RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

Size: px
Start display at page:

Download "RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*"

Transcription

1 RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures The Semantic Web is growing in both size and compexity, with the number of data sources and vocabuaries both increasing. This report shows how arge RDF databases can be accessed in smaer, more manageabe chunks, known as RDF Objects. RDF Objects encapsuate compound data structures, giving appications a more granuar view of a database. Appications can contro the size and structure of RDF Objects by atering the data extraction rue and by fitering the returned data by vocabuary. Links between RDF Objects, anaogous to hypertext inks, enabe appications to connect and navigate data across different databases. OWL and DAML ontoogies are used to discover the identifying properties of resources, aowing information to be aggregated from mutipe databases without the need for constant identifiers. An HTTP impementation of an RDF Object Server has been deveoped and used to deveop toos for W3C Working Groups. * Interna Accession Date Ony Approved for Externa Pubication 1 Enquiries concerning this report shoud be directed to Andy Seaborne emai: Andy_Seaborne@hp.hp.com Copyright Hewett-Packard Company 2002

2 RDF Objects Aex Barne Semantic Web Appications Group, Hewett Packard Laboratories Bristo, Avon, Engand Abstract The Semantic Web is growing in both size and compexity, with the number of data sources and vocabuaries both increasing. This report shows how arge RDF databases can be accessed in smaer, more manageabe chunks, known as RDF Objects. RDF Objects encapsuate compound data structures, giving appications a more granuar view of a database. Appications can contro the size and structure of RDF Objects by atering the data extraction rue and by fitering the returned data by vocabuary. Links between RDF Objects, anaogous to hypertext inks, enabe appications to connect and navigate data across different databases. OWL and DAML ontoogies are used to discover the identifying properties of resources, aowing information to be aggregated from mutipe databases without the need for constant identifiers. An HTTP impementation of an RDF Object Server has been deveoped and used to deveop toos for W3C Working Groups. 1. Context and Background 1.1 RDF and the Semantic Web The Semantic Web is the part of the Internet that machines can understand. It consists of data written in machine-readabe anguages, such as RDF [1], the Resource Description Framework. To be "machine-readabe" means much more than just to be in eectronic form. To be machinereadabe, the machine must be abe to understand the document without ambiguity. This is in contrast to the Word Wide Web whose documents are written using anguages that machines do not understand, such as Engish. RDF is the main anguage of the Semantic Web, a simpe anguage that uses graphs to represent coections of statements. Nodes in the graph represent things, and arrows represent reationships between the things they connect. RDF's origina purpose was to aow metadata to be attached to web pages, but it is powerfu enough to describe more compex entities ike peope and organisations. RDF is even fexibe enough to be used as the foundation for a number of more powerfu anguages such as DAML+OIL [2] and its successor-to-be, OWL [3], the Web Ontoogy Language. 1.2 The Word Wide Web Consortium The W3C [4] is a forum for the deveopment of Internet technoogies. Initiay created to promote compatibiity amongst Web browsers, the Consortium now concentrates on more advanced technoogies such as the Semantic Web and Web Services. The Consortium is made up of a number of Working Groups, each tacking the issues invoved with a particuar technoogy. A Working Group's goa is to produce specifications that aow independent deveopers to create impementations of a technoogy that are compatibe with each other. For exampe, the RDFCore Working Group [5] works to deveop specifications for the RDF anguage. Working Groups use Internet maiing ists as their main method of communication. The ists are used for genera discussion and to report new deveopments. For exampe, RDFCore members use the RDFCore Maiing List [6] to inform the group of competed actions. Groups hod reguar teeconferences in which forma decisions are made. Actions are assigned to each member of the group in order to create progress. A Group produces specifications and other documents group its course, and once a of the outstanding issues have been resoved, those specifications can become recommendations. The W3C process is formay described in the W3C Process Document [7]. 1.3 Semantic Web Appications at Hewett Packard The Semantic Web research team [8] at HP Labs, Bristo, is activey deveoping Jena [9], a Java API for manipuating RDF. Jena provides a rich Mode interface giving a resource-centric set of operations on RDF data. Some Members of the Jena team are aso members of RDFCore, the W3C Working Group for RDF. The Sweb-Apps team at Hewett Packard was formed in Apri 2002 and has been investigating the issues invoved in deveoping a Semantic Web Appication using the Jena tookit. Specificay, they have been tasked with creating a suite of Semantic Web toos to be used by

3 W3C Working Groups to automate and assist the Working Group process. The fied of Semantic Web appication deveopment is sti in its infancy, and many questions are sti to be answered: What does it mean to be a Semantic Web Appication? What toos do deveopers need to create Semantic Web Appications? Are there any recurring patterns invoved in designing Semantic Web Appications? To what extent does Jena meet the needs of the Semantic Web appication deveoper? 1.4 Toos for Working Groups Discussion with members of the RDFCore and WebOnt Working Groups aowed the sweb-apps team to identify three areas in which Semantic Toos woud be usefu for Working Groups. Action and Issue Manager - Actions are tasks to be competed, and go through a number of phases that form the action's ifecyce. Actions are created during Working Group meetings, where they are given a description, for exampe to review a certain document, and are assigned to one or more members of the group. Actions are then active unti they are either competed or discontinued. Issues aso have a ifecyce, being created then active ti either resoved or abandoned. Issues are different to actions in that it is the responsibiity of the entire group to resove an issue, not just a particuar individua. Actions and Issues can be modeed as finite state machines, having states corresponding to their phases. Teeconference Meeting Assistant - Many Working Groups use IRC (Internet Reay Chat) in conjunction with teephone conferences to og the decisions made in the meeting. An IRC robot coud assist with this process by automaticay waking the group through the agenda items, recording the decisions made, and by automaticay producing the minutes for the meeting based on the decisions made. The agenda for the next meeting coud aso be partiay automated by incuding the recenty competed actions as agenda items. Maiing List Assistant - Working Group members use maiing ists to circuate news and views to the rest of the group. For exampe, members can send their regrets that they cannot attend the next meeting, or can inform the group that they have competed one of their actions. A maiing ist assistant coud automaticay detect these messages and take the appropriate action. FIGURE 1: An Action represented using RDF Working Groups, Peope and Actions can a be described using compound data structures in RDF. Figure 1 shows an action described using RDF. The action is represented by the highighted resource, and the rest of the graph structure gives the detais of the action: whom it is assigned to, that person's emai address, the ID of the action, and so on. It is the entire coection of statements in the graph that describe the action, not just the action resource's immediate properties. Many other entities are aso described using compound RDF data structures, for exampe VCards [10], RSS News Feeds [11], and vca Caendar information [12]. RDF Objects have been designed to encapsuate the concept of compound data structures, enabing them to be extracted from databases and treated as atomic entities. The RDF Object API provides higher-eve access to RDF than the Jena API; RDF Objects have a arger granuarity than individua statements, which simpifies the deveopment of appications that dea with compex RDF data structures.

4 2. RDF Databases Athough there is a singe specification for the RDF anguage [13], there is currenty no such standardisation for methods of accessing remote RDF databases. A number of proposas have been made by deveopers, each with different cient-server protocos and different cient APIs. Joseki [14] and Jena SQL Modes [15] are two of the proposas, both with usabe impementations. This section describes the two systems and investigates the issues invoved in database access from the point of view of the appication. 2.1 Use Cases A Semantic Web Appications can be spit into two categories: 1. Appications that access RDF from a singe database 2. Appications that access RDF from mutipe databases In the first case, a the RDF that the appication uses is from a singe graph. An exampe woud be a Persona Information Manager that uses RDF to store user bookmarks in a singe database. In the second case, appications wi often need to merge data from different databases. For exampe, an Enterprise appication might want to find the contact detais (phone, emai etc) of a Project Manager. It coud achieve this by combining information about the project from the project database with information about the manager from the empoyee database. Without the abiity to combine information from different sources, the Semantic Web is no onger a Web, but a coection of discrete data sources. It is therefore important to make using mutipe databases a simpe task for the appication, whist sti giving the appication contro over how the data is combined. 2.2 Existing RDF Database Systems Joseki Joseki [14] is an RDF database server that aows databases to be queried using the RDQL query anguage. The Joseki server is written in java using Jena, and aows the databases to be stored in SQL servers. There is a java cient API, which aso works with Jena. Cients send requests to the Joseki server using HTTP GET. RDQL queries are graph patterns with any number of variabes. The query beow finds a the actions in a database, the peope assigned to those actions, and the emai addresses of those peope. A question mark in the query indicates that the term is a variabe. SELECT?actionID,?person,?emai WHERE (?action, <rdf:type>, <action:action>), (?action, <action:id>,?actionid), (?action, <action:assignedto>?person), (?person, <rdf:type>, <person:person>), (?person, <person:emai>,?emai) The resut is a tabe of variabe bindings, with the coumns being the variabes and the rows being the resuts. For exampe, the resuts might be:?actionid?person?emai "REVIEW-DATATYPES-DOCUMENT" (bank) <maito:brian@w3.org> "ATTEND-MEETING" (bank) <maito:jeremy@w3.org> "ATTEND-MEETING" (bank) <maito:patrick@w3.org> In this particuar resut set, a the bindings of?actionid are iteras, a the bindings of?person are bank nodes, and a the bindings of?emai are named resources (URIs). Cients can make changes to the database by adding and removing sets of statements. The Joseki cient-server protoco creates bank node identifiers so that a cient can refer to an existing bank node when adding or removing a statement Jena SQL Modes The Jena tookit comes with a reationa database casses [15] that aows RDF to be stored in SQL databases and accessed through the Mode interface. This aows remote RDF to be accessed with the same API as oca RDF data, as ong as remote JDBC connections can be made. Using remote

5 SQL modes invoved three types of overhead: Initia SQL connection overhead At east one remote JDBC ca is needed for every Jena function ca On the SQL server, the database needs to be accessed for every tripe operation Other RDF Databases incude Sesame [16] and rdftp [17]. Sesame aows databases to be queried using the RQL query anguage, which has expicit support for RDFS schemas, but not DAML or OWL ontoogies. rdftp uses a reationa database to stored RDF, and aows databases to be queried using property-vaue pairs. 2.3 Issues in RDF Database Design Many rea-word entities ike Peope and Working Groups do not have URIs, and are modeed in RDF using bank nodes. Instead of being identified by a URI, they can be identified by their unambiguous properties. These properties can be determined from OWL and DAML ontoogies. An appication wanting to query a database for information about a person wi need to identify that person by their unambiguous properties, for exampe their emai address or socia security number. This is a probem in RDQL, because there might be many properties that coud be used, but if even one fais then the entire query wi fai, because RDQL does not aow partia matches. RDF Objects have been designed to aow cients to query databases without knowing exacty how resources are identified in the database. This is achieved by both the cient and server making use of DAML and OWL ontoogies behind the scenes, so whereas with Joseki and SQL Modes it was the responsibiity of the appication to identify resources, with RDF Objects, the cient ibrary and server do the identification automaticay, aowing appications to treat bank nodes ike any other resource, simpifying the deveopment process. 3. Requirements for RDF Objects 3.1 RDF Objects An RDF Object is a piece of information from a database. Different types of information from a database can be retrieved as an RDF Object. In particuar, it shoud be possibe to retrieve information about a particuar resource in the database, forming a compound data structure. This shoud be suitabe for retrieving actions, peope and working groups stored in RDF. It shoud aso be possibe to search a database and retrieve the resuts as an RDF Object. It shoud be possibe to find more information about a resource in an RDF Object, either in the same database or a different one. In the remainder of this report, the terms "RDF Object" and "Object" are used interchangeaby. 3.2 Defining and Describing RDF Objects RDF Objects shoud be defined and described using RDF. Object Definitions shoud provide enough information for an agent to retrieve the correct Object from the correct Object Server. This wi aow Object Descriptions to be embedded in Object data, aowing inks between Objects (see beow). 3.3 RDF Object Server An RDF Object Server shoud be abe to accept an RDF Object definition from a cient and return the generated RDF Object to the cient. An RDF Object Server shoud be abe to store data in SQL databases and on the oca fie system. The server shoud have a moduar design aowing additiona storage modues and extraction agorithms to be added. 3.4 Editing and Updating RDF Objects Cient Appications shoud use the Jena Mode API to manipuate data from a returned RDF Object. Cients shoud be abe to make permanent changes to an RDF Object by sending the changes it has made to the Object to the RDF Object Server. This wi aow changes to Action and Working Group Objects to be atomic operations, and eave the database in a consistent state. 3.5 Linking and Aggregating RDF Objects

6 A separate RDF Object cient API shoud provide extra functionaity for creating inks between different objects, which coud possiby be on different servers. The cient API shoud aow inks between Objects to be traversed, even when the Objects are on different servers. It shoud be possibe to aggregate data from different databases by making use of Object inks. This wi aow Working Groups, Peope and Action Objects to be spread over mutipe databases but sti be used together. 4. RDF Objects 4.1 Definition of RDF Objects An RDF Object is a chunk of RDF that is extracted from a database. More technicay, it is a subgraph of the RDF stored in the database. The extraction of the subgraph is performed by a particuar extraction agorithm. Each agorithm can have its own parameters. One parameter is common amongst many agorithms is the "focus resource". This is the resource in the database that acts as the centra point of the extracted subgraph; the agorithm wi start at this resource in the database and recurse through the graph using some path agorithm to extract the RDF Object. 4.2 Object Descriptions An RDF Object can be represented by a resource in an RDF graph. The RDF Object can have properties that describe itsef sufficienty enough for an agent to be abe to retrieve the Object. In particuar, the properties that wi need to be incuded in the description are: The RDF Object Server that provides the RDF Object The source database on that server The extraction agorithm, focus resource, and other parameters An exampe of an RDF Object Description is given in Figure 2. The patterned resource denotes the RDF Object being described. Note that this graph is not the RDF Object itsef, but a description of the Object. The Object is extracted from the urn:w3c:members database, using the BasicCut extraction agorithm, and urn:peope:tom as the focus resource. The resuting Object woud contain the information about Tom in the database. More information about the BasicCut extraction agorithm is given in section Extraction Agorithms FIGURE 2: An RDF Object Description Different RDF Objects can be extracted from a database by using different subgraph extraction

7 agorithms. Extraction agorithms are represented by RDFS casses that are subcasses of ExtractionAgorithm. Instances of these casses represent a particuar extraction, and have associated properties that are used as parameters to the agorithm. The input database and output object are incuded as parameters to a agorithms. Two specific extraction agorithms have been deveoped in order to meet the feature requirements. The first agorithm is the "Basic Cut" agorithm, which aows information about a particuar resource to be retrieved from a database. The depth and breadth of the extracted information can be varied by atering the recursion depth of the agorithm, and by fitering the subgraph by vocabuary. The second agorithm is the "RDQL Search" agorithm, which aows an entire database to be searched using the RDQL query anguage, and the resuts returned as an RDF Object Basic Cut Agorithm The Basic Cut agorithm returns information about a resource, without the cient needing to know what kind of data is stored about that resource in the database. The Basic Cut agorithm takes three arguments: 1. The focus resource 2. The recursion depth 3. A optiona ist of vocabuaries to fiter by (either an incusion or excusion ist) The focus resource can either be a URI, or a bank node with identifying properties. The RDF Object is extracted by first ocating the focus resource in the database, and then by recursing in a directions from this resource through the graph to the specified depth. In traversing arcs between resources, the direction of the arrow is unimportant; they are treated as non-directiona. This is because an arrow that points to a resource is often important information about that resource. For exampe, the statement "Scott isauthorof Waverey" is information about both the person Scott and the nove Waverey, and the statement shoud be part of both the Scott Object and the Waverey Object. If a ist of vocabuaries to incude is specified, an arc wi ony be traversed if it is a property from a vocabuary that is in the incusion ist. If a ist of vocabuaries to excude is specified, an arc wi ony be traversed if it isn't a property from a vocabuary that is in the excusion ist. The agorithm incudes any RDFS type and abe properties of resources even if they woud normay be outside of the recursion depth. This is as a convenience to cient appications, which wi in many cases need this information to make sense of the Object, and saves them from having to make an extra query to the database. The Basic Cut agorithm aso incudes the identifying properties of each bank node (if any). The cient API can make use of this information to ocate the same resource in a different database, by using the identifying properties as a query pattern in the focus resource of the new Object. Figure 3 shows a Working Group Database, and Figure 4 shows an RDF Object extracted from the database, using the Basic Cut agorithm with Tom as the focus (Tom is the patterned resource).

8 FIGURE 3: A Working Group Database RDQL Search Agorithm FIGURE 4: RDF Object focussed on Tom The RDQL Search Agorithm takes an RDQL query string as a singe parameter. The agorithm executes this query over the database, and converts the query resuts tabe into an RDF Object that contains the resut data. The Object graph is the minima compete subgraph for the query, i.e. when it is queried with the query string, the resuts wi be the same as if the query was performed against the database. The RDQL Search agorithm, ike the Basic Cut agorithm, wi incude the identifying properties of each bank node in the resut set, even if those properties where not queried for. This saves the cient from having to manuay modify queries to obtain the identifying properties, which is probematic when the cient knows itte about the structure of the data being queried, since a partia faiure in a query fais the entire query. This is the biggest difference between this impementation of RDQL querying and Joseki. The RDF Object Server uses RDQL to find the resuts, but not as the extraction rue. 4.4 Links between Objects Use Cases There are three possibe ways of inking resources from different Objects, which we ca Simpe, Identity, and Cross-Linking. Linking is the act of creating a property arc between two resources Simpe Linking Simpe Linking is the form of inking aready possibe using Jena's addproperty method of Resources. For exampe, x.addproperty(p, y) creates a ink with property p between resource x and y, where x and y coud be from different Objects. A probem occurs when resource y is a bank node. The identifying properties of y are not copied by Jena into the Object containing resource x, making it impossibe to determine what resource the bank node refers to. This is demonstrated in figure 5. A ink is created between a Working Group in Object A and a person in Object B. The person is identified in Object B using his emai address, but this information is ost in Object A when the ink is made, because Jena does not copy the identifying properties of the bank node.

9 FIGURE 5: Simpe Linking Identity Linking Identity inking is an extension to Jena's addproperty() that does copy the identifying properties of bank nodes into the other Object. An exampe is given in figure 6, using the same scenario as in figure 5 but this time using an identifying ink to copy the identifying properties of the person. Identity inking is performed using the RDFObject cient API: ink(resource x, Property p, Resource y) Cross-Linking FIGURE 6: Identity Linking Cross-Linking is short for Cross-Reference Linking. It extends Identity Linking by adding information about the origin of the inked-to resource to the object of the inked-from resource. This aows an agent who subsequenty accesses Object A to discover information about the inked-to in Object B without previousy knowing about Object B. This ony becomes possibe with Cross-Linking; in Identity Linking the origin of inked-to resource is ost. Figure 7 shows the same scenario again, but using a cross-ink. FIGURE 7: Cross-Linking A Cross-Link is anaogous to an HTML Hyperink. Cross-inks do for Semantic Web agents what hyperinks do for Web users. Because hyperinks are transitive, users can repeatedy foow inks to "surf the web". In the same way, cross-inks are aso transitive, aowing appications and agents to recursivey foow inks to find more information about resources, which can be aggregated into a new Object. Cross-inking is performed using the RDFObject cient API: crosslink(resource x, Property p, Resource y) 5. Resuts and Concusion

10 An RDF Object Server was depoyed in HP Labs, and the RDF Object cient API was used to deveop a Maiing List Assistant. Different Objects were stored in different databases: Peope were stored in a peope database, and severa Working Groups representing the teams in HP Labs were each stored in their own their own database. Cross-inks were used to connect Working Groups to their members. An emai bot was set up to monitor the maiing ists of each group. It was configured using an RDF Object, and used cross-inks to connect the Working Groups it was to monitor to the configuration object. The foowing of these inks aowed the bot to access the correct database of each working group, and to create new action objects in the correct ocation. A GUI for editing and inking RDF Objects was created to aow the bot to be re-configured to assist different Working Groups. RDF Objects aow arge RDF databases to be accessed in smaer, more manageabe chunks. Compound data structures are encapsuated by RDF Objects, giving appications a simper conceptua view of the word than if the individua statement was the atomic unit of information. An ontoogy-aware server and cient ibrary aows data to be modeed using bank nodes rather than URIs, which is more convenient for representing non-web entities ike peope and working groups. Links between Objects aow cients to discover and aggregate data from different sources. The inking API encourages appications to create inks between data sources, and in doing so it provides the gue necessary for the Semantic Web. References [1] Resource Description Framework: [2] DAML+OIL: [3] OWL: [4] W3C: [5] RDFCore Working Group: [6] RDFCore Maiing List [7] W3C Process Document: [8] HP Labs Semantic Web Research: [9] Jena: [10] VCards in RDF: [11] RSS: [12] RDF Caendar Taskforce: [13] RDF Mode and Syntax Specification: [14] Joseki: [15] Jena RDB Support: [16] Sesame: [17] rdftp: Aex Barne is the author of RDF Objects, and can be contacted at aeb99@doc.ic.ac.uk Copyright Hewett-Packard Company, 2002

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

Infinity Connect Web App Customization Guide

Infinity Connect Web App Customization Guide Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup Specia Edition Using Microsoft Office 2000 - Chapter 7 - Sharing Documents Within a.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Office 2000-7 - Sharing

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

Archive Software with value add services:

Archive Software with value add services: E-Mai Archive Software with vaue add services: Protect your emais from data oss through reasonabe and secure backup features. Increase the productivity of your team by using the integrated search engine

More information

Realization of GGF DAIS Data Service Interface for Grid Access to Data Streams

Realization of GGF DAIS Data Service Interface for Grid Access to Data Streams Reaization of GGF DAIS Data Interface for Grid Access to Data Streams Ying Liu, Beth Pae, Nithya Vijayakumar Indiana University Boomington, IN IU-CS TR 613 ABSTRACT As the computation power of hardware

More information

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7 Functions Unit 6 Gaddis: 6.1-5,7-10,13,15-16 and 7.7 CS 1428 Spring 2018 Ji Seaman 6.1 Moduar Programming Moduar programming: breaking a program up into smaer, manageabe components (modues) Function: a

More information

May 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home]

May 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home] "Using Python": a Book Preview May 13, 1995 Mark Lutz Bouder, Coorado utz@kapre.com (303) 546-8848 [work] (303) 684-9565 [home] Introduction. This paper is a brief overview of the upcoming Python O'Reiy

More information

The Internet and the web

The Internet and the web The Internet and the web Contents Introduction 3 1 The Internet at home 4 2 Loca Area Networks sma office/home office 5 3 Loca Area Networks business 6 4 Wide Area Networks 8 5 Wireess networks 9 6 Mobie

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Relational Model. Lecture #6 Autumn, Fall, 2001, LRX

Relational Model. Lecture #6 Autumn, Fall, 2001, LRX Reationa Mode Lecture #6 Autumn, 2001 #06 Reationa Mode HUST,Wuhan,China 121 Reationa Mode Tabe = reation. Coumn headers = attributes. Row = tupe Reation schema = name(attributes). Exampe: Beers(name,

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia: OWNER S MANUAL

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia:   OWNER S MANUAL Guardian 365 Pro App Guide For more exciting new products pease visit our website: Austraia: www.uniden.com.au OWNER S MANUAL Privacy Protection Notice As the device user or data controer, you might coect

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

Quick Start Instructions

Quick Start Instructions Eaton Power Xpert Gateway Minisot (PXGMS) UPS Card Quick Start Instructions Ethernet 10/100 Status DHCP EMP + - CMN 100 Act Ident Power PXGMS UPS Restart TX Setup RX Package Contents Power Xpert Gateway

More information

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers Meeting Exchange 4.1 Service Pack 2 Reease Notes for the S6200/S6800 Servers The Meeting Exchange S6200/S6800 Media Servers are SIP-based voice and web conferencing soutions that extend Avaya s conferencing

More information

Chapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies.

Chapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies. Chapter 3: KDE Page 1 of 31 Chapter 3: KDE In This Chapter What Is KDE? Instaing KDE Seecting KDE Basic Desktop Eements Running Programs Stopping KDE KDE Capabiities Configuring KDE with the Contro Center

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition

MCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition MCSE TestPrep SQL Server 6.5 Design & Impementation - Data Definition Page 1 of 38 [Figures are not incuded in this sampe chapter] MCSE TestPrep SQL Server 6.5 Design & Impementation - 3- Data Definition

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

NCH Software Express Delegate

NCH Software Express Delegate NCH Software Express Deegate This user guide has been created for use with Express Deegate Version 4.xx NCH Software Technica Support If you have difficuties using Express Deegate pease read the appicabe

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

Outerjoins, Constraints, Triggers

Outerjoins, Constraints, Triggers Outerjoins, Constraints, Triggers Lecture #13 Autumn, 2001 Fa, 2001, LRX #13 Outerjoins, Constraints, Triggers HUST,Wuhan,China 358 Outerjoin R S = R S with danging tupes padded with nus and incuded in

More information

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim Deveopment of a Nationa Porta for Tuvau Business Case SPREP Pacific iclim Apri 2018 Tabe of Contents 1. Introduction... 3 1.1 Report Purpose... 3 1.2 Background & Context... 3 1.3 Other IKM Activities

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Operating Avaya Aura Conferencing

Operating Avaya Aura Conferencing Operating Avaya Aura Conferencing Reease 6.0 June 2011 04-603510 Issue 1 2010 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete

More information

Bridge Talk Release Notes for Meeting Exchange 5.0

Bridge Talk Release Notes for Meeting Exchange 5.0 Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events DMS PDMG-RH Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Automatic PD faut cassification High resoution Seectabe UHF fiters and

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1 Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

3GPP TS V7.1.0 ( )

3GPP TS V7.1.0 ( ) TS 29.199-7 V7.1.0 (2006-12) Technica Specification 3rd Generation Partnership Project; Technica Specification Group Core Network and Terminas; Open Service Access (OSA); Paray X Web Services; Part 7:

More information

A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS

A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS Artificia Inteigence and Language Processing ]acques Cohen Editor A SIMPLE APPROACH TO SPECIFYING CONCURRENT SYSTEMS LESLIE LAMPORT Over the past few years, I have deveoped an approach to the forma specification

More information

Modeling of Problems of Projection: A Non-countercyclic Approach * Jason Ginsburg Osaka Kyoiku University

Modeling of Problems of Projection: A Non-countercyclic Approach * Jason Ginsburg Osaka Kyoiku University Modeing of Probems of Projection: A Non-countercycic Approach * Jason Ginsburg Osaka Kyoiku University Abstract This paper describes a computationa impementation of the recent Probems of Projection (POP)

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.

More information

Extracting semistructured data from the Web: An XQuery Based Approach

Extracting semistructured data from the Web: An XQuery Based Approach EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. Extracting semistructured data from the Web: An XQuery Based Approach Gies Nachouki Université de Nantes - Facuté des Sciences, IRIN, 2, rue de a Houssinière,

More information

ngenius Instrumentation Overview

ngenius Instrumentation Overview ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark

More information

Avaya one-x Mobile Pre-Installation Checklist

Avaya one-x Mobile Pre-Installation Checklist Avaya one-x Mobie 18-602133 Issue 1 November 2007 Avaya one-x Mobie November 2007 1 00A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete

More information

A GENERAL PURPOSE FiYl=ERTEXT A6STRACT MACHINE

A GENERAL PURPOSE FiYl=ERTEXT A6STRACT MACHINE A GENERAL PURPOSE FiY=ERTEXT A6STRACT MACHNE BRAD CAMPBELL and JOSEPH M. GOODMAN The HAM is a transaction-based server for a hypertext storage system. The seruer is designed to hande mutipe uses in a networked

More information

.County of San Mateo

.County of San Mateo -- - -- -- - -- - - --- a - -- w---- a- -- : m- I - -- -- -- --., I -- I.a, e mzzcm.county of San Mateo InterneUIntranet Web Page Design Guideines. September 30,1997 fabe of Corntents Purpose... Approach....

More information

Avaya Interaction Center Client SDK Programmer Guide

Avaya Interaction Center Client SDK Programmer Guide Avaya Interaction Center Cient SDK Programmer Guide Reease 7.2 May 2013 Issue 1.1 2013 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

From i* to istar 2.0: An Evolving Social Modelling Language

From i* to istar 2.0: An Evolving Social Modelling Language From i* to istar 2.0: An Evoving Socia Modeing Language Lin Liu 1 Schoo of Software, Tsinghua University, Beijing, 100084, China iniu@tsinghua.edu.cn Abstract. Conceptua Modeing, as a thought too, heps

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5 LCD Video Controer LCD Video Controer Introduction... 3 Safety Precautions... 4 Indentifying the Components... 5 Main Board... 5 Main Board ASIC Features... 6 LVDS Transmitter... 8 Backight Inverter...

More information

Avaya Aura Call Center Elite Multichannel Configuration Server User Guide

Avaya Aura Call Center Elite Multichannel Configuration Server User Guide Avaya Aura Ca Center Eite Mutichanne Configuration Server User Guide Reease 6.2.3/6.2.5 March 2013 2013 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Lecture 4: Threads Announcement Project 0 Due Project 1 out Homework 1 due on Thursday Submit it to Gradescope onine 2 Processes Reca that

More information

Look Bigger to Grow Bigger

Look Bigger to Grow Bigger May 2013 Look Bigger to Grow Bigger Using Virtua Office to hep grow your business Presented by 8x8 2012 NASDAQ-LISTED: EGHT Using Virtua Office to Hep Grow Your Business This webinar wi show you how to

More information

If your PC is connected to the Internet, you should download a current membership data file from the SKCC Web Server.

If your PC is connected to the Internet, you should download a current membership data file from the SKCC Web Server. fie:///c:/users/ron/appdata/loca/temp/~hhe084.htm Page 1 of 54 SKCCLogger, Straight Key Century Cub Inc. A Rights Reserved Version v03.00.11, 24-Oct-2018 Created by Ron Bower, AC2C SKCC #2748S SKCCLogger

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

MAXPRO IP Video Solutions LEARN ONE, KNOW THEM ALL. Open, Flexible and Scalable Video Surveillance Platform

MAXPRO IP Video Solutions LEARN ONE, KNOW THEM ALL. Open, Flexible and Scalable Video Surveillance Platform MAXPRO IP Video Soutions LEARN ONE, KNOW THEM ALL Open, Fexibe and Scaabe Video Surveiance Patform 1 LEARN ONE, KNOW THEM ALL Are you ooking for... Systems that are interoperabe with a wide range of surveiance

More information

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0 IBC DOCUMENT SA/STA SERIES User's Guide V7.0 Page 2 New Features for Version 7.0 Mutipe Schedues This version of the SA/STA firmware supports mutipe schedues for empoyees. The mutipe schedues are impemented

More information

User s Guide. Eaton Bypass Power Module (BPM) For use with the following: Eaton 9155 UPS (8 15 kva)

User s Guide. Eaton Bypass Power Module (BPM) For use with the following: Eaton 9155 UPS (8 15 kva) Eaton Bypass Power Modue (BPM) User s Guide For use with the foowing: Eaton 9155 UPS (8 15 kva) Eaton 9170+ UPS (3 18 kva) Eaton 9PX Spit-Phase UPS (6 10 kva) Specia Symbos The foowing are exampes of symbos

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

index.pdf March 17,

index.pdf March 17, index.pdf March 17, 2013 1 ITI 1121. Introduction to omputing II Marce Turcotte Schoo of Eectrica Engineering and omputer Science Linked List (Part 2) Tai pointer ouby inked ist ummy node Version of March

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Avaya Aura Call Center Elite Multichannel Application Management Service User Guide

Avaya Aura Call Center Elite Multichannel Application Management Service User Guide Avaya Aura Ca Center Eite Mutichanne Appication Management Service User Guide Reease 6.3 October 2013 2014 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts have been made to ensure that the

More information

Privacy Preserving Subgraph Matching on Large Graphs in Cloud

Privacy Preserving Subgraph Matching on Large Graphs in Cloud Privacy Preserving Subgraph Matching on Large Graphs in Coud Zhao Chang,#, Lei Zou, Feifei Li # Peing University, China; # University of Utah, USA; {changzhao,zouei}@pu.edu.cn; {zchang,ifeifei}@cs.utah.edu

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

l A set is a collection of objects of the same l {6,9,11,-5} and {11,9,6,-5} are equivalent. l There is no first element, and no successor of 9.

l A set is a collection of objects of the same l {6,9,11,-5} and {11,9,6,-5} are equivalent. l There is no first element, and no successor of 9. Sets & Hash Tabes Week 13 Weiss: chapter 20 CS 5301 Spring 2018 What are sets? A set is a coection of objects of the same type that has the foowing two properties: - there are no dupicates in the coection

More information

Chapter 3: Introduction to the Flash Workspace

Chapter 3: Introduction to the Flash Workspace Chapter 3: Introduction to the Fash Workspace Page 1 of 10 Chapter 3: Introduction to the Fash Workspace In This Chapter Features and Functionaity of the Timeine Features and Functionaity of the Stage

More information

Oracle Data Relationship Management

Oracle Data Relationship Management Orace Data Reationship Management Orace Data Reationship Steward Orace Data Reationship Management for Orace Hyperion Enterprise Panning Suite Orace Data Reationship Management for Orace Hyperion Financia

More information

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement Internationa Laboratory Accreditation Cooperation The ILAC Mutua Recognition Arrangement Enhancing the acceptance of products and services across nationa borders Removing barriers to goba trade Accreditation

More information

Building the Web of Things

Building the Web of Things Buiding the Web of Things Interoperabiity for Connected Devices Dave Raggett W3C Track 14 Apri 2016 Many Potentia IoT Appication Areas each evoving rich capabiities Smart Homes Wearabes Heathcare Power

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported

More information

Four Circuit 4 Wire Unit With Dante Network Audio Interface

Four Circuit 4 Wire Unit With Dante Network Audio Interface Network Audio 4 Wire Interface Four Circuit 4 Wire Unit With Dante Network Audio Interface GS-FW012 ip 4 Wire With Dante Interface Highights Four x 4 Wire Circuits Loca Cue Input Dante Network Audio Three

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Synchronization: Semaphore

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Synchronization: Semaphore CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Synchronization: Synchronization Needs Two synchronization needs Mutua excusion Whenever mutipe threads access a shared data, you need to worry

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

OAuth 2.0 Token Binding https://tools.ietf.org/html/draft-ietf-oauth-token-binding-04

OAuth 2.0 Token Binding https://tools.ietf.org/html/draft-ietf-oauth-token-binding-04 OAuth 2.0 Token Binding https://toos.ietf.org/htm/draft-ietf-oauth-token-binding-04 Brian Campbe Michae B. Jones John Bradey IETF 99 Prague Juy 2017 from IETF 93 1 The Setting of the Context Provide an

More information

1. INTRODUCTION 1.1 Product Introduction 1.2 Product Modes 1.3 Product Package 1.4 Network Printing Architecture 1.5 Network Printing Environment 1.6

1. INTRODUCTION 1.1 Product Introduction 1.2 Product Modes 1.3 Product Package 1.4 Network Printing Architecture 1.5 Network Printing Environment 1.6 Links for mode 504058 (1-Port UTP/BNC Parae Pocket Print Server): Downoads & inks http://www.inteinet-network.com/htm/d-pserver.htm This manua http://inteinet-network.com/mk2/manuas/502993_manua.zip Instructions

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Advanced Memory Management Advanced Functionaity Now we re going to ook at some advanced functionaity that the OS can provide appications using

More information

Hour 3: Linux Basics Page 1 of 16

Hour 3: Linux Basics Page 1 of 16 Hour 3: Linux Basics Page 1 of 16 Hour 3: Linux Basics Now that you ve instaed Red Hat Linux, you might wonder what to do next. Whether you re the kind of person who earns by jumping right in and starting

More information

Hybrid IP-PBX Systems KX-TDA100 KX-TDA200 KX-TDA600. The intelligent business solution.

Hybrid IP-PBX Systems KX-TDA100 KX-TDA200 KX-TDA600. The intelligent business solution. Hybrid IP-PBX Systems KX-TDA100 KX-TDA200 KX-TDA600 The inteigent business soution. Hybrid IP-PBX KX-TDA Teecommunication Patform: Investment in a teecommunication system requires business communication

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

CylanceOPTICS. Frequently Asked Questions

CylanceOPTICS. Frequently Asked Questions CyanceOPTICS Frequenty Asked Questions Question What is CyanceOPTICS? CyanceOPTICS is an AI driven endpoint detection and response component providing consistent visibiity, root cause anaysis, scaabe threat

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

Introducing a Target-Based Approach to Rapid Prototyping of ECUs

Introducing a Target-Based Approach to Rapid Prototyping of ECUs Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,

More information

Designing for Schedulability Integrating Schedulability Analysis with Object-Oriented Design

Designing for Schedulability Integrating Schedulability Analysis with Object-Oriented Design Designing for Scheduabiity ntegrating Scheduabiity Anaysis with Object-Oriented Design Manas Sasena Department of Computer Science University of Pittsburgh Pittsburgh, PA 15260, USA manas@cs.pitt.edu Panagiota

More information

Hands-free system (for cellular phone)

Hands-free system (for cellular phone) Hands-free system (for ceuar phone) With navigation system Owners of modes equipped with a navigation system shoud refer to the Navigation System Owner s Manua. Without navigation system This system supports

More information

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina

More information