construction of a scanner Lexicl nlysis scnners (NB. Pges 4-5 re for those who need to refresh their knowledge of DFAs nd NFAs. These re not presented during the lectures) Construction of scnner Tools: stte utomt nd trnsition digrms.

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

Reducing a DFA to a Minimal DFA

Reducing a DFA to a Minimal DFA Lexicl Anlysis - Prt 4 Reducing DFA to Miniml DFA Input: DFA IN Assume DFA IN never gets stuck (dd ded stte if necessry) Output: DFA MIN An equivlent DFA with the minimum numer of sttes. Hrry H. Porter,

More information

McAfee Network Security Platform

McAfee Network Security Platform Mnger Applince Quick Strt Guide Revision B McAfee Network Security Pltform This guide is high-level description of how to instll nd configure the Mnger Applince. For more detiled instlltion informtion,

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

Easy Interactive Tools Ver.3.0 Operation Guide

Easy Interactive Tools Ver.3.0 Operation Guide Esy Interctive Tools Ver.3.0 Opertion Guide Esy Interctive Tools Summry 2 Fetures Esy Interctive Tools is n ppliction tht llows you to drw on projected imges. By using the interctive pen supplied with

More information

Finite Automata. Lecture 4 Sections Robb T. Koether. Hampden-Sydney College. Wed, Jan 21, 2015

Finite Automata. Lecture 4 Sections Robb T. Koether. Hampden-Sydney College. Wed, Jan 21, 2015 Finite Automt Lecture 4 Sections 3.6-3.7 Ro T. Koether Hmpden-Sydney College Wed, Jn 21, 2015 Ro T. Koether (Hmpden-Sydney College) Finite Automt Wed, Jn 21, 2015 1 / 23 1 Nondeterministic Finite Automt

More information

VMware Horizon JMP Server Installation and Setup Guide. Modified on 06 SEP 2018 VMware Horizon 7 7.6

VMware Horizon JMP Server Installation and Setup Guide. Modified on 06 SEP 2018 VMware Horizon 7 7.6 VMwre Horizon JMP Server Instlltion nd Setup Guide Modified on 06 SEP 2018 VMwre Horizon 7 7.6 You cn find the most up-to-dte technicl documenttion on the VMwre wesite t: https://docs.vmwre.com/ If you

More information

Upgrading from vrealize Automation 7.1 or Later to June 2018 vrealize Automation 7.4

Upgrading from vrealize Automation 7.1 or Later to June 2018 vrealize Automation 7.4 Upgrding from vrelize Automtion 7.1 or Lter to 7.4 15 June 2018 vrelize Automtion 7.4 You cn find the most up-to-dte technicl documenttion on the VMwre wesite t: https://docs.vmwre.com/ If you hve comments

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 Introduction to EsyMP Multi PC Projection 5 EsyMP Multi PC Projection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters

More information

CSCE 531, Spring 2017, Midterm Exam Answer Key

CSCE 531, Spring 2017, Midterm Exam Answer Key CCE 531, pring 2017, Midterm Exm Answer Key 1. (15 points) Using the method descried in the ook or in clss, convert the following regulr expression into n equivlent (nondeterministic) finite utomton: (

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

How to Design REST API? Written Date : March 23, 2015

How to Design REST API? Written Date : March 23, 2015 Visul Prdigm How Design REST API? Turil How Design REST API? Written Dte : Mrch 23, 2015 REpresenttionl Stte Trnsfer, n rchitecturl style tht cn be used in building networked pplictions, is becoming incresingly

More information

Compiler Construction D7011E

Compiler Construction D7011E Compiler Construction D7011E Lecture 3: Lexer genertors Viktor Leijon Slides lrgely y John Nordlnder with mteril generously provided y Mrk P. Jones. 1 Recp: Hndwritten Lexers: Don t require sophisticted

More information

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011 CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the

More information

Epson iprojection Operation Guide (Windows/Mac)

Epson iprojection Operation Guide (Windows/Mac) Epson iprojection Opertion Guide (Windows/Mc) Contents 2 Introduction to Epson iprojection 5 Epson iprojection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters nd Projection

More information

Graphs with at most two trees in a forest building process

Graphs with at most two trees in a forest building process Grphs with t most two trees in forest uilding process rxiv:802.0533v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order,

More information

Should be done. Do Soon. Structure of a Typical Compiler. Plan for Today. Lab hours and Office hours. Quiz 1 is due tonight, was posted Tuesday night

Should be done. Do Soon. Structure of a Typical Compiler. Plan for Today. Lab hours and Office hours. Quiz 1 is due tonight, was posted Tuesday night Should e done L hours nd Office hours Sign up for the miling list t, strting to send importnt info to list http://groups.google.com/group/cs453-spring-2011 Red Ch 1 nd skim Ch 2 through 2.6, red 3.3 nd

More information

Upgrading from vrealize Automation 7.1, 7.2 to 7.3 or 7.1, 7.2, 7.3 to March 2018 vrealize Automation 7.3

Upgrading from vrealize Automation 7.1, 7.2 to 7.3 or 7.1, 7.2, 7.3 to March 2018 vrealize Automation 7.3 Upgrding from vrelize Automtion 7.1, 7.2 to 7.3 or 7.1, 7.2, 7.3 to 7.3.1 15 Mrch 2018 vrelize Automtion 7.3 You cn find the most up-to-dte technicl documenttion on the VMwre wesite t: https://docs.vmwre.com/

More information

Introductory Information. Setup Guide. Introduction. Space Required for Installation. Overview of Setup. Preparations. Install the Printheads

Introductory Information. Setup Guide. Introduction. Space Required for Installation. Overview of Setup. Preparations. Install the Printheads Introduction Setup Guide Introductory Informtion ENG Red this mnul efore ttempting to operte the printer. Keep this mnul in hndy loction for future reference. Overview of Setup These re the steps in printer

More information

Quiz2 45mins. Personal Number: Problem 1. (20pts) Here is an Table of Perl Regular Ex

Quiz2 45mins. Personal Number: Problem 1. (20pts) Here is an Table of Perl Regular Ex Long Quiz2 45mins Nme: Personl Numer: Prolem. (20pts) Here is n Tle of Perl Regulr Ex Chrcter Description. single chrcter \s whitespce chrcter (spce, t, newline) \S non-whitespce chrcter \d digit (0-9)

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Uninformed Search. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 31 Jan 2012

Uninformed Search. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 31 Jan 2012 1 Hl Dumé III (me@hl3.nme) Uninformed Serch Hl Dumé III Comuter Science University of Mrylnd me@hl3.nme CS 421: Introduction to Artificil Intelligence 31 Jn 2012 Mny slides courtesy of Dn Klein, Sturt

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

Discussion 1 Recap. COP4600 Discussion 2 OS concepts, System call, and Assignment 1. Questions. Questions. Outline. Outline 10/24/2010

Discussion 1 Recap. COP4600 Discussion 2 OS concepts, System call, and Assignment 1. Questions. Questions. Outline. Outline 10/24/2010 COP4600 Discussion 2 OS concepts, System cll, nd Assignment 1 TA: Hufeng Jin hj0@cise.ufl.edu Discussion 1 Recp Introduction to C C Bsic Types (chr, int, long, flot, doule, ) C Preprocessors (#include,

More information

McAfee Network Security Platform

McAfee Network Security Platform NS7x00 Quick Strt Guide Revision D McAfee Network Security Pltform This quick strt guide explins how to quickly set up nd ctivte your McAfee Network Security Pltform NS7100, NS7200, nd NS7300 Sensors in

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information