Concurrent Execution

Size: px
Start display at page:

Download "Concurrent Execution"

Transcription

1 Concurrent Execution Overview: concepts and definitions modelling: parallel composition action interleaving algebraic laws shared actions composite processes process labelling, action relabeling and hiding (these slides including graphics are a modified version of the slides from Ch3 of Magee & Kramer: Concurrency) COMP2310 Lecture 4: Concurrent Execution (I)

2 Concepts and Definitions concepts: processes - concurrent execution interleaving of actions from component processes interaction / synchronization via shared actions: both components must participate concurrency: logically simultaneous processing Does not imply multiple processing elements (cores, PE). Requires interleaved execution on a single PE parallelism: physically simultaneous processing Involves multiple PEs and/or independent device operations. both concurrency and parallelism require controlled access to shared resources we use these terms interchangeably and generally do not distinguish between real and pseudo-concurrent execution COMP2310 Lecture 4: Concurrent Execution (I)

3 Modeling Concurrency how should we model process execution speed? Arbitrary speed (we abstract away time) how do we model concurrency? Arbitrary relative order of actions from different processes (interleaving but preservation of order wrt. each process) what is the result? Provides a general model independent of scheduling (asynchronous model of execution) notation: If P and Q are processes then (P Q) represents the concurrent execution of P and Q The operator is the parallel composition operator COMP2310 Lecture 4: Concurrent Execution (I)

4 ÁÌ À Ö Ø ËÌÇÈ µº > Ø Ò > Ø Ð > ËÌÇÈ µº ÇÆÎ ÊË Concurrent Process Example: Disjoint Alphabets ÇÆÎ ÊË ÁÌ À ÁÌ À ÇÆÎ ÊË µº possible traces as a result of action interleaving: Ø Ò Ø Ð Ö Ø Ø Ò Ö Ø Ø Ð Ö Ø Ø Ò Ø Ð (2 states) (3 states) (0,0) (0,1) (0,2) (1,2) (1,1) (1,0) (2 3 states) COMP2310 Lecture 4: Concurrent Execution (I)

5 Parallel Composition Algebraic Laws commutative: (P Q) = (Q P) associative: (P (Q R)) = ((P Q) R) = (P Q R) it does not matter which order you compose processes we can drop the inner parentheses clock radio example: Ø > ÄÇ Ã µº ÄÇ Ã ÓÒ > Ó > Ê ÁÇ µº Ê ÁÇ ÄÇ Ã Ê ÁÇ ÄÇ Ã Ê ÁÇ µº LTS? Traces? Number of states? (hint: is this structurally similar to another example?) principle: in a parallel composition, each component process must undergo its own state transitions they do so independently if their alphabets are disjoint corollary: any sub-trace of (P Q) wrt. P s alphabet must also be a trace of P COMP2310 Lecture 4: Concurrent Execution (I)

6 Modeling Process Interaction: Shared Actions if the processes in a composition have actions in common, these actions are said to be shared i.e. they have non-disjoint alphabets shared actions are the way that process interaction is modeled. while unshared actions may be arbitrarily interleaved, a shared action must be executed at the same time by all processes that participate in the shared action example: Å Ã Ê synchronizes with ÍË Ê on the Ö Ý action: Ñ > Ö Ý > Å Ã Ê µº Å Ã Ê Ö Ý > Ù > ÍË Ê µº ÍË Ê Å Ã Ê ÍË Ê Å Ã Ê ÍË Ê µº LTS? Traces? Number of states? COMP2310 Lecture 4: Concurrent Execution (I)

7 Modeling Interaction - Handshake a handshake is an action acknowledging another action e.g. Ù acknowledges completion of Ù Ñ > Ö Ý > Ù > Å Ã ÊÚ¾ µº Å Ã ÊÚ¾ Ö Ý > Ù > Ù > ÍË ÊÚ¾ µº ÍË ÊÚ¾ Å Ã Ê ÍË ÊÚ¾ Å Ã ÊÚ¾ ÍË ÊÚ¾ µº 3 states 3 states 3 3 states? equivalent to ÍË ÊÚ¾ Ñ > Ö Ý > Ù > Ù > Å Ã Ê ÍË ÊÚ¾µº Å Ã Ê interaction constrains the overall behavior COMP2310 Lecture 4: Concurrent Execution (I)

8 Ã Ñ > Ö Ý > Ù > Å Ã µº Å Ã Ñ > Ö Ý > Ù > Å Ã µº Å multi-party synchronization: Modeling Interaction: Multiple Processes > > > equivalent to Ñ > Ñ > Ê ÌÇÊ Ñ Ñ > Ê µ > Ê Ö Ý > Ñ Ð > Ù > ÌÇÊ µº COMP2310 Lecture 4: Concurrent Execution (I)

9 Composite Processes a composite process is a parallel composition of primitive processes These composite processes can be used in the definition of further compositions e.g. Å Ã ÊË Å Ã Å Ã µº ÌÇÊ Å Ã ÊË ËË Å Ä µº substituting the definition for Å Ã ÊË in ÌÇÊ and applying the associative law for parallel composition results in the original definition for ÌÇÊ in terms of primitive processes COMP2310 Lecture 4: Concurrent Execution (I)

10 Process Instances and Labeling È prefixes each action label in the alphabet È of with e.g. two instances of a switch process: ÓÒ > Ó > ËÏÁÌ À µº ËÏÁÌ À ÌÏÇ ËÏÁÌ À ËÏÁÌ À ËÏÁÌ À µº an array of instances of the switch process: ËÏÁÌ À Ë Æ µ ÓÖ ÐÐ ½ºº Æ ËÏÁÌ À µº (the text and LTSAtool use the abbreviation ½ººÆ ËÏÁÌ Àµ for the RHS) this is useful to create multiple instances of primitive processes Q: can they interact with each other? Is this a problem? COMP2310 Lecture 4: Concurrent Execution (I)

11 Review Exersize: Indexed Actions and Parallel Composition A die (singular of dice) may repeatedly engage in a throw action followed by a show action, which has an integer value from 1 to 6 associated with it. Q1: what is a correct FSP model for the die? (a) Á Ø ÖÓÛ > ÓÛ > Á µº (b) Á Ø ÖÓÛ > ÓÛ ½ºº > Á µº (c) Á Ø ÖÓÛ ½ºº > ÓÛ > Á µº (d) Á Ø ÖÓÛ > ËÀÇÏ ½ºº µ ËÀÇÏ Ú ½ºº Á º Q2: how many states does it have? (a) 2 (b) 3 (c) 6 (d) 7 (e) 12 Q3: What is an FSP composition of two independent die processes? (a) Á Á Á µº (b) Á Á Á µº Q4: how many states does this have? COMP2310 Lecture 4: Concurrent Execution (I)

12 Process Labeling by a Set of Prefix Labels { ½ ºº Ü} È replaces every action label Ò in the alphabet of È with the labels ½ºÒ ººº ÜºÒ Further, every transition Ò > µ in the definition of È is replaced with the transitions { ½ºÒ ºº ܺÒ} > µ process prefixing is useful for modeling shared resources: ÕÙ Ö > Ù > Ö Ð > ÍË Ê µº ÍË Ê ÕÙ Ö > Ö Ð > Ê ËÇÍÊ µº Ê ËÇÍÊ Ê ËÇÍÊ ËÀ Ê ÍË Ê ÍË Ê { } Ê ËÇÍÊ µº { } Ê ËÇÍÊ now can interact with the two ÍË Ê processes COMP2310 Lecture 4: Concurrent Execution (I)

13 Process Prefix Labels for Shared Resources How does the model ensure that the user that acquires the resource is the one to release it? COMP2310 Lecture 4: Concurrent Execution (I)

14 Action Relabeling relabeling functions are applied to processes to change the names of action labels their general form is { Ò ÛÐ Ð 1»ÓÐ Ð Ð 1... Ò ÛÐ Ðn»ÓÐ Ð Ðn } Note that both Ò ÛÐ Ð and ÓÐ Ð Ð can be sets of labels. relabeling ensures that composed processes synchronize on particular actions ÐÐ >Û Ø >ÓÒØ ÒÙ > ÄÁ ÆÌ µº ÄÁ ÆÌ Ö ÕÙ Ø > ÖÚ >Ö ÔÐÝ >Ë ÊÎ Ê µº Ë ÊÎ Ê ÄÁ ÆÌ Ë ÊÎ Ê ÄÁ ÆÌ Ë ÊÎ Ê µ» { Ðл Ö ÕÙ Ø Ö ÔÐÝ» Û Ø}º the relabeling applies to all primitive processes in the composition (it gets applied before the ÁÁ); it is mainly used to make the primitive processes interact enables us to specify component processes in a modular way upon composition, can be used to connect processes COMP2310 Lecture 4: Concurrent Execution (I)

15 ÄÁ ÆÌ ÐÐ >Û Ø >ÓÒØ ÒÙ > ÄÁ ÆÌ µº Ö ÕÙ Ø > ÖÚ >Ö ÔÐÝ >Ë ÊÎ Ê µº Ë ÊÎ Ê Action Relabeling: Client-Server ÄÁ ÆÌ Ë ÊÎ Ê ÄÁ ÆÌ Ë ÊÎ Ê µ» { Ðл Ö ÕÙ Ø Ö ÔÐÝ» Û Ø}º alternative formulation using qualified or prefixed labels: ÔØ º Ö ÕÙ Ø > ÖÚ > ÔØ º Ö ÔÐÝ > Ë ÊÎ ÊÚ¾ Ë ÊÎ ÊÚ¾ ÐÐ º Ö ÕÙ Ø > ÐÐ º Ö ÔÐÝ > ÓÒØ ÒÙ > ÄÁ ÆÌÚ¾ µº ÄÁ ÆÌÚ¾ ÄÁ ÆÌ Ë ÊÎ ÊÚ¾ ÄÁ ÆÌÚ¾ Ë ÊÎ ÊÚ¾ µ» { Ðл ÔØ}º (the renaming is applied to the prefix) COMP2310 Lecture 4: Concurrent Execution (I)

16 Action Hiding: an Abstraction to Reduce Complexity when applied to a process È, the hiding operator \{ ½ ººº Ü} removes the action names ½,..., Ü from the alphabet of È and makes these concealed actions silent these silent actions are labeled Ø Ù silent actions in different processes are not shared when applied to a process È, the interface operator { ½ ººº Ü} hides all actions in the alphabet of È not labeled in the set ½,..., Ü (sometimes it is more convenient to specify the set of labels to be exposed) the following definitions are equivalent: ÕÙ Ö > Ù > Ö Ð > ÍË Ê µ \ { Ù }º ÍË Ê ÕÙ Ö > Ù > Ö Ð > ÍË Ê µ { ÕÙ Ö Ö Ð }º ÍË Ê The LTSAtool s minimization function removes hidden Ø Ù actions to produce an LTS with the equivalent observable behavior (note: action hiding is not directly assessable in this course) COMP2310 Lecture 4: Concurrent Execution (I)

17 Summary concepts: concurrent processes and process interaction models: asynchronous (arbitrary speed) & interleaving (arbitrary order) parallel composition as a finite state process with action interleaving a (parallel) composite process is equivalent to a (serial) interleaving of its component (serial) processes algebraic laws to express this process interaction by shared actions this forms a primitive for process synchronization (powerful!) and also for process communication (Q: how can they transfer data?) process labeling and action relabeling to control which actions are shared (transform independent actions into shared actions) structure diagrams to visualize these (next lecture) practice: multiple threads in Java (next lecture) COMP2310 Lecture 4: Concurrent Execution (I)

CSCI 5828: Foundations of Software Engineering

CSCI 5828: Foundations of Software Engineering CSCI 5828: Foundations of Software Engineering Lecture 7: Concurrent Execution Slides created by Magee and Kramer for the Concurrency textbook 1 Magee/Kramer 2nd Edition Chapter 3 Concurrent Execution

More information

Concurrent Execution

Concurrent Execution Jan. 30, 2013 Concepts Processes - concurrent execution and interleaving Process interaction Models Parallel composition of asynchronous processes Interleaving Interaction Shared actions Process labeling

More information

CSCI 5828: Foundations of Software Engineering

CSCI 5828: Foundations of Software Engineering CSCI 5828: Foundations of Software Engineering Lecture 7: Concurrent Execution Slides created by Magee and Kramer for the Concurrency textbook 2/05/2008 1 Magee/Kramer 2nd Edition What s the Difference?

More information

THE AUSTRALIAN NATIONAL UNIVERSITY Practice Final Examination, October 2012

THE AUSTRALIAN NATIONAL UNIVERSITY Practice Final Examination, October 2012 THE AUSTRALIAN NATIONAL UNIVERSITY Practice Final Examination, October 2012 COMP2310 / COMP6310 (Concurrent and Distributed Systems ) Writing Period: 3 hours duration Study Period: 15 minutes duration

More information

Models, Notation, Goals

Models, Notation, Goals Scope Ë ÕÙ Ò Ð Ò ÐÝ Ó ÝÒ Ñ ÑÓ Ð Ü Ô Ö Ñ Ö ² Ñ ¹Ú ÖÝ Ò Ú Ö Ð Ö ÒÙÑ Ö Ð ÔÓ Ö ÓÖ ÔÔÖÓÜ Ñ ÓÒ ß À ÓÖ Ð Ô Ö Ô Ú ß Ë ÑÙÐ ÓÒ Ñ Ó ß ËÑÓÓ Ò ² Ö Ò Ö Ò Ô Ö Ñ Ö ÑÔÐ ß Ã ÖÒ Ð Ñ Ó ÚÓÐÙ ÓÒ Ñ Ó ÓÑ Ò Ô Ö Ð Ð Ö Ò Ð ÓÖ Ñ

More information

Probabilistic analysis of algorithms: What s it good for?

Probabilistic analysis of algorithms: What s it good for? Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like

More information

Concurrent Architectures - Unix: Sockets, Select & Signals

Concurrent Architectures - Unix: Sockets, Select & Signals Concurrent Architectures - Unix: Sockets, Select & Signals Assignment 1: Drop In Labs reminder check compiles in CS labs & you have submitted all your files in StReAMS! formatting your work: why to 80

More information

An Esterel Virtual Machine

An Esterel Virtual Machine An Esterel Virtual Machine Stephen A. Edwards Columbia University Octopi Workshop Chalmers University of Technology Gothenburg, Sweden December 28 An Esterel Virtual Machine Goal: Run big Esterel programs

More information

Overview: Concurrent Architectures - Unix: Forks and Pipes

Overview: Concurrent Architectures - Unix: Forks and Pipes Overview: Concurrent Architectures - Unix: Forks and Pipes Other Matters: TuteLab-5 solutions and the proof of Peterson s Algorithm Ref: [Coulouris&al Ch 4] history architecture: monolithic vs microkernels,

More information

Introduction to Scientific Typesetting Lesson 11: Foreign Languages, Columns, and Section Titles

Introduction to Scientific Typesetting Lesson 11: Foreign Languages, Columns, and Section Titles Introduction to Scientific Typesetting Lesson 11: Foreign Languages,, and Ryan Higginbottom January 19, 2012 1 Ð The Package 2 Without Ð What s the Problem? With Ð Using Another Language Typing in Spanish

More information

Graphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405

Graphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 Graphs (MTAT.05.080, 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 homepage: http://www.ut.ee/~peeter_l/teaching/graafid08s (contains slides) For grade:

More information

Control-Flow Graph and. Local Optimizations

Control-Flow Graph and. Local Optimizations Control-Flow Graph and - Part 2 Department of Computer Science and Automation Indian Institute of Science Bangalore 560 012 NPTEL Course on Principles of Compiler Design Outline of the Lecture What is

More information

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0. Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts

More information

Ancillary Software Development at GSI. Michael Reese. Outline: Motivation Old Software New Software

Ancillary Software Development at GSI. Michael Reese. Outline: Motivation Old Software New Software Ancillary Software Development at GSI Michael Reese Outline: Motivation Old Software New Software Work supported by BMBF NuSTAR.DA - TP 6, FKZ: BMBF 05P12RDFN8 (TP 6). March 20, 2013 AGATA week 2013 at

More information

Verification Finite-state process modeling and reachability analysis

Verification Finite-state process modeling and reachability analysis Verification Finite-state process modeling and reachability analysis Topics: Finite-state process modeling Verification through interactive simulation Concurrent composition of processes Verification through

More information

District Institute of Education and Training Lawspet, Puducherry.

District Institute of Education and Training Lawspet, Puducherry. District Institute of Education and Training Lawspet, Puducherry. Educational Computing Record work done by with the Register Number. Submitted for the Internal Assessment examination, April / May 2011,

More information

Unified Configuration Knowledge Representation Using Weight Constraint Rules

Unified Configuration Knowledge Representation Using Weight Constraint Rules Unified Configuration Knowledge Representation Using Weight Constraint Rules Timo Soininen ½ and Ilkka Niemelä ¾ and Juha Tiihonen ½ and Reijo Sulonen ½ Abstract. In this paper we present an approach to

More information

Constraint Logic Programming (CLP): a short tutorial

Constraint Logic Programming (CLP): a short tutorial Constraint Logic Programming (CLP): a short tutorial What is CLP? the use of a rich and powerful language to model optimization problems modelling based on variables, domains and constraints DCC/FCUP Inês

More information

Using USB Hot-Plug For UMTS Short Message Service. Technical Brief from Missing Link Electronics:

Using USB Hot-Plug For UMTS Short Message Service. Technical Brief from Missing Link Electronics: Technical Brief 20100507 from Missing Link Electronics: Using USB Hot-Plug For UMTS Short Message Service This Technical Brief describes how the USB hot-plug capabilities of the MLE Soft Hardware Platform

More information

Lecture 2: Modeling Introduction

Lecture 2: Modeling Introduction Concurrent Programming 19530-V (WS01) Lecture 2: Modeling Introduction Dr. Richard S. Hall rickhall@inf.fu-berlin.de Concurrent programming October 23, 2001 Our Approach to Concurrency Start with concurrency

More information

Personal Conference Manager (PCM)

Personal Conference Manager (PCM) Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her

More information

³ ÁÒØÖÓÙØÓÒ ½º ÐÙ ØÖ ÜÔÒ ÓÒ Ò ÌÒ ÓÖ ÓÖ ¾º ÌÛÓ¹ÓÝ ÈÖÓÔÖØ Ó ÓÑÔÐÜ ÆÙÐ º ËÙÑÑÖÝ Ò ÓÒÐÙ ÓÒ º ² ± ÇÆÌÆÌË Åº ÐÚÓÐ ¾ Ëʼ

³ ÁÒØÖÓÙØÓÒ ½º ÐÙ ØÖ ÜÔÒ ÓÒ Ò ÌÒ ÓÖ ÓÖ ¾º ÌÛÓ¹ÓÝ ÈÖÓÔÖØ Ó ÓÑÔÐÜ ÆÙÐ º ËÙÑÑÖÝ Ò ÓÒÐÙ ÓÒ º ² ± ÇÆÌÆÌË Åº ÐÚÓÐ ¾ Ëʼ È Ò È Æ ÇÊÊÄÌÁÇÆË È ÅÁÍŹÏÁÀÌ ÆÍÄÁ ÁÆ Åº ÐÚÓÐ ÂÄ ÇØÓÖ ¾¼¼ ½ ³ ÁÒØÖÓÙØÓÒ ½º ÐÙ ØÖ ÜÔÒ ÓÒ Ò ÌÒ ÓÖ ÓÖ ¾º ÌÛÓ¹ÓÝ ÈÖÓÔÖØ Ó ÓÑÔÐÜ ÆÙÐ º ËÙÑÑÖÝ Ò ÓÒÐÙ ÓÒ º ² ± ÇÆÌÆÌË Åº ÐÚÓÐ ¾ Ëʼ À Ò Ò Ò ÛØ À Ç Òµ Ú Ò µ Ç Òµ

More information

SFU CMPT Lecture: Week 8

SFU CMPT Lecture: Week 8 SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing

More information

On the Analysis of Interacting Pushdown Systems

On the Analysis of Interacting Pushdown Systems On the Analysis of Interacting Pushdown Systems Vineet Kahlon NEC Labs America, Princeton, NJ 08540, USA. ÐÓÒҹРºÓÑ Aarti Gupta NEC Labs America, Princeton, NJ 08540, USA. ÙÔØҹРºÓÑ Abstract Pushdown

More information

Using SmartXplorer to achieve timing closure

Using SmartXplorer to achieve timing closure Using SmartXplorer to achieve timing closure The main purpose of Xilinx SmartXplorer is to achieve timing closure where the default place-and-route (PAR) strategy results in a near miss. It can be much

More information

FSP Language Specification

FSP Language Specification FSP Language Specification V2.0 additions 1 V2.0 -Additions FSP Language Specification This document describes the additions that have been made to the FSP input notation to the LTSA tool since its initial

More information

Pointers & Arrays. CS2023 Winter 2004

Pointers & Arrays. CS2023 Winter 2004 Pointers & Arrays CS2023 Winter 2004 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this

More information

Formal Specification of an Asynchronous On-Chip Bus

Formal Specification of an Asynchronous On-Chip Bus Formal Specification of an Asynchronous On-Chip Bus Juha Plosila Tiberiu Seceleanu Turku Centre for Computer Science TUCS Technical Reports No 461, 14th June 2002 Formal Specification of an Asynchronous

More information

Lecture 5 C Programming Language

Lecture 5 C Programming Language Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the

More information

Instruction Scheduling. Software Pipelining - 3

Instruction Scheduling. Software Pipelining - 3 Instruction Scheduling and Software Pipelining - 3 Department of Computer Science and Automation Indian Institute of Science Bangalore 560 012 NPTEL Course on Principles of Compiler Design Instruction

More information

Definition and Instantiation of a Reference Model for Problem Specifications

Definition and Instantiation of a Reference Model for Problem Specifications Definition and Instantiation of a Reference Model for Problem Specifications Martin Kronenburg Christian Peper University of Kaiserslautern, Erwin Schrödinger Straße, D-67663 Kaiserslautern, Germany E-mail:

More information

Modules. CS2023 Winter 2004

Modules. CS2023 Winter 2004 Modules CS2023 Winter 2004 Outcomes: Modules C for Java Programmers, Chapter 7, sections 7.4.1-7.4.6 Code Complete, Chapter 6 After the conclusion of this section you should be able to Understand why modules

More information

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date

More information

Networks. Other Matters: draft Assignment 2 up (Labs 7 & 8 v. important!!) Ref: [Coulouris&al Ch 3, 4] network performance and principles

Networks. Other Matters: draft Assignment 2 up (Labs 7 & 8 v. important!!) Ref: [Coulouris&al Ch 3, 4] network performance and principles Networks Other Matters: draft Assignment 2 up (Labs 7 & 8 v. important!!) Ref: [Coulouris&al Ch 3, 4] network performance and principles OSI protocol; routing TCP/IP layers and packet organization IP addresses

More information

How to Implement DOTGO Engines. CMRL Version 1.0

How to Implement DOTGO Engines. CMRL Version 1.0 How to Implement DOTGO Engines CMRL Version 1.0 Copyright c 2009 DOTGO. All rights reserved. Contents 1 Introduction 3 2 A Simple Example 3 2.1 The CMRL Document................................ 3 2.2 The

More information

Computing optimal linear layouts of trees in linear time

Computing optimal linear layouts of trees in linear time Computing optimal linear layouts of trees in linear time Konstantin Skodinis University of Passau, 94030 Passau, Germany, e-mail: skodinis@fmi.uni-passau.de Abstract. We present a linear time algorithm

More information

Response Time Analysis of Asynchronous Real-Time Systems

Response Time Analysis of Asynchronous Real-Time Systems Response Time Analysis of Asynchronous Real-Time Systems Guillem Bernat Real-Time Systems Research Group Department of Computer Science University of York York, YO10 5DD, UK Technical Report: YCS-2002-340

More information

Composable Memory Transactions

Composable Memory Transactions Composable Memory Transactions December 20, 2004 Tim Harris, Simon Marlow, Simon Peyton Jones, Maurice Herlihy Microsoft Research, Cambridge Abstract Writing concurrent programs is notoriously difficult,

More information

Database Languages and their Compilers

Database Languages and their Compilers Database Languages and their Compilers Prof. Dr. Torsten Grust Database Systems Research Group U Tübingen Winter 2010 2010 T. Grust Database Languages and their Compilers 4 Query Normalization Finally,

More information

Banner 8 Using International Characters

Banner 8 Using International Characters College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating

More information

ConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing

ConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing ConMan A Web based Conference Manager for Asterisk -or- How I Managed to get Con'd into skipping my summer vacation by building this thing $90503&07 $:3.74889028,-47,94708 $90503&078:3.42 Sun Labs, slide

More information

ECE608 - Chapter 16 answers

ECE608 - Chapter 16 answers ¼ À ÈÌ Ê ½ ÈÊÇ Ä ÅË ½µ ½ º½¹ ¾µ ½ º½¹ µ ½ º¾¹½ µ ½ º¾¹¾ µ ½ º¾¹ µ ½ º ¹ µ ½ º ¹ µ ½ ¹½ ½ ECE68 - Chapter 6 answers () CLR 6.-4 Let S be the set of n activities. The obvious solution of using Greedy-Activity-

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

From Clarity to Efficiency for Distributed Algorithms

From Clarity to Efficiency for Distributed Algorithms From Clarity to Efficiency for Distributed Algorithms Yanhong A. Liu Scott D. Stoller Bo Lin Michael Gorbovitski Computer Science Department, State University of New York at Stony Brook, Stony Brook, NY

More information

Pointers. CS2023 Winter 2004

Pointers. CS2023 Winter 2004 Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able

More information

To provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts.

To provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts. 200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD msde.maryland.gov TO: FROM: Members of the Maryland State Board of Education Jack R. Smith, Ph.D. DATE: December 8, 2015

More information

Ticc: A Tool for Interface Compatibility and Composition

Ticc: A Tool for Interface Compatibility and Composition ÒØÖ Ö Ò Î Ö Ø ÓÒ Ì Ò Ð Ê ÔÓÖØ ÒÙÑ Ö ¾¼¼ º Ì ÌÓÓÐ ÓÖ ÁÒØ Ö ÓÑÔ Ø Ð ØÝ Ò ÓÑÔÓ Ø ÓÒº Ð Ö º Ì ÓÑ Å ÖÓ ÐÐ ÄÙ Ð ÖÓ Äº Ë ÐÚ Ü Ð Ä Ý Î Û Ò Ø Ê Ñ Ò Èº Ê ÓÝ Ì ÛÓÖ Û Ô ÖØ ÐÐÝ ÙÔÔÓÖØ Ý Ê Ö ÒØ ¾º ¼º¼¾ ØØÔ»»ÛÛÛºÙÐ º

More information

) $ G}] }O H~U. G yhpgxl. Cong

) $ G}] }O H~U. G yhpgxl. Cong » Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã

More information

ESCAPE SEQUENCE G0: ESC 02/08 04/13 C0: C1: NAME Extended African Latin alphabet coded character set for bibliographic information interchange

ESCAPE SEQUENCE G0: ESC 02/08 04/13 C0: C1: NAME Extended African Latin alphabet coded character set for bibliographic information interchange TYPE: 9-character graphic character set REGISTRATION NUMBER: 9 DATE OF REGISTRATION: ESCAPE SEQUENCE G: ESC /8 / G: ESC /9 / G: ESC / / G: ESC / / C: C: NAME Extended African Latin alphabet coded character

More information

Cartons (PCCs) Management

Cartons (PCCs) Management Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,

More information

An Experimental CLP Platform for Integrity Constraints and Abduction

An Experimental CLP Platform for Integrity Constraints and Abduction An Experimental CLP Platform for Integrity Constraints and Abduction Slim Abdennadher ½ and Henning Christiansen ¾ ½ ¾ Computer Science Department, University of Munich Oettingenstr. 67, 80538 München,

More information

Team Practice October 2012: 1:00 6:00 PM Contest Problem Set

Team Practice October 2012: 1:00 6:00 PM Contest Problem Set Team Practice 1 14 October 2012: 1:00 6:00 PM Contest Problem Set The ten problems on this contest are referred to, in order, by the following names: stones, birdtree, money, duke1, dull, maze, howbig,

More information

Review: Test-and-set spinlock

Review: Test-and-set spinlock p. 1/3 Review: Test-and-set spinlock struct var { int lock; int val; ; void atomic_inc (var *v) { while (test_and_set (&v->lock)) ; v->val++; v->lock = 0; void atomic_dec (var *v) { while (test_and_set

More information

A Robust Class of Context-Sensitive Languages

A Robust Class of Context-Sensitive Languages A Robust Class of Context-Sensitive Languages Salvatore La Torre Università di Salerno, Italy latorre@dia.unisa.it P. Madhusudan University of Illinois Urbana-Champaign, USA madhu@uiuc.edu Gennaro Parlato

More information

Service Segment Version 3

Service Segment Version 3 Message Implementation Service Segment Version 3 Rev 2000-02-01 Swedish Bankers Association Svenska Bankföreningen sed96a-e.xxx 20 August 1998 ver 2.0 Page 1 Revisions - Service segments Date: Changes:

More information

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes

CMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter

More information

The CImg Library and G MIC

The CImg Library and G MIC The CImg Library and G MIC Open-Source Toolboxes for Image Processing at Different Levels David Tschumperlé { Image Team - GREYC Laboratory (CNRS UMR 6072) - Caen / France} Séminaire LRDE, Paris / France,

More information

From Tableaux to Automata for Description Logics

From Tableaux to Automata for Description Logics Fundamenta Informaticae XX (2003) 1 33 1 IOS Press From Tableaux to Automata for Description Logics Franz Baader, Jan Hladik, and Carsten Lutz Theoretical Computer Science, TU Dresden, D-01062 Dresden,

More information

Communication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages.

Communication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages. TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 200 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/00 G2: ESC 02/14 06/00 G3: ESC 02/15 06/00 C0: -- C1: -- NAME:

More information

Computing Gaussian Mixture Models with EM using Equivalence Constraints

Computing Gaussian Mixture Models with EM using Equivalence Constraints Computing Gaussian Mixture Models with EM using Equivalence Constraints Noam Shental, Aharon Bar-Hillel, Tomer Hertz and Daphna Weinshall email: tomboy,fenoam,aharonbh,daphna@cs.huji.ac.il School of Computer

More information

Generation of Interactive Visual Interfaces for Resource Management

Generation of Interactive Visual Interfaces for Resource Management Generation of Interactive Visual Interfaces for Resource Management Andreas Dangberg, Wolfgang Mueller C LAB, Fuerstenallee 11, 33102 Paderborn, Germany Abstract This paper introduces the VIVID (Visual

More information

Concurrency: State Models & Design Patterns

Concurrency: State Models & Design Patterns Concurrency: State Models & Design Patterns Practical Session Week 02 1 / 13 Exercises 01 Discussion Exercise 01 - Task 1 a) Do recent central processing units (CPUs) of desktop PCs support concurrency?

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012

CMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012 CMSC 33 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 2, FALL 22 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point formats

More information

Step 0 How to install VirtualBox on Windows operating system?

Step 0 How to install VirtualBox on Windows operating system? Written and cooked by Janusz R. Getta, School of Computing and Information Technology, University of Wollongong Building 3, room 2120, ext 4339, jrg@uow.edu.au, http://www.uow.edu.au/ jrg ËÁ̽½ Ø Å Ò Ñ

More information

This document has been prepared by Sunder Kidambi with the blessings of

This document has been prepared by Sunder Kidambi with the blessings of Ôß ò ÉßÔß ßÔß ò ÆÐÐß ßÔß Ôß» Ôò Æß Ð ÐÑß Æß ÐÑ ýæßæòþøñ Ôò Ð ÐÌÐÑßÔßÑú Ôò ÞØ ß Ð ÞØ Ð ÞÚ Ôß ÔÐÛß Ôß Ôß ÉßÛ Ñß Ì Ðß Þ òõß Ñß ßÔß õó This document has been prepared by Sunder Kidambi with the blessings of

More information

CS100: DISCRETE STRUCTURES

CS100: DISCRETE STRUCTURES CS: DISCRETE STRUCTURES Computer Science Department Lecture : Set and Sets Operations (Ch2) Lecture Contents 2 Sets Definition. Some Important Sets. Notation used to describe membership in sets. How to

More information

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.

RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.

More information

Communication and processing of text in the Chuvash, Erzya Mordvin, Komi, Hill Mari, Meadow Mari, Moksha Mordvin, Russian, and Udmurt languages.

Communication and processing of text in the Chuvash, Erzya Mordvin, Komi, Hill Mari, Meadow Mari, Moksha Mordvin, Russian, and Udmurt languages. TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 201 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/01 G2: ESC 02/14 06/01 G3: ESC 02/15 06/01 C0: -- C1: -- NAME:

More information

Appendix C. Numeric and Character Entity Reference

Appendix C. Numeric and Character Entity Reference Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your

More information

Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems

Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems J.M. López, M. García, J.L. Díaz, D.F. García University of Oviedo Department of Computer Science Campus de Viesques,

More information

CPSC 310: Database Systems / CSPC 603: Database Systems and Applications Exam 2 November 16, 2005

CPSC 310: Database Systems / CSPC 603: Database Systems and Applications Exam 2 November 16, 2005 CPSC 310: Database Systems / CSPC 603: Database Systems and Applications Exam 2 November 16, 2005 Name: Instructions: 1. This is a closed book exam. Do not use any notes or books, other than your two 8.5-by-11

More information

Lecture 20: Classification and Regression Trees

Lecture 20: Classification and Regression Trees Fall, 2017 Outline Basic Ideas Basic Ideas Tree Construction Algorithm Parameter Tuning Choice of Impurity Measure Missing Values Characteristics of Classification Trees Main Characteristics: very flexible,

More information

ERNST. Environment for Redaction of News Sub-Titles

ERNST. Environment for Redaction of News Sub-Titles ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or

More information

Event List Management In Distributed Simulation

Event List Management In Distributed Simulation Event List Management In Distributed Simulation Jörgen Dahl ½, Malolan Chetlur ¾, and Philip A Wilsey ½ ½ Experimental Computing Laboratory, Dept of ECECS, PO Box 20030, Cincinnati, OH 522 0030, philipwilsey@ieeeorg

More information

[module 2.2] MODELING CONCURRENT PROGRAM EXECUTION

[module 2.2] MODELING CONCURRENT PROGRAM EXECUTION v1.0 20130407 Programmazione Avanzata e Paradigmi Ingegneria e Scienze Informatiche - UNIBO a.a 2013/2014 Lecturer: Alessandro Ricci [module 2.2] MODELING CONCURRENT PROGRAM EXECUTION 1 SUMMARY Making

More information

Designing Networks Incrementally

Designing Networks Incrementally Designing Networks Incrementally Adam Meyerson Kamesh Munagala Ý Serge Plotkin Þ Abstract We consider the problem of incrementally designing a network to route demand to a single sink on an underlying

More information

ASCII Code - The extended ASCII table

ASCII Code - The extended ASCII table ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage

More information

Adorn. Serif. Smooth. v22622x

Adorn. Serif. Smooth. v22622x s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs

More information

Using Aspect-GAMMA in the Design of Embedded Systems

Using Aspect-GAMMA in the Design of Embedded Systems Using Aspect-GAMMA in the Design of Embedded Systems (Extended Abstract) MohammadReza Mousavi, Giovanni Russello, Michel Chaudron, Michel Reniers, Twan Basten Technische Universiteit Eindhoven (TU/e) P.O.

More information

Answer the first question and two further questions. i. action prefix ( -> ) [3 marks]

Answer the first question and two further questions. i. action prefix ( -> ) [3 marks] 1 Answer the first question and two further questions. 1. a. Define the meaning of the following constructs of the Finite State Process (FSP) notation. i. action prefix ( -> ) If x is an action and P a

More information

CS , Fall 2001 Exam 2

CS , Fall 2001 Exam 2 Andrew login ID: Full Name: CS 15-213, Fall 2001 Exam 2 November 13, 2001 Instructions: Make sure that your exam is not missing any sheets, then write your full name and Andrew login ID on the front. Write

More information

Parallel Functional Reactive Programming

Parallel Functional Reactive Programming Parallel Functional Reactive Programming John Peterson, Valery Trifonov, and Andrei Serjantov Yale University Ô Ø Ö ÓÒ¹ Ó Ò ºÝ Ð º Ù ØÖ ÓÒÓÚ¹Ú Ð ÖÝ ºÝ Ð º Ù Ò Ö º Ö ÒØÓÚÝ Ð º Ù Abstract In this paper,

More information

PHANTOM TYPES AND SUBTYPING

PHANTOM TYPES AND SUBTYPING PHANTOM TYPES AND SUBTYPING Matthew Fluet and Riccardo Pucella Department of Computer Science Cornell University ßfluet,riccardoÐ@cs.cornell.edu Abstract We investigate a technique from the literature,

More information

Text and Image Metasearch on the Web

Text and Image Metasearch on the Web Appears in International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 99, CSREA Press, pp. 89 835, 1999. Copyright c CSREA Press. Text and Image Metasearch on the

More information

CMPT 470 Based on lecture notes by Woshun Luk

CMPT 470 Based on lecture notes by Woshun Luk * ) ( & 2XWOLQH &RPSRQHQ 2EMHF 0RGXOHV CMPT 470 ased on lecture notes by Woshun Luk What is a DLL? What is a COM object? Linking two COM objects Client-Server relationships between two COM objects COM

More information

Separation Logic: A Logic for Shared Mutable Data Structures

Separation Logic: A Logic for Shared Mutable Data Structures This is a preprint of a paper to appear in the Proceedings of the Seventeenth Annual IEEE Symposium on Logic in Computer Science, to be held July 22-25, 2002 in Copenhagen, Denmark. Copyright 2002 IEEE.

More information

VRF SYSTEM CENTRAL CONTROLLER ("Smart manager") WIRING

VRF SYSTEM CENTRAL CONTROLLER (Smart manager) WIRING VRF SYSTEM CENTRAL CONTROLLER ("Smart manager") WIRING Carrier provided ͳ ³ ² ¹» Û» ²» Ó±² ± ñý±² ± ñí» ²¹ ² ²» Carrier provided б» «² Ó ïîè ²¼±± Ü ¹ ññ ¹² Ó ²í ññ«î Ó±²» ± ½» ±² ±º» Ó ì ÐÝ ³«²»±«½½»

More information

On the Complexity of List Scheduling Algorithms for Distributed-Memory Systems.

On the Complexity of List Scheduling Algorithms for Distributed-Memory Systems. On the Complexity of List Scheduling Algorithms for Distributed-Memory Systems. Andrei Rădulescu Arjan J.C. van Gemund Faculty of Information Technology and Systems Delft University of Technology P.O.Box

More information

A Blind Source Separation Approach to Structure From Motion

A Blind Source Separation Approach to Structure From Motion A Blind Source Separation Approach to Structure From Motion Jeff Fortuna and Aleix M. Martinez Department of Electrical & Computer Engineering The Ohio State University Columbus, Ohio, 4321 Abstract We

More information

Efficient Deterministic Replay through Dynamic Binary Translation

Efficient Deterministic Replay through Dynamic Binary Translation Efficient Deterministic Replay through Dynamic Binary Translation Piyus Kedia Amarnath and Shashi Khosla School of IT This dissertation is submitted for the degree of Doctor of Philosophy Indian Institute

More information

Calligraphic Packing. Craig S. Kaplan. Computer Graphics Lab David R. Cheriton School of Computer Science University of Waterloo. GI'07 May 28, 2007

Calligraphic Packing. Craig S. Kaplan. Computer Graphics Lab David R. Cheriton School of Computer Science University of Waterloo. GI'07 May 28, 2007 Calligraphic Packing Jie Xu Craig S. Kaplan Computer Graphics Lab David R. Cheriton School of Computer Science University of Waterloo GI'07 May 28, 2007 Outline 1 Background of NPR Packing Artistic Packing

More information

Administrivia. Lab 1 will be up by tomorrow, Due Oct. 11

Administrivia. Lab 1 will be up by tomorrow, Due Oct. 11 p.1/45 Administrivia Lab 1 will be up by tomorrow, Due Oct. 11 - Due at start of lecture 4:15pm - Free extension to midnight if you come to lecture - Or for SCPD students only if you watch lecture live

More information

BUCKLEY. User s Guide

BUCKLEY. User s Guide BUCKLEY User s Guide O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make

More information

Online Aggregation over Trees

Online Aggregation over Trees Online Aggregation over Trees C. Greg Plaxton, Mitul Tiwari University of Texas at Austin Praveen Yalagandula HP Labs Abstract Consider a distributed network with nodes arranged in a tree, and each node

More information

1. Oracle Mobile Agents? 2. client-agent-server client-server

1. Oracle Mobile Agents? 2. client-agent-server client-server 1. Oracle Mobile Agents?!"#$ application software system%. &'( )'*+, -. */0 1 23 45 678 9:; >?, %@ +%. - 6A(mobility) : B? CDE@ F GH8!" * channel #I 1 = / 4%. ()'*, &', LAN) - * application

More information

2. Concurrency and Java

2. Concurrency and Java 2. Concurrency and Java Oscar Nierstrasz Selected material Magee and Kramer Roadmap > Threads in Java Threads (vs. Processes) Thread creation Thread lifecycle > Synchronization in Java wait() and notify()

More information

A Fusion-based Approach for Handling Multiple Faults in Distributed Systems

A Fusion-based Approach for Handling Multiple Faults in Distributed Systems A Fusion-based Approach for Handling Multiple Faults in Distributed Systems Bharath Balasubramanian, Vijay K. Garg Parallel and Distributed Systems Laboratory, Dept. of Electrical and Computer Engineering,

More information

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms

Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu

More information

Relating Strands and Multiset Rewriting for Security Protocol Analysis Revised Extended Abstract Ý

Relating Strands and Multiset Rewriting for Security Protocol Analysis Revised Extended Abstract Ý Relating Strands and Multiset Rewriting for Security Protocol Analysis Revised Extended Abstract Ý I. Cervesato ITT Industries iliano@itd.nrl.navy.mil N. Durgin, J. Mitchell Stanford University nad, jcm@cs.stanford.edu

More information