Node +key : int +left : Node +right : Node. root where m is either 0..1, 0..*, or * Node +key : int +left : Node +right : Node 0..
|
|
- Aileen Harvey
- 5 years ago
- Views:
Transcription
1 Question 1: è12 pointsè CISC323 Midter Exa Saple Solution March 19, 2003 J. Dingel Consider the following code fragent for ipleenting binary search trees. class BinSearchTree í public Node root;... í class Node í public int key; public Node left; public Node right;... í Below is a partial UML class diagra for the code above. Coplete the diagra with associations and navigability and ultiplicity constraints such that it describes binary search trees adequately. Here's a suary of the correct answers: left BinSearchTree +root : Node root 0..1 Node +key : int +left : Node +right : Node where is either 0..1, 0..*, or * right BinSearchTree +root : Node root 0..1 Node +key : int +left : Node +right : Node 0..2 children æ Places of variability in the above diagras: í The diagras do not contain aggregations or copositions. However, one could put the on the source ends of all three associations. æ Coon istakes: í navigability constraints issing or incorrect í association between Node objects issing í ultiplicity constraints issing or incorrect
2 Question 2: è12 pointsè For your convenience, here is a copy of the code of the previous page. class BinSearchTree í public Node root;... í class Node í public int key; public Node left; public Node right;... í Recall that every node n in a binary search tree satisæes the following invariant: ëthe key of every node in the left subtree of n is less or equal to the key in n and the key of every node in the right subtree of n is greater than the key in n." Draw an activity diagra for searching for a node with a given key k in a binary search tree with root node r. Your search doesn't have to return a list position or any other inforation. It just has to report success èif the key is found in the treeè or failure èif the key is not foundè. set current node to r key not found yes no current node is null? key found yes no k is equal to key of current node? k is less than key of current node? no set current node to right child yes set current node to left child æ Places of variability: í There are any correct ways of expressing the search as an activity diagra. However, the above is one of the ost succint. æ Coon istakes: í Inappropriate assuptions, that is, diagra assues, e.g., that key is always contained in tree, or tree is coplete èevery node has either no or two childrenè í Access to non-existent ènullè objects. E.g., tree ay be epty, that is, r ay be null. í Syntax of diagras wrong
3 Question 3: è8 pointsè Brieæy and inforally, list the ost iportant diæerences between the Visitor and the Iterator design pattern. æ Both the Iterator and the Visitor pattern give the user unifor accesss to the eleents of a collection. The Visitor pattern, however, is ore general than the Iterator pattern because it allows the eleents of the collection to have diæerent types ècollection is heterogenousè. The Iterator pattern requires that all eleents retrieved have the sae type ècollection is hoogeneousè. æ The Visitor pattern requires the addition of an accept ethod to the classes the eleents of the collection are instances of. Coon istakes: æ Many students siply wrote a paragraph about Iterators, then a paragraph about Visitors. That didn't answer the question of what the diæerences were. Full credit was given if the diæerences could be picked out fro corresponding stateents in your paragraphs èfor exaple, if you said in one place that an Iterator was for hoogeneous data structures and in another that a Visitor was for heterogenous data structuresè. If your stateents did not indicate the diæerences, you only got partial arks, even if you ade true stateents about each pattern. æ Another coon istake was saying that Iterators were for arrays or lists and Visitors were for trees. That's not really correct. People write Iterators for data structures such as binary search trees and hash tables, as long as the eleents of these are of the sae type. The real diæerence is that Visitors are for data structures containing ultiple node types, of which parse trees are only one exaple.
4 Question 4: è6 pointsè Brieæy and inforally list three of the biggest diæerences between the Waterfall process and Microsoft's ësync & Save" process. æ The Waterfall process prescribes the existence of a coplete requireents docuent before the design and ipleentation can begin. Mircosoft's planning phase only calls for a ëvision stateent" that is expected to change and evolve. æ A siilar situation exists with respect to testing. The Waterfall process expects the code to be coplete before testing begins. Microsoft's ësync & Save", however, asks for diæerent kinds of testing during the entire developent. æ The developentèipleentation phases in both the Waterfall and the ësync & Save" process ask for the identiæcation of independent subprojects that can be ipleented in parallel. However, the Waterfall process expects all subprojects to be copleted fully before they are integrated. The daily builds of ësync & Save", however, require even incoplete ipleentations of the subprojects to be cobined and integrated. Coon istakes: æ See ærst coon istake for previous question. A paragraph about the Waterfall process followed by a paragraph about ësynch & Save" did not get you full arks unless three distinct diæerences were ebedded in your paragraphs. æ Many people said that there was no possibility of parallelis in the Waterfall process. You got only partial arks for that. What we said in class èand on the slidesè is that there is ore opportunity for parallelis in Microsoft's process. In the Waterfall process, each step ust be ænished before the next starts, so there is no parallelis between steps. However, it is quite usual to have any groups working in parallel within certain steps, especially ipleentation ècodingè. In the Microsoft process, you can also have parallelis between steps - for exaple, soe eleents of analysis, design, coding and testing going on at once. æ Soe people said that the Microsoft process takes less tie than the Waterfall process. That's not always true; it depends a lot on the task and how each process is anaged. In theory, the Microsoft process gets things to arket quicker, but in practice things can get unorganized and slow down because the project hasn't been planned and coordinated carefully enough. So you only got partial arks for that.
5 Question 5: è6 pointsè For each of the following three software quality criteria, write down at least one feature of the Java prograing language that supports that criterion. For each criterion, write one or two sentences explaining how the Java feature supports the criterion. Correct answers include the following. Soe of the answers are deliberately a bit ore verbose than necessary. EncapsulationèInforation Hiding: í Classes in Java èand other OO languagesè allow the easy grouping of data and behaviours that ëbelong together". í Java's visibility odiæers èpublic, protected, and privateè give the prograer æne-grained control over which entities in a class are visible fro the outside. í Interfaces in Java allow ipleentation details to be hidden fro the clients of the code. Only the publically accessible data and behaviours are entioned in the interface. So, if the client only sees the interface èas it should be the caseè, the ipleentation reains hidden. Reuse: í In Java èand other OO languagesè, a subclass autoatically inherits data and behaviours fro its superclass. Code that has already been developed for a class can thus be shared aong and reused for the handling of the objects in a subclass. í The Java Application Prograer Interface èapiè contains a large nuber of pre-deæned packages to do all kinds of things èe.g., inputèoutput, array and vector anipulation, GUI prograingè. All of these packages can be used in diæerent contexts by just iporting the èstandard packages like java.lang are iported autoatically. Modularity: í Java's notion of interface allows data and behaviours be separated fro the details of their ipleentation. í Classes in Java allow code to be broken up into pieces. All data and behaviours that belong together èbecause, for instance, they accoplish a speciæc taskè can be put into a class. Classes deæne their own nae space, that is, two diæerent classes can have an attribute with the sae nae. í Packages allow you to take grouping to the next level. Classes that for a logical unit can be grouped into a package. The Java API, for instance, contains java.ath a package for supporting high-precision atheatical operations. The package java.io contains all classes that deal with input and output. Coon istakes: æ Design patterns are not a Java feature. They can be ipleented in Java, but they are not Java speciæc. æ Confusion about what ëodularity", ëinheritance", or ëpolyorphis" ean
6 Question 6: è8 pointsè Draw a use case diagra for QCard. Your diagra should contain at least two actors and three use cases. Here's one correct answer. QCard Add Course student Drop Course Adinistrator Check Marks Enter Marks æ Places of variability: í Obviously, there are lots of correct answers to this question. æ Coon istakes: í The ain proble was that people did not really understand the proper forat and choices for use case diagras. Soe people picked QCard as an actor. QCard is the whole syste; actors are people or other hardware or software systes who interact with the syste. An actor is eant to be soeone or soething who initiates interactions with the syste, so a database is not a good choice either. The choice of a backup syste was ok, since soe backup systes will initiate backup operations according to a schedule. í Another error wesawwas in the choice of use cases. A use case is soe kind of interaction between a user and the syste. So ëenter arks" or ëlook up arks" are good use cases, but ëarks" is not. Use cases such as ëarks" and labeled the arrows with actions such as ëenter" or ëlook up" do not æt the syntax of use case diagras. í Only huan actors are drawn using a stick ægure. í Relationships èëuses" or ëextends"è between use cases were not required. If you provided soe and used the correctly, that was æne. If you used the incorrectly, you lost a ark or two. If you put lines between use cases without any labels, that is not correct use case syntax.
7 Question 7: è8 pointsè Hans attepted to use a sequence diagra to describe the steps necessary to pay with your debit card èbank card, interac cardè at a grocery store. Here is what he cae up with: Custoer Cashier CardReader Bank enable slidecard askforcard askforinfo inputinfo askforinfo checkinfo no ok? displayerror yes displaysuccess transactioncoplete where the essages have the following eaning: enable: The cashier enables the reader by sending it the aount to be deducted. slidecard: The custoer slides hisèher card. askforcard: The reader propts the custoer to slide hisèher card. askforinfo: The reader propts the custoer for the account to be debited and PIN. inputinfo: The custoer selects the account and inputs hisèher PIN. checkinfo: The reader sends the PIN, the aount, and the account inforation to the bank for veriæcation purposes. displayerror: The reader infors the custoer that the attepted debit was denied. transactioncoplete: The reader infors the cashier that the attepted debit was copleted successfully. displaysuccess: The reader infors the custoer that the attepted debit was copleted successfully. Continued on next page
8 Question 7 ècontinuedè: In the space below, brieæy list at least four diæerent incorrectnesses in Hans's diagra on the previous page. Here're the incorrectnesses: 1. Wrong sender: The enable essage should be sent by the cashier, not the custoer. 2. Wrong order: In the diagra, the custoer slides his card, before he has actually received the essage propting hi to do so. In other words, the order of askforcard and slidecard should be reversed. 3. No branching: ëbranching" is not allowed in sequence diagras. Each sequence diagra describes a single scenario only. In other words, in a given diagra, the essage fro the bank to the custoer represents either success or failure never both, as Hans attepted to do. Another proble related to branching is that according to the diagra, after displaying the error, control ëæows into" the positive case and the reader also indicates a successful copletion of the transaction. 4. No crossing: A essage cannot ëcross" other essages in sequence diagras. Message askforinfo, however, does. The only way to indicate that a sequence of essages repeats is through a loop which is expressed by a rectangular box around the repeated essages together with a possibly inforal terination condition. Answers that did not receive points: æ Not enough detail: How uch detail is enough, depends on the contextèrequireents. There is nothing in the question that indicates that the diagra contains an insuæcient aount of inforation. So, the level of detail does not count as an incorrectness. æ No upper liit on nuber of unsuccessful attepts: Siilar.
Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]
CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority
More informationcm3520 cm3525 Security Function
wwwiagisticsco c3520 c3525 Security Function Contents Contents 1 Security 11 Introduction 1-2 12 Tradearks and Registered Tradearks 1-2 13 Copliance with the ISO15408 Standard 1-2 14 Operating Precautions1-2
More informationGeometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.
Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationDesign and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design
Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au
More information1 P a g e. F x,x...,x,.,.' written as F D, is the same.
11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando
More informationThe Internal Conflict of a Belief Function
The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More information-- batch, online or subprograms.[z]
Migration of Procedurally Oriented COBOL Progras in an Object-Oriented Architecture Harry M. Sneed Software Engineering Service bsdekz andstr. 37, D-812 Ottobrunn, Gerany The subject of this paper is the
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationStructuring Business Metadata in Data Warehouse Systems for Effective Business Support
Structuring Business Metadata in Data Warehouse Systes for Effective Business Support arxiv:cs/0110020v1 [cs.db] 8 Oct 2001 N.L. Sarda Departent of Coputer Science and Engineering Indian Institute of Technology
More informationFlucs: Artificial Lighting & Daylighting. IES Virtual Environment
Flucs: Artificial Lighting & Daylighting IES Virtual Environent Contents 1. General Description of the FLUCS Interface... 6 1.1. Coon Controls... 6 1.2. Main Application Window... 6 1.3. Other Windows...
More informationTwo hours UNIVERSITY OF MANCHESTER. January Answer any THREE questions. Answer each question in a separate book
Two hours UNIVERSITY OF MANCHESTER Database Architecture Models and Design January 2004 Answer any THREE questions Answer each question in a separate book The use of electronic calculators is not peritted.
More informationStructural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.
Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable
More informationInteroperability/ Conformance Test dpmr Mode 2 Repeater
Interoperability/ Conforance Test dpmr Mode 2 Repeater IOP test Mode 2 Repeater Copyright 2013 dpmr Association All Rights Reserved Version 1.0 0 Revision History Version Date Change By 0v1 16 Oct 2012
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationCS 361 Meeting 8 9/24/18
CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages
More informationA Novel Fuzzy Chinese Address Matching Engine Based on Full-text Search Technology
Based on Full-text Search Technology 12 Institute of Reote Sensing and Digital Earth National Engineering Research Center for Reote Sensing Applications,Beijing,100101, China E-ail: yaoxj@radi.ac.cn Xiang
More informationMAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer
MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The
More information6.1 Topological relations between two simple geometric objects
Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying
More informationVerifying the structure and behavior in UML/OCL models using satisfiability solvers
IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on
More informationM Software management
M Software anageent This docuent is part of the UCISA Inforation Security Toolkit providing guidance on the policies and processes needed to ipleent an organisational inforation security policy. To use
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationAn Architecture for a Distributed Deductive Database System
IEEE TENCON '93 / B eih An Architecture for a Distributed Deductive Database Syste M. K. Mohania N. L. Sarda bept. of Coputer Science and Engineering, Indian Institute of Technology, Bobay 400 076, INDIA
More informationData Engine for NoSQL - IBM Power Systems Edition White Paper and Technical Reference
Data Engine for NoSQL - IBM Power Systes Edition and Technical Reference Brad Brech Juan Rubio Michael Hollinger IBM Systes Group June 2015 Data Engine for NoSQL Power Systes Edition Contents Data Engine
More informationM a c intosh Cyr i l lic Lang u age Ki t. Installation and User s Manual Manuel d installation et d u t i l i s a t i o n
apple M a c intosh Cyr i l lic Lang u age Ki t Installation and User s Manual Manuel d installation et d u t i l i s a t i o n K Apple Coputer, Inc. This anual and the software described in it are copyrighted
More informationDRAFT Master List of WMS Roles and Permissions DRAFT Last updated 8/1/2012
DRAFT Master List of WMS Roles and Perissions DRAFT Last updated 8/1/2012 Roles Acq adin 3 KB adin 31 Acq order staff 3 KB staff 31 Acq receive staff 3 KB supervisor 31 Acq senior staff 3 Network delivery
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationGrading Results Total 100
University of California, Berkeley College of Engineering Departent of Electrical Engineering and Coputer Sciences Fall 2003 Instructor: Dave Patterson 2003-11-19 v1.9 CS 152 Exa #2 Solutions Personal
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationA High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationHomework 1. An Introduction to Neural Networks
Hoework An Introduction to Neural Networks -785: Introduction to Deep Learning Spring 09 OUT: January 4, 09 DUE: February 6, 09, :59 PM Start Here Collaboration policy: You are expected to coply with the
More informationVodafone MachineLink. Port Forwarding / DMZ Configuration Guide
Vodafone MachineLink Port Forwarding / DMZ Configuration Guide Docuent history This guide covers the following products: Vodafone MachineLink 3G (NWL-10) Vodafone MachineLink 3G Plus (NWL-12) Vodafone
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationA Comparison Analysis of Graphical Models of Object-Oriented Databases and the GOQL Model
A Coparison Analysis of Graphical Models of Object-Oriented Databases and the GOQL Model EUCLID KERAMOPOULOS School of Coputer Science Westinster University 5 New Cavendish Street, London WM 8JS, UK PHILIPPOS
More informationFINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS*
irnper neuvork protocols. A. Danthine. editor, 'iniversite de liege. I'->7X. F3 FINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS* Gregor V. Bochann Departeent de Matheatiques Ecole Polytechnique Federals
More informationAutomatic Graph Drawing Algorithms
Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs
More informationEUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD
EUROPEAN ETS 300 428 TELECOMMUNICATION August 1995 STANDARD Source: ETSI TC-NA Reference: DE/NA-052619 ICS: 33.040 Key words: B-ISDN, ATM Broadband Integrated Services Digital Network (B-ISDN); Asynchronous
More informationMulti Packet Reception and Network Coding
The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts
More informationCollection Selection Based on Historical Performance for Efficient Processing
Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska
More informationCarving Differential Unit Test Cases from System Test Cases
Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More informationEntity Search Engine: Towards Agile Best-Effort Information Integration over the Web
Entity Search Engine: Towards Agile Best-Effort Inforation Integration over the Web Tao Cheng, Kevin Chen-Chuan Chang University of Illinois at Urbana-Chapaign {tcheng3, kcchang}@cs.uiuc.edu. INTRODUCTION
More informationDistributed Multicast Tree Construction in Wireless Sensor Networks
Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,
More informationEnergy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks
Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr
More informationVar. V4.03 Issue: July, The present Product Information relates to the Software Packages: Name Variant Product no. (MLFB)
A&D SE SP3 Karlsruhe Product inforation PROGRAF AS+/NT Var. V4.03 Issue: July, 2004 Descriptors TELEPERM M, AS Configuration Suary The present Product Inforation relates to the Software Packages: Nae Variant
More informationDatabase Design on Customer Relationship Management System Yanmei Wang
2nd International Conference on Econoics, Social Science, Arts, Education and Manageent Engineering (ESSAEME 2016) Database Design on Custoer Relationship Manageent Syste Yanei Wang College of Inforation
More informationAuthor. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter
Enterprise Architecture Cybernetics for Global Mining Projects: Reducing the Structural Coplexity of Global Mining Supply Networks via Virtual Brokerage Author Kandjani, Hadi, Wen, Larry, Bernus, Peter
More informationDevelopment of an Integrated Cost Estimation and Cost Control System for Construction Projects
ABSTRACT Developent of an Integrated Estiation and Control Syste for Construction s by Salan Azhar, Syed M. Ahed and Aaury A. Caballero Florida International University 0555 W. Flagler Street, Miai, Florida
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationComparing Techniques by Means of Encapsulation and onnascence
rusuur lt suaries and Meilir Page-Jones Coparing Techniques by Means of Encapsulation and onnascence oday the object-oriented approach to software developent is at the height of fashion. As such, it threatens
More informationThe Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
More informationEfficient Constraint Evaluation Algorithms for Hierarchical Next-Best-View Planning
Efficient Constraint Evaluation Algoriths for Hierarchical Next-Best-View Planning Ko-Li Low National University of Singapore lowl@cop.nus.edu.sg Anselo Lastra University of North Carolina at Chapel Hill
More informationReusability Analysis for Shipbuilding Components Modeled in XML and Java
Reusability Analysis for Shipbuilding Coponents Modeled in XML and Java Prof. Steven A. Deurjian, Sr., Jeffrey R. Ellis, Rodrigo Caballero, Hai Lin, and Xiaopei Wang Coputer Science & Engineering Departent
More informationVar. 9 Issue: January, The present Product Information relates to the Software Packages: Name Variant Product no. (MLFB)
$ '6(63.DUOVUXKH Product inforation 352*5$)$617 Var. 9 Issue: January, 2002 Descriptors TELEPERM M, AS Configuration Suary The present Product Inforation relates to the Software Packages: Nae Variant Product
More informationImprove Peer Cooperation using Social Networks
Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding
More informationA New Generic Model for Vision Based Tracking in Robotics Systems
A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationGeneralised Mixin-based Inheritance to Support Multiple Inheritance
Vrije Universiteit russel Faculteit Wetenschappen VRIJE UNIVERSITEIT RUSSEL SCI EN T I V INCERE T ENE R S Generalised Mixin-based Inheritance to Support Multiple Inheritance Niels oyen, Carine Lucas, Patrick
More informationAPPLICATION NOTE #175
APPLICATION NOTE #175 INTRODUCTION Application Note #175 suppleents the recoended protection circuitry discussions currently found in Ceretek product data sheets. The contents of Application Note #175
More informationNovel Image Representation and Description Technique using Density Histogram of Feature Points
Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos
More informationHeterogeneous Radial Basis Function Networks
Proceedings of the International Conference on Neural Networks (ICNN ), vol. 2, pp. 23-2, June. Heterogeneous Radial Basis Function Networks D. Randall Wilson, Tony R. Martinez e-ail: randy@axon.cs.byu.edu,
More informationA Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network
A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University
More informationMultipath Selection and Channel Assignment in Wireless Mesh Networks
Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,
More informationGromov-Hausdorff Distance Between Metric Graphs
Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More informationELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH
ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.
More information1 Extended Boolean Model
1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible
More informationBoosted Detection of Objects and Attributes
L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly
More informationJoint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points
Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University
More informationMinimax Sensor Location in the Plane
NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location in the Plane To M. Cavalier The Pennsylvania State University University Par, PA 680 Enrique del Castillo The Pennsylvania
More informationOptimal Route Queries with Arbitrary Order Constraints
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,
More informationEntity-Relationship Models of Information Artefacts
Entity-Relationship Models of Inforation Artefacts T. R. G. Green MRC Applied Psychology Unit 5 Chaucer Rd, Cabridge CB2 2EF thoas.green@rc-apu.ca.ac.uk http: //www.rc-apu.ca.ac.uk/personal/thoas.green/
More informationa) Figure 1 shows a small part of an Extended-Entity-Relationship model describing the personnel department of a research company.
a) Figure shows a sall part of an Extended-Entity-Relationship odel describing the personnel departent of a research copany. GivenNae FailyNae relationship telephone NInuber NextOfKin contact Eployee d
More informationScheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We
More informationReal-Time Detection of Invisible Spreaders
Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract
More informationStoring and Accessing Live Mashup Content in the Cloud
Storing and Accessing Live ashup Content in the Cloud Krzysztof Ostrowski Cornell University Ithaca, NY 14853, USA krzys@cs.cornell.edu Ken Biran Cornell University Ithaca, NY 14853, USA ken@cs.cornell.edu
More informationTheoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem
Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The
More informationProceedings of the First Symposium on Networked Systems Design and Implementation
USENIX Association Proceedings of the First Syposiu on Networked Systes Design and Ipleentation San Francisco, CA, USA March 29 31, 2004 2004 by The USENIX Association All Rights Reserved For ore inforation
More informationDesign and Implementation of User Interactive Wireless Smart Home Energy Management System
Design and Ipleentation of User Interactive Wireless Sart Hoe Energy Manageent Syste Aryadevi Reanidevi Devidas 1, Subeesh T. S 2, Maneesha Vinodini Raesh 3 Center for Wireless Networks and Applications
More informationCompiling an Honest but Curious Protocol
6.876/18.46: Advanced Cryptography May 7, 003 Lecture 1: Copiling an Honest but Curious Protocol Scribed by: Jonathan Derryberry 1 Review In previous lectures, the notion of secure ultiparty coputing was
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationDETC2002/DAC DECOMPOSITION-BASED ASSEMBLY SYNTHESIS FOR IN-PROCESS DIMENSIONAL ADJUSTABILITY. Proceedings of DETC 02
Proceedings of DETC 0 ASME 00 Design Engineering Technical Conferences and Coputer and Inforation in Engineering Conference Montreal, Canada, Septeber 9-October, 00 DETC00/DAC-08 DECOMPOSITION-BASED ASSEMBLY
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationKnowledge Discovery Applied to Agriculture Economy Planning
Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn
More informationThe Unit Bar Visibility Number of a Graph
The Unit Bar Visibility Nuber of a Graph Eily Gaub 1,4, Michelle Rose 2,4, and Paul S. Wenger,4 August 20, 2015 Abstract A t-unit-bar representation of a graph G is an assignent of sets of at ost t horizontal
More informationOPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS
OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS ADRIAN DEACONU Transilvania University of Brasov, Roania Abstract A linear tie
More informationRECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS
RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,
More informationSummary. Reconstruction of data from non-uniformly spaced samples
Is there always extra bandwidth in non-unifor spatial sapling? Ralf Ferber* and Massiiliano Vassallo, WesternGeco London Technology Center; Jon-Fredrik Hopperstad and Ali Özbek, Schluberger Cabridge Research
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationWeeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10
Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationPrivacy-preserving String-Matching With PRAM Algorithms
Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,
More informationBrian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi
A Hierarchical Application of ICA-based Feature Etraction to Iage Classification Introduction Iage classification poses one of the greatest challenges in the achine vision and achine learning counities.
More information