CYK Algorithm Adapted to the Penttonen Normal Form

Size: px
Start display at page:

Download "CYK Algorithm Adapted to the Penttonen Normal Form"

Transcription

1 CYK Algorithm Adapted to the Pettoe Normal Form Domiika Klobučíková* Abstract This paper deals with the topic of cotext-sesitive grammars as special cases of urestricted grammars, their ormal forms ad applicatios of these ormal forms. It presets a algorithm desiged usig the priciples of Cocke-Youger-Kasami algorithm to make a decisio, whether a iput strig is a setece of a cotext-sesitive grammar. The fial applicatio, which implemets this algorithm, works with cotext-sesitive grammars i Pettoe ormal form. Keywords: formal laguages ormal forms Kuroda Pettoe sytax aalysis CYK CKY Cocke-Youger-Kasami Supplemetary Material: Theoretical Example ( *xklobu0@stud.fit.vutbr.cz, Faculty of Iformatio Techology, Bro Uiversity of Techology. Itroductio Sytax aalysis is a essetial compoet of may disciplies focusig o strig processig oe such field is program iterpretatio. I practice, it has always bee limited to uambiguous, cotext-free grammars, as the less restricted families of grammars had prove both hard to use ad too difficult to process. However, as the aforemetioed area of study has bee progressig, the cotext-freeess offered by this set of grammars became o loger satisfactory, ad a eed to decompose the iput strig i a way reflectig atural laguage has arise. Cotext-sesitive grammars, ad therefore laguages geerated by them, preset a suitable iterlik betwee these sets, because they allow for cotext, which is a importat aspect of huma speech. Curretly, very few parsers capable of detectig cotext, ad therefore of processig grammars of this family, exist. The aim of this paper is to desig ad implemet such a algorithm that ca determiistically decide, whether the iput strig is a setece geerated by some grammar. To allow for maximum flexibility, the grammar is to be specified by the user. The algorithm itroduced i this paper is based o Cocke-Youger-Kasami (CYK) parsig algorithm for cotext-free grammars [], which works with grammars i Chomsky ormal form. To decide whether a strig is a member of some grammar, it cosiders all derivatio sequeces possibly leadig to the desired strig. It works i a bottom-up way. The preseted algorithm works with grammars i Pettoe ormal form, as a expasio of Chomsky ormal form. Apart from the way CYK works, it also applies a set of restrictios to prevet icosistecies of the derivatio tree. If some otermial was used to apply both a cotext-sesitive ad a cotext-free rule, it could lead to occureces of otermials that would ot appear i the derivatio tree uder ormal coditios. I evet of such rule collisio, the sytax tree is split ito two versios, of which each propagates a differet rule. I the evet of failure of oe such tree, a substitute is chose ad the process is repeated util the strig is either accepted, or there are o other possible sytax trees to be examied ad the strig is rejected. This algorithm offers the ability to parse a iput strig accordig to ay user-specified cotext-sesitive grammar i Pettoe ormal form [2]. Sice every cotext-sesitive grammar ca be coverted to a equivalet grammar i Pettoe ormal form, the algorithm therefore works for ay such grammar. This algorithm always halts eve for cyclic ad ambiguous

2 grammars. Details of its fuctioality will be further described i the followig sectios. 2. Urestricted Grammars Grammar is a ordered pair, G = (Σ,R), where: Σ is the alphabet composed of disjoit sets of otermials, N, ad termials,, R is a set of productio rules. N cotais the start symbol, deoted by S []. Urestricted grammars are the geeral family of grammars they properly iclude cotext-sesitive, cotext-free, ad regular grammars. Grammars of this family ca be recogized by a Turig machie or two-pushdow automato. Neither side of rules belogig to these grammars is restricted i ay way it ca cosist of ay strig of otermial ad termial symbols. The family of laguages geerated by urestricted grammars is closed uder the operatios of itersectio, uio, cocateatio ad iteratio, but ot uder set differece. Urestricted grammars geerally use Kuroda ormal form [3], which ormalizes all grammar rules ito oe of the followig forms: A BC, AB DC, A a, A ε. This form is similar to Chomsky ormal form for cotext-free laguages it adds the cotext-sesitiveess of AB DC. If A = D, the grammar is also i Pettoe ormal form, a special case of Kuroda ormal form. Ay grammar ca be algorithmically coverted ito a equivalet grammar i ormal form [2] the algorithm works as follows. It modifies the origial grammar, ad after each made chage, it moves the set of productio rules that adhere to the ormal form to the ew grammar. These chages are made as follows:. I all rules, replace every termial by a otermial ad iclude these productios i the ew grammar. 2. I all rules whose left-had side is loger tha the right-had side, exted the left-had side by a otermial that fially derives ito ε. 3. For each rule, i which a otermial derives ito a differet otermial, add a rule whose right-had side is composed of the derived otermial followed by the left-had side otermial of every rule the derived otermial is used i. 4. For every cotext-free productio rule whose right-had side is loger tha two, split it ito several coectig rules. 5. For every cotext-sesitive productio rule, pick the first pair of otermials o the left-had side of the rule ad esure that the pair derives ito the first otermial o the right-had side of the rule followed by a supplemetary otermial. Subsequetly, add a rule whose left-had side cosists of the supplemetary otermial ad the rest of the origial rule. Right-had side of this rule cosists of the remaiig otermials of the right-had side of the origial rule. I case the right-had side of the origial rule was of a legth greater tha three, further modify the rule util it coforms to the ormal form. 3. Algorithm Descriptio Give a grammar, G = ( G Σ, G R), i Pettoe ormal form, ad a strig w = a a 2...a with a i G, i, for some, this algorithm decides, whether w is a setece of L(G) i a bottom-up way. For its work, it uses a matrix of sets, CV CurretVersio, where CV [i, j], i j. Each such versio represets a versio of the sytax tree. Other tha this, the algorithm uses several sets that hold additioal iformatio the most importat oe beig V Versios, whose members are versios of the CV matrix the algorithm has geerated so far. Therefore, it cotais differet versios of the derivatio tree, of which all are mutually exclusive. Every member of CV [i, j] has its ow BLQ set every BlackListQueue cotais coordiates of all cells of the correspodig matrix that cotai cotext-sesitive otermials, but whose igored coordiates have ot bee set yet. As metioed above, every cell of the CV matrix cotais a set of otermials that are likely i this phase of the derivatio process. For every such otermial A, there exists a Predecessor set P A, cotaiig refereces to all of its predecessors. Ay otermial ca be marked as cotext-sesitive, which idicates that it origiated from a cotext-sesitive rule. The algorithm starts the parsig process by scaig the iput strig, addig A to CV [i,i], if A a i G R. For every such otermial, a empty set of its predecessors is costructed. Afterwards, the algorithm iterates through the matrix ad costructs the sets CV [i, j]. For every pair CV [i, j] ad CV [ j +,k], it checks whether CV [i, j] is a member of BLQ, which idicates that the set cotais cotext-sesitive oter-

3 mials, but its igored coordiates have ot bee appoited yet. These are the coordiates of the first right eighbour CV [i, j] is compared with, whose otermials must ot be used i combiatio with the cotextsesitive otermials of the examied set this is to esure the cosistecy of the derivatio tree. If the igored coordiates have ot bee set yet, those of CV [ j +,k] are used, ad CV [i, j] is removed from BLQ. The behaviour of the followig step is depedet o whether the igored coordiates of CV [i, j] are equal to CV [ j +,k]. If they are uequal, the algorithm proceeds as follows. Ay otermial B that satisfies A CV [i, j], C CV [ j +,k], AB AC G R, is added to CV [ j +,k]. This implies that C a j+... a k, ad therefore B a j+...a k. A empty set P B, used to refer to predecessors of the otermial, is costructed. A referece to otermial B is the added to sets P A ad P C, i case either of the origial otermials is to be deleted i the evet of versio splittig. This process is repeated util CV [ j +, k] caot be exteded aymore. If ay cotextsesitive otermials were added ad the set s igored coordiates have ot bee set yet, a referece to this set is added to BLQ. Ay otermial A is the added to the set CV [i,k], if it satisfies B CV [i, j], C CV [ j +,k], A BC G R, because B a i...a j, C a j+...a k, ad therefore A a i...a k. A empty set of predecessors, P A, is created for each added otermial A. A referece to otermial A is added to sets P B ad P C. If the igored coordiates are equal to CV [ j +,k], a copy of the matrix is created before the first matchig rule is applied. All cotext-sestive otermials of CV [i, j], icludig their predecessors, are deleted from the copy usig predecessor sets, P A for a otermial A, to recursively detect all of a otermial s predecessors. All of the subsequetly added otermials are the saved to the copy istead of CV. After the sca is completed, this copy is added to V. Oce o set ca be exteded, it is examied whether S CV [,], so S a...a. If the check is passed, the algorithm aouces ACCEPT. Otherwise, CV is removed from V, a member is appoited as the ew CV, ad parsig is cotiued for this versio of the matrix. If V is empty, ad therefore o ew CV ca be appoited, there are o alterative derivatio trees to be costructed. I such case, the algorithm aouces REJECT. The mai part of the algorithm, which describes otermial set matrix traversal, is described i Algorithm. This part also describes the fial testig for presece of the startig otermial. Algorithm Matrix traversal Iput: a grammar, G = ( G E, G R), i Pettoe ormal form; w = a a 2...a with a i G, i, for some. Output: ACCEPT if w L(G); REJECT if w / L(G). : itroduce set V = ; 2: itroduce matrix of sets CV, where CV [i, j] = for i j, ad add CV to V ; 3: itroduce set BLQ = ; 4: for i = to do 5: if A a i G R the 6: add A to CV [i, i]; 7: itroduce set P A = holdig refereces to A s predecessors; 8: parse loop: 9: repeat 0: for level = to do : for i = to level do 2: set k to i + level; 3: for offset = 0 to level do 4: set j to i + offset; 5: ApplyRules(i, j,k); 6: util o chage; 7: if S CV [,] the 8: ACCEPT 9: else 20: remove CV from V ; 2: if V the 22: pick a elemet of V ad set it as CV ; 23: else REJECT; 24: goto parse loop; The idices acquired i Algorithm are used to locate sets represetig substrigs of the iput strig, ad to subsequetly appoit coordiates of the otermial that jois these substrigs. The process is further described by Algorithm 2. Because the grammar, G, is fiite, the algorithm always fiishes. The proof of soudess is aalogical to that of the origial CYK algorithm [] (p. 20 2). Time complexity of the algorithm depeds o both size of the grammar, G, ad legth of the iput strig,. I the worst case sceario, each iteratio of the outermost loop reduces a sigle rule that triggers versio splittig. I this case, the complexity reaches

4 Algorithm 2 Rule Applicatio : procedure APPLYRULES(i, j, k) 2: if CV [i, j] BLQ the 3: set its igored coordiates to [ j +,k]; 4: remove CV [i, j] from BLQ; 5: if A CV [i, j], C CV [ j +,k], rhs(p) = AC for some A, C G N, p G R the 6: if coordiates igored by CV [i, j] are uequal to [ j +,k] the 7: if AB AC G R for some B G N the 8: add B to CV [ j+,k] ad mark it as cotext-sesitive; 9: if igored coordiates of CV [ j +, k] are ot set the 0: add CV [ j +,k] to BLQ; : if B AC for some B G N the 2: add B to CV [i, k]; 3: itroduce set P B = holdig refereces to B s predecessors; 4: add a referece to the otermial B to sets P A ad P C ; 5: else 6: if this istace of A is cotext-sesitive the cotiue to ext otermial; 7: create a copy of CV, its BLQ, ad all sets of predecessors; 8: remove all predecessors of cotextsesitive otermials i copy[i, j]; 9: remove all cotext-sesitive otermials from copy[i, j]; 20: if AB AC G R for some B G N the 2: add B to copy[ j +,k] ad mark it as cotext-sesitive; 22: if igored coordiates of copy [ j +,k] are ot set the 23: add copy[ j +,k] to the copy s BLQ; 24: if B AC G R for some B G N the 25: add B to copy[i,k]; 26: itroduce set P B = holdig refereces to B s predecessors; 27: add a referece to the otermial B to sets P A ad P C ; 28: add the copy to V ; O( 3 G 3 ), as described by Equatio. I that case, the algorithm creates a total of G additioal matrices, of which each cell ca hold G reduced otermials. That also meas the space complexity is O( 2 G 3 ), as described by Equatio 2. t = ( G + ) 2 i= i j= i k=0 G t = (2 ) G ( G + ) 2 6 O(t) = O( 3 G 3 ) s = ( G + ) i= G i ( G + )( G + )( G + ) s = 2 O(s) = O( 2 G 3 ) () (2) The experimetal results support these assumptios, as they show a steady growth whe icreasig oe of the parameters, ad a expoetial growth whe values of both are high. The values listed i Table are the average of a total of three rus with the specified parameters. The data was acquired usig Memcheck ad Callgrid utilities available as a part of the Valgrid memory checker suite. This data is further visualized ad compared to the aalytical values i Figure. Table. Time ad space complexity test results for a total of 42 iput grammars ad strigs with a overall success rate of 40.5 %. G Istructios Memory [B] Prototype Implemetatio The workig prototype, which implemets the algorithm, is programmed i C++. The laguage was chose because it allows object-orieted programmig, as well as its stadard cotaiers ad operatios available o them.

5 (a) Time complexity of the preseted algorithm estimated at O( 3 G 3 ). (b) Space complexity of algorithm reaches O( 2 G 3 ) i worst case sceario. Figure. Time ad space of the preseted algorithm both reach at least cubic values because of the cotextsesitive ature of the discussed topic. The purple grids represet aalytical values of estimated complexities, while the red poits represet average experimetal evalues from Table. The program is divided ito several classes, of which each has a distict role i the process of parsig user settigs, versioig, ad parsig the iput strig to fially decide membership of the iput strig: Grammar Adapter This module parses rules of a u- ser grammar accordig to the predefied format. Before savig a rule, it checks if the rule adheres to restrictios of Pettoe ormal form. Processed rules are subsequetly added to Grammar, as described below. Iput Strig Adapter This module works i a way similar to the previous oe. It scas the iput file ad coverts it ito a vector of termials that are later parsed accordig to Grammar. The tokes are divided by a white space, therefore the iput strig ca be of ulimited legth. Grammar Structure This module stores grammar rules used to detect derivatios. It cosists of three separate lists of rules, of which each set is used durig a differet phase of the parsig process termial rules, which are used to costruct the startig sets of otermials, cotext-free rules ad cotext-sesitive rules, which are used durig the later phases of the process. This module is resposible for verifyig right-had side match of the appropriate rule durig the parsig, as well as retrievig the left-had side otermials i case of a positive match. Versioig System This module is resposible for storig ad maagig viable versios of the otermial matrix the program has geerated so far. Each versio of the matrix has a correspodig blacklist queue of cotext-sesitive sets, as described i Sectio 3. The module keeps a referece to the curret versio of the matrix, which is modified durig the applicatio of productio rules. This module aouces the fial rejectio of the iput strig, if uable to appoit a ew versio of the parsig matrix for processig. Parsig Matrix This class presets a two-dimesioal map of matrix cells. Each such cell cotais a set of otermials used durig the parsig process, ad lists of rules that have bee used to geerate the member otermials of the correspodig set. These lists are used to prevet both edless loopig of cotext-sesitive rule applicatio, ad applicatio of rules that would lead to addig a otermial that had previously bee deleted from the set because of a cotext collisio. These modules are ecapsulated by a sigle Parser object. It parses the iput files, ad saves the adapters output. As described i algorithm, it creates the first versio of the matrix, iitializes it by creatig the startig sets of otermials accordig to the previously obtaied grammar, ad sets it as curret versio. Afterwards, the secod phase of the parsig process begis. Oce a matrix caot be chaged ay further, it checks for the presece of the startig otermial. I case of failure, the versioig system attempts to appoit a ew curret versio. 5. Coclusios This paper deals with the topic of cotext-sesitive grammars as special cases of urestricted grammars, ad applicatios of their ormal forms. It presets a algorithm capable of parsig these grammars ad a software implemetatio of this algorithm that implemets this algorithm. The algorithm is based o Cocke-Youger-Kasami parsig algorithm ad therefore works i a bottom-

6 Parser +parse() uses IputStrigAdapter -tokes: vector<strig> implemets Adapter <<Eumeratio>> RuleType #iput_file: ifstream +parseiputfile() TermialRule CotextFreeRule CotextSesitiveRule cosists of uses GrammarAdapter Grammar ProductioRule uses parses #iput_file: ifstream -applychages() -applycotextfreerule() -applycotextsesitiverule() -ruletype: RuleType +matchesrightside() +getleftsidenotermial() cosists of VersioSet ParsigMatrix Termial Coordiates +colum: Iteger +row: Iteger stores uses curret versio has a +traversematrix() cosists of cosists of -ame: strig exteds has blacklist queue VersioCofiguratio +has_versio_chaged: bool +isiblacklistqueue() +isversiosuccessful() is located at MatrixCell -wascfruleused: vector<bool> -wascsruleused: vector<bool> +addnotermialtoset() Notermial cotais a set of -is_cotext_sesitive: bool +addpredecessor() Figure 2. Diagram of classes as implemeted i the workig prototype. A istace of Parser class ecapsulates the two mai modules, of which each has a distict role Adapter scas the iput files holdig iput strig ad grammar, ad VersioSet stores the cosidered versios of the parsig matrix. up way. It is capable of parsig ay cotext-sesitive grammar i Pettoe ormal form, icludig ambiguous grammars. As this work focuses o a topic that has ot bee thoroughly researched yet, it aims to serve maily as a base for subsequet research. I the future, I would like to expad the algorithm to accept grammars i additioal ormal forms, which would allow for more extesive applicatio. Ackowledgemets I would like to thak my supervisor Prof. Alexader Medua, CSc. for his help. RNDr. Refereces [] MEDUNA, Alexader, Elemets of compiler desig. Boca Rato: Auerbach Publicatios, xiii, 286 p. ISBN [2] MEDUNA, Alexader, Automata ad laguages: theory ad applicatios editio. Lodo: Spriger, xv, 96 p. ISBN [3] ROZENBERG, Grzegorz ad Arto SALOMAA, 997. Hadbook of formal laguages: word, laguage, grammar. Berli: Spriger, xvii, 873 pages; 23 cm. ISBN

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a 4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 4 Procedural Abstractio ad Fuctios That Retur a Value Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 4.1 Top-Dow Desig 4.2 Predefied Fuctios 4.3 Programmer-Defied Fuctios 4.4

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Chapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 8 Strigs ad Vectors Overview 8.1 A Array Type for Strigs 8.2 The Stadard strig Class 8.3 Vectors Slide 8-3 8.1 A Array Type for Strigs A Array Type for Strigs C-strigs ca be used to represet strigs

More information

3. b. Present a combinatorial argument that for all positive integers n : : 2 n

3. b. Present a combinatorial argument that for all positive integers n : : 2 n . b. Preset a combiatorial argumet that for all positive itegers : : Cosider two distict sets A ad B each of size. Sice they are distict, the cardiality of A B is. The umber of ways of choosig a pair of

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

Today s objectives. CSE401: Introduction to Compiler Construction. What is a compiler? Administrative Details. Why study compilers?

Today s objectives. CSE401: Introduction to Compiler Construction. What is a compiler? Administrative Details. Why study compilers? CSE401: Itroductio to Compiler Costructio Larry Ruzzo Sprig 2004 Today s objectives Admiistrative details Defie compilers ad why we study them Defie the high-level structure of compilers Associate specific

More information

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)

Graphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU) Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Solutions to Final COMS W4115 Programming Languages and Translators Monday, May 4, :10-5:25pm, 309 Havemeyer

Solutions to Final COMS W4115 Programming Languages and Translators Monday, May 4, :10-5:25pm, 309 Havemeyer Departmet of Computer ciece Columbia Uiversity olutios to Fial COM W45 Programmig Laguages ad Traslators Moday, May 4, 2009 4:0-5:25pm, 309 Havemeyer Closed book, o aids. Do questios 5. Each questio is

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Chapter 8. Strings and Vectors. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 8. Strings and Vectors. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 8 Strigs ad Vectors Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 8.1 A Array Type for Strigs 8.2 The Stadard strig Class 8.3 Vectors Copyright 2015 Pearso Educatio, Ltd..

More information

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Getting Started. Getting Started - 1

Getting Started. Getting Started - 1 Gettig Started Gettig Started - 1 Issue 1 Overview of Gettig Started Overview of Gettig Started This sectio explais the basic operatios of the AUDIX system. It describes how to: Log i ad log out of the

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

University of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures

University of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures Uiversity of Waterloo Departmet of Electrical ad Computer Egieerig ECE 250 Algorithms ad Data Structures Midterm Examiatio ( pages) Istructor: Douglas Harder February 7, 2004 7:30-9:00 Name (last, first)

More information

Alpha Individual Solutions MAΘ National Convention 2013

Alpha Individual Solutions MAΘ National Convention 2013 Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions:

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions: CS 604 Data Structures Midterm Sprig, 00 VIRG INIA POLYTECHNIC INSTITUTE AND STATE U T PROSI M UNI VERSI TY Istructios: Prit your ame i the space provided below. This examiatio is closed book ad closed

More information

top() Applications of Stacks

top() Applications of Stacks CS22 Algorithms ad Data Structures MW :00 am - 2: pm, MSEC 0 Istructor: Xiao Qi Lecture 6: Stacks ad Queues Aoucemets Quiz results Homework 2 is available Due o September 29 th, 2004 www.cs.mt.edu~xqicoursescs22

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de

More information

Chapter 24. Sorting. Objectives. 1. To study and analyze time efficiency of various sorting algorithms

Chapter 24. Sorting. Objectives. 1. To study and analyze time efficiency of various sorting algorithms Chapter 4 Sortig 1 Objectives 1. o study ad aalyze time efficiecy of various sortig algorithms 4. 4.7.. o desig, implemet, ad aalyze bubble sort 4.. 3. o desig, implemet, ad aalyze merge sort 4.3. 4. o

More information

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS) CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a

More information

A Parallel DFA Minimization Algorithm

A Parallel DFA Minimization Algorithm A Parallel DFA Miimizatio Algorithm Ambuj Tewari, Utkarsh Srivastava, ad P. Gupta Departmet of Computer Sciece & Egieerig Idia Istitute of Techology Kapur Kapur 208 016,INDIA pg@iitk.ac.i Abstract. I this

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

From last week. Lecture 5. Outline. Principles of programming languages

From last week. Lecture 5. Outline. Principles of programming languages Priciples of programmig laguages From last week Lecture 5 http://few.vu.l/~silvis/ppl/2007 Natalia Silvis-Cividjia e-mail: silvis@few.vu.l ML has o assigmet. Explai how to access a old bidig? Is & for

More information

why study sorting? Sorting is a classic subject in computer science. There are three reasons for studying sorting algorithms.

why study sorting? Sorting is a classic subject in computer science. There are three reasons for studying sorting algorithms. Chapter 5 Sortig IST311 - CIS65/506 Clevelad State Uiversity Prof. Victor Matos Adapted from: Itroductio to Java Programmig: Comprehesive Versio, Eighth Editio by Y. Daiel Liag why study sortig? Sortig

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation

Xiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation Flexible Colorig Xiaozhou (Steve) Li, Atri Rudra, Ram Swamiatha HP Laboratories HPL-2010-177 Keyword(s): graph colorig; hardess of approximatio Abstract: Motivated b y reliability cosideratios i data deduplicatio

More information

Minimum Spanning Trees

Minimum Spanning Trees Miimum Spaig Trees Miimum Spaig Trees Spaig subgraph Subgraph of a graph G cotaiig all the vertices of G Spaig tree Spaig subgraph that is itself a (free) tree Miimum spaig tree (MST) Spaig tree of a weighted

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8

BAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8 BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

COP4020 Programming Languages. Compilers and Interpreters Prof. Robert van Engelen

COP4020 Programming Languages. Compilers and Interpreters Prof. Robert van Engelen COP4020 mig Laguages Compilers ad Iterpreters Prof. Robert va Egele Overview Commo compiler ad iterpreter cofiguratios Virtual machies Itegrated developmet eviromets Compiler phases Lexical aalysis Sytax

More information

A Boolean Query Processing with a Result Cache in Mediator Systems

A Boolean Query Processing with a Result Cache in Mediator Systems A Boolea Query Processig with a Result Cache i Mediator Systems Jae-heo Cheog ad Sag-goo Lee * Departmet of Computer Sciece Seoul Natioal Uiversity Sa 56-1 Shillim-dog Kwaak-gu, Seoul Korea {cjh, sglee}cygus.su.ac.kr

More information

are two specific neighboring points, F( x, y)

are two specific neighboring points, F( x, y) $33/,&$7,212)7+(6(/)$92,',1* 5$1'20:$/.12,6(5('8&7,21$/*25,7+0,17+(&2/285,0$*(6(*0(17$7,21 %RJGDQ602/.$+HQU\N3$/86'DPLDQ%(5(6.$ 6LOHVLDQ7HFKQLFDO8QLYHUVLW\'HSDUWPHQWRI&RPSXWHU6FLHQFH $NDGHPLFND*OLZLFH32/$1'

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Linear Time-Invariant Systems

Linear Time-Invariant Systems 9/9/00 LIEAR TIE-IVARIAT SYSTES Uit, d Part Liear Time-Ivariat Sstems A importat class of discrete-time sstem cosists of those that are Liear Priciple of superpositio Time-ivariat dela of the iput sequece

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Human-Computer Interaction IS4300

Human-Computer Interaction IS4300 Huma-Computer Iteractio IS4300 1 I5 due ext class Your missio i this exercise is to implemet a very simple Java paitig applicatio. The app must support the followig fuctios: Draw curves, specified by a

More information

Module 8-7: Pascal s Triangle and the Binomial Theorem

Module 8-7: Pascal s Triangle and the Binomial Theorem Module 8-7: Pascal s Triagle ad the Biomial Theorem Gregory V. Bard April 5, 017 A Note about Notatio Just to recall, all of the followig mea the same thig: ( 7 7C 4 C4 7 7C4 5 4 ad they are (all proouced

More information

EE University of Minnesota. Midterm Exam #1. Prof. Matthew O'Keefe TA: Eric Seppanen. Department of Electrical and Computer Engineering

EE University of Minnesota. Midterm Exam #1. Prof. Matthew O'Keefe TA: Eric Seppanen. Department of Electrical and Computer Engineering EE 4363 1 Uiversity of Miesota Midterm Exam #1 Prof. Matthew O'Keefe TA: Eric Seppae Departmet of Electrical ad Computer Egieerig Uiversity of Miesota Twi Cities Campus EE 4363 Itroductio to Microprocessors

More information

Using VTR Emulation on Avid Systems

Using VTR Emulation on Avid Systems Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit

More information

Minimum Spanning Trees

Minimum Spanning Trees Presetatio for use with the textbook, lgorithm esig ad pplicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 0 Miimum Spaig Trees 0 Goodrich ad Tamassia Miimum Spaig Trees pplicatio: oectig a Network Suppose

More information

Random Graphs and Complex Networks T

Random Graphs and Complex Networks T Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities

More information

Symmetric Class 0 subgraphs of complete graphs

Symmetric Class 0 subgraphs of complete graphs DIMACS Techical Report 0-0 November 0 Symmetric Class 0 subgraphs of complete graphs Vi de Silva Departmet of Mathematics Pomoa College Claremot, CA, USA Chaig Verbec, Jr. Becer Friedma Istitute Booth

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

5.3 Recursive definitions and structural induction

5.3 Recursive definitions and structural induction /8/05 5.3 Recursive defiitios ad structural iductio CSE03 Discrete Computatioal Structures Lecture 6 A recursively defied picture Recursive defiitios e sequece of powers of is give by a = for =0,,, Ca

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

PETRI NETS GENERATING KOLAM PATTERNS

PETRI NETS GENERATING KOLAM PATTERNS . Lalitha et al / Idia Joural of omputer Sciece ad Egieerig (IJSE) PETRI NETS GENERATING KOLAM PATTERNS. Lalitha epartmet of Mathematics Sathyabama Uiversity, heai-119, Idia lalkrish_24@yahoo.co.i K. Ragaraja

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information