Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
|
|
- Berenice Harrington
- 5 years ago
- Views:
Transcription
1 CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure calle a oubly linke list. Rea the whole hanout before starting. Near the en, we give important instructions on testing. At the en of this hanout, we tell you what an how to submit. We will ask you for the time spent in oing A, so please keep track of the time you spen on it. We will report the minimum, average, an maximum. Learning objectives Learn about an master the complexities of oubly linke lists. Learn a little about inner classes. Learn an practice a soun methoology in writing an ebugging a small but intricate program. Collaboration policy an acaemic integrity You may o this assignment with one other person. Both members of the group shoul get on the CMS an o what is require to form a group well before the assignment ue ate. Both must o something to form the group: one proposes, the other accepts. People in a group must work together. It is against the rules for one person to o some programming on this assignment without the other person sitting nearby an helping. Take turns riving using the keyboar an mouse. With the exception of your CMS-registere group partner, you may not look at anyone else's coe, in any form, or show your coe to anyone else (except the course staff), in any form. You may not show or give your coe to another stuent in the class. Getting help If you on't know where to start, if you on't unerstan testing, if you are lost, etc., please SEE SOMEONE IMMEDIATELY an instructor, a TA, a consultant. Do not wait. If you fin yourself spening more than an hour or two on one issue, not making any progress, STOP an get help. Some ponering an thinking with no progress is helpful, but too much of it just wastes your time. A little in-person help can o woners. See the course webpage for contact information. Singly linke lists The iagram below represents the list of values [6, 7, ]. The leftmost object,, is calle the er. It contains two values: the of the list,, an a pointer to the first noe of the list. Each of the other three objects, of class M, contains a value of the list an a pointer to the essor noe of the list or if there are no more noes in the list. This structure is call a singly linke list, or just linke list. For simplicity in iscussions, for any list, we may use the notation [0] for its first element, [1] for its secon, an so on. Below, [0] = 6. But remember, this is not Java notation for lists. 6 7
2 CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 2 Many structures can be use to implement a list, Different programs use lists in ifferent ways. One chooses a structure that optimizes a program in some way, making the most frequently use operations as fast as possible. For example, maintaining a list in an array b has the avantage that any element, say number i, can be reference in constant time, using (typically) b[i]. But maintaining a list in an array has isavantages: (1) The of the array has to be etermine when the array is first create, (2) One nees a variable that contains the number of values in the list, an () Inserting or removing values at the beginning takes time proportional to the of the list. A singly linke list has these avantages: (1) The list can be any, an (2) Inserting (or removing) a value at the beginning can be one in constant time. It takes just a few operations, boune above by some constant: Create a new object an change a few pointers. On the other han, to reference element i of the list takes time proportional to i one has to sequence through all the noes 0..i-1 to fin it. Exercise At this point, you will gain more unerstaning by oing the following, to construct a linke list that represents the sequence [4, 6, 7, ]. Do what follows, on t just rea it. (1) Copy the linke list iagram shown near the bottom of the previous page. (2) Below that iagram, raw a new object of class M, with 4 in fiel an in fiel. () Now change fiel of the new noe to point to noe an change fiel to point to the new noe. (4) Finally, change fiel. to 4. The iagram now represents the list [4, 6, 7, ]. Doubly linke lists A singly linke list has fiel in the er an fiel in each noe, as shown above. A oubly linke list has, in aition, a fiel tail in the er an a fiel in each noe, as shown below. In the iagram below, one can traverse the list of values in reverse: first.tail., then.tail.., then.tail... This oubly linke lists represents the same sequence [6, 7, ] as the singly linke list given above but the structure lets us easily enumerate the values in reverse, [, 7, 6], as well as forwar. The major avantage of a oubly linke list over a singly linke list is that, given a noe n (containing something like ), one can get to n s ecessor an essor in constant time. For example, removing noe n from the list can be one in constant time, but in a singly linke list, the time may epen on the length of the list (why?). In A, you will implement a oubly linke list using the representation below. The er will be of class DLinkeList (abbreviate LL below), an noes will be objects of class Noe (given by M below), Stuy this iagram carefully. All further work rests on unerstaning this structure. 6 7 tail We often write such linke lists without the tabs on the objects an even without names in the pointer fiels, as shown below. No useable information is lost, since the arrows take the place of the object pointer-names. 6 7 tail
3 CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS A oubly linke list allows the following operations to be execute in constant time using just a few assignments an perhaps if-statements to appen a value to the list, prepen a value (insert an element at the beginning of the list), insert a value before or after a given element, an elete a value. It will be your job to implement these operations in constant time. In an array implementation of such a list, most of these operations coul take time proportional to the length of the list in the worst case. This assignment We give you a skeleton for class DLinkeList<E> (where E is any class-type). It extens class java. util.abstractlist<e>. The release coe contains many methos, some alreay written. The ones you have to write are annotate with a //TODO comment, an they inicate the orer in which the methos must be written. Please on t elete these comments. The class also contains a efinition of Noe (it is an inner class; see below). You must also evelop a JUnit test class, DLinkeListTest, that thoroughly tests the methos you write. We give important irections on writing an testing/ebugging below. Generics The efinition of DLinkeList has DLinkeList<E> in its er. Here, E is a type parameter. To eclare a variable v that can contain (a pointer to) a linke list whose elements are of type Integer, use: DLinkeList<Integer> v; // (replace Integer by any class-type you wish) Similarly, create an object whose list-values will be of type String using the new-expression: new DLinkeList<String>() We will introuce you to generic types more thoroughly later in the course. Access moifiers an testing Java has four ifferent access moifiers: public, private, protecte, an package (you can t place package in your program; it s what you get if you on t put an access moifier). This table shows you what each means: moifier class package subclass worl public Y Y Y Y protecte Y Y Y N package Y Y N N private Y N N N Some of the methos in DLinkeList are public because we want users to be able to use them. But other methos are helper methos, which shoul remain unknown an inaccessible to users. So, we coul make them private. But that makes it very har to test the helper methos in a JUnit testing class! How can we call a metho in orer to test it if we can t access it? Instea, we give the helper methos access moifier package (meaning they have no explicit access moifier). Then, since the JUnit testing class an DLinkeList are in the same package, the efault package, the JUnit testing class can reference the helper methos. When writing a realistic class that you want others to use, you woul put the class in a real package, not the efault package, along with your testing class. When one, you coul create a jar file (we ll see that later) containing your class (still in a package), an the user woul use this. The user woul not be able to put a class in the same package, so the user woul not be able to get at the helper methos. Isn t that neat?
4 CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 4 Inner classes Just as one can eclare a variable (fiel) an a metho in a class, one can eclare another class. Class Noe is eclare within class DLinkeList. It is calle an inner class. We ll talk more about inner classes later. The methos of DLinkeList can an shoul reference the fiels of the inner class irectly. There is no nee for getter an setter methos for these fiels. In the JUnit testing class, you will nee to eclare local variables of class Noe. Here is an example of how to o it, where b is a variable of type DLinkeList<Integer>. DLinkeList<Integer>.Noe noe= b.gethea(); What to o for this assignment 1. Start a project a (or another name) in Eclipse, ownloa file DLinkeList.java from the course website or the Piazza, an put the file files into a, in the efault package. Create a new JUnit testing class. Name it DLinkeListTest, which is what Eclipse will try to name it. Inner class Noe is complete; you o not have to an shoul not change it. Write the 1 methos inicate in class DLinkeList, testing each thoroughly as suggeste below. Some of the methos are helper methos, which is where the core functionality shoul be. The rest are public methos, which shoul be mae rather small by using the helper methos. We provie extensive comments to help you out. On the first line of file DLinkeList.java, replace nnnn by your netis an hh an mm by the hours an minutes you spent on this assignment. If you are oing the project alone, replace only the first nnnn. Please o all this carefully. If the minutes is 0, replace mm by 0. We wrote a program to extract these times, an when you on t actually replace hh an mm but instea write in free form, that causes us trouble. Also, please take a few minutes to tell us what you thought of this assignment. 2. Submit the assignment (both classes) on the CMS before the en of the ay on the ue ate. Graing: 65 points will be base on functional correctness an 5 points on efficiency of function getnoe, as specifie in the comments within getnoe. 0 points will be base on testing: we will look carefully at class DLinkeListTest. So, overall, if you on t test a metho properly, points might be eucte in three places: (1) the metho might not be correct, (2) the metho might not use the best way to get to a noe, an () the metho might not be teste properly. Further guielines an instructions Some methos that you have to write have an extra comment in the boy, giving more instructions an hints on how to write it. Follow these instructions carefully. Writing a helper metho: Five of the methos are helper methos. You have to be extremely careful to write them correctly. It is best to raw the linke list. If the metho changes the list, raw the list before an after the change, note which variables have to be change, an then write the coe. Not oing this is sure to cause you trouble. Be careful with a metho like appen because a single picture oes not tell the whole story. Here, two cases must be consiere: the list is empty an it is not empty. So two sets of before-an-after iagrams shoul be rawn. This will probably means implementing the metho with two cases using an if-statement. Methoology on testing: Write an test one group of methos at a time! Writing all an then testing will waste your time, for if you have not fully unerstoo what is require, you will make the same mistakes many times. Goo programmers write an test incrementally, gaining more an more confience as each metho is complete an teste.
5 CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 5 Determining what test cases to use: In testing a metho, you must o two things (1) make sure that each statement of the metho is exercise in at least one test case. Thus, if the metho has an if-statement, at least two test cases are require. (2) Ensure that corner cases or extreme cases are teste. In the context of oubly linke lists, an empty list an a list may be extreme cases, epening what is one to the list. When finishe with a metho, to etermine test cases, look carefully at the coe, base on the above points (1) an (2). What to test an how to test it: Determining how to test a metho that changes the linke list can be time consuming an error prone. For example: after inserting 6 before 8 in list [2, 7, 8, 5)], you must be sure that the list is now [2, 7, 6, 8, 5]. What fiels of what objects nee testing? What an fiels? How can you be sure you in t change something that shouln t be change? To remove the nee to think about this issue an to test all fiels automatically, you must must must o the following. In class DLinkeList, FIRST write the constructor, function, an function tostringrev, as best you can. In writing tostringrev, o not use fiel. Instea, use only fiels tail in class DLinkeList an the an fiels of noes. Do not put in JUnit testing proceures for tostringrev, because it will be teste when testing metho appen, just as getters were teste in testing a constructor in A1. For example, after completing the constructor,, an tostringrev, you can test that they work properly on the empty list using this public voi testconstructor() { DLinkeList<Integer> b= new DLinkeList<Integer>(); assertequals("[]", b.tostring()); assertequals("[]", b.tostringrev()); assertequals(0, b.()); } Testing function appen will fully test tostringrev. You are testing those two functions together. Each call on appen will be followe by assertequals calls, similar to those in testconstructor, followe by a test that the returne value is public voi testappen() { DLinkeList<String> ll= new DLinkeList<String>(); DLinkeList<String>.Noe n= ll.appen("ross"); assertequals("[ross]", ll.tostring()); assertequals("[ross]", ll.tostringrev()); assertequals(1, ll.()); assertequals(ll.gettail(), n); } Many of your tests of your functions will have similar assertequals calls. That way, you on t have to think about what fiels to test: you test them all. Once you have implemente, getnoe, an get, the implementation for methos equals inherite from AbstractList will work as well, so you can test using that in aition to using tostring an tostringrev. Woul you have thought of using tostringrev an tostringrev like this? It is useful to spen time thinking not only about writing the coe but also about how to simplify testing.
Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationCS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics
CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,
More informationLearning objectives. Reading carefully. Managing your time. CS2110 Fall 2017 Assignment A1. PhD Genealogy. See CMS for the due date
1 CS2110 Fall 2017 Assignment A1 PhD Genealogy Website http://genealogy.math.ndsu.nodak.edu contains the PhD genealogy of about 214,100 mathematicians and computer scientists, showing their PhD advisors
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationACORN.COM CS 1110 SPRING 2012: ASSIGNMENT A1
ACORN.COM CS 1110 SPRING 2012: ASSIGNMENT A1 Due to CMS by Tuesday, February 14. Social networking has caused a return of the dot-com madness. You want in on the easy money, so you have decided to make
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More information1. What is a Map (or Function)? Maps. CITS2200 Data Structures and Algorithms. Some definitions... Topic 16
1. What is a Map (or Function)? CITS2200 Data Structures an Algorithms Topic 16 Maps Definitions what is a map (or function)? Specification List-base representation (singly linke) Sorte block representation
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More information6.823 Computer System Architecture. Problem Set #3 Spring 2002
6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem
More informationCS2110 Fall 2015 Assignment A5: Treemaps 1
CS2110 Fall 2015 Assignment A5: Treemaps 1 1. Introduction Assignment 5: Treemaps We continue our study of recursive algorithms and also gain familiarity with building graphical user interfaces (GUIs)
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationChapter 5 Proposed models for reconstituting/ adapting three stereoscopes
Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,
More informationContributing to safety and due diligence in safety-critical interactive systems development
Contributing to safety an ue iligence in safety-critical interactive systems evelopment Harol Thimbleby Future Interaction Technology Lab Swansea University Wales harol@thimbleby.net ABSTRACT Interaction
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationRecitation Caches and Blocking. 4 March 2019
15-213 Recitation Caches an Blocking 4 March 2019 Agena Reminers Revisiting Cache Lab Caching Review Blocking to reuce cache misses Cache alignment Reminers Due Dates Cache Lab (Thursay 3/7) Miterm Exam
More informationPrinciples of B-trees
CSE465, Fall 2009 February 25 1 Principles of B-trees Noes an binary search Anoe u has size size(u), keys k 1,..., k size(u) 1 chilren c 1,...,c size(u). Binary search property: for i = 1,..., size(u)
More informationPolitehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques
Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose
More informationLesson 11 Interference of Light
Physics 30 Lesson 11 Interference of Light I. Light Wave or Particle? The fact that light carries energy is obvious to anyone who has focuse the sun's rays with a magnifying glass on a piece of paper an
More informationContributing to Safety and Due Diligence in Safety-critical Interactive Systems Development by Generating and Analyzing Finite State Models
Contributing to Safety an Due Diligence in Safety-critical Interactive Systems Development by Generating an Analyzing Finite State Moels Harol Thimbleby Future Interaction Technology Lab Swansea University
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationPART 2. Organization Of An Operating System
PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationCS/ENGRD 2110 SPRING Lecture 3: Fields, getters and setters, constructors, testing
1 CS/ENGRD 2110 SPRING 2019 Lecture 3: Fields, getters and setters, constructors, testing http://courses.cs.cornell.edu/cs2110 CS2110 Announcements 2 Take course S/U? OK with us. Check with your advisor/major.
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More informationPERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING
PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that
More informationFrequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises
verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e
More informationAdditional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication
Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last
More informationTop-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications
Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University
More informationLab work #8. Congestion control
TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationCS350 - Exam 4 (100 Points)
Fall 0 Name CS0 - Exam (00 Points).(0 points) Re-Black Trees For the Re-Black tree below, inicate where insert() woul initially occur before rebalancing/recoloring. Sketch the tree at ALL intermeiate steps
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationHow to Link your Accounts at Morgan Stanley
How to Link your Accounts at Morgan Stanley This guie explains how to link your accounts at Morgan Stanley for streamline online access to your shares an cash. At Morgan Stanley, your shares an cash are
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationAlgorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times
Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal
More informationConsidering bounds for approximation of 2 M to 3 N
Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for
More informationLaboratory I.7 Linking Up with the Chain Rule
Laboratory I.7 Linking Up with the Chain Rule Goal The stuent will figure out the Chain Rule for certain example functions. Before the Lab The Chain Rule is the erivative rule which accounts for function
More informationCS201 - Assignment 3, Part 1 Due: Friday February 28, at the beginning of class
CS201 - Assignment 3, Part 1 Due: Friday February 28, at the beginning of class One of the keys to writing good code is testing your code. This assignment is going to introduce you and get you setup to
More informationBoxes, Inkwells, Speech and Formulas DRAFT
Boxes, Inkwells, Speech an Formulas DRAFT Richar J. Fateman March 0, 2006 Introuction This paper sets out some esigns for entering mathematical formulas into a computer system. An initial approach to this
More informationProject 3: Implementing a List Map
Project 3: Implementing a List Map CSCI 245 Programming II: Object-Oriented Design Spring 2017 Devin J. Pohly (adapted from Thomas VanDrunen) This project has two main goals: To give you practice in implementing
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationTest-Based Inference of Polynomial Loop-Bound Functions
Test-Base Inference of Polynomial Loop-Boun Functions Olha Shkaravska Roy Kersten Rabou University Nijmegen {shkarav,r.kersten}@cs.ru.nl Marko van Eekelen Rabou University Nijmegen an Open Universiteit
More informationShift-map Image Registration
Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy
More informationTight Wavelet Frame Decomposition and Its Application in Image Processing
ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department
More informationFigure 1: 2D arm. Figure 2: 2D arm with labelled angles
2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of
More informationCMSC 430 Introduction to Compilers. Spring Register Allocation
CMSC 430 Introuction to Compilers Spring 2016 Register Allocation Introuction Change coe that uses an unoune set of virtual registers to coe that uses a finite set of actual regs For ytecoe targets, can
More informationCS201 - Assignment 3, Part 2 Due: Wednesday March 5, at the beginning of class
CS201 - Assignment 3, Part 2 Due: Wednesday March 5, at the beginning of class For this assignment we will be developing a text-based Tic Tac Toe game 1. The key to this assignment is that we re going
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationProblem Paper Atoms Tree. atoms.pas. atoms.cpp. atoms.c. atoms.java. Time limit per test 1 second 1 second 2 seconds. Number of tests
! " # %$ & Overview Problem Paper Atoms Tree Shen Tian Harry Wiggins Carl Hultquist Program name paper.exe atoms.exe tree.exe Source name paper.pas atoms.pas tree.pas paper.cpp atoms.cpp tree.cpp paper.c
More informationCordEx. >> Operating instructions. English
CorEx >> Operating instructions English Symbols use in this manual Important information concerning your safety is specifically marke. Follow these instructions closely to prevent accients an amage to
More informationUninformed search methods
CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the
More informationELECTRONIC PHYSICIAN SCALE WB-3000 INSTRUCTION MANUAL
ELECTRONIC PHYSICIAN SCALE WB-3000 INSTRUCTION MANUAL Please keep this manual in a safe place, an make sure it is reaily available whenever necessary. Please use this prouct only after carefully reaing
More informationModifying ROC Curves to Incorporate Predicted Probabilities
Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,
More informationBends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways
Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis
More informationEstimating Velocity Fields on a Freeway from Low Resolution Video
Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationUNIT 9 INTERFEROMETRY
UNIT 9 INTERFEROMETRY Structure 9.1 Introuction Objectives 9. Interference of Light 9.3 Light Sources for 9.4 Applie to Flatness Testing 9.5 in Testing of Surface Contour an Measurement of Height 9.6 Interferometers
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationA Plane Tracker for AEC-automation Applications
A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)
More informationd 3 d 4 d d d d d d d d d d d 1 d d d d d d
Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching
More informationAutomation of Bird Front Half Deboning Procedure: Design and Analysis
Automation of Bir Front Half Deboning Proceure: Design an Analysis Debao Zhou, Jonathan Holmes, Wiley Holcombe, Kok-Meng Lee * an Gary McMurray Foo Processing echnology Division, AAS Laboratory, Georgia
More information1 Shortest Path Problems
CS268: Geometric Algorithms Hanout #7 Design an Analysis Original Hanout #18 Stanfor University Tuesay, 25 February 1992 Original Lecture #8: 4 February 1992 Topics: Shortest Path Problems Scribe: Jim
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationCS 134 Programming Exercise 3:
CS 134 Programming Exercise 3: Repulsive Behavior Objective: To gain experience implementing classes and methods. Note that you must bring a program design to lab this week! The Scenario. For this lab,
More informationDesign of Controller for Crawling to Sitting Behavior of Infants
Design of Controller for Crawling to Sitting Behavior of Infants A Report submitte for the Semester Project To be accepte on: 29 June 2007 by Neha Priyaarshini Garg Supervisors: Luovic Righetti Prof. Auke
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationPairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:
airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References
More information0607 CAMBRIDGE INTERNATIONAL MATHEMATICS
CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Seconary Eucation MARK SCHEME for the May/June 03 series 0607 CAMBRIDGE INTERNATIONAL MATHEMATICS 0607/4 Paper 4 (Extene), maximum
More informationFinite Automata Implementations Considering CPU Cache J. Holub
Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton
More information2.7 Implicit Differentiation
2.7 Implicit Differentiation [ y] = = = [ x] 1 Sometimes we may be intereste in fining the erivative of an equation that is not solve or able to be solve for a particular epenent variable explicitly. In
More informationPositions, Iterators, Tree Structures and Tree Traversals. Readings - Chapter 7.3, 7.4 and 8
Positions, Iterators, Tree Structures an Reaings - Chapter 7.3, 7.4 an 8 1 Positional Lists q q q q A position acts as a marker or token within the broaer positional list. A position p is unaffecte by
More informationExercises of PIV. incomplete draft, version 0.0. October 2009
Exercises of PIV incomplete raft, version 0.0 October 2009 1 Images Images are signals efine in 2D or 3D omains. They can be vector value (e.g., color images), real (monocromatic images), complex or binary
More informationVariable Independence and Resolution Paths for Quantified Boolean Formulas
Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean
More information0607 CAMBRIDGE INTERNATIONAL MATHEMATICS
PAPA CAMBRIDGE CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Seconary Eucation MARK SCHEME for the May/June 0 series CAMBRIDGE INTERNATIONAL MATHEMATICS /4 4 (Extene), maximum
More informationCS2112 Fall Assignment 4 Parsing and Fault Injection. Due: March 18, 2014 Overview draft due: March 14, 2014
CS2112 Fall 2014 Assignment 4 Parsing and Fault Injection Due: March 18, 2014 Overview draft due: March 14, 2014 Compilers and bug-finding systems operate on source code to produce compiled code and lists
More informationCMPSCI 187 / Spring 2015 Hangman
CMPSCI 187 / Spring 2015 Hangman Due on February 12, 2015, 8:30 a.m. Marc Liberatore and John Ridgway Morrill I N375 Section 01 @ 10:00 Section 02 @ 08:30 1 CMPSCI 187 / Spring 2015 Hangman Contents Overview
More informationBackpressure-based Packet-by-Packet Adaptive Routing in Communication Networks
1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing
More informationAnalysis of Virtual Machine System Policies
Analysis of Virtual Machine System Policies Sanra Ruea, Hayawarh Vijayakumar, Trent Jaeger Systems an Internet Infrastructure Security Laboratory The Pennsylvania State University University Park, PA,
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationHow to Make E-cash with Non-Repudiation and Anonymity
How to Make E-cash with Non-Repuiation an Anonymity Ronggong Song an Larry Korba Institute for Information Technology National Research Council of Canaa Ottawa, Ontario K1A 0R6, Canaa {Ronggong.Song, Larry.Korba}@nrc.ca
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationKindly read through the below instruction set and guidelines prior filling in your DPD Registration application for
Dear Value DPD Customer, Kinly rea through the low instruction set guielines prior filling in your DPD Registration application registering with our Terminal 1 take a print out of the PDF file name DPDREG-NSICT
More informationWorksheet A. y = e row in the table below, giving values to 1 d.p. Use your calculator to complete the
Use our calculator to complete the = e row in the table below, giving values to 1.p. = e Check that our values agree approimatel with points that lie on the curve shown below. Worksheet A Graph of = e
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More information{TikZ-Feynman} Feynman diagrams with TikZ. by Joshua Ellis
{TikZ-Feynman} Feynman iagrams with TikZ Version 1.0.0 19th January 2016 by Joshua Ellis ARC Centre of Excellence for Particle Physics at the Terascale School of Physics, The University of Melbourne vic
More informationA New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity
Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,
More informationCS112 Lecture: Defining Instantiable Classes
CS112 Lecture: Defining Instantiable Classes Last revised 2/3/05 Objectives: 1. To describe the process of defining an instantiable class 2. To discuss public and private visibility modifiers. Materials:
More information