Aachen. A Counterexample to the Fully Mixed Nash Equilibrium Conjecture. Department of Computer Science. Technical Report

Size: px
Start display at page:

Download "Aachen. A Counterexample to the Fully Mixed Nash Equilibrium Conjecture. Department of Computer Science. Technical Report"

Transcription

1 Aachen Department of Computer Science Technical Report A Counterexample to the Fully Mixed Nash Equilibrium Conjecture Simon Fischer and Berthold Vöcking ISSN Aachener Informatik Berichte AIB RWTH Aachen Department of Computer Science May 2005

2 The publications of the Department of Computer Science of RWTH Aachen University are in general accessible through the World Wide Web.

3 A Counterexample to the Fully Mixed Nash Equilibrium Conjecture Simon Fischer and Berthold Vöcking Department of Computer Science, RWTH Aachen, Aachen, Germany Abstract. We study a well-known resource allocation game introduced by Koutsoupias and Papadimitriou. It was conjectured by Gairing et al. that the fully mixed Nash equilibrium is the worst Nash equilibrium for this game. The known algorithms for approximating the so-called price of anarchy w. r. t. mixed equilibria rely on this conjecture. We present a counterexample to the conjecture showing that fully mixed equilibria cannot be used to approximate the price of anarchy within reasonable factors. 1 The Game Koutsoupias and Papadimitriou introduced a resource allocation game in which n jobs of size w 1,..., w n 0 shall be assigned to m identical machines. Each job is managed by a selfish agent. The set of pure strategies for task i is [m] := {1,..., m}. Let (j 1,..., j n ) [m] n be a combination of pure strategies, one for each task. The load of link j is defined as λ j = j k =j w k. The cost for agent i is λ ji. Every agent aims at minimizing her cost. The social objective is to minimize the maximum cost over all agents or, equivalently, the maximum load over all machines. Agents may also use mixed strategies, i. e., probability distributions on the set of pure strategies. Let p j i denote the probability that agent i assigns its job to link j. Then E [λ j ] = w i p j i. i [n] The social cost of a mixed strategy profile P = (p j i ) is defined as [ ] SC(P) = E max λ j. j [m] The expected cost of task i on link j is c j i = w i + k i w k p j k = E [λ j] + (1 p j i ) w i. A (mixed) strategy profile P defines a Nash equilibrium if and only if any task i will assign non-zero probabilities only to links that minimize c j i, that is, Supported in part by the EU within the 6th Framework Programme under contract (DELIS) and by DFG grant Vo889/1-2.

4 (p j i ) > 0 implies cj i c q i, for every q [m]. A Nash equilibrium is called fully mixed if p j i > 0 for all i [n], j [m]. The game under consideration admits a unique fully mixed Nash equilibrium F in which each job is assigned with probability 1 m to each machine [9]. 2 The Conjecture Mavronicolas and Spirakis [9] investigate the social cost of fully mixed Nash equilibria. The motivation for their study is the hope that the techniques for the analysis of fully mixed strategies can be appropriately extended to yield upper bounds on the social cost for general equilibria. This hypothesis is formalized in the following conjecture stated in [4, 5]. Conjecture 1 (FMNE conjecture). The fully mixed Nash equilibrium F is the worst Nash equilibrium, that is, for every Nash equilibrium P. SC(F) SC(P), Several attempts have been made to prove the conjecture. For example, it was shown that the conjecture is true for the case m = 2 [5] and for the case that P refers only to pure equilibria [4]. Furthermore, it was shown that the conjecture holds in an approximate sense if m = n [1, 4]. In [3], an FPRAS for the social cost of the fully mixed Nash equilibrium is presented. The FMNE conjecture seems to be intuitive and appealing since in case of its validity it would allow for an easy identification of the worst-case mixed Nash equilibrium, whereas the worst case pure Nash equilibrium is NP-hard to compute. 3 The Counterexample We present a counterexample to the FMNE conjecture. More specifically, we show that there is a family of simple instances of the game for which there exists an equilibrium P with ( SC(P) = Ω SC(F) ) ln m ln ln m Let us remark that this is the worst possible ratio as it follows from the analyses in [2, 8] that the social cost of every Nash equilibrium can be at most O ( ) ln m ln ln m times the optimal social cost. Theorem 1. For every m, there exists an instance of the resource allocation game with m machines admitting a Nash equilibrium P with ( ) 1 SC(P) = 4 o(1) ln m ln ln m SC(F). The instance consist of n = O(f(m) m ln m) jobs whose weights differ at most by a factor O(f(m) ln m), where f denotes an arbitrary function in ω(1).. 4

5 Proof. The counterexample uses only two different kinds of jobs: Large jobs of weight 1 and small jobs of weight 1 k, k N. Let l m denote the number of large jobs. The number of small jobs is k(m l). Thus, the total weight is m and the optimal assignment has social cost 1. We show that the fully mixed equilibrium has social cost close to optimal if the parameters k and l are chosen appropriately. Lemma 1. If k = Ω(f(m) ln m) and l = O( n/f(m)) then SC(F) 2 + o(1). Proof. Recall that F assigns each job with probability 1 m to each of the machines. The assignment of the large jobs corresponds to a balls-and-bins experiment in which l = O( m/f(m)) balls are assigned uniformly at random to m bins. Fact 2 from the Appendix yields that for this experiment the expected number of balls in the fullest bin is 1 + o(1). Thus, the expected maximum load due to the large jobs is 1 + o(1), too. The assignment of the small jobs corresponds to a ball-and-bins experiment in which k(m l) balls are assigned uniformly at random to m l bins for k = Ω(f(m) ln m). Fact 3 shows that for this experiment the expected number of balls in the fullest bin is (1 + o(1)) k. Since each ball corresponds to a job of weight 1 k, the expected maximum load due to the small jobs is thus 1 + o(1) as well. Combining the upper bounds for the small and the large jobs yieds that the maximum load over all machines is at most 2 + o(1) when taking into account all the jobs. Next we present a mixed Nash equilibrium whose maximum load is lowerbounded by a function in l. Lemma 2. There exists a Nash equilibrium P with SC(P) (1 o(1)) ln l ln ln l. Proof. We construct P in the following way. The small jobs are assigned using pure strategies. They are distributed evenly among the machines 1,..., m l such that each machine receives k small jobs. Hence, their load is fixed to 1. The large jobs are assigned to each of the remaining l machines with probability 1/l. Again, the expected load of these machines is 1. This is a Nash equilibrium since no job can improve by an unilateral move: For a small job i assigned to machine j i, we have c j i i = 1 and c j i = 1 + 1/k for j j i. For a large job i, we have c j i = 2 1/k if j > m l and cj i = 2 if j m l. The social cost of this equilibrium equals the maximum occupancy of the ballsand-bins experiment where l balls are assigned uniformly at random to l bins. It ln l is well-known that the maximum occupancy of this assignment is (1±o(1)) ln ln l (see, e. g. [6]). The ratio between the bounds in Lemma 1 and 2 is maximized by choosing l as large as possible under the constraints specified in Lemma 1. W.l.o.g., let f(n) = O(ln n). We set l = Θ( m/f(m)). This way, SC(P) ( 1 2 o(1)) ln m ln ln m and SC(F) 2 + o(1). This completes the proof of Theorem 1. 5

6 Let us remark that we can fine-tune the above example such that for m = 14 machines and l = 3 large jobs the expected maximum load of P is 17/9 and the expected maximum load of F is 15/9 + 3/14 + ɛ < 17/9, where ɛ > 0 can be made arbitrarily small by increasing the number of small jobs. Thus there is a counterexample to the FMNE conjecture with only 14 machines. References 1. Andreas Baltz and Anand Srivastav. On the asymptotic inefficiency of the fully mixed Nash equilibrium. Preprint, Artur Czumaj and Berthold Vöcking. Tight bounds for worst-case equilibria. In Proc. 13th SODA (San Francisco), pages , Dimitris Fotakis, Spyros C. Kontogiannis, Elias Koutsoupias, Marios Mavronicolas, and Paul G. Spirakis. The structure and complexity of Nash equilibria for a selfish routing game. In Automata, Languages and Programming, 29th International Colloquium, (ICALP 2002), pages , Martin Gairing, Thomas Lücking, Marios Mavronicolas, Burkhard Monien, and Paul Spirakis. Extreme Nash equilibria. In C. Laneve C. Blundo, editor, Proceedings of the Eighth Italian Conference on Theoretical Computer Science (ICTCS 2003), number 2841 in LNCS, pages Springer, Martin Gairing, Thomas Lücking, Marios Mavronicolas, and Burkhard Monien. Computing Nash equilibria for scheduling on restricted links. In Proceedings of the 36th ACM Symposium on Theory of Computing (STOC 2004), pages , G. Gonnet. Expected length of the longest probe sequence in hash code searching. Journal of the Association for Computing Machinery, 28(2): , Torben Hagerup and Christine Rüb. A guided tour of Chernoff bounds. Information Processing Letters, (33): , Elias Koutsoupias, Marios Mavronicolas, and Paul G. Spirakis. Approximate equilibria and ball fusion. Theory Comput. Syst., 36(6): , Marios Mavronicolas and Paul G. Spirakis. The price of selfish routing. In Proceedings of the 33rd ACM Symposium ob Theory of Computing (STOC 2001), pages , Appendix The following facts have almost surely been shown somewhere else before. Fact 2 Let f denote any function in ω(1). If n m/f(m) balls are assigned independently and uniformly at random to m bins. Then the expected number of balls in the fullest bin is 1 + o(1). Proof. The probability that there exists a bin with at least k 2 balls is at most m ( ) ( ) n 1 k k m m k/2 k! f(m) m k 1 1 k! f(m). Therefore, the expected number of balls in the fullest bin is at most 1 + k 2 1 k! f(m) = 1 + o(1). Fact 3 Let f denote any function in ω(1). If n m f(m) ln m balls are assigned independently and uniformly at random to m bins. Then the expected number of balls in the fullest bin is f(m) ln m + O( f(m) ln m) = (1 + o(1)) f(m) ln m. 6

7 Proof. Fix any bin. The expected number of balls assigned to that bin is f(m) ln m. Applying a Chernoff bound (see, e. g. [7]), we obtain that the probability that a bin receives at least (1 + ɛ) f(m) ln m balls is at most ( exp 1 ) 3 ɛ2 f(m) ln m, for any ɛ R. For t 0, let p(t) denote the probability that the maximum occupancy is at least t f(m) log m. Applying the union bound and substituting ɛ = t 1 into the above bound yields ( p(t) m exp 1 ) 3 (t 1)2 f(m) ln m. The expected maximum occupancy is thus upper-bounded by ( ) f(m) log m p(t)dt f(m) log m τ + p(t)dt 0 τ, where the latter inequality holds for any τ 0. We choose τ = f(m) as the term τ p(t)dt is sufficiently small for this choice, that is, τ p(t)dt = = = p(τ + t)dt ( ) 2 3 f(m) + t f(m) ln m dt m exp 1 3 ( ( ) ) m exp f(m) f(m) t f(m) ln m dt ( exp 2 t f(m) ) ln m dt f(m) ln m. Hence, the expected maximum occupancy is at most ( ) 3 3 f(m) log m 1 + f(m) + 2 f(m) ln m ( ) = f(m) log m + O f(m) log m. 7

8 8

9 Aachener Informatik-Berichte This is a list of recent technical reports. To obtain copies of technical reports please consult or send your request to: Informatik-Bibliothek, RWTH Aachen, Ahornstr. 55, Aachen, biblio@informatik.rwth-aachen.de Fachgruppe Informatik: Jahresbericht David de Frutos Escrig, Klaus Indermark: Equivalence Relations of Non- Deterministic Ianov-Schemes Manfred Nagl: A Software Development Environment based on Graph Technology Claus Lewerentz, Manfred Nagl, Bernhard Westfechtel: On Integration Mechanisms within a Graph-Based Software Development Environment Reinhard Rinn: Über Eingabeanomalien bei verschiedenen Inferenzmodellen Werner Damm, Gert Döhmen: Specifying Distributed Computer Architectures in AADL* Gregor Engels, Claus Lewerentz, Wilhelm Schäfer: Graph Grammar Engineering: A Software Specification Method Manfred Nagl: Set Theoretic Approaches to Graph Grammars Claus Lewerentz, Andreas Schürr: Experiences with a Database System for Software Documents Herbert Klaeren, Klaus Indermark: A New Implementation Technique for Recursive Function Definitions Rita Loogen: Design of a Parallel Programmable Graph Reduction Machine with Distributed Memory J. Börstler, U. Möncke, R. Wilhelm: Table compression for tree automata Gabriele Esser, Johannes Rückert, Frank Wagner: Gesellschaftliche Aspekte der Informatik Peter Martini, Otto Spaniol: Token-Passing in High-Speed Backbone Networks for Campus-Wide Environments Thomas Welzel: Simulation of a Multiple Token Ring Backbone Peter Martini: Performance Comparison for HSLAN Media Access Protocols Peter Martini: Performance Analysis of Multiple Token Rings Andreas Mann, Johannes Rückert, Otto Spaniol: Datenfunknetze Andreas Mann, Johannes Rückert: Packet Radio Networks for Data Exchange Andreas Mann, Johannes Rückert: Concurrent Slot Assignment Protocol for Packet Radio Networks W. Kremer, F. Reichert, J. Rückert, A. Mann: Entwurf einer Netzwerktopologie für ein Mobilfunknetz zur Unterstützung des öffentlichen Straßenverkehrs Kai Jakobs: Towards User-Friendly Networking Kai Jakobs: The Directory - Evolution of a Standard Kai Jakobs: Directory Services in Distributed Systems - A Survey Martine Schümmer: RS-511, a Protocol for the Plant Floor 9

10 U. Quernheim: Satellite Communication Protocols - A Performance Comparison Considering On-Board Processing Peter Martini, Otto Spaniol, Thomas Welzel: File Transfer in High Speed Token Ring Networks: Performance Evaluation by Approximate Analysis and Simulation Fachgruppe Informatik: Jahresbericht Wolfgang Thomas: Automata on Infinite Objects Michael Sonnenschein: On Petri Nets and Data Flow Graphs Heiko Vogler: Functional Distribution of the Contextual Analysis in Block-Structured Programming Languages: A Case Study of Tree Transducers Thomas Welzel: Einsatz des Simulationswerkzeuges QNAP2 zur Leistungsbewertung von Kommunikationsprotokollen Th. Janning, C. Lewerentz: Integrated Project Team Management in a Software Development Environment Joost Engelfriet, Heiko Vogler: Modular Tree Transducers Wolfgang Thomas: Automata and Quantifier Hierarchies Uschi Heuter: Generalized Definite Tree Languages Fachgruppe Informatik: Jahresbericht G. Esser, J. Rückert, F. Wagner (Hrsg.): Gesellschaftliche Aspekte der Informatik Heiko Vogler: Bottom-Up Computation of Primitive Recursive Tree Functions Andy Schürr: Introduction to PROGRESS, an Attribute Graph Grammar Based Specification Language J. Börstler: Reuse and Software Development - Problems, Solutions, and Bibliography (in German) Kai Jakobs: OSI - An Appropriate Basis for Group Communication? Kai Jakobs: ISO s Directory Proposal - Evolution, Current Status and Future Problems Bernhard Westfechtel: Extension of a Graph Storage for Software Documents with Primitives for Undo/Redo and Revision Control Peter Martini: High Speed Local Area Networks - A Tutorial P. Davids, Th. Welzel: Performance Analysis of DQDB Based on Simulation Manfred Nagl (Ed.): Abstracts of Talks presented at the WG 89 15th International Workshop on Graphtheoretic Concepts in Computer Science Peter Martini: The DQDB Protocol - Is it Playing the Game? Martine Schümmer: CNC/DNC Communication with MAP Martine Schümmer: Local Area Networks for Manufactoring Environments with hard Real-Time Requirements M. Schümmer, Th. Welzel, P. Martini: Integration of Field Bus and MAP Networks - Hierarchical Communication Systems in Production Environments G. Vossen, K.-U. Witt: SUXESS: Towards a Sound Unification of Extensions of the Relational Data Model 10

11 J. Derissen, P. Hruschka, M.v.d. Beeck, Th. Janning, M. Nagl: Integrating Structured Analysis and Information Modelling A. Maassen: Programming with Higher Order Functions Mario Rodriguez-Artalejo, Heiko Vogler: A Narrowing Machine for Syntax Directed BABEL H. Kuchen, R. Loogen, J.J. Moreno Navarro, M. Rodriguez Artalejo: Graph-based Implementation of a Functional Logic Language Fachgruppe Informatik: Jahresbericht Vera Jansen, Andreas Potthoff, Wolfgang Thomas, Udo Wermuth: A Short Guide to the AMORE System (Computing Automata, MOnoids and Regular Expressions) Jerzy Skurczynski: On Three Hierarchies of Weak SkS Formulas R. Loogen: Stack-based Implementation of Narrowing H. Kuchen, A. Wagener: Comparison of Dynamic Load Balancing Strategies Kai Jakobs, Frank Reichert: Directory Services for Mobile Communication Kai Jakobs: What s Beyond the Interface - OSI Networks to Support Cooperative Work Kai Jakobs: Directory Names and Schema - An Evaluation Ulrich Quernheim, Dieter Kreuer: Das CCITT - Signalisierungssystem Nr. 7 auf Satellitenstrecken; Simulation der Zeichengabestrecke H. Kuchen, R. Loogen, J.J. Moreno Navarro, M. Rodriguez Artalejo: Lazy Narrowing in a Graph Machine Kai Jakobs, Josef Kaltwasser, Frank Reichert, Otto Spaniol: Der Computer fährt mit Rudolf Mathar, Andreas Mann: Analyzing a Distributed Slot Assignment Protocol by Markov Chains A. Maassen: Compilerentwicklung in Miranda - ein Praktikum in funktionaler Programmierung (written in german) Manfred Nagl, Andreas Schürr: A Specification Environment for Graph Grammars A. Schürr: PROGRESS: A VHL-Language Based on Graph Grammars Marita Möller: Ein Ebenenmodell wissensbasierter Konsultationen - Unterstützung für Wissensakquisition und Erklärungsfähigkeit Eric Kowalewski: Entwurf und Interpretation einer Sprache zur Beschreibung von Konsultationsphasen in Expertensystemen Y. Ortega Mallen, D. de Frutos Escrig: A Complete Proof System for Timed Observations Manfred Nagl: Modelling of Software Architectures: Importance, Notions, Experiences H. Fassbender, H. Vogler: A Call-by-need Implementation of Syntax Directed Functional Programming Guenther Geiler (ed.), Fachgruppe Informatik: Jahresbericht B. Steffen, A. Ingolfsdottir: Characteristic Formulae for Processes with Divergence M. Portz: A new class of cryptosystems based on interconnection networks 11

12 H. Kuchen, G. Geiler: Distributed Applicative Arrays Ludwig Staiger: Kolmogorov Complexity and Hausdorff Dimension Ludwig Staiger: Syntactic Congruences for w-languages Eila Kuikka: A Proposal for a Syntax-Directed Text Processing System K. Gladitz, H. Fassbender, H. Vogler: Compiler-based Implementation of Syntax-Directed Functional Programming R. Loogen, St. Winkler: Dynamic Detection of Determinism in Functional Logic Languages K. Indermark, M. Rodriguez Artalejo (Eds.): Granada Workshop on the Integration of Functional and Logic Programming Rolf Hager, Wolfgang Kremer: The Adaptive Priority Scheduler: A More Fair Priority Service Discipline Andreas Fasbender, Wolfgang Kremer: A New Approximation Algorithm for Tandem Networks with Priority Nodes J. Börstler, A. Zündorf: Revisiting extensions to Modula-2 to support reusability J. Börstler, Th. Janning: Bridging the gap between Requirements Analysis and Design A. Zündorf, A. Schürr: Nondeterministic Control Structures for Graph Rewriting Systems Matthias Jarke, John Mylopoulos, Joachim W. Schmidt, Yannis Vassiliou: DAIDA: An Environment for Evolving Information Systems M. Jeusfeld, M. Jarke: From Relational to Object-Oriented Integrity Simplification G. Hogen, A. Kindler, R. Loogen: Automatic Parallelization of Lazy Functional Programs Prof. Dr. rer. nat. Otto Spaniol: ODP (Open Distributed Processing): Yet another Viewpoint H. Kuchen, F. Lücking, H. Stoltze: The Topology Description Language TDL S. Graf, B. Steffen: Compositional Minimization of Finite State Systems R. Cleaveland, J. Parrow, B. Steffen: The Concurrency Workbench: A Semantics Based Tool for the Verification of Concurrent Systems Rudolf Mathar, Jürgen Mattfeldt: Optimal Transmission Ranges for Mobile Communication in Linear Multihop Packet Radio Networks M. Jeusfeld, M. Staudt: Query Optimization in Deductive Object Bases J. Knoop, B. Steffen: The Interprocedural Coincidence Theorem J. Knoop, B. Steffen: Unifying Strength Reduction and Semantic Code Motion T. Margaria: First-Order theories for the verification of complex FSMs B. Steffen: Generating Data Flow Analysis Algorithms from Modal Specifications Stefan Eherer (ed.), Fachgruppe Informatik: Jahresbericht Bernhard Westfechtel: Basismechanismen zur Datenverwaltung in strukturbezogenen Hypertextsystemen S. A. Smolka, B. Steffen: Priority as Extremal Probability Matthias Jarke, Carlos Maltzahn, Thomas Rose: Sharing Processes: Team Coordination in Design Repositories 12

13 O. Burkart, B. Steffen: Model Checking for Context-Free Processes Matthias Jarke, Klaus Pohl: Information Systems Quality and Quality Information Systems Rudolf Mathar, Jürgen Mattfeldt: Analyzing Routing Strategy NFP in Multihop Packet Radio Networks on a Line Alfons Kemper, Guido Moerkotte: Grundlagen objektorientierter Datenbanksysteme Matthias Jarke, Manfred Jeusfeld, Andreas Miethsam, Michael Gocek: Towards a logic-based reconstruction of software configuration management Werner Hans: A Complete Indexing Scheme for WAM-based Abstract Machines W. Hans, R. Loogen, St. Winkler: On the Interaction of Lazy Evaluation and Backtracking Matthias Jarke, Thomas Rose: Specification Management with CAD Th. Noll, H. Vogler: Top-down Parsing with Simultaneous Evaluation on Noncircular Attribute Grammars A. Schuerr, B. Westfechtel: Graphgrammatiken und Graphersetzungssysteme(written in german) Graduiertenkolleg Informatik und Technik (Hrsg.): Forschungsprojekte des Graduiertenkollegs Informatik und Technik M. Jarke (ed.): ConceptBase V3.1 User Manual Clarence A. Ellis, Matthias Jarke (Eds.): Distributed Cooperation in Integrated Information Systems - Proceedings of the Third International Workshop on Intelligent and Cooperative Information Systems H. Kuchen, R. Loogen (eds.): Proceedings of the 4th Int. Workshop on the Parallel Implementation of Functional Languages G. Hogen, R. Loogen: PASTEL - A Parallel Stack-Based Implementation of Eager Functional Programs with Lazy Data Structures (Extended Abstract) H. Kuchen, K. Gladitz: Implementing Bags on a Shared Memory MIMD- Machine C. Rathsack, S.B. Scholz: LISA - A Lazy Interpreter for a Full-Fledged Lambda-Calculus T.A. Bratvold: Determining Useful Parallelism in Higher Order Functions S. Kahrs: Polymorphic Type Checking by Interpretation of Code M. Chakravarty, M. Köhler: Equational Constraints, Residuation, and the Parallel JUMP-Machine J. Seward: Polymorphic Strictness Analysis using Frontiers (Draft Version) D. Gärtner, A. Kimms, W. Kluge: pi-redˆ+ - A Compiling Graph- Reduction System for a Full Fledged Lambda-Calculus D. Howe, G. Burn: Experiments with strict STG code J. Glauert: Parallel Implementation of Functional Languages Using Small Processes M. Joy, T. Axford: A Parallel Graph Reduction Machine A. Bennett, P. Kelly: Simulation of Multicache Parallel Reduction 13

14 K. Langendoen, D.J. Agterkamp: Cache Behaviour of Lazy Functional Programs (Working Paper) K. Hammond, S. Peyton Jones: Profiling scheduling strategies on the GRIP parallel reducer S. Mintchev: Using Strictness Information in the STG-machine D. Rushall: An Attribute Grammar Evaluator in Haskell J. Wild, H. Glaser, P. Hartel: Statistics on storage management in a lazy functional language implementation W.S. Martins: Parallel Implementations of Functional Languages D. Lester: Distributed Garbage Collection of Cyclic Structures (Draft version) J.C. Glas, R.F.H. Hofman, W.G. Vree: Parallelization of Branch-and- Bound Algorithms in a Functional Programming Environment S. Hwang, D. Rushall: The nu-stg machine: a parallelized Spineless Tagless Graph Reduction Machine in a distributed memory architecture (Draft version) G. Burn, D. Le Metayer: Cps-Translation and the Correctness of Optimising Compilers S.L. Peyton Jones, P. Wadler: Imperative functional programming (Brief summary) W. Damm, F. Liu, Th. Peikenkamp: Evaluation and Parallelization of Functions in Functional + Logic Languages (abstract) M. Kesseler: Communication Issues Regarding Parallel Functional Graph Rewriting Th. Peikenkamp: Charakterizing and representing neededness in functional loginc languages (abstract) H. Doerr: Monitoring with Graph-Grammars as formal operational Models J. van Groningen: Some implementation aspects of Concurrent Clean on distributed memory architectures G. Ostheimer: Load Bounding for Implicit Parallelism (abstract) H. Kuchen, F.J. Lopez Fraguas, J.J. Moreno Navarro, M. Rodriguez Artalejo: Implementing Disequality in a Lazy Functional Logic Language H. Kuchen, F.J. Lopez Fraguas: Result Directed Computing in a Functional Logic Language H. Kuchen, J.J. Moreno Navarro, M.V. Hermenegildo: Independent AND-Parallel Narrowing T. Margaria, B. Steffen: Distinguishing Formulas for Free K. Pohl: The Three Dimensions of Requirements Engineering R. Stainov: A Dynamic Configuration Facility for Multimedia Communications Michael von der Beeck: Integration of Structured Analysis and Timed Statecharts for Real-Time and Concurrency Specification W. Hans, St. Winkler: Aliasing and Groundness Analysis of Logic Programs through Abstract Interpretation and its Safety Gerhard Steinke, Matthias Jarke: Support for Security Modeling in Information Systems Design B. Schinzel: Warum Frauenforschung in Naturwissenschaft und Technik 14

15 A. Kemper, G. Moerkotte, K. Peithner: Object-Orientation Axiomatised by Dynamic Logic Bernd Heinrichs, Kai Jakobs: Timer Handling in High-Performance Transport Systems B. Heinrichs, K. Jakobs, K. Lenßen, W. Reinhardt, A. Spinner: Euro- Bridge: Communication Services for Multimedia Applications C. Gerlhof, A. Kemper, Ch. Kilger, G. Moerkotte: Partition-Based Clustering in Object Bases: From Theory to Practice J. Börstler: Feature-Oriented Classification and Reuse in IPSEN M. Jarke, J. Bubenko, C. Rolland, A. Sutcliffe, Y. Vassiliou: Theories Underlying Requirements Engineering: An Overview of NATURE at Genesis K. Pohl, M. Jarke: Quality Information Systems: Repository Support for Evolving Process Models A. Zuendorf: Implementation of the imperative / rule based language PROGRES P. Koch: Intelligentes Backtracking bei der Auswertung funktionallogischer Programme Rudolf Mathar, Jürgen Mattfeldt: Channel Assignment in Cellular Radio Networks Gerhard Friedrich, Wolfgang Neidl: Constructive Utility in Model-Based Diagnosis Repair Systems P. S. Chen, R. Hennicker, M. Jarke: On the Retrieval of Reusable Software Components W. Hans, St.Winkler: Abstract Interpretation of Functional Logic Languages N. Kiesel, A. Schuerr, B. Westfechtel: Design and Evaluation of GRAS, a Graph-Oriented Database System for Engineering Applications Fachgruppe Informatik: Jahresbericht Patrick Shicheng Chen: On Inference Rules of Logic-Based Information Retrieval Systems G. Hogen, R. Loogen: A New Stack Technique for the Management of Runtime Structures in Distributed Environments A. Zündorf: A Heuristic for the Subgraph Isomorphism Problem in Executing PROGRES A. Kemper, D. Kossmann: Adaptable Pointer Swizzling Strategies in Object Bases: Design, Realization, and Quantitative Analysis Graduiertenkolleg Informatik und Technik (Hrsg.): Graduiertenkolleg Informatik und Technik Matthias Berger: k-coloring Vertices using a Neural Network with Convergence to Valid Solutions M. Buchheit, M. Jeusfeld, W. Nutt, M. Staudt: Subsumption between Queries to Object-Oriented Databases O. Burkart, B. Steffen: Pushdown Processes: Parallel Composition and Model Checking R. Große-Wienker, O. Hermanns, D. Menzenbach, A. Pollacks, S. Repetzki, J. Schwartz, K. Sonnenschein, B. Westfechtel: Das SUKITS-Projekt: A-posteriori-Integration heterogener CIM-Anwendungssysteme 15

16 Rudolf Mathar, Jürgen Mattfeldt: On the Distribution of Cumulated Interference Power in Rayleigh Fading Channels O. Maler, L. Staiger: On Syntactic Congruences for omega-languages M. Jarke, St. Eherer, R. Gallersdoerfer, M. Jeusfeld, M. Staudt: ConceptBase - A Deductive Object Base Manager M. Staudt, H.W. Nissen, M.A. Jeusfeld: Query by Class, Rule and Concept M. Jarke, K. Pohl, St. Jacobs et al.: Requirements Engineering: An Integrated View of Representation Process and Domain M. Jarke, K. Pohl: Establishing Vision in Context: Towards a Model of Requirements Processes W. Hans, H. Kuchen, St. Winkler: Full Indexing for Lazy Narrowing W. Hans, J.J. Ruz, F. Saenz, St. Winkler: A VHDL Specification of a Shared Memory Parallel Machine for Babel K. Finke, M. Jarke, P. Szczurko, R. Soltysiak: Quality Management for Expert Systems in Process Control M. Jarke, M.A. Jeusfeld, P. Szczurko: Three Aspects of Intelligent Cooperation in the Quality Cycle Margit Generet, Sven Martin (eds.), Fachgruppe Informatik: Jahresbericht M. Lefering: Development of Incremental Integration Tools Using Formal Specifications P. Constantopoulos, M. Jarke, J. Mylopoulos, Y. Vassiliou: The Software Information Base: A Server for Reuse Rolf Hager, Rudolf Mathar, Jürgen Mattfeldt: Intelligent Cruise Control and Reliable Communication of Mobile Stations Rolf Hager, Peter Hermesmann, Michael Portz: Feasibility of Authentication Procedures within Advanced Transport Telematics Claudia Popien, Bernd Meyer, Axel Kuepper: A Formal Approach to Service Import in ODP Trader Federations P. Peters, P. Szczurko: Integrating Models of Quality Management Methods by an Object-Oriented Repository Manfred Nagl, Bernhard Westfechtel: A Universal Component for the Administration in Distributed and Integrated Development Environments Patrick Horster, Holger Petersen: Signatur- und Authentifikationsverfahren auf der Basis des diskreten Logarithmusproblems A. Schürr: PROGRES, A Visual Language and Environment for PROgramming with Graph REwrite Systems A. Schürr: Specification of Graph Translators with Triple Graph Grammars A. Schürr: Logic Based Programmed Structure Rewriting Systems L. Staiger: Codes, Simplifying Words, and Open Set Condition Bernhard Westfechtel: A Graph-Based System for Managing Configurations of Engineering Design Documents P. Klein: Designing Software with Modula I. Litovsky, L. Staiger: Finite acceptance of infinite words 16

17 G. Hogen, R. Loogen: Parallel Functional Implementations: Graphbased vs. Stackbased Reduction M. Jeusfeld, U. Johnen: An Executable Meta Model for Re-Engineering of Database Schemas R. Gallersdörfer, M. Jarke, K. Klabunde: Intelligent Networks as a Data Intensive Application (INDIA) M. Mohnen: Proving the Correctness of the Static Link Technique Using Evolving Algebras H. Fernau, L. Staiger: Valuations and Unambiguity of Languages, with Applications to Fractal Geometry M. Jarke, K. Pohl, R. Dömges, St. Jacobs, H. W. Nissen: Requirements Information Management: The NATURE Approach M. Jarke, K. Pohl, C. Rolland, J.-R. Schmitt: Experience-Based Method Evaluation and Improvement: A Process Modeling Approach St. Jacobs, St. Kethers: Improving Communication and Decision Making within Quality Function Deployment M. Jarke, H. W. Nissen, K. Pohl: Tool Integration in Evolving Information Systems Environments O. Burkart, D. Caucal, B. Steffen: An Elementary Bisimulation Decision Procedure for Arbitrary Context-Free Processes Fachgruppe Informatik: Jahresbericht Andy Schürr, Andreas J. Winter, Albert Zündorf: Graph Grammar Engineering with PROGRES Ludwig Staiger: A Tight Upper Bound on Kolmogorov Complexity by Hausdorff Dimension and Uniformly Optimal Prediction Birgitta König-Ries, Sven Helmer, Guido Moerkotte: An experimental study on the complexity of left-deep join ordering problems for cyclic queries Sophie Cluet, Guido Moerkotte: Efficient Evaluation of Aggregates on Bulk Types Sophie Cluet, Guido Moerkotte: Nested Queries in Object Bases Sophie Cluet, Guido Moerkotte: Query Optimization Techniques Exploiting Class Hierarchies Markus Mohnen: Efficient Compile-Time Garbage Collection for Arbitrary Data Structures Markus Mohnen: Functional Specification of Imperative Programs: An Alternative Point of View of Functional Languages Rainer Gallersdörfer, Matthias Nicola: Improving Performance in Replicated Databases through Relaxed Coherency M.Staudt, K.von Thadden: Subsumption Checking in Knowledge Bases G.V.Zemanek, H.W.Nissen, H.Hubert, M.Jarke: Requirements Analysis from Multiple Perspectives: Experiences with Conceptual Modeling Technology M.Staudt, M.Jarke: Incremental Maintenance of Externally Materialized Views P.Peters, P.Szczurko, M.Jeusfeld: Oriented Information Management: Conceptual Models at Work 17

18 Matthias Jarke, Sudha Ram (Hrsg.): WITS 95 Proceedings of the 5th Annual Workshop on Information Technologies and Systems W.Hans, St.Winkler, F.Saenz: Distributed Execution in Functional Logic Programming Jahresbericht Michael Hanus, Christian Prehofer: Higher-Order Narrowing with Definitional Trees W.Scheufele, G.Moerkotte: Optimal Ordering of Selections and Joins in Acyclic Queries with Expensive Predicates Klaus Pohl: PRO-ART: Enabling Requirements Pre-Traceability Klaus Pohl: Requirements Engineering: An Overview M.Jarke, W.Marquardt: Design and Evaluation of Computer Aided Process Modelling Tools Olaf Chitil: The Sigma-Semantics: A Comprehensive Semantics for Functional Programs S.Sripada: On Entropy and the Limitations of the Second Law of Thermodynamics Michael Hanus (Ed.): Proceedings of the Poster Session of ALP96 - Fifth International Conference on Algebraic and Logic Programming Michael Hanus (Ed.): Proceedings of the Poster Session of ALP 96 - Fifth International Conference on Algebraic and Logic Programming: Introduction and table of contents Ilies Alouini: An Implementation of Conditional Concurrent Rewriting on Distributed Memory Machines Olivier Danvy, Karoline Malmkjær: On the Idempotence of the CPS Transformation Víctor M. Gulías, José L. Freire: Concurrent Programming in Haskell Sébastien Limet, Pierre Réty: On Decidability of Unifiability Modulo Rewrite Systems Alexandre Tessier: Declarative Debugging in Constraint Logic Programming Reidar Conradi, Bernhard Westfechtel: Version Models for Software Configuration Management C.Weise, D.Lenzkes: A Fast Decision Algorithm for Timed Refinement R.Dömges, K.Pohl, M.Jarke, B.Lohmann, W.Marquardt: PRO- ART/CE* An Environment for Managing the Evolution of Chemical Process Simulation Models K.Pohl, R.Klamma, K.Weidenhaupt, R.Dömges, P.Haumer, M.Jarke: A Framework for Process-Integrated Tools R.Gallersdörfer, K.Klabunde, A.Stolz, M.Eßmajor: INDIA Intelligent Networks as a Data Intensive Application, Final Project Report, June H.Schimpe, M.Staudt: VAREX: An Environment for Validating and Refining Rule Bases M.Jarke, M.Gebhardt, S.Jacobs, H.Nissen: Conflict Analysis Across Heterogeneous Viewpoints: Formalization and Visualization Manfred A. Jeusfeld, Tung X. Bui: Decision Support Components on the Internet 18

19 Manfred A. Jeusfeld, Mike Papazoglou: Information Brokering: Design, Search and Transformation P.Peters, M.Jarke: Simulating the impact of information flows in networked organizations Matthias Jarke, Peter Peters, Manfred A. Jeusfeld: Model-driven planning and design of cooperative information systems G.de Michelis, E.Dubois, M.Jarke, F.Matthes, J.Mylopoulos, K.Pohl, J.Schmidt, C.Woo, E.Yu: Cooperative information systems: a manifesto S.Jacobs, M.Gebhardt, S.Kethers, W.Rzasa: Filling HTML forms simultaneously: CoWeb architecture and functionality M.Gebhardt, S.Jacobs: Conflict Management in Design Michael Hanus, Frank Zartmann (eds.): Jahresbericht Johannes Faassen: Using full parallel Boltzmann Machines for Optimization Andreas Winter, Andy Schürr: Modules and Updatable Graph Views for PROgrammed Graph REwriting Systems Markus Mohnen, Stefan Tobies: Implementing Context Patterns in the Glasgow Haskell Compiler S.Gruner: Schemakorrespondenzaxiome unterstützen die paargrammatische Spezifikation inkrementeller Integrationswerkzeuge Matthias Nicola, Matthias Jarke: Design and Evaluation of Wireless Health Care Information Systems in Developing Countries Petra Hofstedt: Taskparallele Skelette für irregulär strukturierte Probleme in deklarativen Sprachen Dorothea Blostein, Andy Schürr: Computing with Graphs and Graph Rewriting Carl-Arndt Krapp, Bernhard Westfechtel: Feedback Handling in Dynamic Task Nets Matthias Nicola, Matthias Jarke: Integrating Replication and Communication in Performance Models of Distributed Databases R. Klamma, P. Peters, M. Jarke: Workflow Support for Failure Management in Federated Organizations Markus Mohnen: Optimising the Memory Management of Higher-Order Functional Programs Roland Baumann: Client/Server Distribution in a Structure-Oriented Database Management System George Botorog: High-Level Parallel Programming and the Efficient Implementation of Numerical Algorithms Fachgruppe Informatik: Jahresbericht Stefan Gruner, Manfred Nagel, Andy Schürr: Fine-grained and Structure-Oriented Document Integration Tools are Needed for Development Processes Stefan Gruner: Einige Anmerkungen zur graphgrammatischen Spezifikation von Integrationswerkzeugen nach Westfechtel, Janning, Lefering und Schürr O. Kubitz: Mobile Robots in Dynamic Environments Martin Leucker, Stephan Tobies: Truth - A Verification Platform for Distributed Systems 19

20 Matthias Oliver Berger: DECT in the Factory of the Future M. Arnold, M. Erdmann, M. Glinz, P. Haumer, R. Knoll, B. Paech, K. Pohl, J. Ryser, R. Studer, K. Weidenhaupt: Survey on the Scenario Use in Twelve Selected Industrial Projects H. Aust: Sprachverstehen und Dialogmodellierung in natürlichsprachlichen Informationssystemen Th. Lehmann: Geometrische Ausrichtung medizinischer Bilder am Beispiel intraoraler Radiographien M. Nicola, M. Jarke: Performance Modeling of Distributed and Replicated Databases Ansgar Schleicher, Bernhard Westfechtel, Dirk Jäger: Modeling Dynamic Software Processes in UML W. Appelt, M. Jarke: Interoperable Tools for Cooperation Support using the World Wide Web Klaus Indermark: Semantik rekursiver Funktionsdefinitionen mit Striktheitsinformation Jahresbericht F. Huch: Verifcation of Erlang Programs using Abstract Interpretation and Model Checking Extended Version R. Gallersdörfer, M. Jarke, M. Nicola: The ADR Replication Manager María Alpuente, Michael Hanus, Salvador Lucas, Germán Vidal: Specialization of Functional Logic Programs Based on Needed Narrowing W. Thomas (Ed.): DLT 99 - Developments in Language Theory Fourth International Conference Kai Jakobs, Klaus-Dieter Kleefeld: Informationssysteme für die angewandte historische Geographie Thomas Wilke: CTL+ is exponentially more succinct than CTL Oliver Matz: Dot-Depth and Monadic Quantifier Alternation over Pictures Jahresbericht Jens Vöge, Marcin Jurdzinski: A Discrete Strategy Improvement Algorithm for Solving Parity Games Andreas Becks, Stefan Sklorz, Matthias Jarke: Exploring the Semantic Structure of Technical Document Collections: A Cooperative Systems Approach Mareike Schoop: Cooperative Document Management Mareike Schoop, Christoph Quix (eds.): Proceedings of the Fifth International Workshop on the Language-Action Perspective on Communication Modelling Markus Mohnen, Pieter Koopman (Eds.): Proceedings of the 12th International Workshop of Functional Languages Thomas Arts, Thomas Noll: Verifying Generic Erlang Client-Server Implementations Jahresbericht Benedikt Bollig, Martin Leucker: Deciding LTL over Mazurkiewicz Traces Thierry Cachat: The power of one-letter rational languages 20

21 Benedikt Bollig, Martin Leucker, Michael Weber: Local Parallel Model Checking for the Alternation Free mu-calculus Benedikt Bollig, Martin Leucker, Thomas Noll: Regular MSC Languages Achim Blumensath: Prefix-Recognisable Graphs and Monadic Second- Order Logic Martin Grohe, Stefan Wöhrle: An Existential Locality Theorem Mareike Schoop, James Taylor (eds.): Proceedings of the Sixth International Workshop on the Language-Action Perspective on Communication Modelling Thomas Arts, Jürgen Giesl: A collection of examples for termination of term rewriting using dependency pairs Achim Blumensath: Axiomatising Tree-interpretable Structures Klaus Indermark, Thomas Noll (eds.): Kolloquium Programmiersprachen und Grundlagen der Programmierung Jahresbericht Jürgen Giesl, Aart Middeldorp: Transformation Techniques for Context- Sensitive Rewrite Systems Benedikt Bollig, Martin Leucker, Thomas Noll: Generalised Regular MSC Languages Jürgen Giesl, Aart Middeldorp: Innermost Termination of Context- Sensitive Rewriting Horst Lichter, Thomas von der Maßen, Thomas Weiler: Modelling Requirements and Architectures for Software Product Lines Henry N. Adorna: 3-Party Message Complexity is Better than 2-Party Ones for Proving Lower Bounds on the Size of Minimal Nondeterministic Finite Automata Jörg Dahmen: Invariant Image Object Recognition using Gaussian Mixture Densities Markus Mohnen: An Open Framework for Data-Flow Analysis in Java Markus Mohnen: Interfaces with Default Implementations in Java Martin Leucker: Logics for Mazurkiewicz traces Jürgen Giesl, Hans Zantema: Liveness in Rewriting Jahresbericht Jürgen Giesl, René Thiemann: Size-Change Termination for Term Rewriting Jürgen Giesl, Deepak Kapur: Deciding Inductive Validity of Equations Jürgen Giesl, René Thiemann, Peter Schneider-Kamp, Stephan Falke: Improving Dependency Pairs Christof Löding, Philipp Rohde: Solving the Sabotage Game is PSPACEhard Franz Josef Och: Statistical Machine Translation: From Single-Word Models to Alignment Templates Horst Lichter, Thomas von der Maßen, Alexander Nyßen, Thomas Weiler: Vergleich von Ansätzen zur Feature Modellierung bei der Softwareproduktlinienentwicklung Jürgen Giesl, René Thiemann, Peter Schneider-Kamp, Stephan Falke: Mechanizing Dependency Pairs Fachgruppe Informatik: Jahresbericht

22 Benedikt Bollig, Martin Leucker: Message-Passing Automata are expressively equivalent to EMSO logic Delia Kesner, Femke van Raamsdonk, Joe Wells (eds.): HOR nd International Workshop on Higher-Order Rewriting Slim Abdennadher, Christophe Ringeissen (eds.): RULE 04 Fifth International Workshop on Rule-Based Programming Herbert Kuchen (ed.): WFLP 04 13th International Workshop on Functional and (Constraint) Logic Programming Sergio Antoy, Yoshihito Toyama (eds.): WRS 04 4th International Workshop on Reduction Strategies in Rewriting and Programming Michael Codish, Aart Middeldorp (eds.): WST 04 7th International Workshop on Termination Klaus Indermark, Thomas Noll: Algebraic Correctness Proofs for Compiling Recursive Function Definitions with Strictness Information Joachim Kneis, Daniel Mölle, Stefan Richter, Peter Rossmanith: Parameterized Power Domination Complexity Zinaida Benenson, Felix C. Gärtner, Dogan Kesdogan: Secure Multi- Party Computation with Security Modules Fachgruppe Informatik: Jahresbericht Maximillian Dornseif, Felix C. Gärtner, Thorsten Holz, Martin Mink: An Offensive Approach to Teaching Information Security: Aachen Summer School Applied IT Security Jürgen Giesl, René Thiemann, Peter Schneider-Kamp: Proving and Disproving Termination of Higher-Order Functions Daniel Mölle, Stefan Richter, Peter Rossmanith: A Faster Algorithm for the Steiner Tree Problem Fabien Pouget, Thorsten Holz: A Pointillist Approach for Comparing Honeypots Simon Fischer, Berthold Vöcking: Adaptive Routing with Stale Information Felix C. Freiling, Thorsten Holz, Georg Wicherski: Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of- Service Attacks Joachim Kneis, Peter Rossmanith: A New Satisfiability Algorithm With Applications To Max-Cut Klaus Kursawe, Felix C. Freiling: Byzantine Fault Tolerance on General Hybrid Adversary Structures Benedikt Bollig: Automata and Logics for Message Sequence Charts Simon Fischer, Berthold Vöcking: A Counterexample to the Fully Mixed Nash Equilibrium Conjecture These reports are only available as a printed version. Please contact biblio@informatik.rwth-aachen.de to obtain copies. 22

Toward Low Static Memory Jacobian Accumulation

Toward Low Static Memory Jacobian Accumulation Aachen Department of Computer Science Technical Report Toward Low Static Memory Jacobian Accumulation Ebadollah Varnik, Uwe Naumann and Andrew Lyons ISSN 935 3232 Aachener Informatik Berichte AIB-26-4

More information

Department of Computer Science. Joachim Kneis, Daniel Mölle, Stefan Richter, Peter Rossmanith. ISSN 0935 3232 Aachener Informatik Berichte AIB-2006-06

Department of Computer Science. Joachim Kneis, Daniel Mölle, Stefan Richter, Peter Rossmanith. ISSN 0935 3232 Aachener Informatik Berichte AIB-2006-06 Aachen Department of Computer Science Technical Report Divide-and-Color Joachim Kneis, Daniel Mölle, Stefan Richter, Peter Rossmanith ISSN 0935 3232 Aachener Informatik Berichte AIB-2006-06 RWTH Aachen

More information

Aachen. CD2Alloy: A Translation of Class Diagrams to Alloy. Department of Computer Science. Technical Report

Aachen. CD2Alloy: A Translation of Class Diagrams to Alloy. Department of Computer Science. Technical Report Aachen Department of Computer Science Technical Report CD2Alloy: A Translation of Class Diagrams to Alloy Shahar Maoz and Jan Oliver Ringert and Bernhard Rumpe ISSN 0935 3232 Aachener Informatik-Berichte

More information

Aachen. Toward Adjoint OpenMP. Department of Computer Science. Technical Report. Michael Förster and Uwe Naumann and Jean Utke

Aachen. Toward Adjoint OpenMP. Department of Computer Science. Technical Report. Michael Förster and Uwe Naumann and Jean Utke Aachen Department of Computer Science Technical Report Toward Adjoint OpenMP Michael Förster and Uwe Naumann and Jean Utke ISSN 0935 3232 Aachener Informatik-Berichte AIB-2011-13 RWTH Aachen Department

More information

Aachen. Toward Adjoint OpenFOAM. Department of Computer Science. Technical Report. Niloofar Safiran and Uwe Naumann

Aachen. Toward Adjoint OpenFOAM. Department of Computer Science. Technical Report. Niloofar Safiran and Uwe Naumann Aachen Department of Computer Science Technical Report Toward Adjoint OpenFOAM Niloofar Safiran and Uwe Naumann ISSN 0935 3232 Aachener Informatik-Berichte AIB-2011-16 RWTH Aachen Department of Computer

More information

Aachen. An Operational Semantics for Activity Diagrams using SMV. Department of Computer Science. Technical Report

Aachen. An Operational Semantics for Activity Diagrams using SMV. Department of Computer Science. Technical Report Aachen Department of Computer Science Technical Report An Operational Semantics for Activity Diagrams using SMV Shahar Maoz and Jan Oliver Ringert and Bernhard Rumpe ISSN 0935 3232 Aachener Informatik-Berichte

More information

Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks

Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks Aachen Department of Computer Science Technical Report Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks Alexander Becher, Zinaida Benenson, Maximillian Dornseif ISSN 0935 3232

More information

Aachen. Achieving Highly Reliable Embedded Software: An empirical evaluation of different approaches. Department of Computer Science.

Aachen. Achieving Highly Reliable Embedded Software: An empirical evaluation of different approaches. Department of Computer Science. Aachen Department of Computer Science Technical Report Achieving Highly Reliable Embedded Software: An empirical evaluation of different approaches Falk Salewski and Stefan Kowalewski ISSN 0935 3232 Aachener

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Competitive Analysis of On line Randomized Call Control in Cellular Networks Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

Division of Mathematical Sciences

Division of Mathematical Sciences Division of Mathematical Sciences Chair: Mohammad Ladan, Ph.D. The Division of Mathematical Sciences at Haigazian University includes Computer Science and Mathematics. The Bachelor of Science (B.S.) degree

More information

20 Selfish Load Balancing

20 Selfish Load Balancing 20 Selfish Load Balancing Berthold Vöcking Abstract Suppose that a set of weighted tasks shall be assigned to a set of machines with possibly different speeds such that the load is distributed evenly among

More information

Tight Bounds for Selfish and Greedy Load Balancing

Tight Bounds for Selfish and Greedy Load Balancing Tight Bounds for Selfish and Greedy Load Balancing Ioannis Caragiannis 1, Michele Flammini, Christos Kaklamanis 1, Panagiotis Kanellopoulos 1, and Luca Moscardelli 1 Research Academic Computer Technology

More information

Master s Program in Information Systems

Master s Program in Information Systems The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems

More information

Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks

Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks Aachen Department of Computer Science Technical Report Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks Felix C. Freiling and Thorsten Holz and Georg

More information

Software Modeling and Verification

Software Modeling and Verification Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system

More information

Static Program Transformations for Efficient Software Model Checking

Static Program Transformations for Efficient Software Model Checking Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

Functional Programming. Functional Programming Languages. Chapter 14. Introduction

Functional Programming. Functional Programming Languages. Chapter 14. Introduction Functional Programming Languages Chapter 14 Introduction Functional programming paradigm History Features and concepts Examples: Lisp ML 1 2 Functional Programming Functional Programming Languages The

More information

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008

Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008 Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report

More information

The countdown problem

The countdown problem JFP 12 (6): 609 616, November 2002. c 2002 Cambridge University Press DOI: 10.1017/S0956796801004300 Printed in the United Kingdom 609 F U N C T I O N A L P E A R L The countdown problem GRAHAM HUTTON

More information

IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS

IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS Volume 2, No. 3, March 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE

More information

Course Syllabus For Operations Management. Management Information Systems

Course Syllabus For Operations Management. Management Information Systems For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third

More information

Software Construction

Software Construction Software Construction Staff Faculty: Univ.-Prof. Dr. rer. nat. Horst Lichter lichter@informatik.rwth-aachen.de Secretary: Bärbel Kronewetter Phone: +49 241 80 21 330 Fax: +49 241 80 22 352 Research Assistants:

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2015/6 - August 2015 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

School of Computer Science

School of Computer Science Computer Science Honours Level 2013/14 August 2013 School of Computer Science Computer Science (CS) Modules CS3051 Software Engineering SCOTCAT Credits: 15 SCQF Level 9 Semester: 1 This module gives a

More information

Object-Oriented Software Specification in Programming Language Design and Implementation

Object-Oriented Software Specification in Programming Language Design and Implementation Object-Oriented Software Specification in Programming Language Design and Implementation Barrett R. Bryant and Viswanathan Vaidyanathan Department of Computer and Information Sciences University of Alabama

More information

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University

More information

CSCI 3136 Principles of Programming Languages

CSCI 3136 Principles of Programming Languages CSCI 3136 Principles of Programming Languages Faculty of Computer Science Dalhousie University Winter 2013 CSCI 3136 Principles of Programming Languages Faculty of Computer Science Dalhousie University

More information

Software Engineering

Software Engineering Software Engineering Lecture 06: Design an Overview Peter Thiemann University of Freiburg, Germany SS 2013 Peter Thiemann (Univ. Freiburg) Software Engineering SWT 1 / 35 The Design Phase Programming in

More information

A Knowledge-based Product Derivation Process and some Ideas how to Integrate Product Development

A Knowledge-based Product Derivation Process and some Ideas how to Integrate Product Development A Knowledge-based Product Derivation Process and some Ideas how to Integrate Product Development (Position paper) Lothar Hotz and Andreas Günter HITeC c/o Fachbereich Informatik Universität Hamburg Hamburg,

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries

Bachelor of Games and Virtual Worlds (Programming) Subject and Course Summaries First Semester Development 1A On completion of this subject students will be able to apply basic programming and problem solving skills in a 3 rd generation object-oriented programming language (such as

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Datavetenskapligt Program (kandidat) Computer Science Programme (master)

Datavetenskapligt Program (kandidat) Computer Science Programme (master) Datavetenskapligt Program (kandidat) Computer Science Programme (master) Wolfgang Ahrendt Director Datavetenskap (BSc), Computer Science (MSc) D&IT Göteborg University, 30/01/2009 Part I D&IT: Computer

More information

INFORMATION TECHNOLOGY PROGRAM

INFORMATION TECHNOLOGY PROGRAM INFORMATION TECHNOLOGY PROGRAM The School of Information Technology offers a two-year bachelor degree program in Information Technology for students having acquired an advanced vocational certificate.

More information

FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES

FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY AUTUMN 2016 BACHELOR COURSES FACULTY OF COMPUTER SCIENCE AND INFORMATION TECHNOLOGY Please note! This is a preliminary list of courses for the study year 2016/2017. Changes may occur! AUTUMN 2016 BACHELOR COURSES DIP217 Applied Software

More information

Programming Language Pragmatics

Programming Language Pragmatics Programming Language Pragmatics THIRD EDITION Michael L. Scott Department of Computer Science University of Rochester ^ШШШШШ AMSTERDAM BOSTON HEIDELBERG LONDON, '-*i» ЩЛ< ^ ' m H NEW YORK «OXFORD «PARIS»SAN

More information

How Asymmetry Helps Load Balancing

How Asymmetry Helps Load Balancing How Asymmetry Helps oad Balancing Berthold Vöcking nternational Computer Science nstitute Berkeley, CA 947041198 voecking@icsiberkeleyedu Abstract This paper deals with balls and bins processes related

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

Lecture 1: Introduction

Lecture 1: Introduction Programming Languages Lecture 1: Introduction Benjamin J. Keller Department of Computer Science, Virginia Tech Programming Languages Lecture 1 Introduction 2 Lecture Outline Preview History of Programming

More information

Programming Languages

Programming Languages Programming Languages Qing Yi Course web site: www.cs.utsa.edu/~qingyi/cs3723 cs3723 1 A little about myself Qing Yi Ph.D. Rice University, USA. Assistant Professor, Department of Computer Science Office:

More information

Dynamic Project and Workflow Management for Design Processes in Chemical Engineering

Dynamic Project and Workflow Management for Design Processes in Chemical Engineering Dynamic Project and Workflow Management for Design Processes in Chemical Engineering Markus Heller, Bernhard Westfechtel Computer Science III, RWTH Aachen, D-52056 Aachen, Germany Abstract Design processes

More information

ML for the Working Programmer

ML for the Working Programmer ML for the Working Programmer 2nd edition Lawrence C. Paulson University of Cambridge CAMBRIDGE UNIVERSITY PRESS CONTENTS Preface to the Second Edition Preface xiii xv 1 Standard ML 1 Functional Programming

More information

Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track)

Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track) Plan Number 2009 Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track) I. General Rules and Conditions 1. This plan conforms to the regulations of the general frame of programs

More information

2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce

2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce 2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge

More information

Algebraic Recognizability of Languages

Algebraic Recognizability of Languages of Languages LaBRI, Université Bordeaux-1 and CNRS MFCS Conference, Prague, August 2004 The general problem Problem: to specify and analyse infinite sets by finite means The general problem Problem: to

More information

Simulation-Based Security with Inexhaustible Interactive Turing Machines

Simulation-Based Security with Inexhaustible Interactive Turing Machines Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany kuesters@ti.informatik.uni-kiel.de

More information

Information and Communications Technology Courses at a Glance

Information and Communications Technology Courses at a Glance Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer

More information

Tool Support for Inspecting the Code Quality of HPC Applications

Tool Support for Inspecting the Code Quality of HPC Applications Tool Support for Inspecting the Code Quality of HPC Applications Thomas Panas Dan Quinlan Richard Vuduc Center for Applied Scientific Computing Lawrence Livermore National Laboratory P.O. Box 808, L-550

More information

Software Verification: Infinite-State Model Checking and Static Program

Software Verification: Infinite-State Model Checking and Static Program Software Verification: Infinite-State Model Checking and Static Program Analysis Dagstuhl Seminar 06081 February 19 24, 2006 Parosh Abdulla 1, Ahmed Bouajjani 2, and Markus Müller-Olm 3 1 Uppsala Universitet,

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection

Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Martin Leucker Technische Universität München (joint work with Andreas Bauer, Christian Schallhart et. al) FLACOS

More information

Load Balancing In Concurrent Parallel Applications

Load Balancing In Concurrent Parallel Applications Load Balancing In Concurrent Parallel Applications Jeff Figler Rochester Institute of Technology Computer Engineering Department Rochester, New York 14623 May 1999 Abstract A parallel concurrent application

More information

Opus: University of Bath Online Publication Store http://opus.bath.ac.uk/

Opus: University of Bath Online Publication Store http://opus.bath.ac.uk/ England, M. (2014) Formulating problems for real algebraic geometry. In: UNSPECIFIED. Link to official URL (if available): Opus: University of Bath Online Publication Store http://opus.bath.ac.uk/ This

More information

Lecture 03 (04.11.2013) Quality of the Software Development Process

Lecture 03 (04.11.2013) Quality of the Software Development Process Systeme hoher Qualität und Sicherheit Universität Bremen, WS 2013/14 Lecture 03 (04.11.2013) Quality of the Software Development Process Christoph Lüth Christian Liguda Your Daily Menu Models of Software

More information

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53

Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53 Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software

More information

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma

CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are

More information

Principles of Distributed Database Systems

Principles of Distributed Database Systems M. Tamer Özsu Patrick Valduriez Principles of Distributed Database Systems Third Edition

More information

Mediated Equilibria in Load-Balancing Games

Mediated Equilibria in Load-Balancing Games Mediated Equilibria in Load-Balancing Games Joshua R. Davis, David Liben-Nowell, Alexa Sharp, and Tom Wexler Carleton College; Northfield, MN Oberlin College; Oberlin, OH joshuadavis@q.com, dlibenno@carleton.edu,

More information

A Pattern-Based Method for Identifying and Analyzing Laws

A Pattern-Based Method for Identifying and Analyzing Laws A Pattern-Based Method for Identifying and Analyzing Laws Kristian Beckers, Stephan Faßbender, Jan-Christoph Küster, and Holger Schmidt paluno - The Ruhr Institute for Software Technology University of

More information

Structure of Presentation. The Role of Programming in Informatics Curricula. Concepts of Informatics 2. Concepts of Informatics 1

Structure of Presentation. The Role of Programming in Informatics Curricula. Concepts of Informatics 2. Concepts of Informatics 1 The Role of Programming in Informatics Curricula A. J. Cowling Department of Computer Science University of Sheffield Structure of Presentation Introduction The problem, and the key concepts. Dimensions

More information

StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java

StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java Jesús Mauricio Chimento 1, Wolfgang Ahrendt 1, Gordon J. Pace 2, and Gerardo Schneider 3 1 Chalmers University of Technology, Sweden.

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Demonstration of an Automated Integrated Test Environment for Web-based Applications

Demonstration of an Automated Integrated Test Environment for Web-based Applications Demonstration of an Automated Integrated Test Environment for Web-based Applications Tiziana Margaria 1,2, Oliver Niese 2, and Bernhard Steffen 2 1 METAFrame Technologies GmbH, Dortmund, Germany TMargaria@METAFrame.de

More information

Physical Design in OODBMS

Physical Design in OODBMS 1 Physical Design in OODBMS Dieter Gluche and Marc H. Scholl University of Konstanz Department of Mathematics and Computer Science P.O.Box 5560/D188, D-78434 Konstanz, Germany E-mail: {Dieter.Gluche, Marc.Scholl}@Uni-Konstanz.de

More information

1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2

1 Business Modeling. 1.1 Event-driven Process Chain (EPC) Seite 2 Business Process Modeling with EPC and UML Transformation or Integration? Dr. Markus Nüttgens, Dipl.-Inform. Thomas Feld, Dipl.-Kfm. Volker Zimmermann Institut für Wirtschaftsinformatik (IWi), Universität

More information

Offline sorting buffers on Line

Offline sorting buffers on Line Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com

More information

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses

Core Courses Seminar (0-2) Non-credit Ph.D. Thesis (0-1) Non-credit Special Studies (8-0) Non-credit. Elective Courses İZMİR INSTITUTE OF TECHNOLOGY GRADUATE SCHOOL OF ENGINEERING AND SCIENCES DEPARTMENT OF COMPUTER ENGINEERING JOINT DOCTORAL PROGRAM IN COMPUTER SCIENCE AND ENGINEERING Core Courses CENG 590 CENG 600 CENG

More information

[Refer Slide Time: 05:10]

[Refer Slide Time: 05:10] Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture

More information

Testing LTL Formula Translation into Büchi Automata

Testing LTL Formula Translation into Büchi Automata Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland

More information

LONG BEACH CITY COLLEGE MEMORANDUM

LONG BEACH CITY COLLEGE MEMORANDUM LONG BEACH CITY COLLEGE MEMORANDUM DATE: May 5, 2000 TO: Academic Senate Equivalency Committee FROM: John Hugunin Department Head for CBIS SUBJECT: Equivalency statement for Computer Science Instructor

More information

Aachen. Syntax-Directed Derivative Code (Part I: Tangent-Linear Code) Department of Computer Science. Technical Report.

Aachen. Syntax-Directed Derivative Code (Part I: Tangent-Linear Code) Department of Computer Science. Technical Report. Aachen Department of Computer Science Technical Report Syntax-Directed Derivative Code (Part I: Tangent-Linear Code) Uwe Naumann ISSN 0935 3232 Aachener Informatik Berichte AIB-2005-16 RWTH Aachen Department

More information

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets

Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets 9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)

More information

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce

Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Assessment Plan for CS and CIS Degree Programs Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge of Computer Science

More information

Computer Science MS Course Descriptions

Computer Science MS Course Descriptions Computer Science MS Course Descriptions CSc I0400: Operating Systems Underlying theoretical structure of operating systems; input-output and storage systems, data management and processing; assembly and

More information

From Business Process Modeling to the Specification of Distributed Business Application Systems - An Object-Oriented Approach -

From Business Process Modeling to the Specification of Distributed Business Application Systems - An Object-Oriented Approach - From Business Process Modeling to the Specification of Distributed Business Application Systems - An Object-Oriented Approach - Otto K. Ferstl, Elmar J. Sinz 1 Abstract A business application system is

More information

Curriculum Vitae of. Vicky G. Papadopoulou

Curriculum Vitae of. Vicky G. Papadopoulou Curriculum Vitae of Vicky G. Papadopoulou Personal Information Full Name: Vicky G. Papadopoulou Home Address: Odysseos 23, Strovolos, PO Box 2040, Nicosia, Cyprus Phones: Office: +357 22 713046 Email:

More information

2 nd UML 2 Semantics Symposium: Formal Semantics for UML

2 nd UML 2 Semantics Symposium: Formal Semantics for UML 2 nd UML 2 Semantics Symposium: Formal Semantics for UML Manfred Broy 1, Michelle L. Crane 2, Juergen Dingel 2, Alan Hartman 3, Bernhard Rumpe 4, and Bran Selic 5 1 Technische Universität München, Germany

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines

An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines This is the Pre-Published Version. An improved on-line algorithm for scheduling on two unrestrictive parallel batch processing machines Q.Q. Nong, T.C.E. Cheng, C.T. Ng Department of Mathematics, Ocean

More information

Chapter 1. Dr. Chris Irwin Davis Email: cid021000@utdallas.edu Phone: (972) 883-3574 Office: ECSS 4.705. CS-4337 Organization of Programming Languages

Chapter 1. Dr. Chris Irwin Davis Email: cid021000@utdallas.edu Phone: (972) 883-3574 Office: ECSS 4.705. CS-4337 Organization of Programming Languages Chapter 1 CS-4337 Organization of Programming Languages Dr. Chris Irwin Davis Email: cid021000@utdallas.edu Phone: (972) 883-3574 Office: ECSS 4.705 Chapter 1 Topics Reasons for Studying Concepts of Programming

More information

The Software Development Process

The Software Development Process Systeme hoher Qualität und Sicherheit Universität Bremen WS 2015/2016 Lecture 03 (26.10.2015) The Software Development Process Christoph Lüth Jan Peleska Dieter Hutter Your Daily Menu Models of software

More information

Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications

Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Sayantan Das Prasenjit Basu Ansuman Banerjee Pallab Dasgupta P.P. Chakrabarti Department of Computer Science & Engineering

More information

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Please consult the Department of Engineering about the Computer Engineering Emphasis. COMPUTER SCIENCE Computer science is a dynamically growing discipline. ABOUT THE PROGRAM The Department of Computer Science is committed to providing students with a program that includes the basic fundamentals

More information

A Case Study on Model-Driven and Conventional Software Development: The Palladio Editor

A Case Study on Model-Driven and Conventional Software Development: The Palladio Editor A Case Study on Model-Driven and Conventional Software Development: The Palladio Editor Klaus Krogmann, Steffen Becker University of Karlsruhe (TH) {krogmann, sbecker}@ipd.uka.de Abstract: The actual benefits

More information

Computational Game Theory and Clustering

Computational Game Theory and Clustering Computational Game Theory and Clustering Martin Hoefer mhoefer@mpi-inf.mpg.de 1 Computational Game Theory? 2 Complexity and Computation of Equilibrium 3 Bounding Inefficiencies 4 Conclusion Computational

More information

Network Security Validation Using Game Theory

Network Security Validation Using Game Theory Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy

More information

Modular Communication Infrastructure Design with Quality of Service

Modular Communication Infrastructure Design with Quality of Service Modular Communication Infrastructure Design with Quality of Service Pawel Wojciechowski and Péter Urbán Distributed Systems Laboratory School of Computer and Communication Sciences Swiss Federal Institute

More information

MetaGame: An Animation Tool for Model-Checking Games

MetaGame: An Animation Tool for Model-Checking Games MetaGame: An Animation Tool for Model-Checking Games Markus Müller-Olm 1 and Haiseung Yoo 2 1 FernUniversität in Hagen, Fachbereich Informatik, LG PI 5 Universitätsstr. 1, 58097 Hagen, Germany mmo@ls5.informatik.uni-dortmund.de

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

InvGen: An Efficient Invariant Generator

InvGen: An Efficient Invariant Generator InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPI-SWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic

More information

Principles of integrated software development environments. Learning Objectives. Context: Software Process (e.g. USDP or RUP)

Principles of integrated software development environments. Learning Objectives. Context: Software Process (e.g. USDP or RUP) Principles of integrated software development environments Wolfgang Emmerich Professor of Distributed Computing University College London http://sse.cs.ucl.ac.uk Learning Objectives Be able to define the

More information

A Practical Scheme for Wireless Network Operation

A Practical Scheme for Wireless Network Operation A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving

More information