Pointers & Arrays. CS2023 Winter 2004
|
|
- Rose Daniel
- 5 years ago
- Views:
Transcription
1 Pointers & Arrays CS2023 Winter 2004
2 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this section you should be able to Identify how pointers and array are similar and how they are different Use pointers to traverse C arrays (1D and 2D) and pointer subtraction to count how many elements have been traversed Use pointers to pass portions of C arrays to functions
3 Arrays and Pointers A single-dimensional array is a typed constant pointer initialized to point to a block of memory that can hold a number of objects. is an pointer that points to a block of memory that can hold 1000 integer objects is a pointer to.
4 ! Arrays and Pointers When an array is declared, compiler allocates enough contiguous space in memory to contain all the elements of array Base address of array is address of first element of array. Say bytes numbered 300, 304, 308,..., 696 are alocated as addresses of a[0], a[1],... a[99] is equivalent to Causes 300 to be assigned to p "
5 # ' %& $ ( # $*, ( -, ( # /. Arrays Assignment and Pointers Can access first element of an array using: )+* or through pointer: ) * Can access other elements of a using pointer arithmetic
6 Pointer Arithmetic Valid operations on pointers include: - the sum of a pointer and an integer - the difference of a pointer and an integer - pointer comparison - the difference of two pointers.
7 Sum of Pointer and Integer To access other objects in the block of memory pointed to, use where is an integer. This expression yields a pointer to the n-th object beyond the one that currently points to. The exact meaning of "object" is determined by the type of.
8 7 8? E : I H G J Sum of Pointer and Integer => ; < 9:? 8 D A D E? F M K I L K I 5 6 = > B > = B > =
9 RS T P Q Z V b ] \ Q X Z [ a c ^ Z [ e b ^ \ X [ Y Z d a c _ Z [ e _ [ \ X Z a f d c ` Z [ Sum of Pointer and Integer WY WX U V N O WX W Y b WX
10 t m u n m yz i o s { ƒv Sum of Pointer and Integer: ith object v w prq n o m gh hx k x l lk j ji }~ j h or v are equivalent. and
11 Š Œ œ Ÿ ž œ œ Š š š Œ ² ± Ž«œ µ Sum of Pointer and Integer: ith object Ž ˆ Ž š ˆ œ Ž Š Ÿ Š Œ Ÿ Š Ž Ÿ ª ³ Ž œ Ÿ š
12 ¹ º Difference of Pointer and Integer Often, we need to access objects preceding the object pointed to by a pointer yields a pointer to the n-th object before the one that currently points to.
13 À Á ½ ¾ Ç Ã Ï Ê É ¾ Å Ç È Ñ Ð Ë Ç È Ó Ö Í Õ Å È Æ Ç Ò Ì Ô Î Ç È Û Î Å Ç Ú Ø È Ì Ù Í Ç È Difference of Pointer and Integer ÄÆ ÄŠ û ¼ ÄÅ Ä Æ Ü ÄÅ
14 Example Ý Þàß áâ ßã äå çæ è â ã é êìë í êìî í ï ð äå çæ ñóò ë ô ïò õ ö ê â ã â é â ï â ø ß é ùàß ú àû ü ý ê ö ö ê û þ é ë þ é â ã ßÿ ß ÿ ß û ÿ Þàß ÿ ê ö á û ÿ â ô í î ô ë äå çæ ò â äå çæ ò â ë ÿ â ã é á á ã í ê î â ò è
15 ! '& $% # " Careful! Given a block of memory of you can set objects, pointed to by to point to the last object in the block using:, rather than ( off by one error).
16 * ) ( +, Pointer Comparison Two pointers of the same type, and, may be compared as long as both of them point to objects within a single memory block Pointers may be compared using the <, >, <=, >=, ==,!= When you are comparing two pointers, you are comparing the values of those pointers rather than the contents of memory locations pointed to by these pointers
17 ?> ; U E E E TS K J P D D AB D M F G V K J AB D F V V K D U E E E TS ^ P D D ] _ K D W G P P Pointers and traversals Assuming 8: /. doubles: <= pointing to an array of and QR LNM H:I C/D D O D F E M V D H I H/\ B Y Z:[ J X/Y E/W B L M QR C/D M D F D F ] ] U M ` V D E/W B
18 m d d d c lk g h ba f f e pq Block Traversal Idiom ij h h p p o n
19 r s w ~ {z { w Œ Ž s s ~ Ž ƒ ƒ ƒ ~ z Ž s ~ ~ s ~ {z uz Example: largest element ƒ { } u }~ u w rs ~z z { u u w u z wyx tvu ƒ{ } u ˆ x w u z }~ Š ƒ { } u ˆ x ƒ } u ˆ x { ƒ s ƒ ƒ w x
20 œ ž ± Example: block copy of Copy the contents of a block (or array) pointed to by size to another block pointed to by : š :ª 6 6 Ÿ/ ««Ÿ/ ª µ ª ³ ² ª 6
21 ¹» º ¾ ¼ ½ À Á Ç ÆÅ Ã Â Ï Ë Ê É Pointer Subtraction Given two pointers, and, such that: both pointers are of the same type, > both point to objects in a single memory block, the expression yields the number of objects between including the object pointed to by. and The type of the result of pointer difference is defined in. Ë/Ì Í Î, ÃyÄ Ç È,
22 Ò Ó Ø è Ú Ý é ß Þ Ó Û Ü Ý ç áâ Ò Ú Ú Û Ü æ Ø Pointer Subtraction Ø Ö ÔÕ Ü Ù6Û Ù6Ú Ð/Ñ ê Ü Ó ã å ãä Ð Ñ à Output: 3
23 ë ò ï õ ôó ï óö ò ï ï ï ï ó ó ó ö ó ö ûÿ ï ò ï õ ôó ó ó Example in a block of Find the first occurrence of the value integers ( if not found): íî ì ï ô ðö ò ïñð óùø ò ïñð ú ÿ ïþý ü ïñû ïñð ó ú ö ó ô ï ó ï ï ó ö ó ï ô ð
24 ! F F " # # + E D C G " 76 0 /. 2 1 = 3 L OJ # 0. ; " : B " 3 => 0 1!? in a block of H IJK LNM A@ Example Find the first occurrence of the value integers ( if not found): " %$ & #, *) ( ' # & " '+ / 7 <
25 ]\ YX PW S a` S ^ c U ^ Z[ UT V b ]\ YX Ph S S ^ c ^ Z[ UT V b Arrays as Parameters When arrays are used as function parameters, they are actually treated as pointers. The following two declarations are equivalent: feg Ped PRQ PRQ f g P d PRQ i U PRQ The second parameter is necessary to specify the size of the array.
26 jlk m on p qr n n ps t jlk m u wv x j k m y j{z o } j k m ~ j{ {ƒ n t j u j j y j{z o j j t y kp ˆt ˆq x j Š on mœ kn Ž on mœ kn ƒ j q n jlk m r n n ps t j k m u wv x jlk m y j z o } j k m ~ j{ {ƒ n t j u j j y j{z o j n jlk m t ˆq x ~ j
27 š œ š Ÿž ž ž ž ž ž Ÿ Ÿ š ª lÿ «{ Ÿž ž ž ± ² ² ± ³ µ ¹lº» ¼ ½¾ À Á Âà ÅÄ Æ ¹lº» ¼ ½¾ À Á Âà ÅÄ Ç È É Æ ÊË Ì Í ¹{Î Ë Ê ¹lº» ¼ ½¾ À Ï Ð Á Âà ÅÄ Ç Ð Æ ÊË ÑÒ Í Í ¹ Î Ë Ê ¹lº» ¼ ½¾ À Ï Ð Á Ó Æ ÊË Ñ ÔÌ Õ ºÌ» Ë Ê
28 Ö Ø Are Arrays and Pointers Interchangeable? Array parameters are interchangeable with pointer parameters, but array variables are not the same as pointer variables. C compiler converts name of an array to a constant pointer when necessary sizeof(array) returns number of bytes occupied by array, whereas sizeof(pointer) returns number of bytes used to store pointer
29 ÜÙ Û Û è á ÿ þ ûü ïð ò ñë îí úù Are Arrays and Pointers Interchangeable? àeá ß ß ß ÝÞ ÙRÚ Üé Ûçæ Ù Ú å âäã ÙRÚ Rý eø ö ôõ ô ô ó is ëeì ê is the number of bytes used to. store a pointer to an
30 " # - 3 +*, 0. +*, 3 0 / ) Pointers & Multi-Dimensional Arrays example: & ( $' & $%! Arrays stored in row-major order
31 BA BA = > C C = NR NM Z U X NM M NM NM O O V C S S U Z S X NR NR M NR V C? NR NM > O V [ ^ b m qp qp e b g n g r r } ` l g m y Pointers & Multi-Dimensional Arrays HLK G EJ I?@ H G EF D?@ :<; S K :<; OQP G K EF D Y Y O W K T N G K EJ I Y Y W K T N H S? H W K as a one-dimensional array of integers: View _a` \<] t{ z ko m y tu s ko kl m kl v w vxw h i hji f ` cld ` b _a` b
32 ~ Š Ž œ š Pointers & Multi-Dimensional Arrays Point to row in array : ƒa < Š jˆ or: L Œ since is the th row of contrast with single-dimensional array where to žÿ equivalent
33 ««µ Á «ª À ¼ ¾ ¾ Æ ÅÄ Ã Ç È ÑÒ Ô ÞÝ Ü ÛÚ Ï ÎÍ ÌË Ó ÎÍ ÌË Ð Õ Õ Pointers & Multi-Dimensional Arrays : of array Clear row L¹ ² µ ± ³ ª ² ± ª a < < ³ ² À À ± ¹ ² ¹ ½ ºL»  ¹ a Can pass to a function that is expecting a onedimensional array as its argument. Find largest element in row of : álâ à ß Ø Ù Ò Ö Ê Ï É<Ê É<Ê
34 ã é çè é çè ê îï ë Pointers & Multi-Dimensional Arrays Caution: The base address of a two-dimensional array, not. äæå The array name by itself is equivalent to ìæí is ð
35 õø õö ó ô ÿ ÿ üý û úõ ñ õ þ ô Storage Mapping Function ù ñò is equivalent to Note that column size is required in storage mapping function, which is why it must be specified in function declaration
Pointers. CS2023 Winter 2004
Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able
More informationModules. CS2023 Winter 2004
Modules CS2023 Winter 2004 Outcomes: Modules C for Java Programmers, Chapter 7, sections 7.4.1-7.4.6 Code Complete, Chapter 6 After the conclusion of this section you should be able to Understand why modules
More informationLecture 5 C Programming Language
Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the
More informationCassandra: Distributed Access Control Policies with Tunable Expressiveness
Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 1/12 Cassandra: Distributed Access Control Policies with Tunable Expressiveness Moritz Y. Becker and Peter Sewell Computer
More informationAPPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC
APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date
More informationCMPT 470 Based on lecture notes by Woshun Luk
* ) ( & 2XWOLQH &RPSRQHQ 2EMHF 0RGXOHV CMPT 470 ased on lecture notes by Woshun Luk What is a DLL? What is a COM object? Linking two COM objects Client-Server relationships between two COM objects COM
More informationO Type of array element
! " #! $ % % # & : ; a ontiguous sequene of variables. all of the sae type. Eah variable is identified by its index. Index values are integers. Index of first entry is. ' ( ) * + May /,. - ( & ( ( J K
More informationConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing
ConMan A Web based Conference Manager for Asterisk -or- How I Managed to get Con'd into skipping my summer vacation by building this thing $90503&07 $:3.74889028,-47,94708 $90503&078:3.42 Sun Labs, slide
More informationCartons (PCCs) Management
Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,
More information1. Oracle Mobile Agents? 2. client-agent-server client-server
1. Oracle Mobile Agents?!"#$ application software system%. &'( )'*+, -. */0 1 23 45 678 9:; >?, %@ +%. - 6A(mobility) : B? CDE@ F GH8!" * channel #I 1 = / 4%. ()'*, &', LAN) - * application
More informationThis file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.
Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts
More information) $ G}] }O H~U. G yhpgxl. Cong
» Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã
More informationSecond Year March 2017
Reg. No. :... Code No. 5052 Name :... Second Year March 2017 Time : 2 Hours Cool-off time : 15 Minutes Part III COMPUTER APPLICATION (Commerce) Maximum : 60 Scores General Instructions to Candidates :
More informationIII. CLAIMS ADMINISTRATION
III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800
More informationPersonal Conference Manager (PCM)
Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her
More information1 Swing 2006A 5 B? 18. Swing Sun Microsystems AWT. 3.1 JFrame JFrame GHI
' þ ³ š ³ œ ³ 2006 1 Swing! " # &%' ()+-,./0 1 2 45-6 &8% 9 : ; < = >@? 2006A 5 B? 18 C@D E F : G HJILK-M!NPO-Q R S-I!T R!U V-W X Y!Z[N GUI\ ] ^ O-Q R S _a` b-w!c dje!f g Swing Wh i Z j k l m n N VisualEditor
More informationUSB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual
USB-ASC232 ASCII RS-232 Controlled USB Keyboard and Mouse Cable User Manual Thank you for purchasing the model USB-ASC232 Cable HAGSTROM ELECTRONICS, INC. is pleased that you have selected this product
More informationASCII Code - The extended ASCII table
ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage
More informationProbabilistic analysis of algorithms: What s it good for?
Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like
More informationSheila. Regular Bold. User s Guide
Sheila Regular Bold User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your
More informationHoneyBee User s Guide
HoneyBee User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is
More informationState of Connecticut Workers Compensation Commission
State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,
More informationTools for LC physics study
Tool for LC phyic tudy Akiya Miyamoto, KEK Content: 1. Introduction to JLC computing 9:00-9:30 2. Breif introduction to C++ 9:30-10:00 3. Introduction to ROOT 10:00-11:30 4. Introduction to JSF and Demo
More informationAdorn. Serif. Smooth. v22622x
s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs
More informationOOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement
OOstaExcel.ir J. Abbasi Syooki HTML Name HTML Number دهدهی ا کتال هگزاد سیمال باینری نشانه )کاراکتر( توضیح Null char Start of Heading Start of Text End of Text End of Transmission Enquiry Acknowledgment
More information7. IP. » &!'() (IS: intermediate system) !"#$% *+'() (ES: end system) Copyright 2000, Suguru Yamaguchi, All right reserved
7. IP»!"#$%» &!'() (IS: intermediate system) *+'() (ES: end system) 1 ISES ES: End System!"#$Ethernet%&' ()*+,'-./ Ethernet IS: Intermediate System =>?@&+12/AB$CD EF FDDI ES: End System 0 FDDI%&'12!"#$345
More informationERNST. Environment for Redaction of News Sub-Titles
ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or
More informationA Mixed Fragmentation Algorithm for Distributed Object Oriented Databases 1
A Mixed Fragmentation Algorithm for Distributed Object Oriented Databases 1 Fernanda Baião Department of Computer Science - COPPE/UFRJ Abstract Federal University of Rio de Janeiro - Brazil baiao@cos.ufrj.br
More informationMAT 22B-001: Differential Equations
MAT 22B-001: Differential Equations Final Exam Solutions Note: There is a table of the Laplace transform in the last page Name: SSN: Total Score: Problem 1 (5 pts) Solve the following initial value problem
More informationBUCKLEY. User s Guide
BUCKLEY User s Guide O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make
More informationTo provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts.
200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD msde.maryland.gov TO: FROM: Members of the Maryland State Board of Education Jack R. Smith, Ph.D. DATE: December 8, 2015
More informationModels, Notation, Goals
Scope Ë ÕÙ Ò Ð Ò ÐÝ Ó ÝÒ Ñ ÑÓ Ð Ü Ô Ö Ñ Ö ² Ñ ¹Ú ÖÝ Ò Ú Ö Ð Ö ÒÙÑ Ö Ð ÔÓ Ö ÓÖ ÔÔÖÓÜ Ñ ÓÒ ß À ÓÖ Ð Ô Ö Ô Ú ß Ë ÑÙÐ ÓÒ Ñ Ó ß ËÑÓÓ Ò ² Ö Ò Ö Ò Ô Ö Ñ Ö ÑÔÐ ß Ã ÖÒ Ð Ñ Ó ÚÓÐÙ ÓÒ Ñ Ó ÓÑ Ò Ô Ö Ð Ð Ö Ò Ð ÓÖ Ñ
More informationAdorn. Slab Serif Smooth R E G U LAR. v22622x
s u Adorn f Slab Serif Smooth R E G U LAR B OL D t 0 v22622x 9 user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates,
More information124 DISTO pro 4 / pro 4 a-1.0.0zh
0 30 40 50 DISTO PD-Z01 14 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 15 16 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 17 1 PD-Z03 3 7 4 5 6 10 9 8 18 DISTO pro 4 / pro 4 a-1.0.0
More informationVersion /10/2015. Type specimen. Bw STRETCH
Version 1.00 08/10/2015 Bw STRETCH type specimen 2 Description Bw Stretch is a compressed grotesque designed by Alberto Romanos, suited for display but also body text purposes. It started in 2013 as a
More informationAdorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION
s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on
More informationEstimate Traffic with Combined Neural Network Approach
Estimate Traffic with Combined Neural Network Approach Edmond Chin-Ping Chang, Ph.D., P.E Oak Ridge National Laboratory, Oak Ridge, TN 37831-6207 USA E-mail: ecc2005@ornl.gov Abstract - Many operating
More informationNGN Charging issues NGN charging overview Some of IP charging projects and international activities Proposals for NGN charging
! #" # % %$ Introduction NGN overview BcN overview BcN trial Service NGN Charging issues NGN charging overview Some of IP charging projects and international activities Proposals for NGN charging Conclusions
More informationContrast. user s guide
N Contrast chu U77777777V user s guide c P font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.
More informationA Survey of Current CLOS MOP Implementations
A Survey of Current CLOS MOP Implementations Raymond de Lacaze Artificial Intelligence Center SRI International 333 Ravenswood Ave. Menlo Park, CA 9402 delacaze@ai.sri.com Tim Bradshaw Cley Limited 6 East
More informationRapid Prototyping of flexible Embedded Systems on multi-dsp Architectures
Rapid Prototyping of flexible Embedded Systems on multi-dsp Architectures Bernhard Rinner, Martin Schmid and Reinhold Weiss Institut für Technische Informatik Technische Universität Graz Inffeldgasse 16/1,
More informationThe course that gives CMU its Zip! Web Services Nov 26, Topics HTTP Serving static content Serving dynamic content
15-213 The course that gives CMU its Zip! Web Services Nov 26, 2002 Topics HTTP Serving static content Serving dynamic content Web History 1945: 1989: 1990: Vannevar Bush, As we may think, Atlantic Monthly,
More informationoptions (alternatives)
)! "!#$% #!&! '#($ * +,-./012-3/,-/ 452363/,7,89:636 ; ?@ABCDE=F@GGH>IJ@KLGMLBH=>JL>LGNCHC ; O@?HCH=> PQ=RG@EST=GKH>IDTBLI@C ; U@GLBH=> =V O W B= C=E@ =BX@Q O H C?HAGH>@C * 452363/,YZ8[3,\ 1,05. ],25.-83,-:
More informationCommunication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages.
TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 200 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/00 G2: ESC 02/14 06/00 G3: ESC 02/15 06/00 C0: -- C1: -- NAME:
More informationGetting round your Mac with Shortcut Keys
The Mac has many useful keyboard shortcuts but these do depend on you knowing the difference between the following keys: Shift Fn Ctrl Alt (Also referred to as Option) Command (Also referred to as the
More informationEvaluation of Ethernet based Control Network used in the Distributed Control System
Proceedings on the 15th CISL Winter Workshop Kushu, Japan February 2002 Evaluation of Ethernet based Control Network used in the Distributed Control System Jae Young Choi Control Information Systems Lab.,
More informationBanner 8 Using International Characters
College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating
More informationSegments Proofs Reference
Segments Proofs Reference Properties of Equality Addition Property Subtraction Property Multiplication Property Division Property Distributive Property Reflexive Property The properties above may only
More information7DONSODQ. ƒ We called our platform 9 D-II TG: Distributed Internet Traffic Generator
',7*'LVWULEXWHG,QWHUQHW7UDIILF *HQHUDWRU Antonio Pescapè,, Donato Emma, Stefano Avallone,, Alessio Botta, and Giorgio Ventre { pescape@unina.it @unina.it} Dipartimento Informatica e Sistemistica Università
More informationClaimSpotter: an Environment to Support Sensemaking with Knowledge Triples
ClaimSpotter: an Environment to Support Sensemaking with Knowledge Triples Bertrand Sereno, Simon Buckingham Shum & Enrico Motta Knowledge Media Institute The Open University Milton Keynes MK7 6AA, UK
More informationfont faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS
font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:
More informationCurvature of subdivision surfaces
Curvature of subdivision surfaces a differential geometric analysis and literature review Jörg Peters, jorg@cise.ufl.edu Georg Umlauf, georg.umlauf@gmx.de Motivation Almost all subdivision algorithms in
More informationfont faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS
font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:
More informationAlfred Aho Brian Kernighan Peter Weinberger gawk awk GUN. GNU linux. gawk
awk linux/unix awk linux/unix ( ) awk Alfred AhoBrian KernighanPeter Weinbergergawk awk GUN awk gawk GNU linux Bell awk GNU awk gawk awk [options] 'script' var=value file(s) awk [options] -f scriptfile
More informationOracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011
Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper December 2011 Disclaimer The following is intended to outline our general product direction.
More informationESCAPE SEQUENCE G0: ESC 02/08 04/13 C0: C1: NAME Extended African Latin alphabet coded character set for bibliographic information interchange
TYPE: 9-character graphic character set REGISTRATION NUMBER: 9 DATE OF REGISTRATION: ESCAPE SEQUENCE G: ESC /8 / G: ESC /9 / G: ESC / / G: ESC / / C: C: NAME Extended African Latin alphabet coded character
More informationCommunication and processing of text in the Chuvash, Erzya Mordvin, Komi, Hill Mari, Meadow Mari, Moksha Mordvin, Russian, and Udmurt languages.
TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 201 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/01 G2: ESC 02/14 06/01 G3: ESC 02/15 06/01 C0: -- C1: -- NAME:
More informationChapter 5 Data Organization: The Load and Store Instructions
Chapter 5 Data Organization: The Load and Store Instructions Arthur B. Maccabe Department of Computer Science The University of New Mexico Copyright 1993 2000, Arthur B. Maccabe and McGraw-Hill, Inc. Assembler
More informationUNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614
UNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614 DATE: 7 May 2015 MARKS: 130 ASSESSOR: Prof. P.J. Blignaut (Bonus marks: 5) MODERATOR: Dr. L. de Wet TIME: 180 minutes
More informationDistrict Institute of Education and Training Lawspet, Puducherry.
District Institute of Education and Training Lawspet, Puducherry. Educational Computing Record work done by with the Register Number. Submitted for the Internal Assessment examination, April / May 2011,
More informationOn Constructing k-connected k-dominating Set in Wireless Networks
On Constructing k-connected k-dominating Set in Wireless Networks Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL Abstract An important problem
More informationBold U S E R S G U I D E
Yana Regular Bold Italic USER S GUIDE S S S font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.
More informationFor information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs
Juicy User s Guide opent ype faq: For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make it possible
More informationADORN. Roman. v x. user s gu ide
ADORN f Roman t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions on how to
More informationA COMPARISON BETWEEN OBJECT-ORIENTED DATABASE SYSTEMS AND INFORMATION SYSTEM SHELLS
A COMPARISON BETWEEN OBJECT-ORIENTED DATABASE SYSTEMS AND INFORMATION SYSTEM SHELLS ABSTRACT The work makes an overview of the main characteristics of object-oriented database systems (OODBS) and information
More informationfont faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS
font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:
More informationThe Logical Solution - Digital Video Extension. DVI EXTENSION - Velocity Series
Digital Video Extension System-3 Digital Video Extension System-3R Digital Video Extension System-3 A/V+ Digital Video Extension System-3 A/V Pro Digital Video Extension System-3R A/V+ MRTS Technology
More informationInformation management for MST cleanroom processes
PhoeniX Cleanroom Database Process Flow Module Application Note 200308001 Information management for MST cleanroom processes A systematic and efficient approach in managing and preserving the knowledge
More informationControl-Flow Graph and. Local Optimizations
Control-Flow Graph and - Part 2 Department of Computer Science and Automation Indian Institute of Science Bangalore 560 012 NPTEL Course on Principles of Compiler Design Outline of the Lecture What is
More informationCMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012
CMSC 33 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 2, FALL 22 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point formats
More informationAppendix C. Numeric and Character Entity Reference
Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your
More informationKbdKaz 500 layout tables
a ao a ao a o o o o o a a oo A o a a o a a oa ao oo A o a a o oa ao A a o a oa oa ao o a a a a o a A a a A ˆ a a A ˇ ao a a A a a A o Ao a a A Ao a o a a A ao a o a a A α a A a a a A o o a a A A a a A
More informationEffective Sequential Pattern Mining Algorithms for Dense Database
DEWS2006 3A-o4 Abstract Effective Sequential Pattern Mining Algorithms for Dense Database Zhenglu YANG, Yitong WANG, and Masaru KITSUREGAWA Institute of Industrial Science, The Univeristy of Tokyo Komaba
More informationAdorn. Slab Serif BOLD. v x. user s gu ide
Adorn f Slab Serif BOLD t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions
More informationConcurrent Execution
Concurrent Execution Overview: concepts and definitions modelling: parallel composition action interleaving algebraic laws shared actions composite processes process labelling, action relabeling and hiding
More informationUsing non-latin alphabets in Blaise
Using non-latin alphabets in Blaise Rob Groeneveld, Statistics Netherlands 1. Basic techniques with fonts In the Data Entry Program in Blaise, it is possible to use different fonts. Here, we show an example
More informationCMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes
Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter
More informationVisualization (human) Analysis (computer) Documents, Textures, Biometrics, Object recognition
Dr. Yoram Tal! " # $ $ % & ' Visualization (human) Enhancement, Restoration Analysis (computer) Documents, Textures, Biometrics, Object recognition There are fundamental differences between them 3 Dr.
More informationChemistry Hour Exam 2
Chemistry 838 - Hour Exam 2 Fall 2003 Department of Chemistry Michigan State University East Lansing, MI 48824 Name Student Number Question Points Score 1 15 2 15 3 15 4 15 5 15 6 15 7 15 8 15 9 15 Total
More informationAdorn. Serif. v x. user s gu ide
Adorn f Serif t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions on how to
More informationScan Scheduling Specification and Analysis
Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract
More informationIPv6 Servic es. LONG Net w ork
IP Servic es in LONG Net w ork Carlos Ralli Ucendo Telefonica Research & Development Overview IP Distributed Labs LONG: Building a distributed IP Lab. LONG Backbone LONG Global View LONG IP Services Examples
More informationFile Structures N F. Chapter 1-1. z M.Folk and B.Zoellick, File Structures, Addison Wesley.
File Structures žöof ú êëov f Ž N F z M.Folk and B.Zoellick, File Structures, Addison Wesley. z E. Horowitz, S. Sahni, and S. Anderson-Freed, Fundamentals of Data Structures in C, Computer Science Press.
More informationSFU CMPT Lecture: Week 8
SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing
More informationSemester Thesis. Ad-Hoc Services. Marc Schiely, Clemens Schroedter
Semester Thesis Ad-Hoc Services Marc Schiely, Clemens Schroedter maschiel@student.ethz.ch, clschroe@student.ethz.ch Dept. of Computer Science Swiss Federal Institute of Technology (ETH) Zurich Winter 2002
More informationHow to Implement DOTGO Engines. CMRL Version 1.0
How to Implement DOTGO Engines CMRL Version 1.0 Copyright c 2009 DOTGO. All rights reserved. Contents 1 Introduction 3 2 A Simple Example 3 2.1 The CMRL Document................................ 3 2.2 The
More informationChap. 3. Chap. 3. Recall and Precision Alternative Measures. TREC Collection CACM and ISI Collections CFC (Cystic Fibrosis Collection)
b!"$#%&'(!) *,+.-0/1-0/2 3547698;:'=?@A8;BC
More informationDescription AX5805. Default values for the permissible motors. Version: Date:
Description values for the permissible motors Version: 1.3.0 Date: 2017-06-01 Table of contents Table of contents 1 Foreword 2 1.1 Notes on the manual 2 1.1.1 Intendent audience 2 1.1.2 Origin of the
More informationDesigning Networks Incrementally
Designing Networks Incrementally Adam Meyerson Kamesh Munagala Ý Serge Plotkin Þ Abstract We consider the problem of incrementally designing a network to route demand to a single sink on an underlying
More informationDesign Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network
7 1 Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi, Timothy X Brown Department of Electrical Engg. University of Colorado at Boulder
More information[DP19] DN-500CD. Serial Command Protocol Guide
[DP19] Serial Command Protocol Guide Ver. 1.2 January 16, 2017 inmusic Brands, Inc. 1 1 Contents 2 General... 3 2.1 RS-232C Control... 3 3 Specification... 4 3.1 RS-232C Control... 4 4 Communication Protocol...
More informationAutomatic Verification of Finite State Concurrent Systems
Automatic Verification of Finite State Concurrent Systems Edmund M Clarke, Jr Computer Science Department Carnegie Mellon University Pittsburgh, PA 523 Temporal Logic Model Checking Specification Language:
More informationUser Guide for Greek GGT-Fonts Revision date: 23 May, 2011
User Guide for Greek GGT-Fonts Revision date: 23 May, 2011 by Graham G Thomason Copyright Graham G Thomason, 2009. Permission is granted to copy or publish this document, provided this complete notice
More informationConstraint Logic Programming (CLP): a short tutorial
Constraint Logic Programming (CLP): a short tutorial What is CLP? the use of a rich and powerful language to model optimization problems modelling based on variables, domains and constraints DCC/FCUP Inês
More informationConcurrent Architectures - Unix: Sockets, Select & Signals
Concurrent Architectures - Unix: Sockets, Select & Signals Assignment 1: Drop In Labs reminder check compiles in CS labs & you have submitted all your files in StReAMS! formatting your work: why to 80
More informationUNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614. DATE: 5 March 2015 MARKS: 100 SECTION A (36)
UNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614 DATE: 5 March 2015 MARKS: 100 ASSESSOR: Prof. P.J. Blignaut TIME: 180 minutes MODERATOR: Dr. L. de Wet SECTION A (36)
More information{c,} c 00E7 ç ç LATIN SMALL LETTER C WITH CEDILLA {'e} e 00E8 è è LATIN SMALL LETTER E WITH GRAVE {e'} e 00E9 é é LATIN SMALL
Non-ASCII Symbols in the SCA Armorial Database by Iulstan Sigewealding, updated by Herveus d'ormonde 4 January 2014 PDF Version by Yehuda ben Moshe, 16 February 2014 Since January 1996, the SCA Ordinary
More informationDynascrip The Dynascript Manual And Typesetting Guide A n o t h e r O r i g i n a l
The Dynascript Manual And Typesetting Guide Another Original Thank You! If you've purchased Dynascript, or are just looking into it Thank You! This manual will explain how Dynascript came to be, and how
More informationMyriad Pro Light. Lining proportional. Latin capitals. Alphabetic. Oldstyle tabular. Oldstyle proportional. Superscript ⁰ ¹ ² ³ ⁴ ⁵ ⁶ ⁷ ⁸ ⁹,.
Myriad Pro Light Latin capitals A B C D E F G H I J K L M N O P Q R S T U V W X Y Z & Æ Ł Ø Œ Þ Ð Á Â Ä À Å Ã Ç É Ê Ë È Í Î Ï Ì İ Ñ Ó Ô Ö Ò Õ Š Ú Û Ü Ù Ý Ÿ Ž Ă Ā Ą Ć Č Ď Đ Ě Ė Ē Ę Ğ Ģ Ī Į Ķ Ĺ Ľ Ļ Ń Ň Ņ
More informationarxiv: v1 [physics.soc-ph] 17 May 2007 Hiroyasu Inoue a,, Wataru Souma b, Schumpeter Tamada c
Spatial Characteristics of Joint Application Networks in Japanese Patents 1 arxiv:0705.2497v1 [physics.soc-ph] 17 May 2007 Hiroyasu Inoue a,, Wataru Souma b, Schumpeter Tamada c a ITEC, Doshisha University,
More information