Pointers & Arrays. CS2023 Winter 2004

Size: px
Start display at page:

Download "Pointers & Arrays. CS2023 Winter 2004"

Transcription

1 Pointers & Arrays CS2023 Winter 2004

2 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this section you should be able to Identify how pointers and array are similar and how they are different Use pointers to traverse C arrays (1D and 2D) and pointer subtraction to count how many elements have been traversed Use pointers to pass portions of C arrays to functions

3 Arrays and Pointers A single-dimensional array is a typed constant pointer initialized to point to a block of memory that can hold a number of objects. is an pointer that points to a block of memory that can hold 1000 integer objects is a pointer to.

4 ! Arrays and Pointers When an array is declared, compiler allocates enough contiguous space in memory to contain all the elements of array Base address of array is address of first element of array. Say bytes numbered 300, 304, 308,..., 696 are alocated as addresses of a[0], a[1],... a[99] is equivalent to Causes 300 to be assigned to p "

5 # ' %& $ ( # $*, ( -, ( # /. Arrays Assignment and Pointers Can access first element of an array using: )+* or through pointer: ) * Can access other elements of a using pointer arithmetic

6 Pointer Arithmetic Valid operations on pointers include: - the sum of a pointer and an integer - the difference of a pointer and an integer - pointer comparison - the difference of two pointers.

7 Sum of Pointer and Integer To access other objects in the block of memory pointed to, use where is an integer. This expression yields a pointer to the n-th object beyond the one that currently points to. The exact meaning of "object" is determined by the type of.

8 7 8? E : I H G J Sum of Pointer and Integer => ; < 9:? 8 D A D E? F M K I L K I 5 6 = > B > = B > =

9 RS T P Q Z V b ] \ Q X Z [ a c ^ Z [ e b ^ \ X [ Y Z d a c _ Z [ e _ [ \ X Z a f d c ` Z [ Sum of Pointer and Integer WY WX U V N O WX W Y b WX

10 t m u n m yz i o s { ƒv Sum of Pointer and Integer: ith object v w prq n o m gh hx k x l lk j ji }~ j h or v are equivalent. and

11 Š Œ œ Ÿ ž œ œ Š š š Œ ² ± Ž«œ µ Sum of Pointer and Integer: ith object Ž ˆ Ž š ˆ œ Ž Š Ÿ Š Œ Ÿ Š Ž Ÿ ª ³ Ž œ Ÿ š

12 ¹ º Difference of Pointer and Integer Often, we need to access objects preceding the object pointed to by a pointer yields a pointer to the n-th object before the one that currently points to.

13 À Á ½ ¾ Ç Ã Ï Ê É ¾ Å Ç È Ñ Ð Ë Ç È Ó Ö Í Õ Å È Æ Ç Ò Ì Ô Î Ç È Û Î Å Ç Ú Ø È Ì Ù Í Ç È Difference of Pointer and Integer ÄÆ ÄŠ û ¼ ÄÅ Ä Æ Ü ÄÅ

14 Example Ý Þàß áâ ßã äå çæ è â ã é êìë í êìî í ï ð äå çæ ñóò ë ô ïò õ ö ê â ã â é â ï â ø ß é ùàß ú àû ü ý ê ö ö ê û þ é ë þ é â ã ßÿ ß ÿ ß û ÿ Þàß ÿ ê ö á û ÿ â ô í î ô ë äå çæ ò â äå çæ ò â ë ÿ â ã é á á ã í ê î â ò è

15 ! '& $% # " Careful! Given a block of memory of you can set objects, pointed to by to point to the last object in the block using:, rather than ( off by one error).

16 * ) ( +, Pointer Comparison Two pointers of the same type, and, may be compared as long as both of them point to objects within a single memory block Pointers may be compared using the <, >, <=, >=, ==,!= When you are comparing two pointers, you are comparing the values of those pointers rather than the contents of memory locations pointed to by these pointers

17 ?> ; U E E E TS K J P D D AB D M F G V K J AB D F V V K D U E E E TS ^ P D D ] _ K D W G P P Pointers and traversals Assuming 8: /. doubles: <= pointing to an array of and QR LNM H:I C/D D O D F E M V D H I H/\ B Y Z:[ J X/Y E/W B L M QR C/D M D F D F ] ] U M ` V D E/W B

18 m d d d c lk g h ba f f e pq Block Traversal Idiom ij h h p p o n

19 r s w ~ {z { w Œ Ž s s ~ Ž ƒ ƒ ƒ ~ z Ž s ~ ~ s ~ {z uz Example: largest element ƒ { } u }~ u w rs ~z z { u u w u z wyx tvu ƒ{ } u ˆ x w u z }~ Š ƒ { } u ˆ x ƒ } u ˆ x { ƒ s ƒ ƒ w x

20 œ ž ± Example: block copy of Copy the contents of a block (or array) pointed to by size to another block pointed to by : š :ª 6 6 Ÿ/ ««Ÿ/ ª µ ª ³ ² ª 6

21 ¹» º ¾ ¼ ½ À Á Ç ÆÅ Ã Â Ï Ë Ê É Pointer Subtraction Given two pointers, and, such that: both pointers are of the same type, > both point to objects in a single memory block, the expression yields the number of objects between including the object pointed to by. and The type of the result of pointer difference is defined in. Ë/Ì Í Î, ÃyÄ Ç È,

22 Ò Ó Ø è Ú Ý é ß Þ Ó Û Ü Ý ç áâ Ò Ú Ú Û Ü æ Ø Pointer Subtraction Ø Ö ÔÕ Ü Ù6Û Ù6Ú Ð/Ñ ê Ü Ó ã å ãä Ð Ñ à Output: 3

23 ë ò ï õ ôó ï óö ò ï ï ï ï ó ó ó ö ó ö ûÿ ï ò ï õ ôó ó ó Example in a block of Find the first occurrence of the value integers ( if not found): íî ì ï ô ðö ò ïñð óùø ò ïñð ú ÿ ïþý ü ïñû ïñð ó ú ö ó ô ï ó ï ï ó ö ó ï ô ð

24 ! F F " # # + E D C G " 76 0 /. 2 1 = 3 L OJ # 0. ; " : B " 3 => 0 1!? in a block of H IJK LNM A@ Example Find the first occurrence of the value integers ( if not found): " %$ & #, *) ( ' # & " '+ / 7 <

25 ]\ YX PW S a` S ^ c U ^ Z[ UT V b ]\ YX Ph S S ^ c ^ Z[ UT V b Arrays as Parameters When arrays are used as function parameters, they are actually treated as pointers. The following two declarations are equivalent: feg Ped PRQ PRQ f g P d PRQ i U PRQ The second parameter is necessary to specify the size of the array.

26 jlk m on p qr n n ps t jlk m u wv x j k m y j{z o } j k m ~ j{ {ƒ n t j u j j y j{z o j j t y kp ˆt ˆq x j Š on mœ kn Ž on mœ kn ƒ j q n jlk m r n n ps t j k m u wv x jlk m y j z o } j k m ~ j{ {ƒ n t j u j j y j{z o j n jlk m t ˆq x ~ j

27 š œ š Ÿž ž ž ž ž ž Ÿ Ÿ š ª lÿ «{ Ÿž ž ž ± ² ² ± ³ µ ¹lº» ¼ ½¾ À Á Âà ÅÄ Æ ¹lº» ¼ ½¾ À Á Âà ÅÄ Ç È É Æ ÊË Ì Í ¹{Î Ë Ê ¹lº» ¼ ½¾ À Ï Ð Á Âà ÅÄ Ç Ð Æ ÊË ÑÒ Í Í ¹ Î Ë Ê ¹lº» ¼ ½¾ À Ï Ð Á Ó Æ ÊË Ñ ÔÌ Õ ºÌ» Ë Ê

28 Ö Ø Are Arrays and Pointers Interchangeable? Array parameters are interchangeable with pointer parameters, but array variables are not the same as pointer variables. C compiler converts name of an array to a constant pointer when necessary sizeof(array) returns number of bytes occupied by array, whereas sizeof(pointer) returns number of bytes used to store pointer

29 ÜÙ Û Û è á ÿ þ ûü ïð ò ñë îí úù Are Arrays and Pointers Interchangeable? àeá ß ß ß ÝÞ ÙRÚ Üé Ûçæ Ù Ú å âäã ÙRÚ Rý eø ö ôõ ô ô ó is ëeì ê is the number of bytes used to. store a pointer to an

30 " # - 3 +*, 0. +*, 3 0 / ) Pointers & Multi-Dimensional Arrays example: & ( $' & $%! Arrays stored in row-major order

31 BA BA = > C C = NR NM Z U X NM M NM NM O O V C S S U Z S X NR NR M NR V C? NR NM > O V [ ^ b m qp qp e b g n g r r } ` l g m y Pointers & Multi-Dimensional Arrays HLK G EJ I?@ H G EF D?@ :<; S K :<; OQP G K EF D Y Y O W K T N G K EJ I Y Y W K T N H S? H W K as a one-dimensional array of integers: View _a` \<] t{ z ko m y tu s ko kl m kl v w vxw h i hji f ` cld ` b _a` b

32 ~ Š Ž œ š Pointers & Multi-Dimensional Arrays Point to row in array : ƒa < Š jˆ or: L Œ since is the th row of contrast with single-dimensional array where to žÿ equivalent

33 ««µ Á «ª À ¼ ¾ ¾ Æ ÅÄ Ã Ç È ÑÒ Ô ÞÝ Ü ÛÚ Ï ÎÍ ÌË Ó ÎÍ ÌË Ð Õ Õ Pointers & Multi-Dimensional Arrays : of array Clear row L¹ ² µ ± ³ ª ² ± ª a < < ³ ² À À ± ¹ ² ¹ ½ ºL»  ¹ a Can pass to a function that is expecting a onedimensional array as its argument. Find largest element in row of : álâ à ß Ø Ù Ò Ö Ê Ï É<Ê É<Ê

34 ã é çè é çè ê îï ë Pointers & Multi-Dimensional Arrays Caution: The base address of a two-dimensional array, not. äæå The array name by itself is equivalent to ìæí is ð

35 õø õö ó ô ÿ ÿ üý û úõ ñ õ þ ô Storage Mapping Function ù ñò is equivalent to Note that column size is required in storage mapping function, which is why it must be specified in function declaration

Pointers. CS2023 Winter 2004

Pointers. CS2023 Winter 2004 Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able

More information

Modules. CS2023 Winter 2004

Modules. CS2023 Winter 2004 Modules CS2023 Winter 2004 Outcomes: Modules C for Java Programmers, Chapter 7, sections 7.4.1-7.4.6 Code Complete, Chapter 6 After the conclusion of this section you should be able to Understand why modules

More information

Lecture 5 C Programming Language

Lecture 5 C Programming Language Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the

More information

Cassandra: Distributed Access Control Policies with Tunable Expressiveness

Cassandra: Distributed Access Control Policies with Tunable Expressiveness Cassandra: Distributed Access Control Policies with Tunable Expressiveness p. 1/12 Cassandra: Distributed Access Control Policies with Tunable Expressiveness Moritz Y. Becker and Peter Sewell Computer

More information

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date

More information

CMPT 470 Based on lecture notes by Woshun Luk

CMPT 470 Based on lecture notes by Woshun Luk * ) ( & 2XWOLQH &RPSRQHQ 2EMHF 0RGXOHV CMPT 470 ased on lecture notes by Woshun Luk What is a DLL? What is a COM object? Linking two COM objects Client-Server relationships between two COM objects COM

More information

O Type of array element

O Type of array element ! " #! $ % % # & : ; a ontiguous sequene of variables. all of the sae type. Eah variable is identified by its index. Index values are integers. Index of first entry is. ' ( ) * + May /,. - ( & ( ( J K

More information

ConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing

ConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing ConMan A Web based Conference Manager for Asterisk -or- How I Managed to get Con'd into skipping my summer vacation by building this thing $90503&07 $:3.74889028,-47,94708 $90503&078:3.42 Sun Labs, slide

More information

Cartons (PCCs) Management

Cartons (PCCs) Management Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,

More information

1. Oracle Mobile Agents? 2. client-agent-server client-server

1. Oracle Mobile Agents? 2. client-agent-server client-server 1. Oracle Mobile Agents?!"#$ application software system%. &'( )'*+, -. */0 1 23 45 678 9:; >?, %@ +%. - 6A(mobility) : B? CDE@ F GH8!" * channel #I 1 = / 4%. ()'*, &', LAN) - * application

More information

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0. Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts

More information

) $ G}] }O H~U. G yhpgxl. Cong

) $ G}] }O H~U. G yhpgxl. Cong » Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã

More information

Second Year March 2017

Second Year March 2017 Reg. No. :... Code No. 5052 Name :... Second Year March 2017 Time : 2 Hours Cool-off time : 15 Minutes Part III COMPUTER APPLICATION (Commerce) Maximum : 60 Scores General Instructions to Candidates :

More information

III. CLAIMS ADMINISTRATION

III. CLAIMS ADMINISTRATION III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800

More information

Personal Conference Manager (PCM)

Personal Conference Manager (PCM) Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her

More information

1 Swing 2006A 5 B? 18. Swing Sun Microsystems AWT. 3.1 JFrame JFrame GHI

1 Swing 2006A 5 B? 18. Swing Sun Microsystems AWT. 3.1 JFrame JFrame GHI ' þ ³ š ³ œ ³ 2006 1 Swing! " # &%' ()+-,./0 1 2 45-6 &8% 9 : ; < = >@? 2006A 5 B? 18 C@D E F : G HJILK-M!NPO-Q R S-I!T R!U V-W X Y!Z[N GUI\ ] ^ O-Q R S _a` b-w!c dje!f g Swing Wh i Z j k l m n N VisualEditor

More information

USB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual

USB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual USB-ASC232 ASCII RS-232 Controlled USB Keyboard and Mouse Cable User Manual Thank you for purchasing the model USB-ASC232 Cable HAGSTROM ELECTRONICS, INC. is pleased that you have selected this product

More information

ASCII Code - The extended ASCII table

ASCII Code - The extended ASCII table ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage

More information

Probabilistic analysis of algorithms: What s it good for?

Probabilistic analysis of algorithms: What s it good for? Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like

More information

Sheila. Regular Bold. User s Guide

Sheila. Regular Bold. User s Guide Sheila Regular Bold User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your

More information

HoneyBee User s Guide

HoneyBee User s Guide HoneyBee User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is

More information

State of Connecticut Workers Compensation Commission

State of Connecticut Workers Compensation Commission State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,

More information

Tools for LC physics study

Tools for LC physics study Tool for LC phyic tudy Akiya Miyamoto, KEK Content: 1. Introduction to JLC computing 9:00-9:30 2. Breif introduction to C++ 9:30-10:00 3. Introduction to ROOT 10:00-11:30 4. Introduction to JSF and Demo

More information

Adorn. Serif. Smooth. v22622x

Adorn. Serif. Smooth. v22622x s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs

More information

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement OOstaExcel.ir J. Abbasi Syooki HTML Name HTML Number دهدهی ا کتال هگزاد سیمال باینری نشانه )کاراکتر( توضیح Null char Start of Heading Start of Text End of Text End of Transmission Enquiry Acknowledgment

More information

7. IP. » &!'() (IS: intermediate system) !"#$% *+'() (ES: end system) Copyright 2000, Suguru Yamaguchi, All right reserved

7. IP. » &!'() (IS: intermediate system) !#$% *+'() (ES: end system) Copyright 2000, Suguru Yamaguchi, All right reserved 7. IP»!"#$%» &!'() (IS: intermediate system) *+'() (ES: end system) 1 ISES ES: End System!"#$Ethernet%&' ()*+,'-./ Ethernet IS: Intermediate System =>?@&+12/AB$CD EF FDDI ES: End System 0 FDDI%&'12!"#$345

More information

ERNST. Environment for Redaction of News Sub-Titles

ERNST. Environment for Redaction of News Sub-Titles ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or

More information

A Mixed Fragmentation Algorithm for Distributed Object Oriented Databases 1

A Mixed Fragmentation Algorithm for Distributed Object Oriented Databases 1 A Mixed Fragmentation Algorithm for Distributed Object Oriented Databases 1 Fernanda Baião Department of Computer Science - COPPE/UFRJ Abstract Federal University of Rio de Janeiro - Brazil baiao@cos.ufrj.br

More information

MAT 22B-001: Differential Equations

MAT 22B-001: Differential Equations MAT 22B-001: Differential Equations Final Exam Solutions Note: There is a table of the Laplace transform in the last page Name: SSN: Total Score: Problem 1 (5 pts) Solve the following initial value problem

More information

BUCKLEY. User s Guide

BUCKLEY. User s Guide BUCKLEY User s Guide O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make

More information

To provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts.

To provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts. 200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD msde.maryland.gov TO: FROM: Members of the Maryland State Board of Education Jack R. Smith, Ph.D. DATE: December 8, 2015

More information

Models, Notation, Goals

Models, Notation, Goals Scope Ë ÕÙ Ò Ð Ò ÐÝ Ó ÝÒ Ñ ÑÓ Ð Ü Ô Ö Ñ Ö ² Ñ ¹Ú ÖÝ Ò Ú Ö Ð Ö ÒÙÑ Ö Ð ÔÓ Ö ÓÖ ÔÔÖÓÜ Ñ ÓÒ ß À ÓÖ Ð Ô Ö Ô Ú ß Ë ÑÙÐ ÓÒ Ñ Ó ß ËÑÓÓ Ò ² Ö Ò Ö Ò Ô Ö Ñ Ö ÑÔÐ ß Ã ÖÒ Ð Ñ Ó ÚÓÐÙ ÓÒ Ñ Ó ÓÑ Ò Ô Ö Ð Ð Ö Ò Ð ÓÖ Ñ

More information

Adorn. Slab Serif Smooth R E G U LAR. v22622x

Adorn. Slab Serif Smooth R E G U LAR. v22622x s u Adorn f Slab Serif Smooth R E G U LAR B OL D t 0 v22622x 9 user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates,

More information

124 DISTO pro 4 / pro 4 a-1.0.0zh

124 DISTO pro 4 / pro 4 a-1.0.0zh 0 30 40 50 DISTO PD-Z01 14 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 15 16 DISTO pro 4 / pro 4 a-1.0.0 DISTO pro 4 / pro 4 a-1.0.0 17 1 PD-Z03 3 7 4 5 6 10 9 8 18 DISTO pro 4 / pro 4 a-1.0.0

More information

Version /10/2015. Type specimen. Bw STRETCH

Version /10/2015. Type specimen. Bw STRETCH Version 1.00 08/10/2015 Bw STRETCH type specimen 2 Description Bw Stretch is a compressed grotesque designed by Alberto Romanos, suited for display but also body text purposes. It started in 2013 as a

More information

Adorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION

Adorn. Serif. Smooth. v22622x. user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on

More information

Estimate Traffic with Combined Neural Network Approach

Estimate Traffic with Combined Neural Network Approach Estimate Traffic with Combined Neural Network Approach Edmond Chin-Ping Chang, Ph.D., P.E Oak Ridge National Laboratory, Oak Ridge, TN 37831-6207 USA E-mail: ecc2005@ornl.gov Abstract - Many operating

More information

NGN Charging issues NGN charging overview Some of IP charging projects and international activities Proposals for NGN charging

NGN Charging issues NGN charging overview Some of IP charging projects and international activities Proposals for NGN charging ! #" # % %$ Introduction NGN overview BcN overview BcN trial Service NGN Charging issues NGN charging overview Some of IP charging projects and international activities Proposals for NGN charging Conclusions

More information

Contrast. user s guide

Contrast. user s guide N Contrast chu U77777777V user s guide c P font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.

More information

A Survey of Current CLOS MOP Implementations

A Survey of Current CLOS MOP Implementations A Survey of Current CLOS MOP Implementations Raymond de Lacaze Artificial Intelligence Center SRI International 333 Ravenswood Ave. Menlo Park, CA 9402 delacaze@ai.sri.com Tim Bradshaw Cley Limited 6 East

More information

Rapid Prototyping of flexible Embedded Systems on multi-dsp Architectures

Rapid Prototyping of flexible Embedded Systems on multi-dsp Architectures Rapid Prototyping of flexible Embedded Systems on multi-dsp Architectures Bernhard Rinner, Martin Schmid and Reinhold Weiss Institut für Technische Informatik Technische Universität Graz Inffeldgasse 16/1,

More information

The course that gives CMU its Zip! Web Services Nov 26, Topics HTTP Serving static content Serving dynamic content

The course that gives CMU its Zip! Web Services Nov 26, Topics HTTP Serving static content Serving dynamic content 15-213 The course that gives CMU its Zip! Web Services Nov 26, 2002 Topics HTTP Serving static content Serving dynamic content Web History 1945: 1989: 1990: Vannevar Bush, As we may think, Atlantic Monthly,

More information

options (alternatives)

options (alternatives) )! "!#$% #!&! '#($ * +,-./012-3/,-/ 452363/,7,89:636 ; ?@ABCDE=F@GGH>IJ@KLGMLBH=>JL>LGNCHC ; O@?HCH=> PQ=RG@EST=GKH>IDTBLI@C ; U@GLBH=> =V O W B= C=E@ =BX@Q O H C?HAGH>@C * 452363/,YZ8[3,\ 1,05. ],25.-83,-:

More information

Communication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages.

Communication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages. TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 200 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/00 G2: ESC 02/14 06/00 G3: ESC 02/15 06/00 C0: -- C1: -- NAME:

More information

Getting round your Mac with Shortcut Keys

Getting round your Mac with Shortcut Keys The Mac has many useful keyboard shortcuts but these do depend on you knowing the difference between the following keys: Shift Fn Ctrl Alt (Also referred to as Option) Command (Also referred to as the

More information

Evaluation of Ethernet based Control Network used in the Distributed Control System

Evaluation of Ethernet based Control Network used in the Distributed Control System Proceedings on the 15th CISL Winter Workshop Kushu, Japan February 2002 Evaluation of Ethernet based Control Network used in the Distributed Control System Jae Young Choi Control Information Systems Lab.,

More information

Banner 8 Using International Characters

Banner 8 Using International Characters College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating

More information

Segments Proofs Reference

Segments Proofs Reference Segments Proofs Reference Properties of Equality Addition Property Subtraction Property Multiplication Property Division Property Distributive Property Reflexive Property The properties above may only

More information

7DONSODQ. ƒ We called our platform 9 D-II TG: Distributed Internet Traffic Generator

7DONSODQ. ƒ We called our platform 9 D-II TG: Distributed Internet Traffic Generator ',7*'LVWULEXWHG,QWHUQHW7UDIILF *HQHUDWRU Antonio Pescapè,, Donato Emma, Stefano Avallone,, Alessio Botta, and Giorgio Ventre { pescape@unina.it @unina.it} Dipartimento Informatica e Sistemistica Università

More information

ClaimSpotter: an Environment to Support Sensemaking with Knowledge Triples

ClaimSpotter: an Environment to Support Sensemaking with Knowledge Triples ClaimSpotter: an Environment to Support Sensemaking with Knowledge Triples Bertrand Sereno, Simon Buckingham Shum & Enrico Motta Knowledge Media Institute The Open University Milton Keynes MK7 6AA, UK

More information

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:

More information

Curvature of subdivision surfaces

Curvature of subdivision surfaces Curvature of subdivision surfaces a differential geometric analysis and literature review Jörg Peters, jorg@cise.ufl.edu Georg Umlauf, georg.umlauf@gmx.de Motivation Almost all subdivision algorithms in

More information

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:

More information

Alfred Aho Brian Kernighan Peter Weinberger gawk awk GUN. GNU linux. gawk

Alfred Aho Brian Kernighan Peter Weinberger gawk awk GUN. GNU linux. gawk awk linux/unix awk linux/unix ( ) awk Alfred AhoBrian KernighanPeter Weinbergergawk awk GUN awk gawk GNU linux Bell awk GNU awk gawk awk [options] 'script' var=value file(s) awk [options] -f scriptfile

More information

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011 Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper December 2011 Disclaimer The following is intended to outline our general product direction.

More information

ESCAPE SEQUENCE G0: ESC 02/08 04/13 C0: C1: NAME Extended African Latin alphabet coded character set for bibliographic information interchange

ESCAPE SEQUENCE G0: ESC 02/08 04/13 C0: C1: NAME Extended African Latin alphabet coded character set for bibliographic information interchange TYPE: 9-character graphic character set REGISTRATION NUMBER: 9 DATE OF REGISTRATION: ESCAPE SEQUENCE G: ESC /8 / G: ESC /9 / G: ESC / / G: ESC / / C: C: NAME Extended African Latin alphabet coded character

More information

Communication and processing of text in the Chuvash, Erzya Mordvin, Komi, Hill Mari, Meadow Mari, Moksha Mordvin, Russian, and Udmurt languages.

Communication and processing of text in the Chuvash, Erzya Mordvin, Komi, Hill Mari, Meadow Mari, Moksha Mordvin, Russian, and Udmurt languages. TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 201 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/01 G2: ESC 02/14 06/01 G3: ESC 02/15 06/01 C0: -- C1: -- NAME:

More information

Chapter 5 Data Organization: The Load and Store Instructions

Chapter 5 Data Organization: The Load and Store Instructions Chapter 5 Data Organization: The Load and Store Instructions Arthur B. Maccabe Department of Computer Science The University of New Mexico Copyright 1993 2000, Arthur B. Maccabe and McGraw-Hill, Inc. Assembler

More information

UNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614

UNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614 UNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614 DATE: 7 May 2015 MARKS: 130 ASSESSOR: Prof. P.J. Blignaut (Bonus marks: 5) MODERATOR: Dr. L. de Wet TIME: 180 minutes

More information

District Institute of Education and Training Lawspet, Puducherry.

District Institute of Education and Training Lawspet, Puducherry. District Institute of Education and Training Lawspet, Puducherry. Educational Computing Record work done by with the Register Number. Submitted for the Internal Assessment examination, April / May 2011,

More information

On Constructing k-connected k-dominating Set in Wireless Networks

On Constructing k-connected k-dominating Set in Wireless Networks On Constructing k-connected k-dominating Set in Wireless Networks Fei Dai and Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL Abstract An important problem

More information

Bold U S E R S G U I D E

Bold U S E R S G U I D E Yana Regular Bold Italic USER S GUIDE S S S font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/.

More information

For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs

For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs Juicy User s Guide opent ype faq: For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make it possible

More information

ADORN. Roman. v x. user s gu ide

ADORN. Roman. v x. user s gu ide ADORN f Roman t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions on how to

More information

A COMPARISON BETWEEN OBJECT-ORIENTED DATABASE SYSTEMS AND INFORMATION SYSTEM SHELLS

A COMPARISON BETWEEN OBJECT-ORIENTED DATABASE SYSTEMS AND INFORMATION SYSTEM SHELLS A COMPARISON BETWEEN OBJECT-ORIENTED DATABASE SYSTEMS AND INFORMATION SYSTEM SHELLS ABSTRACT The work makes an overview of the main characteristics of object-oriented database systems (OODBS) and information

More information

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS

font faq HOW TO INSTALL YOUR FONT HOW TO INSERT SWASHES, ALTERNATES, AND ORNAMENTS font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is available in two formats:

More information

The Logical Solution - Digital Video Extension. DVI EXTENSION - Velocity Series

The Logical Solution - Digital Video Extension. DVI EXTENSION - Velocity Series Digital Video Extension System-3 Digital Video Extension System-3R Digital Video Extension System-3 A/V+ Digital Video Extension System-3 A/V Pro Digital Video Extension System-3R A/V+ MRTS Technology

More information

Information management for MST cleanroom processes

Information management for MST cleanroom processes PhoeniX Cleanroom Database Process Flow Module Application Note 200308001 Information management for MST cleanroom processes A systematic and efficient approach in managing and preserving the knowledge

More information

Control-Flow Graph and. Local Optimizations

Control-Flow Graph and. Local Optimizations Control-Flow Graph and - Part 2 Department of Computer Science and Automation Indian Institute of Science Bangalore 560 012 NPTEL Course on Principles of Compiler Design Outline of the Lecture What is

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 CMSC 33 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 2, FALL 22 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point formats

More information

Appendix C. Numeric and Character Entity Reference

Appendix C. Numeric and Character Entity Reference Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your

More information

KbdKaz 500 layout tables

KbdKaz 500 layout tables a ao a ao a o o o o o a a oo A o a a o a a oa ao oo A o a a o oa ao A a o a oa oa ao o a a a a o a A a a A ˆ a a A ˇ ao a a A a a A o Ao a a A Ao a o a a A ao a o a a A α a A a a a A o o a a A A a a A

More information

Effective Sequential Pattern Mining Algorithms for Dense Database

Effective Sequential Pattern Mining Algorithms for Dense Database DEWS2006 3A-o4 Abstract Effective Sequential Pattern Mining Algorithms for Dense Database Zhenglu YANG, Yitong WANG, and Masaru KITSUREGAWA Institute of Industrial Science, The Univeristy of Tokyo Komaba

More information

Adorn. Slab Serif BOLD. v x. user s gu ide

Adorn. Slab Serif BOLD. v x. user s gu ide Adorn f Slab Serif BOLD t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions

More information

Concurrent Execution

Concurrent Execution Concurrent Execution Overview: concepts and definitions modelling: parallel composition action interleaving algebraic laws shared actions composite processes process labelling, action relabeling and hiding

More information

Using non-latin alphabets in Blaise

Using non-latin alphabets in Blaise Using non-latin alphabets in Blaise Rob Groeneveld, Statistics Netherlands 1. Basic techniques with fonts In the Data Entry Program in Blaise, it is possible to use different fonts. Here, we show an example

More information

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter

More information

Visualization (human) Analysis (computer) Documents, Textures, Biometrics, Object recognition

Visualization (human) Analysis (computer) Documents, Textures, Biometrics, Object recognition Dr. Yoram Tal! " # $ $ % & ' Visualization (human) Enhancement, Restoration Analysis (computer) Documents, Textures, Biometrics, Object recognition There are fundamental differences between them 3 Dr.

More information

Chemistry Hour Exam 2

Chemistry Hour Exam 2 Chemistry 838 - Hour Exam 2 Fall 2003 Department of Chemistry Michigan State University East Lansing, MI 48824 Name Student Number Question Points Score 1 15 2 15 3 15 4 15 5 15 6 15 7 15 8 15 9 15 Total

More information

Adorn. Serif. v x. user s gu ide

Adorn. Serif. v x. user s gu ide Adorn f Serif t 9a0 v2226222x user s gu ide v fon t faq HOW T O I N S TA L L YOU R F ON T H O W T O I N S E R T S WA S H E S, You will receive your files as a zipped folder. For instructions on how to

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

IPv6 Servic es. LONG Net w ork

IPv6 Servic es. LONG Net w ork IP Servic es in LONG Net w ork Carlos Ralli Ucendo Telefonica Research & Development Overview IP Distributed Labs LONG: Building a distributed IP Lab. LONG Backbone LONG Global View LONG IP Services Examples

More information

File Structures N F. Chapter 1-1. z M.Folk and B.Zoellick, File Structures, Addison Wesley.

File Structures N F. Chapter 1-1. z M.Folk and B.Zoellick, File Structures, Addison Wesley. File Structures žöof ú êëov f Ž N F z M.Folk and B.Zoellick, File Structures, Addison Wesley. z E. Horowitz, S. Sahni, and S. Anderson-Freed, Fundamentals of Data Structures in C, Computer Science Press.

More information

SFU CMPT Lecture: Week 8

SFU CMPT Lecture: Week 8 SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing

More information

Semester Thesis. Ad-Hoc Services. Marc Schiely, Clemens Schroedter

Semester Thesis. Ad-Hoc Services. Marc Schiely, Clemens Schroedter Semester Thesis Ad-Hoc Services Marc Schiely, Clemens Schroedter maschiel@student.ethz.ch, clschroe@student.ethz.ch Dept. of Computer Science Swiss Federal Institute of Technology (ETH) Zurich Winter 2002

More information

How to Implement DOTGO Engines. CMRL Version 1.0

How to Implement DOTGO Engines. CMRL Version 1.0 How to Implement DOTGO Engines CMRL Version 1.0 Copyright c 2009 DOTGO. All rights reserved. Contents 1 Introduction 3 2 A Simple Example 3 2.1 The CMRL Document................................ 3 2.2 The

More information

Description AX5805. Default values for the permissible motors. Version: Date:

Description AX5805. Default values for the permissible motors. Version: Date: Description values for the permissible motors Version: 1.3.0 Date: 2017-06-01 Table of contents Table of contents 1 Foreword 2 1.1 Notes on the manual 2 1.1.1 Intendent audience 2 1.1.2 Origin of the

More information

Designing Networks Incrementally

Designing Networks Incrementally Designing Networks Incrementally Adam Meyerson Kamesh Munagala Ý Serge Plotkin Þ Abstract We consider the problem of incrementally designing a network to route demand to a single sink on an underlying

More information

Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network

Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network 7 1 Design Considerations for an On-Demand Minimum Energy Routing Protocol for a Wireless Ad Hoc Network Sheetalkumar Doshi, Timothy X Brown Department of Electrical Engg. University of Colorado at Boulder

More information

[DP19] DN-500CD. Serial Command Protocol Guide

[DP19] DN-500CD. Serial Command Protocol Guide [DP19] Serial Command Protocol Guide Ver. 1.2 January 16, 2017 inmusic Brands, Inc. 1 1 Contents 2 General... 3 2.1 RS-232C Control... 3 3 Specification... 4 3.1 RS-232C Control... 4 4 Communication Protocol...

More information

Automatic Verification of Finite State Concurrent Systems

Automatic Verification of Finite State Concurrent Systems Automatic Verification of Finite State Concurrent Systems Edmund M Clarke, Jr Computer Science Department Carnegie Mellon University Pittsburgh, PA 523 Temporal Logic Model Checking Specification Language:

More information

User Guide for Greek GGT-Fonts Revision date: 23 May, 2011

User Guide for Greek GGT-Fonts Revision date: 23 May, 2011 User Guide for Greek GGT-Fonts Revision date: 23 May, 2011 by Graham G Thomason Copyright Graham G Thomason, 2009. Permission is granted to copy or publish this document, provided this complete notice

More information

Constraint Logic Programming (CLP): a short tutorial

Constraint Logic Programming (CLP): a short tutorial Constraint Logic Programming (CLP): a short tutorial What is CLP? the use of a rich and powerful language to model optimization problems modelling based on variables, domains and constraints DCC/FCUP Inês

More information

Concurrent Architectures - Unix: Sockets, Select & Signals

Concurrent Architectures - Unix: Sockets, Select & Signals Concurrent Architectures - Unix: Sockets, Select & Signals Assignment 1: Drop In Labs reminder check compiles in CS labs & you have submitted all your files in StReAMS! formatting your work: why to 80

More information

UNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614. DATE: 5 March 2015 MARKS: 100 SECTION A (36)

UNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614. DATE: 5 March 2015 MARKS: 100 SECTION A (36) UNIVERSITY OF THE FREE STATE DEPARTMENT OF COMPUTER SCIENCE AND INFORMATICS CSIS1614 DATE: 5 March 2015 MARKS: 100 ASSESSOR: Prof. P.J. Blignaut TIME: 180 minutes MODERATOR: Dr. L. de Wet SECTION A (36)

More information

{c,} c 00E7 ç &ccedil LATIN SMALL LETTER C WITH CEDILLA {'e} e 00E8 è &egrave LATIN SMALL LETTER E WITH GRAVE {e'} e 00E9 é &eacute LATIN SMALL

{c,} c 00E7 ç &ccedil LATIN SMALL LETTER C WITH CEDILLA {'e} e 00E8 è &egrave LATIN SMALL LETTER E WITH GRAVE {e'} e 00E9 é &eacute LATIN SMALL Non-ASCII Symbols in the SCA Armorial Database by Iulstan Sigewealding, updated by Herveus d'ormonde 4 January 2014 PDF Version by Yehuda ben Moshe, 16 February 2014 Since January 1996, the SCA Ordinary

More information

Dynascrip The Dynascript Manual And Typesetting Guide A n o t h e r O r i g i n a l

Dynascrip The Dynascript Manual And Typesetting Guide A n o t h e r O r i g i n a l The Dynascript Manual And Typesetting Guide Another Original Thank You! If you've purchased Dynascript, or are just looking into it Thank You! This manual will explain how Dynascript came to be, and how

More information

Myriad Pro Light. Lining proportional. Latin capitals. Alphabetic. Oldstyle tabular. Oldstyle proportional. Superscript ⁰ ¹ ² ³ ⁴ ⁵ ⁶ ⁷ ⁸ ⁹,.

Myriad Pro Light. Lining proportional. Latin capitals. Alphabetic. Oldstyle tabular. Oldstyle proportional. Superscript ⁰ ¹ ² ³ ⁴ ⁵ ⁶ ⁷ ⁸ ⁹,. Myriad Pro Light Latin capitals A B C D E F G H I J K L M N O P Q R S T U V W X Y Z & Æ Ł Ø Œ Þ Ð Á Â Ä À Å Ã Ç É Ê Ë È Í Î Ï Ì İ Ñ Ó Ô Ö Ò Õ Š Ú Û Ü Ù Ý Ÿ Ž Ă Ā Ą Ć Č Ď Đ Ě Ė Ē Ę Ğ Ģ Ī Į Ķ Ĺ Ľ Ļ Ń Ň Ņ

More information

arxiv: v1 [physics.soc-ph] 17 May 2007 Hiroyasu Inoue a,, Wataru Souma b, Schumpeter Tamada c

arxiv: v1 [physics.soc-ph] 17 May 2007 Hiroyasu Inoue a,, Wataru Souma b, Schumpeter Tamada c Spatial Characteristics of Joint Application Networks in Japanese Patents 1 arxiv:0705.2497v1 [physics.soc-ph] 17 May 2007 Hiroyasu Inoue a,, Wataru Souma b, Schumpeter Tamada c a ITEC, Doshisha University,

More information