CYK Algorithm Adapted to the Penttonen Normal Form
|
|
- Abigayle Joseph
- 5 years ago
- Views:
Transcription
1 CYK Algorithm Adapted to the Pettoe Normal Form Domiika Klobučíková* Abstract This paper deals with the topic of cotext-sesitive grammars as special cases of urestricted grammars, their ormal forms ad applicatios of these ormal forms. It presets a algorithm desiged usig the priciples of Cocke-Youger-Kasami algorithm to make a decisio, whether a iput strig is a setece of a cotext-sesitive grammar. The fial applicatio, which implemets this algorithm, works with cotext-sesitive grammars i Pettoe ormal form. Keywords: formal laguages ormal forms Kuroda Pettoe sytax aalysis CYK CKY Cocke-Youger-Kasami Supplemetary Material: Theoretical Example ( *xklobu0@stud.fit.vutbr.cz, Faculty of Iformatio Techology, Bro Uiversity of Techology. Itroductio Sytax aalysis is a essetial compoet of may disciplies focusig o strig processig oe such field is program iterpretatio. I practice, it has always bee limited to uambiguous, cotext-free grammars, as the less restricted families of grammars had prove both hard to use ad too difficult to process. However, as the aforemetioed area of study has bee progressig, the cotext-freeess offered by this set of grammars became o loger satisfactory, ad a eed to decompose the iput strig i a way reflectig atural laguage has arise. Cotext-sesitive grammars, ad therefore laguages geerated by them, preset a suitable iterlik betwee these sets, because they allow for cotext, which is a importat aspect of huma speech. Curretly, very few parsers capable of detectig cotext, ad therefore of processig grammars of this family, exist. The aim of this paper is to desig ad implemet such a algorithm that ca determiistically decide, whether the iput strig is a setece geerated by some grammar. To allow for maximum flexibility, the grammar is to be specified by the user. The algorithm itroduced i this paper is based o Cocke-Youger-Kasami (CYK) parsig algorithm for cotext-free grammars [], which works with grammars i Chomsky ormal form. To decide whether a strig is a member of some grammar, it cosiders all derivatio sequeces possibly leadig to the desired strig. It works i a bottom-up way. The preseted algorithm works with grammars i Pettoe ormal form, as a expasio of Chomsky ormal form. Apart from the way CYK works, it also applies a set of restrictios to prevet icosistecies of the derivatio tree. If some otermial was used to apply both a cotext-sesitive ad a cotext-free rule, it could lead to occureces of otermials that would ot appear i the derivatio tree uder ormal coditios. I evet of such rule collisio, the sytax tree is split ito two versios, of which each propagates a differet rule. I the evet of failure of oe such tree, a substitute is chose ad the process is repeated util the strig is either accepted, or there are o other possible sytax trees to be examied ad the strig is rejected. This algorithm offers the ability to parse a iput strig accordig to ay user-specified cotext-sesitive grammar i Pettoe ormal form [2]. Sice every cotext-sesitive grammar ca be coverted to a equivalet grammar i Pettoe ormal form, the algorithm therefore works for ay such grammar. This algorithm always halts eve for cyclic ad ambiguous
2 grammars. Details of its fuctioality will be further described i the followig sectios. 2. Urestricted Grammars Grammar is a ordered pair, G = (Σ,R), where: Σ is the alphabet composed of disjoit sets of otermials, N, ad termials,, R is a set of productio rules. N cotais the start symbol, deoted by S []. Urestricted grammars are the geeral family of grammars they properly iclude cotext-sesitive, cotext-free, ad regular grammars. Grammars of this family ca be recogized by a Turig machie or two-pushdow automato. Neither side of rules belogig to these grammars is restricted i ay way it ca cosist of ay strig of otermial ad termial symbols. The family of laguages geerated by urestricted grammars is closed uder the operatios of itersectio, uio, cocateatio ad iteratio, but ot uder set differece. Urestricted grammars geerally use Kuroda ormal form [3], which ormalizes all grammar rules ito oe of the followig forms: A BC, AB DC, A a, A ε. This form is similar to Chomsky ormal form for cotext-free laguages it adds the cotext-sesitiveess of AB DC. If A = D, the grammar is also i Pettoe ormal form, a special case of Kuroda ormal form. Ay grammar ca be algorithmically coverted ito a equivalet grammar i ormal form [2] the algorithm works as follows. It modifies the origial grammar, ad after each made chage, it moves the set of productio rules that adhere to the ormal form to the ew grammar. These chages are made as follows:. I all rules, replace every termial by a otermial ad iclude these productios i the ew grammar. 2. I all rules whose left-had side is loger tha the right-had side, exted the left-had side by a otermial that fially derives ito ε. 3. For each rule, i which a otermial derives ito a differet otermial, add a rule whose right-had side is composed of the derived otermial followed by the left-had side otermial of every rule the derived otermial is used i. 4. For every cotext-free productio rule whose right-had side is loger tha two, split it ito several coectig rules. 5. For every cotext-sesitive productio rule, pick the first pair of otermials o the left-had side of the rule ad esure that the pair derives ito the first otermial o the right-had side of the rule followed by a supplemetary otermial. Subsequetly, add a rule whose left-had side cosists of the supplemetary otermial ad the rest of the origial rule. Right-had side of this rule cosists of the remaiig otermials of the right-had side of the origial rule. I case the right-had side of the origial rule was of a legth greater tha three, further modify the rule util it coforms to the ormal form. 3. Algorithm Descriptio Give a grammar, G = ( G Σ, G R), i Pettoe ormal form, ad a strig w = a a 2...a with a i G, i, for some, this algorithm decides, whether w is a setece of L(G) i a bottom-up way. For its work, it uses a matrix of sets, CV CurretVersio, where CV [i, j], i j. Each such versio represets a versio of the sytax tree. Other tha this, the algorithm uses several sets that hold additioal iformatio the most importat oe beig V Versios, whose members are versios of the CV matrix the algorithm has geerated so far. Therefore, it cotais differet versios of the derivatio tree, of which all are mutually exclusive. Every member of CV [i, j] has its ow BLQ set every BlackListQueue cotais coordiates of all cells of the correspodig matrix that cotai cotext-sesitive otermials, but whose igored coordiates have ot bee set yet. As metioed above, every cell of the CV matrix cotais a set of otermials that are likely i this phase of the derivatio process. For every such otermial A, there exists a Predecessor set P A, cotaiig refereces to all of its predecessors. Ay otermial ca be marked as cotext-sesitive, which idicates that it origiated from a cotext-sesitive rule. The algorithm starts the parsig process by scaig the iput strig, addig A to CV [i,i], if A a i G R. For every such otermial, a empty set of its predecessors is costructed. Afterwards, the algorithm iterates through the matrix ad costructs the sets CV [i, j]. For every pair CV [i, j] ad CV [ j +,k], it checks whether CV [i, j] is a member of BLQ, which idicates that the set cotais cotext-sesitive oter-
3 mials, but its igored coordiates have ot bee appoited yet. These are the coordiates of the first right eighbour CV [i, j] is compared with, whose otermials must ot be used i combiatio with the cotextsesitive otermials of the examied set this is to esure the cosistecy of the derivatio tree. If the igored coordiates have ot bee set yet, those of CV [ j +,k] are used, ad CV [i, j] is removed from BLQ. The behaviour of the followig step is depedet o whether the igored coordiates of CV [i, j] are equal to CV [ j +,k]. If they are uequal, the algorithm proceeds as follows. Ay otermial B that satisfies A CV [i, j], C CV [ j +,k], AB AC G R, is added to CV [ j +,k]. This implies that C a j+... a k, ad therefore B a j+...a k. A empty set P B, used to refer to predecessors of the otermial, is costructed. A referece to otermial B is the added to sets P A ad P C, i case either of the origial otermials is to be deleted i the evet of versio splittig. This process is repeated util CV [ j +, k] caot be exteded aymore. If ay cotextsesitive otermials were added ad the set s igored coordiates have ot bee set yet, a referece to this set is added to BLQ. Ay otermial A is the added to the set CV [i,k], if it satisfies B CV [i, j], C CV [ j +,k], A BC G R, because B a i...a j, C a j+...a k, ad therefore A a i...a k. A empty set of predecessors, P A, is created for each added otermial A. A referece to otermial A is added to sets P B ad P C. If the igored coordiates are equal to CV [ j +,k], a copy of the matrix is created before the first matchig rule is applied. All cotext-sestive otermials of CV [i, j], icludig their predecessors, are deleted from the copy usig predecessor sets, P A for a otermial A, to recursively detect all of a otermial s predecessors. All of the subsequetly added otermials are the saved to the copy istead of CV. After the sca is completed, this copy is added to V. Oce o set ca be exteded, it is examied whether S CV [,], so S a...a. If the check is passed, the algorithm aouces ACCEPT. Otherwise, CV is removed from V, a member is appoited as the ew CV, ad parsig is cotiued for this versio of the matrix. If V is empty, ad therefore o ew CV ca be appoited, there are o alterative derivatio trees to be costructed. I such case, the algorithm aouces REJECT. The mai part of the algorithm, which describes otermial set matrix traversal, is described i Algorithm. This part also describes the fial testig for presece of the startig otermial. Algorithm Matrix traversal Iput: a grammar, G = ( G E, G R), i Pettoe ormal form; w = a a 2...a with a i G, i, for some. Output: ACCEPT if w L(G); REJECT if w / L(G). : itroduce set V = ; 2: itroduce matrix of sets CV, where CV [i, j] = for i j, ad add CV to V ; 3: itroduce set BLQ = ; 4: for i = to do 5: if A a i G R the 6: add A to CV [i, i]; 7: itroduce set P A = holdig refereces to A s predecessors; 8: parse loop: 9: repeat 0: for level = to do : for i = to level do 2: set k to i + level; 3: for offset = 0 to level do 4: set j to i + offset; 5: ApplyRules(i, j,k); 6: util o chage; 7: if S CV [,] the 8: ACCEPT 9: else 20: remove CV from V ; 2: if V the 22: pick a elemet of V ad set it as CV ; 23: else REJECT; 24: goto parse loop; The idices acquired i Algorithm are used to locate sets represetig substrigs of the iput strig, ad to subsequetly appoit coordiates of the otermial that jois these substrigs. The process is further described by Algorithm 2. Because the grammar, G, is fiite, the algorithm always fiishes. The proof of soudess is aalogical to that of the origial CYK algorithm [] (p. 20 2). Time complexity of the algorithm depeds o both size of the grammar, G, ad legth of the iput strig,. I the worst case sceario, each iteratio of the outermost loop reduces a sigle rule that triggers versio splittig. I this case, the complexity reaches
4 Algorithm 2 Rule Applicatio : procedure APPLYRULES(i, j, k) 2: if CV [i, j] BLQ the 3: set its igored coordiates to [ j +,k]; 4: remove CV [i, j] from BLQ; 5: if A CV [i, j], C CV [ j +,k], rhs(p) = AC for some A, C G N, p G R the 6: if coordiates igored by CV [i, j] are uequal to [ j +,k] the 7: if AB AC G R for some B G N the 8: add B to CV [ j+,k] ad mark it as cotext-sesitive; 9: if igored coordiates of CV [ j +, k] are ot set the 0: add CV [ j +,k] to BLQ; : if B AC for some B G N the 2: add B to CV [i, k]; 3: itroduce set P B = holdig refereces to B s predecessors; 4: add a referece to the otermial B to sets P A ad P C ; 5: else 6: if this istace of A is cotext-sesitive the cotiue to ext otermial; 7: create a copy of CV, its BLQ, ad all sets of predecessors; 8: remove all predecessors of cotextsesitive otermials i copy[i, j]; 9: remove all cotext-sesitive otermials from copy[i, j]; 20: if AB AC G R for some B G N the 2: add B to copy[ j +,k] ad mark it as cotext-sesitive; 22: if igored coordiates of copy [ j +,k] are ot set the 23: add copy[ j +,k] to the copy s BLQ; 24: if B AC G R for some B G N the 25: add B to copy[i,k]; 26: itroduce set P B = holdig refereces to B s predecessors; 27: add a referece to the otermial B to sets P A ad P C ; 28: add the copy to V ; O( 3 G 3 ), as described by Equatio. I that case, the algorithm creates a total of G additioal matrices, of which each cell ca hold G reduced otermials. That also meas the space complexity is O( 2 G 3 ), as described by Equatio 2. t = ( G + ) 2 i= i j= i k=0 G t = (2 ) G ( G + ) 2 6 O(t) = O( 3 G 3 ) s = ( G + ) i= G i ( G + )( G + )( G + ) s = 2 O(s) = O( 2 G 3 ) () (2) The experimetal results support these assumptios, as they show a steady growth whe icreasig oe of the parameters, ad a expoetial growth whe values of both are high. The values listed i Table are the average of a total of three rus with the specified parameters. The data was acquired usig Memcheck ad Callgrid utilities available as a part of the Valgrid memory checker suite. This data is further visualized ad compared to the aalytical values i Figure. Table. Time ad space complexity test results for a total of 42 iput grammars ad strigs with a overall success rate of 40.5 %. G Istructios Memory [B] Prototype Implemetatio The workig prototype, which implemets the algorithm, is programmed i C++. The laguage was chose because it allows object-orieted programmig, as well as its stadard cotaiers ad operatios available o them.
5 (a) Time complexity of the preseted algorithm estimated at O( 3 G 3 ). (b) Space complexity of algorithm reaches O( 2 G 3 ) i worst case sceario. Figure. Time ad space of the preseted algorithm both reach at least cubic values because of the cotextsesitive ature of the discussed topic. The purple grids represet aalytical values of estimated complexities, while the red poits represet average experimetal evalues from Table. The program is divided ito several classes, of which each has a distict role i the process of parsig user settigs, versioig, ad parsig the iput strig to fially decide membership of the iput strig: Grammar Adapter This module parses rules of a u- ser grammar accordig to the predefied format. Before savig a rule, it checks if the rule adheres to restrictios of Pettoe ormal form. Processed rules are subsequetly added to Grammar, as described below. Iput Strig Adapter This module works i a way similar to the previous oe. It scas the iput file ad coverts it ito a vector of termials that are later parsed accordig to Grammar. The tokes are divided by a white space, therefore the iput strig ca be of ulimited legth. Grammar Structure This module stores grammar rules used to detect derivatios. It cosists of three separate lists of rules, of which each set is used durig a differet phase of the parsig process termial rules, which are used to costruct the startig sets of otermials, cotext-free rules ad cotext-sesitive rules, which are used durig the later phases of the process. This module is resposible for verifyig right-had side match of the appropriate rule durig the parsig, as well as retrievig the left-had side otermials i case of a positive match. Versioig System This module is resposible for storig ad maagig viable versios of the otermial matrix the program has geerated so far. Each versio of the matrix has a correspodig blacklist queue of cotext-sesitive sets, as described i Sectio 3. The module keeps a referece to the curret versio of the matrix, which is modified durig the applicatio of productio rules. This module aouces the fial rejectio of the iput strig, if uable to appoit a ew versio of the parsig matrix for processig. Parsig Matrix This class presets a two-dimesioal map of matrix cells. Each such cell cotais a set of otermials used durig the parsig process, ad lists of rules that have bee used to geerate the member otermials of the correspodig set. These lists are used to prevet both edless loopig of cotext-sesitive rule applicatio, ad applicatio of rules that would lead to addig a otermial that had previously bee deleted from the set because of a cotext collisio. These modules are ecapsulated by a sigle Parser object. It parses the iput files, ad saves the adapters output. As described i algorithm, it creates the first versio of the matrix, iitializes it by creatig the startig sets of otermials accordig to the previously obtaied grammar, ad sets it as curret versio. Afterwards, the secod phase of the parsig process begis. Oce a matrix caot be chaged ay further, it checks for the presece of the startig otermial. I case of failure, the versioig system attempts to appoit a ew curret versio. 5. Coclusios This paper deals with the topic of cotext-sesitive grammars as special cases of urestricted grammars, ad applicatios of their ormal forms. It presets a algorithm capable of parsig these grammars ad a software implemetatio of this algorithm that implemets this algorithm. The algorithm is based o Cocke-Youger-Kasami parsig algorithm ad therefore works i a bottom-
6 Parser +parse() uses IputStrigAdapter -tokes: vector<strig> implemets Adapter <<Eumeratio>> RuleType #iput_file: ifstream +parseiputfile() TermialRule CotextFreeRule CotextSesitiveRule cosists of uses GrammarAdapter Grammar ProductioRule uses parses #iput_file: ifstream -applychages() -applycotextfreerule() -applycotextsesitiverule() -ruletype: RuleType +matchesrightside() +getleftsidenotermial() cosists of VersioSet ParsigMatrix Termial Coordiates +colum: Iteger +row: Iteger stores uses curret versio has a +traversematrix() cosists of cosists of -ame: strig exteds has blacklist queue VersioCofiguratio +has_versio_chaged: bool +isiblacklistqueue() +isversiosuccessful() is located at MatrixCell -wascfruleused: vector<bool> -wascsruleused: vector<bool> +addnotermialtoset() Notermial cotais a set of -is_cotext_sesitive: bool +addpredecessor() Figure 2. Diagram of classes as implemeted i the workig prototype. A istace of Parser class ecapsulates the two mai modules, of which each has a distict role Adapter scas the iput files holdig iput strig ad grammar, ad VersioSet stores the cosidered versios of the parsig matrix. up way. It is capable of parsig ay cotext-sesitive grammar i Pettoe ormal form, icludig ambiguous grammars. As this work focuses o a topic that has ot bee thoroughly researched yet, it aims to serve maily as a base for subsequet research. I the future, I would like to expad the algorithm to accept grammars i additioal ormal forms, which would allow for more extesive applicatio. Ackowledgemets I would like to thak my supervisor Prof. Alexader Medua, CSc. for his help. RNDr. Refereces [] MEDUNA, Alexader, Elemets of compiler desig. Boca Rato: Auerbach Publicatios, xiii, 286 p. ISBN [2] MEDUNA, Alexader, Automata ad laguages: theory ad applicatios editio. Lodo: Spriger, xv, 96 p. ISBN [3] ROZENBERG, Grzegorz ad Arto SALOMAA, 997. Hadbook of formal laguages: word, laguage, grammar. Berli: Spriger, xvii, 873 pages; 23 cm. ISBN
Elementary Educational Computer
Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationn n B. How many subsets of C are there of cardinality n. We are selecting elements for such a
4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset
More informationComputers and Scientific Thinking
Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More information3D Model Retrieval Method Based on Sample Prediction
20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer
More informationLecture 1: Introduction and Strassen s Algorithm
5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access
More informationPattern Recognition Systems Lab 1 Least Mean Squares
Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig
More informationChapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationChapter 4. Procedural Abstraction and Functions That Return a Value. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 4 Procedural Abstractio ad Fuctios That Retur a Value Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 4.1 Top-Dow Desig 4.2 Predefied Fuctios 4.3 Programmer-Defied Fuctios 4.4
More informationChapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig
More informationThe Magma Database file formats
The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,
More information1.2 Binomial Coefficients and Subsets
1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =
More informationHash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.
Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative
More informationLower Bounds for Sorting
Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig
More informationSorting in Linear Time. Data Structures and Algorithms Andrei Bulatov
Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio
More informationAppendix D. Controller Implementation
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);
More informationHow do we evaluate algorithms?
F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:
More informationData diverse software fault tolerance techniques
Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the
More informationOnes Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationThe isoperimetric problem on the hypercube
The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose
More informationChapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved.
Chapter 8 Strigs ad Vectors Overview 8.1 A Array Type for Strigs 8.2 The Stadard strig Class 8.3 Vectors Slide 8-3 8.1 A Array Type for Strigs A Array Type for Strigs C-strigs ca be used to represet strigs
More information3. b. Present a combinatorial argument that for all positive integers n : : 2 n
. b. Preset a combiatorial argumet that for all positive itegers : : Cosider two distict sets A ad B each of size. Sice they are distict, the cardiality of A B is. The umber of ways of choosig a pair of
More informationBasic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.
5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator
More informationAPPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS
APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13
CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis
More informationToday s objectives. CSE401: Introduction to Compiler Construction. What is a compiler? Administrative Details. Why study compilers?
CSE401: Itroductio to Compiler Costructio Larry Ruzzo Sprig 2004 Today s objectives Admiistrative details Defie compilers ad why we study them Defie the high-level structure of compilers Associate specific
More informationGraphs. Minimum Spanning Trees. Slides by Rose Hoberman (CMU)
Graphs Miimum Spaig Trees Slides by Rose Hoberma (CMU) Problem: Layig Telephoe Wire Cetral office 2 Wirig: Naïve Approach Cetral office Expesive! 3 Wirig: Better Approach Cetral office Miimize the total
More informationOne advantage that SONAR has over any other music-sequencing product I ve worked
*gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig
More informationSolutions to Final COMS W4115 Programming Languages and Translators Monday, May 4, :10-5:25pm, 309 Havemeyer
Departmet of Computer ciece Columbia Uiversity olutios to Fial COM W45 Programmig Laguages ad Traslators Moday, May 4, 2009 4:0-5:25pm, 309 Havemeyer Closed book, o aids. Do questios 5. Each questio is
More informationStructuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software
Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationChapter 8. Strings and Vectors. Copyright 2015 Pearson Education, Ltd.. All rights reserved.
Chapter 8 Strigs ad Vectors Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 8.1 A Array Type for Strigs 8.2 The Stadard strig Class 8.3 Vectors Copyright 2015 Pearso Educatio, Ltd..
More informationCombination Labelings Of Graphs
Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is
More informationChapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.
Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationSoftware development of components for complex signal analysis on the example of adaptive recursive estimation methods.
Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig
More informationImproving Information Retrieval System Security via an Optimal Maximal Coding Scheme
Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk
More informationA SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON
A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work
More informationGetting Started. Getting Started - 1
Gettig Started Gettig Started - 1 Issue 1 Overview of Gettig Started Overview of Gettig Started This sectio explais the basic operatios of the AUDIX system. It describes how to: Log i ad log out of the
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5
Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:
More informationUniversity of Waterloo Department of Electrical and Computer Engineering ECE 250 Algorithms and Data Structures
Uiversity of Waterloo Departmet of Electrical ad Computer Egieerig ECE 250 Algorithms ad Data Structures Midterm Examiatio ( pages) Istructor: Douglas Harder February 7, 2004 7:30-9:00 Name (last, first)
More informationAlpha Individual Solutions MAΘ National Convention 2013
Alpha Idividual Solutios MAΘ Natioal Covetio 0 Aswers:. D. A. C 4. D 5. C 6. B 7. A 8. C 9. D 0. B. B. A. D 4. C 5. A 6. C 7. B 8. A 9. A 0. C. E. B. D 4. C 5. A 6. D 7. B 8. C 9. D 0. B TB. 570 TB. 5
More informationExact Minimum Lower Bound Algorithm for Traveling Salesman Problem
Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute
More informationBayesian approach to reliability modelling for a probability of failure on demand parameter
Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee
More informationImage Segmentation EEE 508
Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19
CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.
More informationSolution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring, Instructions:
CS 604 Data Structures Midterm Sprig, 00 VIRG INIA POLYTECHNIC INSTITUTE AND STATE U T PROSI M UNI VERSI TY Istructios: Prit your ame i the space provided below. This examiatio is closed book ad closed
More informationtop() Applications of Stacks
CS22 Algorithms ad Data Structures MW :00 am - 2: pm, MSEC 0 Istructor: Xiao Qi Lecture 6: Stacks ad Queues Aoucemets Quiz results Homework 2 is available Due o September 29 th, 2004 www.cs.mt.edu~xqicoursescs22
More informationPseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance
Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured
More informationFREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS
FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y
More informationData Structures and Algorithms. Analysis of Algorithms
Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output
More informationCounting the Number of Minimum Roman Dominating Functions of a Graph
Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph
More informationExtending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis
Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de
More informationChapter 24. Sorting. Objectives. 1. To study and analyze time efficiency of various sorting algorithms
Chapter 4 Sortig 1 Objectives 1. o study ad aalyze time efficiecy of various sortig algorithms 4. 4.7.. o desig, implemet, ad aalyze bubble sort 4.. 3. o desig, implemet, ad aalyze merge sort 4.3. 4. o
More informationCSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)
CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a
More informationA Parallel DFA Minimization Algorithm
A Parallel DFA Miimizatio Algorithm Ambuj Tewari, Utkarsh Srivastava, ad P. Gupta Departmet of Computer Sciece & Egieerig Idia Istitute of Techology Kapur Kapur 208 016,INDIA pg@iitk.ac.i Abstract. I this
More informationChapter 3 Classification of FFT Processor Algorithms
Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As
More informationFrom last week. Lecture 5. Outline. Principles of programming languages
Priciples of programmig laguages From last week Lecture 5 http://few.vu.l/~silvis/ppl/2007 Natalia Silvis-Cividjia e-mail: silvis@few.vu.l ML has o assigmet. Explai how to access a old bidig? Is & for
More informationwhy study sorting? Sorting is a classic subject in computer science. There are three reasons for studying sorting algorithms.
Chapter 5 Sortig IST311 - CIS65/506 Clevelad State Uiversity Prof. Victor Matos Adapted from: Itroductio to Java Programmig: Comprehesive Versio, Eighth Editio by Y. Daiel Liag why study sortig? Sortig
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to
More information1. SWITCHING FUNDAMENTALS
. SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig
More informationCOSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1
COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,
More informationXiaozhou (Steve) Li, Atri Rudra, Ram Swaminathan. HP Laboratories HPL Keyword(s): graph coloring; hardness of approximation
Flexible Colorig Xiaozhou (Steve) Li, Atri Rudra, Ram Swamiatha HP Laboratories HPL-2010-177 Keyword(s): graph colorig; hardess of approximatio Abstract: Motivated b y reliability cosideratios i data deduplicatio
More informationMinimum Spanning Trees
Miimum Spaig Trees Miimum Spaig Trees Spaig subgraph Subgraph of a graph G cotaiig all the vertices of G Spaig tree Spaig subgraph that is itself a (free) tree Miimum spaig tree (MST) Spaig tree of a weighted
More informationPython Programming: An Introduction to Computer Science
Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More informationBaan Tools User Management
Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio
More informationGE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III
GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-
More informationBASED ON ITERATIVE ERROR-CORRECTION
A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationLecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions
U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationTask scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation
6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08
More informationBAAN IVc/BaanERP. Conversion Guide Oracle7 to Oracle8
BAAN IVc/BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject
More informationThe Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana
The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:
More informationFast Fourier Transform (FFT) Algorithms
Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform
More informationCOMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design
COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad
More informationCOP4020 Programming Languages. Compilers and Interpreters Prof. Robert van Engelen
COP4020 mig Laguages Compilers ad Iterpreters Prof. Robert va Egele Overview Commo compiler ad iterpreter cofiguratios Virtual machies Itegrated developmet eviromets Compiler phases Lexical aalysis Sytax
More informationA Boolean Query Processing with a Result Cache in Mediator Systems
A Boolea Query Processig with a Result Cache i Mediator Systems Jae-heo Cheog ad Sag-goo Lee * Departmet of Computer Sciece Seoul Natioal Uiversity Sa 56-1 Shillim-dog Kwaak-gu, Seoul Korea {cjh, sglee}cygus.su.ac.kr
More informationare two specific neighboring points, F( x, y)
$33/,&$7,212)7+(6(/)$92,',1* 5$1'20:$/.12,6(5('8&7,21$/*25,7+0,17+(&2/285,0$*(6(*0(17$7,21 %RJGDQ602/.$+HQU\N3$/86'DPLDQ%(5(6.$ 6LOHVLDQ7HFKQLFDO8QLYHUVLW\'HSDUWPHQWRI&RPSXWHU6FLHQFH $NDGHPLFND*OLZLFH32/$1'
More informationAlgorithms for Disk Covering Problems with the Most Points
Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi
More informationBOOLEAN MATHEMATICS: GENERAL THEORY
CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:
More informationLinear Time-Invariant Systems
9/9/00 LIEAR TIE-IVARIAT SYSTES Uit, d Part Liear Time-Ivariat Sstems A importat class of discrete-time sstem cosists of those that are Liear Priciple of superpositio Time-ivariat dela of the iput sequece
More informationLecture 5. Counting Sort / Radix Sort
Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018
More informationHuman-Computer Interaction IS4300
Huma-Computer Iteractio IS4300 1 I5 due ext class Your missio i this exercise is to implemet a very simple Java paitig applicatio. The app must support the followig fuctios: Draw curves, specified by a
More informationModule 8-7: Pascal s Triangle and the Binomial Theorem
Module 8-7: Pascal s Triagle ad the Biomial Theorem Gregory V. Bard April 5, 017 A Note about Notatio Just to recall, all of the followig mea the same thig: ( 7 7C 4 C4 7 7C4 5 4 ad they are (all proouced
More informationEE University of Minnesota. Midterm Exam #1. Prof. Matthew O'Keefe TA: Eric Seppanen. Department of Electrical and Computer Engineering
EE 4363 1 Uiversity of Miesota Midterm Exam #1 Prof. Matthew O'Keefe TA: Eric Seppae Departmet of Electrical ad Computer Egieerig Uiversity of Miesota Twi Cities Campus EE 4363 Itroductio to Microprocessors
More informationUsing VTR Emulation on Avid Systems
Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit
More informationMinimum Spanning Trees
Presetatio for use with the textbook, lgorithm esig ad pplicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 0 Miimum Spaig Trees 0 Goodrich ad Tamassia Miimum Spaig Trees pplicatio: oectig a Network Suppose
More informationRandom Graphs and Complex Networks T
Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities
More informationSymmetric Class 0 subgraphs of complete graphs
DIMACS Techical Report 0-0 November 0 Symmetric Class 0 subgraphs of complete graphs Vi de Silva Departmet of Mathematics Pomoa College Claremot, CA, USA Chaig Verbec, Jr. Becer Friedma Istitute Booth
More informationOn (K t e)-saturated Graphs
Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph
More information5.3 Recursive definitions and structural induction
/8/05 5.3 Recursive defiitios ad structural iductio CSE03 Discrete Computatioal Structures Lecture 6 A recursively defied picture Recursive defiitios e sequece of powers of is give by a = for =0,,, Ca
More informationDescriptive Statistics Summary Lists
Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard
More informationUNIVERSITY OF MORATUWA
UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016
More informationPETRI NETS GENERATING KOLAM PATTERNS
. Lalitha et al / Idia Joural of omputer Sciece ad Egieerig (IJSE) PETRI NETS GENERATING KOLAM PATTERNS. Lalitha epartmet of Mathematics Sathyabama Uiversity, heai-119, Idia lalkrish_24@yahoo.co.i K. Ragaraja
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead
More information