Concurrent Execution
|
|
- Archibald Craig
- 5 years ago
- Views:
Transcription
1 Concurrent Execution Overview: concepts and definitions modelling: parallel composition action interleaving algebraic laws shared actions composite processes process labelling, action relabeling and hiding (these slides including graphics are a modified version of the slides from Ch3 of Magee & Kramer: Concurrency) COMP2310 Lecture 4: Concurrent Execution (I)
2 Concepts and Definitions concepts: processes - concurrent execution interleaving of actions from component processes interaction / synchronization via shared actions: both components must participate concurrency: logically simultaneous processing Does not imply multiple processing elements (cores, PE). Requires interleaved execution on a single PE parallelism: physically simultaneous processing Involves multiple PEs and/or independent device operations. both concurrency and parallelism require controlled access to shared resources we use these terms interchangeably and generally do not distinguish between real and pseudo-concurrent execution COMP2310 Lecture 4: Concurrent Execution (I)
3 Modeling Concurrency how should we model process execution speed? Arbitrary speed (we abstract away time) how do we model concurrency? Arbitrary relative order of actions from different processes (interleaving but preservation of order wrt. each process) what is the result? Provides a general model independent of scheduling (asynchronous model of execution) notation: If P and Q are processes then (P Q) represents the concurrent execution of P and Q The operator is the parallel composition operator COMP2310 Lecture 4: Concurrent Execution (I)
4 ÁÌ À Ö Ø ËÌÇÈ µº > Ø Ò > Ø Ð > ËÌÇÈ µº ÇÆÎ ÊË Concurrent Process Example: Disjoint Alphabets ÇÆÎ ÊË ÁÌ À ÁÌ À ÇÆÎ ÊË µº possible traces as a result of action interleaving: Ø Ò Ø Ð Ö Ø Ø Ò Ö Ø Ø Ð Ö Ø Ø Ò Ø Ð (2 states) (3 states) (0,0) (0,1) (0,2) (1,2) (1,1) (1,0) (2 3 states) COMP2310 Lecture 4: Concurrent Execution (I)
5 Parallel Composition Algebraic Laws commutative: (P Q) = (Q P) associative: (P (Q R)) = ((P Q) R) = (P Q R) it does not matter which order you compose processes we can drop the inner parentheses clock radio example: Ø > ÄÇ Ã µº ÄÇ Ã ÓÒ > Ó > Ê ÁÇ µº Ê ÁÇ ÄÇ Ã Ê ÁÇ ÄÇ Ã Ê ÁÇ µº LTS? Traces? Number of states? (hint: is this structurally similar to another example?) principle: in a parallel composition, each component process must undergo its own state transitions they do so independently if their alphabets are disjoint corollary: any sub-trace of (P Q) wrt. P s alphabet must also be a trace of P COMP2310 Lecture 4: Concurrent Execution (I)
6 Modeling Process Interaction: Shared Actions if the processes in a composition have actions in common, these actions are said to be shared i.e. they have non-disjoint alphabets shared actions are the way that process interaction is modeled. while unshared actions may be arbitrarily interleaved, a shared action must be executed at the same time by all processes that participate in the shared action example: Å Ã Ê synchronizes with ÍË Ê on the Ö Ý action: Ñ > Ö Ý > Å Ã Ê µº Å Ã Ê Ö Ý > Ù > ÍË Ê µº ÍË Ê Å Ã Ê ÍË Ê Å Ã Ê ÍË Ê µº LTS? Traces? Number of states? COMP2310 Lecture 4: Concurrent Execution (I)
7 Modeling Interaction - Handshake a handshake is an action acknowledging another action e.g. Ù acknowledges completion of Ù Ñ > Ö Ý > Ù > Å Ã ÊÚ¾ µº Å Ã ÊÚ¾ Ö Ý > Ù > Ù > ÍË ÊÚ¾ µº ÍË ÊÚ¾ Å Ã Ê ÍË ÊÚ¾ Å Ã ÊÚ¾ ÍË ÊÚ¾ µº 3 states 3 states 3 3 states? equivalent to ÍË ÊÚ¾ Ñ > Ö Ý > Ù > Ù > Å Ã Ê ÍË ÊÚ¾µº Å Ã Ê interaction constrains the overall behavior COMP2310 Lecture 4: Concurrent Execution (I)
8 Ã Ñ > Ö Ý > Ù > Å Ã µº Å Ã Ñ > Ö Ý > Ù > Å Ã µº Å multi-party synchronization: Modeling Interaction: Multiple Processes > > > equivalent to Ñ > Ñ > Ê ÌÇÊ Ñ Ñ > Ê µ > Ê Ö Ý > Ñ Ð > Ù > ÌÇÊ µº COMP2310 Lecture 4: Concurrent Execution (I)
9 Composite Processes a composite process is a parallel composition of primitive processes These composite processes can be used in the definition of further compositions e.g. Å Ã ÊË Å Ã Å Ã µº ÌÇÊ Å Ã ÊË ËË Å Ä µº substituting the definition for Å Ã ÊË in ÌÇÊ and applying the associative law for parallel composition results in the original definition for ÌÇÊ in terms of primitive processes COMP2310 Lecture 4: Concurrent Execution (I)
10 Process Instances and Labeling È prefixes each action label in the alphabet È of with e.g. two instances of a switch process: ÓÒ > Ó > ËÏÁÌ À µº ËÏÁÌ À ÌÏÇ ËÏÁÌ À ËÏÁÌ À ËÏÁÌ À µº an array of instances of the switch process: ËÏÁÌ À Ë Æ µ ÓÖ ÐÐ ½ºº Æ ËÏÁÌ À µº (the text and LTSAtool use the abbreviation ½ººÆ ËÏÁÌ Àµ for the RHS) this is useful to create multiple instances of primitive processes Q: can they interact with each other? Is this a problem? COMP2310 Lecture 4: Concurrent Execution (I)
11 Review Exersize: Indexed Actions and Parallel Composition A die (singular of dice) may repeatedly engage in a throw action followed by a show action, which has an integer value from 1 to 6 associated with it. Q1: what is a correct FSP model for the die? (a) Á Ø ÖÓÛ > ÓÛ > Á µº (b) Á Ø ÖÓÛ > ÓÛ ½ºº > Á µº (c) Á Ø ÖÓÛ ½ºº > ÓÛ > Á µº (d) Á Ø ÖÓÛ > ËÀÇÏ ½ºº µ ËÀÇÏ Ú ½ºº Á º Q2: how many states does it have? (a) 2 (b) 3 (c) 6 (d) 7 (e) 12 Q3: What is an FSP composition of two independent die processes? (a) Á Á Á µº (b) Á Á Á µº Q4: how many states does this have? COMP2310 Lecture 4: Concurrent Execution (I)
12 Process Labeling by a Set of Prefix Labels { ½ ºº Ü} È replaces every action label Ò in the alphabet of È with the labels ½ºÒ ººº ÜºÒ Further, every transition Ò > µ in the definition of È is replaced with the transitions { ½ºÒ ºº ܺÒ} > µ process prefixing is useful for modeling shared resources: ÕÙ Ö > Ù > Ö Ð > ÍË Ê µº ÍË Ê ÕÙ Ö > Ö Ð > Ê ËÇÍÊ µº Ê ËÇÍÊ Ê ËÇÍÊ ËÀ Ê ÍË Ê ÍË Ê { } Ê ËÇÍÊ µº { } Ê ËÇÍÊ now can interact with the two ÍË Ê processes COMP2310 Lecture 4: Concurrent Execution (I)
13 Process Prefix Labels for Shared Resources How does the model ensure that the user that acquires the resource is the one to release it? COMP2310 Lecture 4: Concurrent Execution (I)
14 Action Relabeling relabeling functions are applied to processes to change the names of action labels their general form is { Ò ÛÐ Ð 1»ÓÐ Ð Ð 1... Ò ÛÐ Ðn»ÓÐ Ð Ðn } Note that both Ò ÛÐ Ð and ÓÐ Ð Ð can be sets of labels. relabeling ensures that composed processes synchronize on particular actions ÐÐ >Û Ø >ÓÒØ ÒÙ > ÄÁ ÆÌ µº ÄÁ ÆÌ Ö ÕÙ Ø > ÖÚ >Ö ÔÐÝ >Ë ÊÎ Ê µº Ë ÊÎ Ê ÄÁ ÆÌ Ë ÊÎ Ê ÄÁ ÆÌ Ë ÊÎ Ê µ» { Ðл Ö ÕÙ Ø Ö ÔÐÝ» Û Ø}º the relabeling applies to all primitive processes in the composition (it gets applied before the ÁÁ); it is mainly used to make the primitive processes interact enables us to specify component processes in a modular way upon composition, can be used to connect processes COMP2310 Lecture 4: Concurrent Execution (I)
15 ÄÁ ÆÌ ÐÐ >Û Ø >ÓÒØ ÒÙ > ÄÁ ÆÌ µº Ö ÕÙ Ø > ÖÚ >Ö ÔÐÝ >Ë ÊÎ Ê µº Ë ÊÎ Ê Action Relabeling: Client-Server ÄÁ ÆÌ Ë ÊÎ Ê ÄÁ ÆÌ Ë ÊÎ Ê µ» { Ðл Ö ÕÙ Ø Ö ÔÐÝ» Û Ø}º alternative formulation using qualified or prefixed labels: ÔØ º Ö ÕÙ Ø > ÖÚ > ÔØ º Ö ÔÐÝ > Ë ÊÎ ÊÚ¾ Ë ÊÎ ÊÚ¾ ÐÐ º Ö ÕÙ Ø > ÐÐ º Ö ÔÐÝ > ÓÒØ ÒÙ > ÄÁ ÆÌÚ¾ µº ÄÁ ÆÌÚ¾ ÄÁ ÆÌ Ë ÊÎ ÊÚ¾ ÄÁ ÆÌÚ¾ Ë ÊÎ ÊÚ¾ µ» { Ðл ÔØ}º (the renaming is applied to the prefix) COMP2310 Lecture 4: Concurrent Execution (I)
16 Action Hiding: an Abstraction to Reduce Complexity when applied to a process È, the hiding operator \{ ½ ººº Ü} removes the action names ½,..., Ü from the alphabet of È and makes these concealed actions silent these silent actions are labeled Ø Ù silent actions in different processes are not shared when applied to a process È, the interface operator { ½ ººº Ü} hides all actions in the alphabet of È not labeled in the set ½,..., Ü (sometimes it is more convenient to specify the set of labels to be exposed) the following definitions are equivalent: ÕÙ Ö > Ù > Ö Ð > ÍË Ê µ \ { Ù }º ÍË Ê ÕÙ Ö > Ù > Ö Ð > ÍË Ê µ { ÕÙ Ö Ö Ð }º ÍË Ê The LTSAtool s minimization function removes hidden Ø Ù actions to produce an LTS with the equivalent observable behavior (note: action hiding is not directly assessable in this course) COMP2310 Lecture 4: Concurrent Execution (I)
17 Summary concepts: concurrent processes and process interaction models: asynchronous (arbitrary speed) & interleaving (arbitrary order) parallel composition as a finite state process with action interleaving a (parallel) composite process is equivalent to a (serial) interleaving of its component (serial) processes algebraic laws to express this process interaction by shared actions this forms a primitive for process synchronization (powerful!) and also for process communication (Q: how can they transfer data?) process labeling and action relabeling to control which actions are shared (transform independent actions into shared actions) structure diagrams to visualize these (next lecture) practice: multiple threads in Java (next lecture) COMP2310 Lecture 4: Concurrent Execution (I)
CSCI 5828: Foundations of Software Engineering
CSCI 5828: Foundations of Software Engineering Lecture 7: Concurrent Execution Slides created by Magee and Kramer for the Concurrency textbook 1 Magee/Kramer 2nd Edition Chapter 3 Concurrent Execution
More informationConcurrent Execution
Jan. 30, 2013 Concepts Processes - concurrent execution and interleaving Process interaction Models Parallel composition of asynchronous processes Interleaving Interaction Shared actions Process labeling
More informationCSCI 5828: Foundations of Software Engineering
CSCI 5828: Foundations of Software Engineering Lecture 7: Concurrent Execution Slides created by Magee and Kramer for the Concurrency textbook 2/05/2008 1 Magee/Kramer 2nd Edition What s the Difference?
More informationTHE AUSTRALIAN NATIONAL UNIVERSITY Practice Final Examination, October 2012
THE AUSTRALIAN NATIONAL UNIVERSITY Practice Final Examination, October 2012 COMP2310 / COMP6310 (Concurrent and Distributed Systems ) Writing Period: 3 hours duration Study Period: 15 minutes duration
More informationModels, Notation, Goals
Scope Ë ÕÙ Ò Ð Ò ÐÝ Ó ÝÒ Ñ ÑÓ Ð Ü Ô Ö Ñ Ö ² Ñ ¹Ú ÖÝ Ò Ú Ö Ð Ö ÒÙÑ Ö Ð ÔÓ Ö ÓÖ ÔÔÖÓÜ Ñ ÓÒ ß À ÓÖ Ð Ô Ö Ô Ú ß Ë ÑÙÐ ÓÒ Ñ Ó ß ËÑÓÓ Ò ² Ö Ò Ö Ò Ô Ö Ñ Ö ÑÔÐ ß Ã ÖÒ Ð Ñ Ó ÚÓÐÙ ÓÒ Ñ Ó ÓÑ Ò Ô Ö Ð Ð Ö Ò Ð ÓÖ Ñ
More informationProbabilistic analysis of algorithms: What s it good for?
Probabilistic analysis of algorithms: What s it good for? Conrado Martínez Univ. Politècnica de Catalunya, Spain February 2008 The goal Given some algorithm taking inputs from some set Á, we would like
More informationConcurrent Architectures - Unix: Sockets, Select & Signals
Concurrent Architectures - Unix: Sockets, Select & Signals Assignment 1: Drop In Labs reminder check compiles in CS labs & you have submitted all your files in StReAMS! formatting your work: why to 80
More informationAn Esterel Virtual Machine
An Esterel Virtual Machine Stephen A. Edwards Columbia University Octopi Workshop Chalmers University of Technology Gothenburg, Sweden December 28 An Esterel Virtual Machine Goal: Run big Esterel programs
More informationOverview: Concurrent Architectures - Unix: Forks and Pipes
Overview: Concurrent Architectures - Unix: Forks and Pipes Other Matters: TuteLab-5 solutions and the proof of Peterson s Algorithm Ref: [Coulouris&al Ch 4] history architecture: monolithic vs microkernels,
More informationIntroduction to Scientific Typesetting Lesson 11: Foreign Languages, Columns, and Section Titles
Introduction to Scientific Typesetting Lesson 11: Foreign Languages,, and Ryan Higginbottom January 19, 2012 1 Ð The Package 2 Without Ð What s the Problem? With Ð Using Another Language Typing in Spanish
More informationGraphs (MTAT , 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405
Graphs (MTAT.05.080, 4 AP / 6 ECTS) Lectures: Fri 12-14, hall 405 Exercises: Mon 14-16, hall 315 või N 12-14, aud. 405 homepage: http://www.ut.ee/~peeter_l/teaching/graafid08s (contains slides) For grade:
More informationControl-Flow Graph and. Local Optimizations
Control-Flow Graph and - Part 2 Department of Computer Science and Automation Indian Institute of Science Bangalore 560 012 NPTEL Course on Principles of Compiler Design Outline of the Lecture What is
More informationThis file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.
Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts
More informationAncillary Software Development at GSI. Michael Reese. Outline: Motivation Old Software New Software
Ancillary Software Development at GSI Michael Reese Outline: Motivation Old Software New Software Work supported by BMBF NuSTAR.DA - TP 6, FKZ: BMBF 05P12RDFN8 (TP 6). March 20, 2013 AGATA week 2013 at
More informationVerification Finite-state process modeling and reachability analysis
Verification Finite-state process modeling and reachability analysis Topics: Finite-state process modeling Verification through interactive simulation Concurrent composition of processes Verification through
More informationDistrict Institute of Education and Training Lawspet, Puducherry.
District Institute of Education and Training Lawspet, Puducherry. Educational Computing Record work done by with the Register Number. Submitted for the Internal Assessment examination, April / May 2011,
More informationUnified Configuration Knowledge Representation Using Weight Constraint Rules
Unified Configuration Knowledge Representation Using Weight Constraint Rules Timo Soininen ½ and Ilkka Niemelä ¾ and Juha Tiihonen ½ and Reijo Sulonen ½ Abstract. In this paper we present an approach to
More informationConstraint Logic Programming (CLP): a short tutorial
Constraint Logic Programming (CLP): a short tutorial What is CLP? the use of a rich and powerful language to model optimization problems modelling based on variables, domains and constraints DCC/FCUP Inês
More informationUsing USB Hot-Plug For UMTS Short Message Service. Technical Brief from Missing Link Electronics:
Technical Brief 20100507 from Missing Link Electronics: Using USB Hot-Plug For UMTS Short Message Service This Technical Brief describes how the USB hot-plug capabilities of the MLE Soft Hardware Platform
More informationLecture 2: Modeling Introduction
Concurrent Programming 19530-V (WS01) Lecture 2: Modeling Introduction Dr. Richard S. Hall rickhall@inf.fu-berlin.de Concurrent programming October 23, 2001 Our Approach to Concurrency Start with concurrency
More informationPersonal Conference Manager (PCM)
Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her
More information³ ÁÒØÖÓÙØÓÒ ½º ÐÙ ØÖ ÜÔÒ ÓÒ Ò ÌÒ ÓÖ ÓÖ ¾º ÌÛÓ¹ÓÝ ÈÖÓÔÖØ Ó ÓÑÔÐÜ ÆÙÐ º ËÙÑÑÖÝ Ò ÓÒÐÙ ÓÒ º ² ± ÇÆÌÆÌË Åº ÐÚÓÐ ¾ Ëʼ
È Ò È Æ ÇÊÊÄÌÁÇÆË È ÅÁÍŹÏÁÀÌ ÆÍÄÁ ÁÆ Åº ÐÚÓÐ ÂÄ ÇØÓÖ ¾¼¼ ½ ³ ÁÒØÖÓÙØÓÒ ½º ÐÙ ØÖ ÜÔÒ ÓÒ Ò ÌÒ ÓÖ ÓÖ ¾º ÌÛÓ¹ÓÝ ÈÖÓÔÖØ Ó ÓÑÔÐÜ ÆÙÐ º ËÙÑÑÖÝ Ò ÓÒÐÙ ÓÒ º ² ± ÇÆÌÆÌË Åº ÐÚÓÐ ¾ Ëʼ À Ò Ò Ò ÛØ À Ç Òµ Ú Ò µ Ç Òµ
More informationSFU CMPT Lecture: Week 8
SFU CMPT-307 2008-2 1 Lecture: Week 8 SFU CMPT-307 2008-2 Lecture: Week 8 Ján Maňuch E-mail: jmanuch@sfu.ca Lecture on June 24, 2008, 5.30pm-8.20pm SFU CMPT-307 2008-2 2 Lecture: Week 8 Universal hashing
More informationOn the Analysis of Interacting Pushdown Systems
On the Analysis of Interacting Pushdown Systems Vineet Kahlon NEC Labs America, Princeton, NJ 08540, USA. ÐÓÒҹРºÓÑ Aarti Gupta NEC Labs America, Princeton, NJ 08540, USA. ÙÔØҹРºÓÑ Abstract Pushdown
More informationUsing SmartXplorer to achieve timing closure
Using SmartXplorer to achieve timing closure The main purpose of Xilinx SmartXplorer is to achieve timing closure where the default place-and-route (PAR) strategy results in a near miss. It can be much
More informationFSP Language Specification
FSP Language Specification V2.0 additions 1 V2.0 -Additions FSP Language Specification This document describes the additions that have been made to the FSP input notation to the LTSA tool since its initial
More informationPointers & Arrays. CS2023 Winter 2004
Pointers & Arrays CS2023 Winter 2004 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this
More informationFormal Specification of an Asynchronous On-Chip Bus
Formal Specification of an Asynchronous On-Chip Bus Juha Plosila Tiberiu Seceleanu Turku Centre for Computer Science TUCS Technical Reports No 461, 14th June 2002 Formal Specification of an Asynchronous
More informationLecture 5 C Programming Language
Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the
More informationInstruction Scheduling. Software Pipelining - 3
Instruction Scheduling and Software Pipelining - 3 Department of Computer Science and Automation Indian Institute of Science Bangalore 560 012 NPTEL Course on Principles of Compiler Design Instruction
More informationDefinition and Instantiation of a Reference Model for Problem Specifications
Definition and Instantiation of a Reference Model for Problem Specifications Martin Kronenburg Christian Peper University of Kaiserslautern, Erwin Schrödinger Straße, D-67663 Kaiserslautern, Germany E-mail:
More informationModules. CS2023 Winter 2004
Modules CS2023 Winter 2004 Outcomes: Modules C for Java Programmers, Chapter 7, sections 7.4.1-7.4.6 Code Complete, Chapter 6 After the conclusion of this section you should be able to Understand why modules
More informationAPPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC
APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date
More informationNetworks. Other Matters: draft Assignment 2 up (Labs 7 & 8 v. important!!) Ref: [Coulouris&al Ch 3, 4] network performance and principles
Networks Other Matters: draft Assignment 2 up (Labs 7 & 8 v. important!!) Ref: [Coulouris&al Ch 3, 4] network performance and principles OSI protocol; routing TCP/IP layers and packet organization IP addresses
More informationHow to Implement DOTGO Engines. CMRL Version 1.0
How to Implement DOTGO Engines CMRL Version 1.0 Copyright c 2009 DOTGO. All rights reserved. Contents 1 Introduction 3 2 A Simple Example 3 2.1 The CMRL Document................................ 3 2.2 The
More informationComputing optimal linear layouts of trees in linear time
Computing optimal linear layouts of trees in linear time Konstantin Skodinis University of Passau, 94030 Passau, Germany, e-mail: skodinis@fmi.uni-passau.de Abstract. We present a linear time algorithm
More informationResponse Time Analysis of Asynchronous Real-Time Systems
Response Time Analysis of Asynchronous Real-Time Systems Guillem Bernat Real-Time Systems Research Group Department of Computer Science University of York York, YO10 5DD, UK Technical Report: YCS-2002-340
More informationComposable Memory Transactions
Composable Memory Transactions December 20, 2004 Tim Harris, Simon Marlow, Simon Peyton Jones, Maurice Herlihy Microsoft Research, Cambridge Abstract Writing concurrent programs is notoriously difficult,
More informationDatabase Languages and their Compilers
Database Languages and their Compilers Prof. Dr. Torsten Grust Database Systems Research Group U Tübingen Winter 2010 2010 T. Grust Database Languages and their Compilers 4 Query Normalization Finally,
More informationBanner 8 Using International Characters
College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating
More informationConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing
ConMan A Web based Conference Manager for Asterisk -or- How I Managed to get Con'd into skipping my summer vacation by building this thing $90503&07 $:3.74889028,-47,94708 $90503&078:3.42 Sun Labs, slide
More informationECE608 - Chapter 16 answers
¼ À ÈÌ Ê ½ ÈÊÇ Ä ÅË ½µ ½ º½¹ ¾µ ½ º½¹ µ ½ º¾¹½ µ ½ º¾¹¾ µ ½ º¾¹ µ ½ º ¹ µ ½ º ¹ µ ½ ¹½ ½ ECE68 - Chapter 6 answers () CLR 6.-4 Let S be the set of n activities. The obvious solution of using Greedy-Activity-
More informationScan Scheduling Specification and Analysis
Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract
More informationFrom Clarity to Efficiency for Distributed Algorithms
From Clarity to Efficiency for Distributed Algorithms Yanhong A. Liu Scott D. Stoller Bo Lin Michael Gorbovitski Computer Science Department, State University of New York at Stony Brook, Stony Brook, NY
More informationPointers. CS2023 Winter 2004
Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able
More informationTo provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts.
200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD msde.maryland.gov TO: FROM: Members of the Maryland State Board of Education Jack R. Smith, Ph.D. DATE: December 8, 2015
More informationTicc: A Tool for Interface Compatibility and Composition
ÒØÖ Ö Ò Î Ö Ø ÓÒ Ì Ò Ð Ê ÔÓÖØ ÒÙÑ Ö ¾¼¼ º Ì ÌÓÓÐ ÓÖ ÁÒØ Ö ÓÑÔ Ø Ð ØÝ Ò ÓÑÔÓ Ø ÓÒº Ð Ö º Ì ÓÑ Å ÖÓ ÐÐ ÄÙ Ð ÖÓ Äº Ë ÐÚ Ü Ð Ä Ý Î Û Ò Ø Ê Ñ Ò Èº Ê ÓÝ Ì ÛÓÖ Û Ô ÖØ ÐÐÝ ÙÔÔÓÖØ Ý Ê Ö ÒØ ¾º ¼º¼¾ ØØÔ»»ÛÛÛºÙÐ º
More information) $ G}] }O H~U. G yhpgxl. Cong
» Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã
More informationESCAPE SEQUENCE G0: ESC 02/08 04/13 C0: C1: NAME Extended African Latin alphabet coded character set for bibliographic information interchange
TYPE: 9-character graphic character set REGISTRATION NUMBER: 9 DATE OF REGISTRATION: ESCAPE SEQUENCE G: ESC /8 / G: ESC /9 / G: ESC / / G: ESC / / C: C: NAME Extended African Latin alphabet coded character
More informationCartons (PCCs) Management
Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,
More informationAn Experimental CLP Platform for Integrity Constraints and Abduction
An Experimental CLP Platform for Integrity Constraints and Abduction Slim Abdennadher ½ and Henning Christiansen ¾ ½ ¾ Computer Science Department, University of Munich Oettingenstr. 67, 80538 München,
More informationTeam Practice October 2012: 1:00 6:00 PM Contest Problem Set
Team Practice 1 14 October 2012: 1:00 6:00 PM Contest Problem Set The ten problems on this contest are referred to, in order, by the following names: stones, birdtree, money, duke1, dull, maze, howbig,
More informationReview: Test-and-set spinlock
p. 1/3 Review: Test-and-set spinlock struct var { int lock; int val; ; void atomic_inc (var *v) { while (test_and_set (&v->lock)) ; v->val++; v->lock = 0; void atomic_dec (var *v) { while (test_and_set
More informationA Robust Class of Context-Sensitive Languages
A Robust Class of Context-Sensitive Languages Salvatore La Torre Università di Salerno, Italy latorre@dia.unisa.it P. Madhusudan University of Illinois Urbana-Champaign, USA madhu@uiuc.edu Gennaro Parlato
More informationService Segment Version 3
Message Implementation Service Segment Version 3 Rev 2000-02-01 Swedish Bankers Association Svenska Bankföreningen sed96a-e.xxx 20 August 1998 ver 2.0 Page 1 Revisions - Service segments Date: Changes:
More informationCMSC 313 Lecture 03 Multiple-byte data big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes
Multiple-byte data CMSC 313 Lecture 03 big-endian vs little-endian sign extension Multiplication and division Floating point formats Character Codes UMBC, CMSC313, Richard Chang 4-5 Chapter
More informationThe CImg Library and G MIC
The CImg Library and G MIC Open-Source Toolboxes for Image Processing at Different Levels David Tschumperlé { Image Team - GREYC Laboratory (CNRS UMR 6072) - Caen / France} Séminaire LRDE, Paris / France,
More informationFrom Tableaux to Automata for Description Logics
Fundamenta Informaticae XX (2003) 1 33 1 IOS Press From Tableaux to Automata for Description Logics Franz Baader, Jan Hladik, and Carsten Lutz Theoretical Computer Science, TU Dresden, D-01062 Dresden,
More informationCommunication and processing of text in the Kildin Sámi, Komi, and Nenets, and Russian languages.
TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 200 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/00 G2: ESC 02/14 06/00 G3: ESC 02/15 06/00 C0: -- C1: -- NAME:
More informationComputing Gaussian Mixture Models with EM using Equivalence Constraints
Computing Gaussian Mixture Models with EM using Equivalence Constraints Noam Shental, Aharon Bar-Hillel, Tomer Hertz and Daphna Weinshall email: tomboy,fenoam,aharonbh,daphna@cs.huji.ac.il School of Computer
More informationGeneration of Interactive Visual Interfaces for Resource Management
Generation of Interactive Visual Interfaces for Resource Management Andreas Dangberg, Wolfgang Mueller C LAB, Fuerstenallee 11, 33102 Paderborn, Germany Abstract This paper introduces the VIVID (Visual
More informationConcurrency: State Models & Design Patterns
Concurrency: State Models & Design Patterns Practical Session Week 02 1 / 13 Exercises 01 Discussion Exercise 01 - Task 1 a) Do recent central processing units (CPUs) of desktop PCs support concurrency?
More informationRSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.
RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.
More informationCMSC 313 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 02, FALL 2012
CMSC 33 COMPUTER ORGANIZATION & ASSEMBLY LANGUAGE PROGRAMMING LECTURE 2, FALL 22 TOPICS TODAY Bits of Memory Data formats for negative numbers Modulo arithmetic & two s complement Floating point formats
More informationStep 0 How to install VirtualBox on Windows operating system?
Written and cooked by Janusz R. Getta, School of Computing and Information Technology, University of Wollongong Building 3, room 2120, ext 4339, jrg@uow.edu.au, http://www.uow.edu.au/ jrg ËÁ̽½ Ø Å Ò Ñ
More informationThis document has been prepared by Sunder Kidambi with the blessings of
Ôß ò ÉßÔß ßÔß ò ÆÐÐß ßÔß Ôß» Ôò Æß Ð ÐÑß Æß ÐÑ ýæßæòþøñ Ôò Ð ÐÌÐÑßÔßÑú Ôò ÞØ ß Ð ÞØ Ð ÞÚ Ôß ÔÐÛß Ôß Ôß ÉßÛ Ñß Ì Ðß Þ òõß Ñß ßÔß õó This document has been prepared by Sunder Kidambi with the blessings of
More informationCS100: DISCRETE STRUCTURES
CS: DISCRETE STRUCTURES Computer Science Department Lecture : Set and Sets Operations (Ch2) Lecture Contents 2 Sets Definition. Some Important Sets. Notation used to describe membership in sets. How to
More informationRSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È.
RSA (Rivest Shamir Adleman) public key cryptosystem: Key generation: Pick two large prime Ô Õ ¾ numbers È. Let Ò Ô Õ. Pick ¾ ½ ³ Òµ ½ so, that ³ Òµµ ½. Let ½ ÑÓ ³ Òµµ. Public key: Ò µ. Secret key Ò µ.
More informationCommunication and processing of text in the Chuvash, Erzya Mordvin, Komi, Hill Mari, Meadow Mari, Moksha Mordvin, Russian, and Udmurt languages.
TYPE: 96 Character Graphic Character Set REGISTRATION NUMBER: 201 DATE OF REGISTRATION: 1998-05-01 ESCAPE SEQUENCE G0: -- G1: ESC 02/13 06/01 G2: ESC 02/14 06/01 G3: ESC 02/15 06/01 C0: -- C1: -- NAME:
More informationAppendix C. Numeric and Character Entity Reference
Appendix C Numeric and Character Entity Reference 2 How to Do Everything with HTML & XHTML As you design Web pages, there may be occasions when you want to insert characters that are not available on your
More informationWorst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems
Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems J.M. López, M. García, J.L. Díaz, D.F. García University of Oviedo Department of Computer Science Campus de Viesques,
More informationCPSC 310: Database Systems / CSPC 603: Database Systems and Applications Exam 2 November 16, 2005
CPSC 310: Database Systems / CSPC 603: Database Systems and Applications Exam 2 November 16, 2005 Name: Instructions: 1. This is a closed book exam. Do not use any notes or books, other than your two 8.5-by-11
More informationLecture 20: Classification and Regression Trees
Fall, 2017 Outline Basic Ideas Basic Ideas Tree Construction Algorithm Parameter Tuning Choice of Impurity Measure Missing Values Characteristics of Classification Trees Main Characteristics: very flexible,
More informationERNST. Environment for Redaction of News Sub-Titles
ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or
More informationEvent List Management In Distributed Simulation
Event List Management In Distributed Simulation Jörgen Dahl ½, Malolan Chetlur ¾, and Philip A Wilsey ½ ½ Experimental Computing Laboratory, Dept of ECECS, PO Box 20030, Cincinnati, OH 522 0030, philipwilsey@ieeeorg
More information[module 2.2] MODELING CONCURRENT PROGRAM EXECUTION
v1.0 20130407 Programmazione Avanzata e Paradigmi Ingegneria e Scienze Informatiche - UNIBO a.a 2013/2014 Lecturer: Alessandro Ricci [module 2.2] MODELING CONCURRENT PROGRAM EXECUTION 1 SUMMARY Making
More informationDesigning Networks Incrementally
Designing Networks Incrementally Adam Meyerson Kamesh Munagala Ý Serge Plotkin Þ Abstract We consider the problem of incrementally designing a network to route demand to a single sink on an underlying
More informationASCII Code - The extended ASCII table
ASCII Code - The extended ASCII table ASCII, stands for American Standard Code for Information Interchange. It's a 7-bit character code where every single bit represents a unique character. On this webpage
More informationAdorn. Serif. Smooth. v22622x
s u Adorn f Serif Smooth 9 0 t v22622x user s guide PART OF THE ADORN POMANDER SMOOTH COLLECTION v O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs
More informationUsing Aspect-GAMMA in the Design of Embedded Systems
Using Aspect-GAMMA in the Design of Embedded Systems (Extended Abstract) MohammadReza Mousavi, Giovanni Russello, Michel Chaudron, Michel Reniers, Twan Basten Technische Universiteit Eindhoven (TU/e) P.O.
More informationAnswer the first question and two further questions. i. action prefix ( -> ) [3 marks]
1 Answer the first question and two further questions. 1. a. Define the meaning of the following constructs of the Finite State Process (FSP) notation. i. action prefix ( -> ) If x is an action and P a
More informationCS , Fall 2001 Exam 2
Andrew login ID: Full Name: CS 15-213, Fall 2001 Exam 2 November 13, 2001 Instructions: Make sure that your exam is not missing any sheets, then write your full name and Andrew login ID on the front. Write
More informationParallel Functional Reactive Programming
Parallel Functional Reactive Programming John Peterson, Valery Trifonov, and Andrei Serjantov Yale University Ô Ø Ö ÓÒ¹ Ó Ò ºÝ Ð º Ù ØÖ ÓÒÓÚ¹Ú Ð ÖÝ ºÝ Ð º Ù Ò Ö º Ö ÒØÓÚÝ Ð º Ù Abstract In this paper,
More informationPHANTOM TYPES AND SUBTYPING
PHANTOM TYPES AND SUBTYPING Matthew Fluet and Riccardo Pucella Department of Computer Science Cornell University ßfluet,riccardoÐ@cs.cornell.edu Abstract We investigate a technique from the literature,
More informationText and Image Metasearch on the Web
Appears in International Conference on Parallel and Distributed Processing Techniques and Applications, PDPTA 99, CSREA Press, pp. 89 835, 1999. Copyright c CSREA Press. Text and Image Metasearch on the
More informationCMPT 470 Based on lecture notes by Woshun Luk
* ) ( & 2XWOLQH &RPSRQHQ 2EMHF 0RGXOHV CMPT 470 ased on lecture notes by Woshun Luk What is a DLL? What is a COM object? Linking two COM objects Client-Server relationships between two COM objects COM
More informationSeparation Logic: A Logic for Shared Mutable Data Structures
This is a preprint of a paper to appear in the Proceedings of the Seventeenth Annual IEEE Symposium on Logic in Computer Science, to be held July 22-25, 2002 in Copenhagen, Denmark. Copyright 2002 IEEE.
More informationVRF SYSTEM CENTRAL CONTROLLER ("Smart manager") WIRING
VRF SYSTEM CENTRAL CONTROLLER ("Smart manager") WIRING Carrier provided ͳ ³ ² ¹» Û» ²» Ó±² ± ñý±² ± ñí» ²¹ ² ²» Carrier provided б» «² Ó ïîè ²¼±± Ü ¹ ññ ¹² Ó ²í ññ«î Ó±²» ± ½» ±² ±º» Ó ì ÐÝ ³«²»±«½½»
More informationOn the Complexity of List Scheduling Algorithms for Distributed-Memory Systems.
On the Complexity of List Scheduling Algorithms for Distributed-Memory Systems. Andrei Rădulescu Arjan J.C. van Gemund Faculty of Information Technology and Systems Delft University of Technology P.O.Box
More informationA Blind Source Separation Approach to Structure From Motion
A Blind Source Separation Approach to Structure From Motion Jeff Fortuna and Aleix M. Martinez Department of Electrical & Computer Engineering The Ohio State University Columbus, Ohio, 4321 Abstract We
More informationEfficient Deterministic Replay through Dynamic Binary Translation
Efficient Deterministic Replay through Dynamic Binary Translation Piyus Kedia Amarnath and Shashi Khosla School of IT This dissertation is submitted for the degree of Doctor of Philosophy Indian Institute
More informationCalligraphic Packing. Craig S. Kaplan. Computer Graphics Lab David R. Cheriton School of Computer Science University of Waterloo. GI'07 May 28, 2007
Calligraphic Packing Jie Xu Craig S. Kaplan Computer Graphics Lab David R. Cheriton School of Computer Science University of Waterloo GI'07 May 28, 2007 Outline 1 Background of NPR Packing Artistic Packing
More informationAdministrivia. Lab 1 will be up by tomorrow, Due Oct. 11
p.1/45 Administrivia Lab 1 will be up by tomorrow, Due Oct. 11 - Due at start of lecture 4:15pm - Free extension to midnight if you come to lecture - Or for SCPD students only if you watch lecture live
More informationBUCKLEY. User s Guide
BUCKLEY User s Guide O P E N T Y P E FAQ : For information on how to access the swashes and alternates, visit LauraWorthingtonType.com/faqs All operating systems come equipped with a utility that make
More informationOnline Aggregation over Trees
Online Aggregation over Trees C. Greg Plaxton, Mitul Tiwari University of Texas at Austin Praveen Yalagandula HP Labs Abstract Consider a distributed network with nodes arranged in a tree, and each node
More information1. Oracle Mobile Agents? 2. client-agent-server client-server
1. Oracle Mobile Agents?!"#$ application software system%. &'( )'*+, -. */0 1 23 45 678 9:; >?, %@ +%. - 6A(mobility) : B? CDE@ F GH8!" * channel #I 1 = / 4%. ()'*, &', LAN) - * application
More information2. Concurrency and Java
2. Concurrency and Java Oscar Nierstrasz Selected material Magee and Kramer Roadmap > Threads in Java Threads (vs. Processes) Thread creation Thread lifecycle > Synchronization in Java wait() and notify()
More informationA Fusion-based Approach for Handling Multiple Faults in Distributed Systems
A Fusion-based Approach for Handling Multiple Faults in Distributed Systems Bharath Balasubramanian, Vijay K. Garg Parallel and Distributed Systems Laboratory, Dept. of Electrical and Computer Engineering,
More informationEfficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms
Efficiency versus Convergence of Boolean Kernels for On-Line Learning Algorithms Roni Khardon Tufts University Medford, MA 02155 roni@eecs.tufts.edu Dan Roth University of Illinois Urbana, IL 61801 danr@cs.uiuc.edu
More informationRelating Strands and Multiset Rewriting for Security Protocol Analysis Revised Extended Abstract Ý
Relating Strands and Multiset Rewriting for Security Protocol Analysis Revised Extended Abstract Ý I. Cervesato ITT Industries iliano@itd.nrl.navy.mil N. Durgin, J. Mitchell Stanford University nad, jcm@cs.stanford.edu
More information