Node +key : int +left : Node +right : Node. root where m is either 0..1, 0..*, or * Node +key : int +left : Node +right : Node 0..

Size: px
Start display at page:

Download "Node +key : int +left : Node +right : Node. root where m is either 0..1, 0..*, or * Node +key : int +left : Node +right : Node 0.."

Transcription

1 Question 1: è12 pointsè CISC323 Midter Exa Saple Solution March 19, 2003 J. Dingel Consider the following code fragent for ipleenting binary search trees. class BinSearchTree í public Node root;... í class Node í public int key; public Node left; public Node right;... í Below is a partial UML class diagra for the code above. Coplete the diagra with associations and navigability and ultiplicity constraints such that it describes binary search trees adequately. Here's a suary of the correct answers: left BinSearchTree +root : Node root 0..1 Node +key : int +left : Node +right : Node where is either 0..1, 0..*, or * right BinSearchTree +root : Node root 0..1 Node +key : int +left : Node +right : Node 0..2 children æ Places of variability in the above diagras: í The diagras do not contain aggregations or copositions. However, one could put the on the source ends of all three associations. æ Coon istakes: í navigability constraints issing or incorrect í association between Node objects issing í ultiplicity constraints issing or incorrect

2 Question 2: è12 pointsè For your convenience, here is a copy of the code of the previous page. class BinSearchTree í public Node root;... í class Node í public int key; public Node left; public Node right;... í Recall that every node n in a binary search tree satisæes the following invariant: ëthe key of every node in the left subtree of n is less or equal to the key in n and the key of every node in the right subtree of n is greater than the key in n." Draw an activity diagra for searching for a node with a given key k in a binary search tree with root node r. Your search doesn't have to return a list position or any other inforation. It just has to report success èif the key is found in the treeè or failure èif the key is not foundè. set current node to r key not found yes no current node is null? key found yes no k is equal to key of current node? k is less than key of current node? no set current node to right child yes set current node to left child æ Places of variability: í There are any correct ways of expressing the search as an activity diagra. However, the above is one of the ost succint. æ Coon istakes: í Inappropriate assuptions, that is, diagra assues, e.g., that key is always contained in tree, or tree is coplete èevery node has either no or two childrenè í Access to non-existent ènullè objects. E.g., tree ay be epty, that is, r ay be null. í Syntax of diagras wrong

3 Question 3: è8 pointsè Brieæy and inforally, list the ost iportant diæerences between the Visitor and the Iterator design pattern. æ Both the Iterator and the Visitor pattern give the user unifor accesss to the eleents of a collection. The Visitor pattern, however, is ore general than the Iterator pattern because it allows the eleents of the collection to have diæerent types ècollection is heterogenousè. The Iterator pattern requires that all eleents retrieved have the sae type ècollection is hoogeneousè. æ The Visitor pattern requires the addition of an accept ethod to the classes the eleents of the collection are instances of. Coon istakes: æ Many students siply wrote a paragraph about Iterators, then a paragraph about Visitors. That didn't answer the question of what the diæerences were. Full credit was given if the diæerences could be picked out fro corresponding stateents in your paragraphs èfor exaple, if you said in one place that an Iterator was for hoogeneous data structures and in another that a Visitor was for heterogenous data structuresè. If your stateents did not indicate the diæerences, you only got partial arks, even if you ade true stateents about each pattern. æ Another coon istake was saying that Iterators were for arrays or lists and Visitors were for trees. That's not really correct. People write Iterators for data structures such as binary search trees and hash tables, as long as the eleents of these are of the sae type. The real diæerence is that Visitors are for data structures containing ultiple node types, of which parse trees are only one exaple.

4 Question 4: è6 pointsè Brieæy and inforally list three of the biggest diæerences between the Waterfall process and Microsoft's ësync & Save" process. æ The Waterfall process prescribes the existence of a coplete requireents docuent before the design and ipleentation can begin. Mircosoft's planning phase only calls for a ëvision stateent" that is expected to change and evolve. æ A siilar situation exists with respect to testing. The Waterfall process expects the code to be coplete before testing begins. Microsoft's ësync & Save", however, asks for diæerent kinds of testing during the entire developent. æ The developentèipleentation phases in both the Waterfall and the ësync & Save" process ask for the identiæcation of independent subprojects that can be ipleented in parallel. However, the Waterfall process expects all subprojects to be copleted fully before they are integrated. The daily builds of ësync & Save", however, require even incoplete ipleentations of the subprojects to be cobined and integrated. Coon istakes: æ See ærst coon istake for previous question. A paragraph about the Waterfall process followed by a paragraph about ësynch & Save" did not get you full arks unless three distinct diæerences were ebedded in your paragraphs. æ Many people said that there was no possibility of parallelis in the Waterfall process. You got only partial arks for that. What we said in class èand on the slidesè is that there is ore opportunity for parallelis in Microsoft's process. In the Waterfall process, each step ust be ænished before the next starts, so there is no parallelis between steps. However, it is quite usual to have any groups working in parallel within certain steps, especially ipleentation ècodingè. In the Microsoft process, you can also have parallelis between steps - for exaple, soe eleents of analysis, design, coding and testing going on at once. æ Soe people said that the Microsoft process takes less tie than the Waterfall process. That's not always true; it depends a lot on the task and how each process is anaged. In theory, the Microsoft process gets things to arket quicker, but in practice things can get unorganized and slow down because the project hasn't been planned and coordinated carefully enough. So you only got partial arks for that.

5 Question 5: è6 pointsè For each of the following three software quality criteria, write down at least one feature of the Java prograing language that supports that criterion. For each criterion, write one or two sentences explaining how the Java feature supports the criterion. Correct answers include the following. Soe of the answers are deliberately a bit ore verbose than necessary. EncapsulationèInforation Hiding: í Classes in Java èand other OO languagesè allow the easy grouping of data and behaviours that ëbelong together". í Java's visibility odiæers èpublic, protected, and privateè give the prograer æne-grained control over which entities in a class are visible fro the outside. í Interfaces in Java allow ipleentation details to be hidden fro the clients of the code. Only the publically accessible data and behaviours are entioned in the interface. So, if the client only sees the interface èas it should be the caseè, the ipleentation reains hidden. Reuse: í In Java èand other OO languagesè, a subclass autoatically inherits data and behaviours fro its superclass. Code that has already been developed for a class can thus be shared aong and reused for the handling of the objects in a subclass. í The Java Application Prograer Interface èapiè contains a large nuber of pre-deæned packages to do all kinds of things èe.g., inputèoutput, array and vector anipulation, GUI prograingè. All of these packages can be used in diæerent contexts by just iporting the èstandard packages like java.lang are iported autoatically. Modularity: í Java's notion of interface allows data and behaviours be separated fro the details of their ipleentation. í Classes in Java allow code to be broken up into pieces. All data and behaviours that belong together èbecause, for instance, they accoplish a speciæc taskè can be put into a class. Classes deæne their own nae space, that is, two diæerent classes can have an attribute with the sae nae. í Packages allow you to take grouping to the next level. Classes that for a logical unit can be grouped into a package. The Java API, for instance, contains java.ath a package for supporting high-precision atheatical operations. The package java.io contains all classes that deal with input and output. Coon istakes: æ Design patterns are not a Java feature. They can be ipleented in Java, but they are not Java speciæc. æ Confusion about what ëodularity", ëinheritance", or ëpolyorphis" ean

6 Question 6: è8 pointsè Draw a use case diagra for QCard. Your diagra should contain at least two actors and three use cases. Here's one correct answer. QCard Add Course student Drop Course Adinistrator Check Marks Enter Marks æ Places of variability: í Obviously, there are lots of correct answers to this question. æ Coon istakes: í The ain proble was that people did not really understand the proper forat and choices for use case diagras. Soe people picked QCard as an actor. QCard is the whole syste; actors are people or other hardware or software systes who interact with the syste. An actor is eant to be soeone or soething who initiates interactions with the syste, so a database is not a good choice either. The choice of a backup syste was ok, since soe backup systes will initiate backup operations according to a schedule. í Another error wesawwas in the choice of use cases. A use case is soe kind of interaction between a user and the syste. So ëenter arks" or ëlook up arks" are good use cases, but ëarks" is not. Use cases such as ëarks" and labeled the arrows with actions such as ëenter" or ëlook up" do not æt the syntax of use case diagras. í Only huan actors are drawn using a stick ægure. í Relationships èëuses" or ëextends"è between use cases were not required. If you provided soe and used the correctly, that was æne. If you used the incorrectly, you lost a ark or two. If you put lines between use cases without any labels, that is not correct use case syntax.

7 Question 7: è8 pointsè Hans attepted to use a sequence diagra to describe the steps necessary to pay with your debit card èbank card, interac cardè at a grocery store. Here is what he cae up with: Custoer Cashier CardReader Bank enable slidecard askforcard askforinfo inputinfo askforinfo checkinfo no ok? displayerror yes displaysuccess transactioncoplete where the essages have the following eaning: enable: The cashier enables the reader by sending it the aount to be deducted. slidecard: The custoer slides hisèher card. askforcard: The reader propts the custoer to slide hisèher card. askforinfo: The reader propts the custoer for the account to be debited and PIN. inputinfo: The custoer selects the account and inputs hisèher PIN. checkinfo: The reader sends the PIN, the aount, and the account inforation to the bank for veriæcation purposes. displayerror: The reader infors the custoer that the attepted debit was denied. transactioncoplete: The reader infors the cashier that the attepted debit was copleted successfully. displaysuccess: The reader infors the custoer that the attepted debit was copleted successfully. Continued on next page

8 Question 7 ècontinuedè: In the space below, brieæy list at least four diæerent incorrectnesses in Hans's diagra on the previous page. Here're the incorrectnesses: 1. Wrong sender: The enable essage should be sent by the cashier, not the custoer. 2. Wrong order: In the diagra, the custoer slides his card, before he has actually received the essage propting hi to do so. In other words, the order of askforcard and slidecard should be reversed. 3. No branching: ëbranching" is not allowed in sequence diagras. Each sequence diagra describes a single scenario only. In other words, in a given diagra, the essage fro the bank to the custoer represents either success or failure never both, as Hans attepted to do. Another proble related to branching is that according to the diagra, after displaying the error, control ëæows into" the positive case and the reader also indicates a successful copletion of the transaction. 4. No crossing: A essage cannot ëcross" other essages in sequence diagras. Message askforinfo, however, does. The only way to indicate that a sequence of essages repeats is through a loop which is expressed by a rectangular box around the repeated essages together with a possibly inforal terination condition. Answers that did not receive points: æ Not enough detail: How uch detail is enough, depends on the contextèrequireents. There is nothing in the question that indicates that the diagra contains an insuæcient aount of inforation. So, the level of detail does not count as an incorrectness. æ No upper liit on nuber of unsuccessful attepts: Siilar.

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10] CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority

More information

cm3520 cm3525 Security Function

cm3520 cm3525 Security Function wwwiagisticsco c3520 c3525 Security Function Contents Contents 1 Security 11 Introduction 1-2 12 Tradearks and Registered Tradearks 1-2 13 Copliance with the ISO15408 Standard 1-2 14 Operating Precautions1-2

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au

More information

1 P a g e. F x,x...,x,.,.' written as F D, is the same.

1 P a g e. F x,x...,x,.,.' written as F D, is the same. 11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

-- batch, online or subprograms.[z]

-- batch, online or subprograms.[z] Migration of Procedurally Oriented COBOL Progras in an Object-Oriented Architecture Harry M. Sneed Software Engineering Service bsdekz andstr. 37, D-812 Ottobrunn, Gerany The subject of this paper is the

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Structuring Business Metadata in Data Warehouse Systems for Effective Business Support

Structuring Business Metadata in Data Warehouse Systems for Effective Business Support Structuring Business Metadata in Data Warehouse Systes for Effective Business Support arxiv:cs/0110020v1 [cs.db] 8 Oct 2001 N.L. Sarda Departent of Coputer Science and Engineering Indian Institute of Technology

More information

Flucs: Artificial Lighting & Daylighting. IES Virtual Environment

Flucs: Artificial Lighting & Daylighting. IES Virtual Environment Flucs: Artificial Lighting & Daylighting IES Virtual Environent Contents 1. General Description of the FLUCS Interface... 6 1.1. Coon Controls... 6 1.2. Main Application Window... 6 1.3. Other Windows...

More information

Two hours UNIVERSITY OF MANCHESTER. January Answer any THREE questions. Answer each question in a separate book

Two hours UNIVERSITY OF MANCHESTER. January Answer any THREE questions. Answer each question in a separate book Two hours UNIVERSITY OF MANCHESTER Database Architecture Models and Design January 2004 Answer any THREE questions Answer each question in a separate book The use of electronic calculators is not peritted.

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Interoperability/ Conformance Test dpmr Mode 2 Repeater

Interoperability/ Conformance Test dpmr Mode 2 Repeater Interoperability/ Conforance Test dpmr Mode 2 Repeater IOP test Mode 2 Repeater Copyright 2013 dpmr Association All Rights Reserved Version 1.0 0 Revision History Version Date Change By 0v1 16 Oct 2012

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

CS 361 Meeting 8 9/24/18

CS 361 Meeting 8 9/24/18 CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages

More information

A Novel Fuzzy Chinese Address Matching Engine Based on Full-text Search Technology

A Novel Fuzzy Chinese Address Matching Engine Based on Full-text Search Technology Based on Full-text Search Technology 12 Institute of Reote Sensing and Digital Earth National Engineering Research Center for Reote Sensing Applications,Beijing,100101, China E-ail: yaoxj@radi.ac.cn Xiang

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

M Software management

M Software management M Software anageent This docuent is part of the UCISA Inforation Security Toolkit providing guidance on the policies and processes needed to ipleent an organisational inforation security policy. To use

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

An Architecture for a Distributed Deductive Database System

An Architecture for a Distributed Deductive Database System IEEE TENCON '93 / B eih An Architecture for a Distributed Deductive Database Syste M. K. Mohania N. L. Sarda bept. of Coputer Science and Engineering, Indian Institute of Technology, Bobay 400 076, INDIA

More information

Data Engine for NoSQL - IBM Power Systems Edition White Paper and Technical Reference

Data Engine for NoSQL - IBM Power Systems Edition White Paper and Technical Reference Data Engine for NoSQL - IBM Power Systes Edition and Technical Reference Brad Brech Juan Rubio Michael Hollinger IBM Systes Group June 2015 Data Engine for NoSQL Power Systes Edition Contents Data Engine

More information

M a c intosh Cyr i l lic Lang u age Ki t. Installation and User s Manual Manuel d installation et d u t i l i s a t i o n

M a c intosh Cyr i l lic Lang u age Ki t. Installation and User s Manual Manuel d installation et d u t i l i s a t i o n apple M a c intosh Cyr i l lic Lang u age Ki t Installation and User s Manual Manuel d installation et d u t i l i s a t i o n K Apple Coputer, Inc. This anual and the software described in it are copyrighted

More information

DRAFT Master List of WMS Roles and Permissions DRAFT Last updated 8/1/2012

DRAFT Master List of WMS Roles and Permissions DRAFT Last updated 8/1/2012 DRAFT Master List of WMS Roles and Perissions DRAFT Last updated 8/1/2012 Roles Acq adin 3 KB adin 31 Acq order staff 3 KB staff 31 Acq receive staff 3 KB supervisor 31 Acq senior staff 3 Network delivery

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Grading Results Total 100

Grading Results Total 100 University of California, Berkeley College of Engineering Departent of Electrical Engineering and Coputer Sciences Fall 2003 Instructor: Dave Patterson 2003-11-19 v1.9 CS 152 Exa #2 Solutions Personal

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Homework 1. An Introduction to Neural Networks

Homework 1. An Introduction to Neural Networks Hoework An Introduction to Neural Networks -785: Introduction to Deep Learning Spring 09 OUT: January 4, 09 DUE: February 6, 09, :59 PM Start Here Collaboration policy: You are expected to coply with the

More information

Vodafone MachineLink. Port Forwarding / DMZ Configuration Guide

Vodafone MachineLink. Port Forwarding / DMZ Configuration Guide Vodafone MachineLink Port Forwarding / DMZ Configuration Guide Docuent history This guide covers the following products: Vodafone MachineLink 3G (NWL-10) Vodafone MachineLink 3G Plus (NWL-12) Vodafone

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

A Comparison Analysis of Graphical Models of Object-Oriented Databases and the GOQL Model

A Comparison Analysis of Graphical Models of Object-Oriented Databases and the GOQL Model A Coparison Analysis of Graphical Models of Object-Oriented Databases and the GOQL Model EUCLID KERAMOPOULOS School of Coputer Science Westinster University 5 New Cavendish Street, London WM 8JS, UK PHILIPPOS

More information

FINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS*

FINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS* irnper neuvork protocols. A. Danthine. editor, 'iniversite de liege. I'->7X. F3 FINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS* Gregor V. Bochann Departeent de Matheatiques Ecole Polytechnique Federals

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD EUROPEAN ETS 300 428 TELECOMMUNICATION August 1995 STANDARD Source: ETSI TC-NA Reference: DE/NA-052619 ICS: 33.040 Key words: B-ISDN, ATM Broadband Integrated Services Digital Network (B-ISDN); Asynchronous

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

Collection Selection Based on Historical Performance for Efficient Processing

Collection Selection Based on Historical Performance for Efficient Processing Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska

More information

Carving Differential Unit Test Cases from System Test Cases

Carving Differential Unit Test Cases from System Test Cases Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web Entity Search Engine: Towards Agile Best-Effort Inforation Integration over the Web Tao Cheng, Kevin Chen-Chuan Chang University of Illinois at Urbana-Chapaign {tcheng3, kcchang}@cs.uiuc.edu. INTRODUCTION

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Var. V4.03 Issue: July, The present Product Information relates to the Software Packages: Name Variant Product no. (MLFB)

Var. V4.03 Issue: July, The present Product Information relates to the Software Packages: Name Variant Product no. (MLFB) A&D SE SP3 Karlsruhe Product inforation PROGRAF AS+/NT Var. V4.03 Issue: July, 2004 Descriptors TELEPERM M, AS Configuration Suary The present Product Inforation relates to the Software Packages: Nae Variant

More information

Database Design on Customer Relationship Management System Yanmei Wang

Database Design on Customer Relationship Management System Yanmei Wang 2nd International Conference on Econoics, Social Science, Arts, Education and Manageent Engineering (ESSAEME 2016) Database Design on Custoer Relationship Manageent Syste Yanei Wang College of Inforation

More information

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter Enterprise Architecture Cybernetics for Global Mining Projects: Reducing the Structural Coplexity of Global Mining Supply Networks via Virtual Brokerage Author Kandjani, Hadi, Wen, Larry, Bernus, Peter

More information

Development of an Integrated Cost Estimation and Cost Control System for Construction Projects

Development of an Integrated Cost Estimation and Cost Control System for Construction Projects ABSTRACT Developent of an Integrated Estiation and Control Syste for Construction s by Salan Azhar, Syed M. Ahed and Aaury A. Caballero Florida International University 0555 W. Flagler Street, Miai, Florida

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Comparing Techniques by Means of Encapsulation and onnascence

Comparing Techniques by Means of Encapsulation and onnascence rusuur lt suaries and Meilir Page-Jones Coparing Techniques by Means of Encapsulation and onnascence oday the object-oriented approach to software developent is at the height of fashion. As such, it threatens

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Efficient Constraint Evaluation Algorithms for Hierarchical Next-Best-View Planning

Efficient Constraint Evaluation Algorithms for Hierarchical Next-Best-View Planning Efficient Constraint Evaluation Algoriths for Hierarchical Next-Best-View Planning Ko-Li Low National University of Singapore lowl@cop.nus.edu.sg Anselo Lastra University of North Carolina at Chapel Hill

More information

Reusability Analysis for Shipbuilding Components Modeled in XML and Java

Reusability Analysis for Shipbuilding Components Modeled in XML and Java Reusability Analysis for Shipbuilding Coponents Modeled in XML and Java Prof. Steven A. Deurjian, Sr., Jeffrey R. Ellis, Rodrigo Caballero, Hai Lin, and Xiaopei Wang Coputer Science & Engineering Departent

More information

Var. 9 Issue: January, The present Product Information relates to the Software Packages: Name Variant Product no. (MLFB)

Var. 9 Issue: January, The present Product Information relates to the Software Packages: Name Variant Product no. (MLFB) $ '6(63.DUOVUXKH Product inforation 352*5$)$617 Var. 9 Issue: January, 2002 Descriptors TELEPERM M, AS Configuration Suary The present Product Inforation relates to the Software Packages: Nae Variant Product

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

A New Generic Model for Vision Based Tracking in Robotics Systems

A New Generic Model for Vision Based Tracking in Robotics Systems A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Generalised Mixin-based Inheritance to Support Multiple Inheritance

Generalised Mixin-based Inheritance to Support Multiple Inheritance Vrije Universiteit russel Faculteit Wetenschappen VRIJE UNIVERSITEIT RUSSEL SCI EN T I V INCERE T ENE R S Generalised Mixin-based Inheritance to Support Multiple Inheritance Niels oyen, Carine Lucas, Patrick

More information

APPLICATION NOTE #175

APPLICATION NOTE #175 APPLICATION NOTE #175 INTRODUCTION Application Note #175 suppleents the recoended protection circuitry discussions currently found in Ceretek product data sheets. The contents of Application Note #175

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

Heterogeneous Radial Basis Function Networks

Heterogeneous Radial Basis Function Networks Proceedings of the International Conference on Neural Networks (ICNN ), vol. 2, pp. 23-2, June. Heterogeneous Radial Basis Function Networks D. Randall Wilson, Tony R. Martinez e-ail: randy@axon.cs.byu.edu,

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

Minimax Sensor Location in the Plane

Minimax Sensor Location in the Plane NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location in the Plane To M. Cavalier The Pennsylvania State University University Par, PA 680 Enrique del Castillo The Pennsylvania

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Entity-Relationship Models of Information Artefacts

Entity-Relationship Models of Information Artefacts Entity-Relationship Models of Inforation Artefacts T. R. G. Green MRC Applied Psychology Unit 5 Chaucer Rd, Cabridge CB2 2EF thoas.green@rc-apu.ca.ac.uk http: //www.rc-apu.ca.ac.uk/personal/thoas.green/

More information

a) Figure 1 shows a small part of an Extended-Entity-Relationship model describing the personnel department of a research company.

a) Figure 1 shows a small part of an Extended-Entity-Relationship model describing the personnel department of a research company. a) Figure shows a sall part of an Extended-Entity-Relationship odel describing the personnel departent of a research copany. GivenNae FailyNae relationship telephone NInuber NextOfKin contact Eployee d

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Storing and Accessing Live Mashup Content in the Cloud

Storing and Accessing Live Mashup Content in the Cloud Storing and Accessing Live ashup Content in the Cloud Krzysztof Ostrowski Cornell University Ithaca, NY 14853, USA krzys@cs.cornell.edu Ken Biran Cornell University Ithaca, NY 14853, USA ken@cs.cornell.edu

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

Proceedings of the First Symposium on Networked Systems Design and Implementation

Proceedings of the First Symposium on Networked Systems Design and Implementation USENIX Association Proceedings of the First Syposiu on Networked Systes Design and Ipleentation San Francisco, CA, USA March 29 31, 2004 2004 by The USENIX Association All Rights Reserved For ore inforation

More information

Design and Implementation of User Interactive Wireless Smart Home Energy Management System

Design and Implementation of User Interactive Wireless Smart Home Energy Management System Design and Ipleentation of User Interactive Wireless Sart Hoe Energy Manageent Syste Aryadevi Reanidevi Devidas 1, Subeesh T. S 2, Maneesha Vinodini Raesh 3 Center for Wireless Networks and Applications

More information

Compiling an Honest but Curious Protocol

Compiling an Honest but Curious Protocol 6.876/18.46: Advanced Cryptography May 7, 003 Lecture 1: Copiling an Honest but Curious Protocol Scribed by: Jonathan Derryberry 1 Review In previous lectures, the notion of secure ultiparty coputing was

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

DETC2002/DAC DECOMPOSITION-BASED ASSEMBLY SYNTHESIS FOR IN-PROCESS DIMENSIONAL ADJUSTABILITY. Proceedings of DETC 02

DETC2002/DAC DECOMPOSITION-BASED ASSEMBLY SYNTHESIS FOR IN-PROCESS DIMENSIONAL ADJUSTABILITY. Proceedings of DETC 02 Proceedings of DETC 0 ASME 00 Design Engineering Technical Conferences and Coputer and Inforation in Engineering Conference Montreal, Canada, Septeber 9-October, 00 DETC00/DAC-08 DECOMPOSITION-BASED ASSEMBLY

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

The Unit Bar Visibility Number of a Graph

The Unit Bar Visibility Number of a Graph The Unit Bar Visibility Nuber of a Graph Eily Gaub 1,4, Michelle Rose 2,4, and Paul S. Wenger,4 August 20, 2015 Abstract A t-unit-bar representation of a graph G is an assignent of sets of at ost t horizontal

More information

OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS ADRIAN DEACONU Transilvania University of Brasov, Roania Abstract A linear tie

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

Summary. Reconstruction of data from non-uniformly spaced samples

Summary. Reconstruction of data from non-uniformly spaced samples Is there always extra bandwidth in non-unifor spatial sapling? Ralf Ferber* and Massiiliano Vassallo, WesternGeco London Technology Center; Jon-Fredrik Hopperstad and Ali Özbek, Schluberger Cabridge Research

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10 Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi A Hierarchical Application of ICA-based Feature Etraction to Iage Classification Introduction Iage classification poses one of the greatest challenges in the achine vision and achine learning counities.

More information