Debugging Prolog Programs. Contents The basic Prolog debugger Tracing program execution Spying on problem predicates
|
|
- Kelly Jefferson
- 8 years ago
- Views:
Transcription
1 Debugging Prolog Programs Prof. Geraint A. Wiggins Centre for Cognition, Computation and Culture Goldsmiths College, University of London Contents The basic Prolog debugger Tracing program execution Spying on problem predicates
2 The basic Prolog debugger When programs go wrong we need a means of working out why One way to do this is to analyse the logic of the program (declarative debugging) Declarative debugging is a relatively new area, and we do not yet have the technology to do it really well Another way is to look at its procedural behaviour This is less helpful, but relatively easy to do Goldsmiths College, University of London 2
3 The basic Prolog debugger (2) To use the debugger, we need SICStus, with our program loaded; a copy of the program, on paper or on screen; a clear idea of what the program is supposed to do; an example query, for which the program does not exhibit the correct behaviour To switch on the basic debugger, use the command?- trace. To switch it off again, use?- notrace. Goldsmiths College, University of London 3
4 The basic Prolog debugger (3) Once the debugger is switched on, any query you ask of Prolog will be explained as it is proven We think of each predicate in a program as having four ways in and out, or ports. These are: Call where control goes in on the first attempt to prove a goal; Succeed where control comes out when the goal succeeds; Retry where control goes in on subsequent attempts to prove a goal (ie after backtracking) Fail where control comes out when the goal fails. Some systems define a further port: Exception where control comes out on an error (eg instantiation error). Goldsmiths College, University of London 4
5 Tracing program execution The Prolog debugger will now stop and tell us what it is doing, each time it passes a port. For example:?- trace. {The debugger will first creep -- showing everything (trace)} yes {trace}?- append( [a], [b], X ). 1 1 Call: append([a],[b], 89)? 2 2 Call: append([],[b], 355)? 2 2 Exit: append([],[b],[b])? 1 1 Exit: append([a],[b],[a,b])? X = [a,b]? yes {trace}?- Goldsmiths College, University of London 5
6 Tracing program execution (2) {trace}?- append( X, Y, [a] ). 1 1 Call: append( 69, 83,[a])? 1 1 Exit: append([],[a],[a])? X = [], Y = [a]? ; 1 1 Redo: append([],[a],[a])? 2 2 Call: append( 365, 83,[])? 2 2 Exit: append([],[],[])? 1 1 Exit: append([a],[],[a])? X = [a], Y = []? ; 1 1 Redo: append([a],[],[a])? 2 2 Redo: append([],[],[])? 2 2 Fail: append( 365, 83,[])? 1 1 Fail: append( 69, 83,[a])? no Goldsmiths College, University of London 6
7 Tracing program execution (3) The main components of the trace output are: 2 2 Call: append( 365, 83,[])? Invocation number an identification number which is unique to this invocation of a predicate; Current depth an indication of how deep the proof process has gone; Port indictor tells us which port we are at; Current goal tells us the current goal and its instantiation; Prompt asks for what to do next. Goldsmiths College, University of London 7
8 Tracing program execution (4) There are several useful options to apply (mostly single character commands): c Creep (also carriage return) take one proof step to the next port; s Skip jump to the next exit port (Succeed or Fail) from this invocation of this predicate; a Abort drop out of execution and return to the Prolog prompt; n Nodebug switch off tracing and proceed as for normal execution; r Retry go back to the call whose invocation number is given? Help print out a list of available commands. Note that some commands (eg Skip) only make sense at some ports (eg input ports), and so will not work at others. Goldsmiths College, University of London 8
9 Spying on problem predicates In large programs, it is often not feasible to trace all the way through to an error Often, we have a clear idea of which predicate is going wrong, so we want to go straight to it, even in small programs To do this, we use spy points We can set the debugger to wait until it encounters a spy point in the program, and then it will switch on. Goldsmiths College, University of London 9
10 Spying on problem predicates (2) Example: append( [], L, L ). append( [H T], L, [H Z] ) :- append( T, L, Z ). test( X, XX ) :- append( X, X, XX ). Here, we can set a spy point on append/3:?- spy( append ). {The debugger will first leap -- showing spypoints (debug)} {Spypoint placed on user:append/3} yes {debug}?- Goldsmiths College, University of London 10
11 Spying on problem predicates (2) {debug}?- test( X, [a,b,c,d,e,f] ) Call: append( 69, 69,[a, 91,c, 111,e, 131])? Call: append( 471,[a 471],[ 91,c, 111,e, 131])? Call: append( 676,[a, ],[c, 111,e, 131])? Call: append( 881,[a, 91,c 881],[ 111,e, 131])? Exit: append([],[a,e,c],[a,e,c])? Exit: append([c],[a,e,c],[c,a,e,c])? Exit: append([e,c],[a,e,c],[e,c,a,e,c])? Exit: append([a,e,c],[a,e,c],[a,e,c,a,e,c])? 1 1 Exit: test([a,e,c],[a,e,c,a,e,c])? B = e, D = a, F = c, X = [a,e,c]? + means there is a spy point here Goldsmiths College, University of London 11
12 Spying on problem predicates (3) The same commands as before work in debug mode, plus l Leap switch off the debugger until the next spy point is found; + Add spypoint to the current predicate; - Remove spypoint from the current predicate. It is possible to choose which debug ports stop the execution, using the leash/1 predicate. See the manual for details. Goldsmiths College, University of London 12
simplicity hides complexity
flow of control backtracking reasoning in logic and in Prolog 1 simplicity hides complexity simple and/or connections of goals conceal very complex control patterns Prolog programs are not easily represented
More informationThe ProB Animator and Model Checker for B
The ProB Animator and Model Checker for B A Tool Description Michael Leuschel and Michael Butler Department of Electronics and Computer Science University of Southampton Highfield, Southampton, SO17 1BJ,
More informationHermes.Net IVR Designer Page 2 36
Hermes.Net IVR Designer Page 2 36 Summary 1. Introduction 4 1.1 IVR Features 4 2. The interface 5 2.1 Description of the Interface 6 2.1.1 Menus. Provides 6 2.1.2 Commands for IVR editions. 6 2.1.3 Commands
More informationIntroduction: Implementation of the MVI56-MCM module for modbus communications:
Introduction: Implementation of the MVI56-MCM module for modbus communications: Initial configuration of the module should be done using the sample ladder file for the mvi56mcm module. This can be obtained
More informationFrom Release 8.0, IPv6 can also be used to configure the LDAP server on the controller.
Information About LDAP, page 1 (GUI), page 2 (CLI), page 4 Information About LDAP An LDAP backend database allows the controller to query an LDAP server for the credentials (username and password) of a
More informationDebugging Network Communications. 1 Check the Network Cabling
Debugging Network Communications Situation: you have a computer and your NetBurner device on a network, but you cannot communicate between the two. This application note provides a set of debugging steps
More informationOverview. NetBorder Express Loggers Configuration Guide
Overview The Gateway service includes a powerful logging framework to enable you to control the logging of events. This document contains information about logging, including the following key topics:
More informationFile Transfer Protocols In Anzio
The New File Transfer Protocols in Anzio version 12.6 What s New in Version 12.6 With the release of Anzio Lite and AnzioWin version 12.6 we are introducing a new user interface and support for additional
More informationSystem Administration Commands nslookup ( 1M )
NAME nslookup query name servers interactively SYNOPSIS nslookup [ option]... host [server] nslookup [ option]... - [server] nslookup DESCRIPTION nslookup sends queries to Internet domain name servers.
More informationAutomatic Scheduling Using AutoTrack Command Line Options
Automatic Scheduling Using AutoTrack Command Line Options Applies to AutoTrack and AutoTrack Pro v3.1.11 and higher A feature added in v3.1.11 allows you to use Command line options to set AutoTrack to
More informationA Program for PCB Estimation with Altium Designer
A Program for PCB Estimation with Altium Designer By: Steve Hageman AnalogHome.com One thing that I have had to do over and over on my new PCB jobs is to make an estimate of how long I think the layout
More informationVerizon Wireless Field Force Manager. Windows Mobile Devices
Verizon Wireless Field Force Manager User Guide for Windows Mobile Devices Verizon Wireless Field Force Manager User Guide for Windows Mobile Devices Table of Contents Application Requirements...3 Windows
More informationThe structured application of advanced logging techniques for SystemVerilog testbench debug and analysis. By Bindesh Patel and Amanda Hsiao.
Logging makes sense for testbench debug The structured application of advanced logging techniques for SystemVerilog testbench debug and analysis. By Bindesh Patel and Amanda Hsiao. SystemVerilog provides
More informationProlog A Tutorial Introduction James Lu Jerud J. Mead
Prolog A Tutorial Introduction James Lu Jerud J. Mead Computer Science Department Bucknell University Lewisburg, PA 17387 1 Contents 1 Introduction 1 2 Easing into Prolog 2 2.1 Logic Programming.........................................
More informationWeek 2 Practical Objects and Turtles
Week 2 Practical Objects and Turtles Aims and Objectives Your aim in this practical is: to practise the creation and use of objects in Java By the end of this practical you should be able to: create objects
More informationComparing RTOS to Infinite Loop Designs
Comparing RTOS to Infinite Loop Designs If you compare the way software is developed for a small to medium sized embedded project using a Real Time Operating System (RTOS) versus a traditional infinite
More informationHow to Use YouTube Ads to Grow Your Business
How to Use YouTube Ads to Grow Your Business The different kinds of YouTube ads In broad terms there are two kinds of YouTube Ads: skippable ads and non-skippable ads. Non-skippable ads are ads that force
More informationList of FTP commands for the Microsoft command-line FTP client
You are on the nsftools.com site This is a list of the commands available when using the Microsoft Windows command-line FTP client (requires TCP/IP to be installed). All information is from the Windows
More informationResearch Data Management CODING
CODING Coding When writing software or analytical code it is important that others and your future self can understand what the code is doing. published 10 steps that they regard as the Best Practices
More informationSYMETRIX SOLUTIONS: TECH TIP August 2015
String Output Modules The purpose of this document is to provide an understanding of operation and configuration of the two different String Output modules available within SymNet Composer. The two different
More informationFor Introduction to Java Programming, 5E By Y. Daniel Liang
Supplement H: NetBeans Tutorial For Introduction to Java Programming, 5E By Y. Daniel Liang This supplement covers the following topics: Getting Started with NetBeans Creating a Project Creating, Mounting,
More informationExSched: Solving Constraint Satisfaction Problems with the Spreadsheet Paradigm
ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet Paradigm Siddharth Chitnis, Madhu Yennamani, Gopal Gupta Department of Computer Science The University of Texas at Dallas Richardson,
More informationCode::Blocks Student Manual
Code::Blocks Student Manual Lawrence Goetz, Network Administrator Yedidyah Langsam, Professor and Theodore Raphan, Distinguished Professor Dept. of Computer and Information Science Brooklyn College of
More informationRelease Notes. R&S ZVH4/ZVH8 Cable and Antenna Analyzer
Release Notes Revision: 01 R&S ZVH4/ZVH8 Cable and Antenna Analyzer Firmware Release V1.50 These Release Notes describe the following models and options of the R&S Cable and Antenna Analyzer: R&S Cable
More information15-150 Lecture 11: Tail Recursion; Continuations
15-150 Lecture 11: Tail Recursion; Continuations Lecture by Dan Licata February 21, 2011 In this lecture we will discuss space usage: analyzing the memory it takes your program to run tail calls and tail
More informationOutline. 1 Denitions. 2 Principles. 4 Implementation and Evaluation. 5 Debugging. 6 References
Outline Computer Science 331 Introduction to Testing of Programs Mike Jacobson Department of Computer Science University of Calgary Lecture #3-4 1 Denitions 2 3 4 Implementation and Evaluation 5 Debugging
More informationExSched: Solving Constraint Satisfaction Problems with the Spreadsheet Paradigm
ExSched: Solving Constraint Satisfaction Problems with the Spreadsheet Paradigm Siddharth Chitnis, Madhu Yennamani, Gopal Gupta Department of Computer Science The University of Texas at Dallas Richardson,
More informationHow to test and debug an ASP.NET application
Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult
More informationHypercosm. Studio. www.hypercosm.com
Hypercosm Studio www.hypercosm.com Hypercosm Studio Guide 3 Revision: November 2005 Copyright 2005 Hypercosm LLC All rights reserved. Hypercosm, OMAR, Hypercosm 3D Player, and Hypercosm Studio are trademarks
More informationmdata from Mobile Commons enables organizations to make any data accessible to the public via text message, no programming required.
mdata Web Services mdata from Mobile Commons enables organizations to make any data accessible to the public via text message, no programming required. How it Works 1. A user sends a text message with
More informationWikto how does it work and how do I use it?
Wikto how does it work and how do I use it? Introduction This document describes how to use Wikto to quickly and easily perform web server assessments. Before we start we need to know what Wikto does and
More informationOutline. Architecture of Web Applications. Example Web Application. Black Box Testing. Testing a Web Database Application
Outline AutoDBT: A Framework for Automatic Testing of Web Database Applications Lihua Ran, Curtis Dyreson, Anneliese Andrews School of E.E. and Computer Science Washington State University USA Two approaches
More informationFirewallTM. isecurity. Out-of-the Box. The Network Security Component of. Version 15. Copyright Raz-Lee Security Ltd.
FirewallTM The Network Security Component of isecurity Out-of-the Box Version 15 Copyright Raz-Lee Security Ltd. Updated: 02/09/2011 This guide is intended to provide as a quick beginning to the principal
More informationRMAN What is Rman Why use Rman Understanding The Rman Architecture Taking Backup in Non archive Backup Mode Taking Backup in archive Mode
RMAN - What is Rman - Why use Rman - Understanding The Rman Architecture - Taking Backup in Non archive Backup Mode - Taking Backup in archive Mode - Enhancement in 10g For Rman - 9i Enhancement For Rman
More informationPostgreSQL Concurrency Issues
PostgreSQL Concurrency Issues 1 PostgreSQL Concurrency Issues Tom Lane Red Hat Database Group Red Hat, Inc. PostgreSQL Concurrency Issues 2 Introduction What I want to tell you about today: How PostgreSQL
More information[Refer Slide Time: 05:10]
Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture
More informationPRN_LOAD 17.04.2002 16:22
PRN_LOAD.EXE is a user-friendly program for loading the HPR4915 with new firmware or fonts. It is based on the DOS operating system and also runs under WIN 95/89/NT WIN2000 WIN ME WIN XP and OS/2. However,
More informationHow To Develop Software
Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which
More informationNHSmail mobile configuration guide NotifySync V4.7 for Blackberry
Only devices running NotifySync version 4.7 support encryption at rest NHSmail mobile configuration guide NotifySync V4.7 for Blackberry Version: V.4 Date: March 2011 THIS INFORMATION IS FOR NHS STAFF
More informationIntegration for X-Tools and X32
Integration for X-Tools and X32 TRACE32 Online Help TRACE32 Directory TRACE32 Index TRACE32 Documents... 3rd Party Tool Integrations... Integration for X-Tools and X32... 1 Overview... 2 Brief Overview
More informationSQL Injection Protection by Variable Normalization of SQL Statement
Page 1 of 9 SQL Injection Protection by Variable Normalization of SQL Statement by: Sam M.S. NG, 0 http://www.securitydocs.com/library/3388 "Make everything as simple as possible, but not simpler." --
More informationDIRECT PAYMENTS (ACH TRANSFER MODULE)
DIRECT PAYMENTS (ACH TRANSFER MODULE) Direct payments is an add on module to utility billing that allows customers to pay their utility bill by a recur ACH payment. Please note that the term ACH (Automatic
More informationLatency Monitoring Tool on Cisco Nexus Switches: Troubleshoot Network Latency
White Paper Latency Monitoring Tool on Cisco Nexus Switches: Troubleshoot Network Latency Introduction Networks often encounter problems related to latency. Troubleshooting such problems can be complicated.
More information(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
More informationModule 3: Functional Requirements
smart BA Distance Learning Programme Module 3: Functional Requirements Hello and welcome to the smart BA distance learning programme Module 3 in this module you are going to analyse the requirements of
More informationOfficeServ Link. User Guide. Version 2.1 June 2005
OfficeServ Link User Guide Version 2.1 June 2005 OfficeServ Link Version 2.1 User Guide This manual should be read before the installation and operation of the OfficeServ Link Software. COPYRIGHT This
More informationVolume AGKSOFT. Wayne Nucleus Back Office Software. Nucleus Guide
Volume N AGKSOFT Wayne Nucleus Back Office Software Nucleus Guide Configuring Your Back Office PC The Back Office PC requires 2 network cards to connect to the Nucleus & internet at the same time. On some
More informationLab 3.1.2 Creating a Logical Network Diagram
Lab 3.1.2 Creating a Logical Network Diagram Objectives Use router and switch commands to obtain information about an existing network. Use Cisco Network Assistant to obtain information about an existing
More informationComp 255Q - 1M: Computer Organization Lab #3 - Machine Language Programs for the PDP-8
Comp 255Q - 1M: Computer Organization Lab #3 - Machine Language Programs for the PDP-8 January 22, 2013 Name: Grade /10 Introduction: In this lab you will write, test, and execute a number of simple PDP-8
More informationASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER
ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER Pierre A. von Kaenel Mathematics and Computer Science Department Skidmore College Saratoga Springs, NY 12866 (518) 580-5292 pvonk@skidmore.edu ABSTRACT This paper
More informationNUM INFORMATION US N 111 1/9
US N 111 1/9 Procedure: 10xx Series CNC Backup/Restore Procedures using NUMCOM Scope: The NUM 10xx Series CNC system has essential application specific files stored in various locations within the system.
More informationOpenTSP Driver Description
OfficeServ OpenTSP Driver Description Ed. 00 9. 2003. COPYRIGHT This manual is proprietary to SAMSUNG Electronics Co., Ltd. and is protected by copyright. No information contained herein may be copied,
More informationThe New ABAP Debugger - An Introduction. Boris Gebhardt Christoph Stoeck SAP AG
The New ABAP Debugger - An Introduction Boris Gebhardt Christoph Stoeck SAP AG 1 Content Motivation & Goals Two Process Architecture Starting The New Debugger New Debugger UI Main Parts Customize The New
More informationPCLinq2 Hi-Speed USB Bridge-Network Cable. Quick Network Setup Guide
PCLinq2 Hi-Speed USB Bridge-Network Cable Congratulations! Quick Network Setup Guide For Windows 98/ME/2000/XP Congratulations for installing the PCLinq2 Hi-Speed USB Bridge-Network Cable. This Quick Network
More informationEmail Configuration Network Management Card-2
Email Configuration Network Management Card-2 AP9630, AP9631 and 2GrPDUs(AP8XXX) Email Overview The NMC can be configured to send email to up to four recipients when it encounters a problem or event selected
More informationGlobal Monitoring + Support
Use HyperTerminal to access your Global Monitoring Units View and edit configuration settings View live data Download recorded data for use in Excel and other applications HyperTerminal is one of many
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
More informationDiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
More informationMonitoring the team s performance
Monitoring the team s performance Why does your team need to be monitored? How can performance be monitored? You should ensure that you monitor only what is really important. In the two BS2 sessions Making
More informationSetting up the Swann HD IP cameras
Setting up the Swann HD IP cameras Connecting the cameras to the network The Swann IP cameras are connected to the network with Category 5/5E/6 cables. The cameras feature Power over Ethernet for ease
More informationHow to Install SMTPSwith Mailer on Centos Server/VPS
How to Install SMTPSwith Mailer on Centos Server/VPS SMTPSwitch Mailer User Guide V4.0 SMTPSwitch Mailer is a web based email marketing software that runs on a web server or online server. An online server
More informationRunning a Program on an AVD
Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run
More informationPPM Users Manual Signature Software 01-12-00
PPM Users Manual Signature Software 0-2-00 PPM User Manual /8/02 Software Versions: 0.0.27 Contents. Introduction 2 2. Parameters 3 2. Overload Limit...4 2.2 Relative Upper Limit...4 2.3 Relative Lower
More informationSerialMailer Manual. For SerialMailer 7.2. Copyright 2010-2011 Falko Axmann. All rights reserved.
1 SerialMailer Manual For SerialMailer 7.2 Copyright 2010-2011 Falko Axmann. All rights reserved. 2 Contents 1 Getting Started 4 1.1 Configuring SerialMailer 4 1.2 Your First Serial Mail 7 1.2.1 Database
More informationUsing Git for Project Management with µvision
MDK Version 5 Tutorial AN279, Spring 2015, V 1.0 Abstract Teamwork is the basis of many modern microcontroller development projects. Often teams are distributed all over the world and over various time
More informationhp calculators HP 17bII+ Discounting & Discounted Cash Flow Analysis It's About Time The Financial Registers versus Discounted Cash Flow
HP 17bII+ Discounting & Discounted Cash Flow Analysis It's About Time The Financial Registers versus Discounted Cash Flow Discounting a Single Sum Discounting and Compounding Discounting a Series of Sums
More informationDatabase Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No.
Database Management System Prof. D. Janakiram Department of Computer Science & Engineering Indian Institute of Technology, Madras Lecture No. 23 Concurrency Control Part -4 In the last lecture, we have
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationParticipant Tracking Functionality
Participant Tracking Functionality Opening a visit schedule to enrollment Before you are able to enroll a participant to a trial you must open the visit schedule to enrollment. Click on the visit schedule
More informationHow the Dolphin Scanner Works
The Dolphin Scanner How the Dolphin Scanner Works The Dolphin scanner is a hand held, battery powered computer that has a built in laser scanner that is able to scan most barcodes. It uses an internal
More informationVPN Client User s Guide. 9235966 Issue 2
VPN Client User s Guide 9235966 Issue 2 Copyright 2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the
More informationSetting Up a Windows Virtual Machine for SANS FOR526
Setting Up a Windows Virtual Machine for SANS FOR526 As part of the Windows Memory Forensics course, SANS FOR526, you will need to create a Windows virtual machine to use in class. We recommend using VMware
More informationWhen you publish data to a SharePoint site, you first
SharePoint, maintaining the relationships between them and creating links to them within Access. Here s how the wizard works: 1. Click to select the External Data tab. 2. Click the Move to SharePoint button
More informationMobile MessageBank Standard User Guide
1. Now Everyone Gets The Message 2. MessageBank Stard Set Up 3. Using MessageBank 4. Options 5. Pricing 6. Billing 7. Troubleshooting 8. Helpful Hints 9. Tips 10. More Information Mobile MessageBank Stard
More informationGas Dynamics Prof. T. M. Muruganandam Department of Aerospace Engineering Indian Institute of Technology, Madras. Module No - 12 Lecture No - 25
(Refer Slide Time: 00:22) Gas Dynamics Prof. T. M. Muruganandam Department of Aerospace Engineering Indian Institute of Technology, Madras Module No - 12 Lecture No - 25 Prandtl-Meyer Function, Numerical
More informationExample of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
More informationPaper FF-014. Tips for Moving to SAS Enterprise Guide on Unix Patricia Hettinger, Consultant, Oak Brook, IL
Paper FF-014 Tips for Moving to SAS Enterprise Guide on Unix Patricia Hettinger, Consultant, Oak Brook, IL ABSTRACT Many companies are moving to SAS Enterprise Guide, often with just a Unix server. A surprising
More informationUsing the CoreSight ITM for debug and testing in RTX applications
Using the CoreSight ITM for debug and testing in RTX applications Outline This document outlines a basic scheme for detecting runtime errors during development of an RTX application and an approach to
More informationUnderstanding MySQL storage and clustering in QueueMetrics. Loway
Understanding MySQL storage and clustering in QueueMetrics Loway Understanding MySQL storage and clustering in QueueMetrics Loway Table of Contents 1. Understanding MySQL storage and clustering... 1 2.
More informationPHP Debugging. Draft: March 19, 2013 2013 Christopher Vickery
PHP Debugging Draft: March 19, 2013 2013 Christopher Vickery Introduction Debugging is the art of locating errors in your code. There are three types of errors to deal with: 1. Syntax errors: When code
More informationVIP Quick Reference Card
VIP Quick Reference Card Loading VIP (Based on VIP 3.5 in GNU Emacs 18) Just type M-x vip-mode followed by RET VIP Modes VIP has three modes: emacs mode, vi mode and insert mode. Mode line tells you which
More informationHOW TO... Email Secure PR Payslips to Employees in OA
PR-HT004 HOW TO... Email Secure PR Payslips to Employees in OA Date: Nov 18, 2011, rev. Apr 27, 2012 Document Version: 0.3 Earliest available version of COINS: COINS OA 10.22 These notes are published
More informationA Sample OFBiz application implementing remote access via RMI and SOAP Table of contents
A Sample OFBiz application implementing remote access via RMI and SOAP Table of contents 1 About this document... 2 2 Introduction... 2 3 Defining the data model... 2 4 Populating the database tables with
More informationDrupal + Formulize. A Step-by-Step Guide to Integrating Drupal with XOOPS/ImpressCMS, and installing and using the Formulize module
Drupal + Formulize A Step-by-Step Guide to Integrating Drupal with XOOPS/ImpressCMS, and installing and using the Formulize module May 16, 2007 Updated December 23, 2009 This document has been prepared
More informationThe Systems Approach to Problem Solving
The Systems Approach to Problem Solving I. Introduction This course introduces the methodology systems engineers use to solve problems. You will learn about many concepts and tools that systems engineers
More informationHow To Connect To A Ppanasonic Pbx On A Pc Or Mac Or Ipa (For A Pc) With A Usb Or Ipo (For Mac) With Pbq (For Pc) On A Usb (For Pb
R KX-Series PBX TAPI Service Provider Installation Manual Revision: 4.0.0.1 October 2011 Introduction About TSP Panasonic TAPI Service Provider for TDA/TDE/NCP/NS Series PBX (Panasonic TSP) is a driver
More informationUsing the HCS12 Serial Monitor on Wytec Dragon-12 boards. Using Motorola s HCS12 Serial Monitor on Wytec s Dragon-12 boards
Using Motorola s HCS12 Serial Monitor on Wytec s Dragon-12 boards Wytec s Dragon-12 development boards are pre-installed with DBug-12, a small monitor program which allows a user to interact with the board
More informationThe first program: Little Crab
CHAPTER 2 The first program: Little Crab topics: concepts: writing code: movement, turning, reacting to the screen edges source code, method call, parameter, sequence, if-statement In the previous chapter,
More informationM21 Database Backup and Restore
M21 Database Backup and Restore M21 Database Backup and Restore Table of Contents 1. Overview...7 2. dbbkrs - DATABASE BACKUP and RESTORE...9 EXAMPLES...13 3. runbackup - RUN DATABASE BACKUP IN QUIET
More informationYubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015
YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,
More informationAN141 SMBUS COMMUNICATION FOR SMALL FORM FACTOR DEVICE FAMILIES. 1. Introduction. 2. Overview of the SMBus Specification. 2.1.
SMBUS COMMUNICATION FOR SMALL FORM FACTOR DEVICE FAMILIES 1. Introduction C8051F3xx and C8051F41x devices are equipped with an SMBus serial I/O peripheral that is compliant with both the System Management
More informationLab 2 - Basic Router Configuration
CS326 Fall 2001 Room: PAI 5.48 Name: Lab 2 - Basic Router Configuration In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how
More informationISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January
More informationCreating Tables ACCESS. Normalisation Techniques
Creating Tables ACCESS Normalisation Techniques Microsoft ACCESS Creating a Table INTRODUCTION A database is a collection of data or information. Access for Windows allow files to be created, each file
More informationRIPE Database User Manual: Getting Started
RIPE Database User Manual: Getting Started ***IMPORTANT*** Please note that this document is obsolete. A new version will be prepared following a project to restructure the RIPE Database documentation.
More informationHow to Configure Windows 8.1 to run ereports on IE11
How to Configure Windows 8.1 to run ereports on IE11 Description: Windows 8.1 ships with IE10, but can be updated to IE11. There is a special mode in IE11 called Enterprise Mode that can be used to emulate
More informationEVERYTHING A DBA SHOULD KNOW
EVERYTHING A DBA SHOULD KNOW ABOUT TCPIP NETWORKS Chen (Gwen),HP Software-as-a-Service 1. TCP/IP Problems that DBAs Can Face In this paper I ll discuss some of the network problems that I ve encountered
More informationDHCP and DNS Protocols
DHCP and DNS Protocols DHCP (Dynamic Host Configuration Protocol) is an industry standard protocol that lets a DHCP server (Unix/Window/As400 system) allocate temporary IP addresses and other network parameters
More informationSV8100 & UM8000 Voicemail Administration Guide
Page 1 of 8 SV8100 & UM8000 Voicemail Administration Guide Page 2 of 8 Table of Contents Phone Outline... 3 Phone System Programming... 4 Changing the name of a Phone... 4 Programming One-Touch Keys with
More informationT1 QUICK START GUIDE
T1 QUICK START GUIDE 1 T1 Quick Start Guide: English Microphones Indicator Light Multi- Function Button (MFB) Charging Port 2 Charge Your T1 Your T1 has been given an initial partial charge to get started,
More information