String Searching. String Search. Spam Filtering. String Search
|
|
- Poppy Walters
- 7 years ago
- Views:
Transcription
1 String Serch String Serching String serch: given pttern string p, find first mtch in text t. Model : cn't fford to preprocess the text. Krp-Rin Knuth-Morris-Prtt Boyer-Moore N = # chrcters in text M = # chrcters in pttern n n e e n l Serch Text typiclly N >> M Ex: N = 1 million, M = 1 e d e n e e n e e d l e n l d Serch Pttern n e e d l e M = 1, N = 6 Reference: Chpter 19, Algorithms in C, nd Edition, Roert Sedgewick. n n e e n l Successful Serch e d e n e e n e e d l e n l d Princeton University COS 6 Algorithms nd Dt Structures Spring 4 Kevin Wyne String Serch Spm Filtering String: Sequence of chrcters over some lphet. Ex lphets: inry, deciml, ASCII, UNICODE, DNA. Some pplictions. Prsers. Lexis/Nexis. Spm filters. Virus scnning. Digitl lirries. Screen scrpers. Word processors. We serch engines. Symol mnipultion. Biliogrphic retrievl. Nturl lnguge processing. Crnivore surveillnce system. Computtionl moleculr iology. Feture detection in digitized imges. 3 Spm filtering: ptterns indictive of spm. AMAZING GUARANTEE PROFITS herl Vigr This is one-time miling. There is no ctch. This messge is sent in complince with spm regultions. You're getting this messge ecuse you registered with one of our mrketing prtners. 4
2 Brute Force Anlysis of Brute Force Brute force: Check for pttern strting t every text position. pulic sttic int serch(string pttern, String text) { int M = pttern.length(); int N = text.length(); Anlysis of rute force. Running time depends on pttern nd text. Worst cse: M N comprisons. "Averge" cse: 1.1 N comprisons. (!) Slow if M nd N re lrge, nd hve lots of repetition. for (int i = ; i < N - M; i++) { int j; for (j = ; j < M; j++) { if (text.chrat(i+j)!= pttern.chrat(j)) rek; if (j == M) return i; return -1; return -1 if not found return offset i if found Serch Pttern Serch Text 5 6 Screen Scrping Find current stock price of Sun Microsystems. t.indexof(p): index of 1 st occurrence of pttern p in text t. Downlod html from Find 1 st string delimited y <> nd </> ppering fter Lst Trde pulic clss StockQuote { pulic sttic void min(string[] rgs) { String nme = " + rgs[]; In in = new In(nme); String input = in.redall(); int p = input.indexof("lst Trde:", ); int from = input.indexof("<>", p); int to = input.indexof("</>", from); String price = input.sustring(from + 3, to); System.out.println(price); % jv StockQuote sunw 5. % jv StockQuote im Algorithmic Chllenges Theoreticl chllenge: liner-time gurntee. TST index costs ~ N lgn. Prcticl chllenge: void BACKUP. Often no room or time to sve text. Fundmentl lgorithmic prolem. Now is the time for ll people to come to the id of their prty.now is the time for ll good people to come to the id of theirprty.now is the time for mnygood people to come to the id of their prty.now is the time for ll good people to come to the id of their prty.now is the time for lot of good people to come to the id of their prty.now is the time for ll of the good people to come to the id of their prty.now is the time for ll good people to come to the id of their prty. Now is the time for ech good person to come to the id of their prty.now is the time for ll good people to come to the id of their prty. Now is the time for ll good Repulicns to come to the id of their prty.now is the time for ll good people to come to the id of their prty. Now is the time for mny or ll good people to come to the id of their prty. Now is the time for ll good people to come to the id of their prty.now is the time for ll good Democrts to come to the id of their prty. Now is the time for ll people to come to the id of their prty.now is the time for ll good people to come to the id of theirprty. Now is the time for mnygood people to come to the id of their prty.now is the time for ll good people to come to the id of their prty.now is the time for lot of good people to come to the id of their prty.now is the time for ll of the good people to come to the id of their prty.now is the time for ll good people to come to the id of their ttck t dwn prty. Now is the time for ech person to come to the id of their prty.now is the time for ll good people to come to the id of their prty. Now is the time for ll good Repulicns to come to the id of their prty.now is the time for ll good people to come to the id of their prty. Now is the time for mny or ll good people to come to the id of their prty. Now is the time for ll good people to come to the id of their prty.now is the time for ll good Democrts to come to the id of their prty. 7 8
3 Krp-Rin Fingerprint Algorithm Krp-Rin Fingerprint Algorithm Ide: use hshing. Compute hsh function for ech text position. No explicit hsh tle: just compre with pttern hsh! Exmple. Hsh "tle" size = 97. Serch Pttern % 97 = 95 Serch Text % 97 = % 97 = % 97 = % 97 = % 97 = 95 Ide: use hshing. Compute hsh function for ech text position. Gurnteeing correctness. Need full compre on hsh mtch to gurd ginst collisions % 97 = % 97 = 95 Running time. Hsh function depends on M chrcters. Running time is (MN) for serch miss. how cn we fix this? 9 1 Krp-Rin Fingerprint Algorithm Krp-Rin Fingerprint Algorithm : Jv Implementtion Key ide: fst to compute hsh function of djcent sustrings. Use previous hsh to compute next hsh. O(1) time per hsh, except first one. Exmple. Pre-compute: 1 % 97 = 9 Previous hsh: 4159 % 97 = 76 Next hsh: 1596 % 97 =?? Oservtion % 97 (4159 (4 * 1)) * (76 (4 * 9 )) * pulic sttic int serch(string p, String t) { int M = p.length(); int N = t.length(); int dm = 1, h1 =, h = ; int q = ; // tle size int d = 56; // rdix for (int j = 1; j < M; j++) // precompute d^m % q dm = (d * dm) % q; for (int j = ; j < M; j++) { h1 = (h1*d + p.chrat(j)) % q; h = (h*d + t.chrat(j)) % q; if (h1 == h) return i - M; // hsh of pttern // hsh of text // mtch found for (int i = M; j < N; i++) { h = (h - t.chrat(i-m)) % q; // remove high order digit h = (h*d + t.chrat(i)) % q; // insert low order digit if (h1 == h) return i - M; // mtch found return -1; // not found 11 1
4 String Serch Implementtion Cost Summry Rndomized Algorithms Krp-Rin fingerprint lgorithm. Choose tle size t rndom to e huge prime. Expected running time is O(M + N). (MN) worst-cse, ut this is (unelievly) unlikely. Min dvntge. Extends to d ptterns nd other generliztions. A rndomized lgorithm uses rndom numers to gin efficiency. Ls Vegs lgorithms. Expected to e fst. Gurnteed to e correct. Ex: quicksort, rndomized BST, Rin-Krp with mtch check. Serch for n M-chrcter pttern in n N-chrcter text. Implementtion Krp-Rin Typicl (N) Worst Brute 1.1 N M N (N) ssumes pproprite model rndomized Monte Crlo lgorithms. Gurnteed to e fst. Expected to e correct. Ex: Rin-Krp without mtch check. Would either version of Rin-Krp mke good lirry function? chrcter comprisons How To Sve Comprisons Knuth-Morris-Prtt (over inry lphet) How to void re-computtion? Pre-nlyze serch pttern. Ex: suppose tht first 5 chrcters of pttern re ll 's. if t[..4] mtches p[..4] then t[1..4] mtches p[..3] no need to check i = 1, j =, 1,, 3 sves 4 comprisons KMP lgorithm. Use knowledge of how serch pttern repets itself. Build DFA from pttern. Run DFA on text. Bsic strtegy: pre-compute something sed on pttern. Serch Pttern Serch Text Serch Pttern Serch Text 1 ccept stte 15 16
5 DFA Representtion KMP Algorithm DFA used in KMP hs specil property. Upon chrcter mtch, go forwrd one stte. Only need to keep trck of where to go upon chrcter mismtch: go to stte next[j] if chrcter mismtches in stte j Two key differences from rute force. Text pointer i never cks up. Need to precompute next[] tle. Serch Pttern next 3 only store this row for (int i =, j = ; i < N; i++) { if (t.chrat(i) == p.chrat(j)) j++; // mtch else j = next[j]; // mismtch if (j == M) return i - M + 1; // found return -1; // not found Simultion of KMP DFA (ssumes inry lphet) 1 ccept stte 7 8 Knuth-Morris-Prtt DFA Construction for KMP KMP lgorithm. (over inry lphet, for simplicity) Use knowledge of how serch pttern repets itself. Build DFA from pttern. Run DFA on text. Rule for creting next[] tle for pttern. next[4]: longest prefix of tht is proper suffix of. next[5]: longest prefix of tht is proper suffix of. DFA construction for KMP. DFA uilds itself! Ex: compute next[6] for pttern p[..6] =. Assume you know DFA for pttern p[..5]=. Assume you know stte X for p[1..5] =. X = Updte next[6] to stte for. X + = Updte X to stte for p[1..6] = X + = 3 compute y simulting on DFA
6 DFA Construction for KMP DFA Construction for KMP DFA construction for KMP. DFA uilds itself! DFA construction for KMP. DFA uilds itself! Ex: compute next[6] for pttern p[..6] =. Assume you know DFA for pttern p[..5]=. Assume you know stte X for p[1..5] =. X = Updte next[6] to stte for. X + = Updte X to stte for p[1..6] = X + = 3 Ex: compute next[7] for pttern p[..7] =. Assume you know DFA for pttern p[..6]=. Assume you know stte X for p[1..6] =. X = 3 Updte next[7] to stte for. X + = 4 Updte X to stte for p[1..7] = X + = DFA Construction for KMP DFA Construction for KMP DFA construction for KMP. DFA uilds itself! DFA construction for KMP. DFA uilds itself! Ex: compute next[7] for pttern p[..7] =. Assume you know DFA for pttern p[..6]=. Assume you know stte X for p[1..6] =. X = 3 Updte next[7] to stte for. X + = 4 Updte X to stte for p[1..7] = X + = Crucil insight. To compute trnsitions for stte n of DFA, suffices to hve: DFA for sttes to n-1 stte X tht DFA ends up in with input p[1..n-1] To compute stte X' tht DFA ends up in with input p[1..n], it suffices to hve: DFA for sttes to n-1 stte X tht DFA ends up in with input p[1..n-1] 33 34
7 DFA Construction for KMP DFA Construction for KMP: Implementtion 1 Serch Pttern j pttern[1..j] X next Build DFA for KMP. Tkes O(M) time. Requires O(M) extr spce to store next[] tle. int X = ; int[] next = new int[m]; for (int j = 1; j < M; j++) { if (p.chrat(x) == p.chrat(j)) { // chr mtch next[j] = next[x]; X = X + 1; else { // chr mismtch next[j] = X + 1; X = next[x]; DFA Construction for KMP (ssumes inry lphet) Optimized KMP Implementtion KMP Over Aritrry Alphet Ultimte serch progrm for pttern. Specilized C progrm. Mchine lnguge version of C progrm. int kmperch(chr t[]) { int i = ; s: if (t[i++]!= '') goto s; s1: if (t[i++]!= '') goto s; s: if (t[i++]!= '') goto s; s3: if (t[i++]!= '') goto s; s4: if (t[i++]!= '') goto s; s5: if (t[i++]!= '') goto s3; s6: if (t[i++]!= '') goto s; s7: if (t[i++]!= '') goto s4; return i - 8; next[] DFA for ptterns over ritrry lphets. Red new chrcter only upon success (or filure t eginning). Reuse current chrcter upon filure nd follow ck. Fct: KMP follows t most 1 + log M ck links in row. Theorem: t most N chrcter comprisons in totl. Ex: DFA for pttern c. N Y c ssumes pttern is in text (o/w use sentinel) 45 46
8 String Serch Implementtion Cost Summry History of KMP KMP nlysis. DFA simultion tkes (N) time in worst-cse. DFA construction tkes (M) time nd spce in worst-cse. Extends to ASCII or UNICODE lphets. Good efficiency for ptterns nd texts with much repetition. "On-line lgorithm." virus scnning, internet spying Serch for n M-chrcter pttern in n N-chrcter text. Implementtion Krp-Rin KMP Typicl Worst Brute 1.1 N M N (N) (N) 1.1 N N ssumes pproprite model rndomized History of KMP. Inspired y esoteric theorem of Cook tht sys liner time lgorithm should e possile for -wy pushdown utomt. Discovered in 1976 independently y two theoreticins nd hcker. Knuth: discovered liner time lgorithm Prtt: mde running time independent of lphet Morris: trying to uild n editor nd void nnoying uffer for string serch Resolved theoreticl nd prcticl prolems. Surprise when it ws discovered. In hindsight, seems like right lgorithm. chrcter comprisons Boyer-Moore Boyer-Moore Boyer-Moore lgorithm (1974). Right-to-left scnning. find offset i in text y moving left to right. compre pttern to text y moving right to left. Boyer-Moore lgorithm (1974). Right-to-left scnning. Heuristic 1: dvnce offset i using "d chrcter rule." upon mismtch of text chrcter c, look up index[c] increse offset i so tht j th chrcter of pttern lines up with text chrcter c Index g 5 i n 1 s 4 t 3 * 5 Text Text s t r i n g s s e r c h c o n s i o f Pttern s t r i n g s s e r c h c o n s i o f Pttern Mismtch Mtch No comprison 49 Mismtch Mtch No comprison 5
9 Boyer-Moore Boyer-Moore Boyer-Moore lgorithm (1974). Right-to-left scnning. Heuristic 1: dvnce offset i using "d chrcter rule." upon mismtch of text chrcter c, look up index[c] increse offset i so tht j th chrcter of pttern lines up with text chrcter c Index g 5 i n 1 s 4 t 3 * 5 Boyer-Moore lgorithm (1974). Right-to-left scnning. Heuristic 1: dvnce offset i using "d chrcter rule." Heuristic : use KMP-like suffix rule. effective with smll lphets different rules led to different worst-cse ehvior privte sttic void dchrskip(string pttern, int[] skip) { int M = pttern.length(); for (int j = ; j < 56; j++) skip[j] = M; for (int j = ; j < M-1; j++) skip[pttern.chrat(j)] = M j 1; construction of d chrcter skip tle Text x x x x x x x?????? x x x x x x x x x c d d x d d now ligned d chrcter rule 51 5 Boyer-Moore String Serch Implementtion Cost Summry Boyer-Moore lgorithm (1974). Right-to-left scnning. Heuristic 1: dvnce offset i using "d chrcter rule." Heuristic : use KMP-like suffix rule. effective with smll lphets different rules led to different worst-cse ehvior Boyer-Moore nlysis. O(N / M) verge cse if given letter usully doesn't occur in string. time decreses s pttern length increses suliner in input size! O(N) worst-cse with Glil vrint. Serch for n M-chrcter pttern in n N-chrcter text. Text x x x x x x x?????? x x x x x x x x x c d d x d d cn skip over this since we know d doesn't mtch strong good suffix Implementtion Brute Typicl 1.1 N Worst M N Krp-Rin (N) (N) KMP 1.1 N N Boyer-Moore N / M 4N chrcter comprisons ssumes pproprite model rndomized 53 54
10 Boyer-Moore nd Alphet Size Tip of the Iceerg Boyer-Moore spce requirement. (M + A) Big lphets. Direct implementtion my e imprcticl, e.g., UNICODE. My explin why Jv's indexof doesn't use it. Solution 1: serch one yte t time. Solution : hsh UNICODE chrcters to smller rnge. Smll lphets. Loses effectiveness when A is too smll, e.g., DNA. Solution: group chrcters together (, c,... ). Multiple string serch. Serch for ny of k different strings. Nïve: O(M + kn). Aho-Corsick: O(M + N). Screen out dirty words from text strem. Wildcrds / chrcter clsses. Ex: PROSITE ptterns for computtionl iology. O(M + N) time using O(M + A) extr spce. Multiple mtches Approximte string mtching: llow up to k mismtches. Recovering from typing or spelling errors in informtion retrievl. Fixing trnsmission errors in signl processing. Edit-distnce: llow up to k edits. Recover from mesurement errors in computtionl iology Jv String Lirry String Serch Summry Jv String lirry hs uilt-in string serching. t.indexof(p): index of 1 st occurrence of pttern p in text t. Cvet: it's rute force, nd cn tke (MN) time. pulic sttic void min(string[] rgs) { int n = Integer.prseInt(rgs[]); String s = ""; for (int i = ; i < n; i++) s = s + s; String pttern = s + ""; String text = s + s;... n Ingenious lgorithms for fundmentl prolem. Rin Krp. Esy to implement, ut usully worse thn rute-force. Extends to more generl settings (e.g., D serch). Knuth-Morris-Prtt. Quintessentil solution to theoreticl prolem. Independent of lphet size. Extends to multiple string serch, wild-crds, regulr expressions. n+1 System.out.println(text.indexOf(pttern)); Boyer-Moore. Simple ide leds to drmtic speedup for long ptterns. Need to twek for smll or lrge lphets. Why do you think lirry uses rute force? 57 58
One Minute To Learn Programming: Finite Automata
Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge
More informationHomework 3 Solutions
CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.
More informationBayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom
Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the
More informationRegular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
More informationHow fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009
CS 4 -- Spring 2009 Sorting Crol Wenk Slides courtesy of Chrles Leiserson with smll chnges by Crol Wenk CS 4 Anlysis of Algorithms 1 How fst cn we sort? All the sorting lgorithms we hve seen so fr re comprison
More informationflex Regular Expressions and Lexical Scanning Regular Expressions and flex Examples on Alphabet A = {a,b} (Standard) Regular Expressions on Alphabet A
flex Regulr Expressions nd Lexicl Scnning Using flex to Build Scnner flex genertes lexicl scnners: progrms tht discover tokens. Tokens re the smllest meningful units of progrm (or other string). flex is
More informationReasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More informationAppendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:
Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you
More informationData Compression. Lossless And Lossy Compression
Dt Compression Reduce the size of dt. ƒ Reduces storge spce nd hence storge cost. Compression rtio = originl dt size/compressed dt size ƒ Reduces time to retrieve nd trnsmit dt. Lossless And Lossy Compression
More information1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam
1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges
More informationSolving the String Statistics Problem in Time O(n log n)
Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl 1,,, Rune B. Lyngsø 3, Ann Östlin1,, nd Christin N. S. Pedersen 1,2, 1 BRICS, Deprtment of Computer Science, University of Arhus,
More informationSmall Businesses Decisions to Offer Health Insurance to Employees
Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More information5 a LAN 6 a gateway 7 a modem
STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet
More informationBasic Research in Computer Science BRICS RS-02-13 Brodal et al.: Solving the String Statistics Problem in Time O(n log n)
BRICS Bsic Reserch in Computer Science BRICS RS-02-13 Brodl et l.: Solving the String Sttistics Prolem in Time O(n log n) Solving the String Sttistics Prolem in Time O(n log n) Gerth Stølting Brodl Rune
More informationLec 2: Gates and Logic
Lec 2: Gtes nd Logic Kvit Bl CS 34, Fll 28 Computer Science Cornell University Announcements Clss newsgroup creted Posted on we-pge Use it for prtner finding First ssignment is to find prtners Due this
More informationExperiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
More informationIntegration by Substitution
Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is
More information! What can a computer do? ! What can a computer do with limited resources? ! Don't talk about specific machines or problems.
Introduction to Theoreticl CS ecture 18: Theory of Computtion Two fundmentl questions.! Wht cn computer do?! Wht cn computer do with limited resources? Generl pproch. Pentium IV running inux kernel.4.!
More information1. Introduction. 1.1. Texts and their processing
Chpter 1 3 21/7/97 1. Introduction 1.1. Texts nd their processing One of the simplest nd nturl types of informtion representtion is y mens of written texts. Dt to e processed often does not decompose into
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationDlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report
DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of
More informationHow To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationBypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems
Bypssing Spce Explosion in Regulr Expression Mtching for Network Intrusion Detection n Prevention Systems Jignesh Ptel, Alex Liu n Eric Torng Dept. of Computer Science n Engineering Michign Stte University
More informationSection 5-4 Trigonometric Functions
5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationWelch Allyn CardioPerfect Workstation Installation Guide
Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.5 or lter For network instlltion, plese refer to
More informationOperations with Polynomials
38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply
More informationTwo hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Friday 16 th May 2008. Time: 14:00 16:00
COMP20212 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE Digitl Design Techniques Dte: Fridy 16 th My 2008 Time: 14:00 16:00 Plese nswer ny THREE Questions from the FOUR questions provided
More informationA Visual and Interactive Input abb Automata. Theory Course with JFLAP 4.0
Strt Puse Step Noninverted Tree A Visul nd Interctive Input Automt String ccepted! 5 nodes generted. Theory Course with JFLAP 4.0 q0 even 's, even 's q2 even 's, odd 's q1 odd 's, even 's q3 odd 's, odd
More informationTreatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.
The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only
More informationAPPLICATION NOTE Revision 3.0 MTD/PS-0534 August 13, 2008 KODAK IMAGE SENDORS COLOR CORRECTION FOR IMAGE SENSORS
APPLICATION NOTE Revision 3.0 MTD/PS-0534 August 13, 2008 KODAK IMAGE SENDORS COLOR CORRECTION FOR IMAGE SENSORS TABLE OF FIGURES Figure 1: Spectrl Response of CMOS Imge Sensor...3 Figure 2: Byer CFA Ptterns...4
More informationHow To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
More informationOutline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4)
Outline of the Lecture Softwre Testing Lecture Notes 3 (of 4) Integrtion Testing Top-down ottom-up ig-ng Sndwich System Testing cceptnce Testing istriution of ults in lrge Industril Softwre System (ISST
More informationRegular Languages and Finite Automata
N Lecture Notes on Regulr Lnguges nd Finite Automt for Prt IA of the Computer Science Tripos Mrcelo Fiore Cmbridge University Computer Lbortory First Edition 1998. Revised 1999, 2000, 2001, 2002, 2003,
More informationAntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationPolynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
More informationDistributions. (corresponding to the cumulative distribution function for the discrete case).
Distributions Recll tht n integrble function f : R [,] such tht R f()d = is clled probbility density function (pdf). The distribution function for the pdf is given by F() = (corresponding to the cumultive
More informationExample 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.
2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this
More informationSolutions for Selected Exercises from Introduction to Compiler Design
Solutions for Selected Exercises from Introduction to Compiler Design Torben Æ. Mogensen Lst updte: My 30, 2011 1 Introduction This document provides solutions for selected exercises from Introduction
More informationFORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION EXERCISES ON REGULAR LANGUAGES
FORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION EXERCISES ON REGULAR LANGUAGES Introduction This compendium contins exercises out regulr lnguges for the course Forml Lnguges, Automt nd Theory of Computtion
More informationLogical or physical organisation and data independence
Four FILE STRUCTURES Introduction This chpter is minly concerned with the wy in which file structures re used in document retrievl. Most surveys of file structures ddress themselves to pplictions in dt
More informationCS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001
CS99S Lortory 2 Preprtion Copyright W. J. Dlly 2 Octoer, 2 Ojectives:. Understnd the principle of sttic CMOS gte circuits 2. Build simple logic gtes from MOS trnsistors 3. Evlute these gtes to oserve logic
More informationConcept Formation Using Graph Grammars
Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015
More informationExample A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding
1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde
More informationApplication Bundles & Data Plans
Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help
More informationProtocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff
Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention
More informationJava CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser:
Jv CUP Jv CUP is prser-genertion tool, similr to Ycc. CUP uilds Jv prser for LALR(1) grmmrs from production rules nd ssocited Jv code frgments. When prticulr production is recognized, its ssocited code
More information19. The Fermat-Euler Prime Number Theorem
19. The Fermt-Euler Prime Number Theorem Every prime number of the form 4n 1 cn be written s sum of two squres in only one wy (side from the order of the summnds). This fmous theorem ws discovered bout
More informationGraphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
More informationHelicopter Theme and Variations
Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the
More informationBinary Representation of Numbers Autar Kaw
Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy
More informationSolution to Problem Set 1
CSE 5: Introduction to the Theory o Computtion, Winter A. Hevi nd J. Mo Solution to Prolem Set Jnury, Solution to Prolem Set.4 ). L = {w w egin with nd end with }. q q q q, d). L = {w w h length t let
More informationMorgan Stanley Ad Hoc Reporting Guide
spphire user guide Ferury 2015 Morgn Stnley Ad Hoc Reporting Guide An Overview For Spphire Users 1 Introduction The Ad Hoc Reporting tool is ville for your reporting needs outside of the Spphire stndrd
More informationFactoring Polynomials
Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles
More informationLearning Outcomes. Computer Systems - Architecture Lecture 4 - Boolean Logic. What is Logic? Boolean Logic 10/28/2010
/28/2 Lerning Outcomes At the end of this lecture you should: Computer Systems - Architecture Lecture 4 - Boolen Logic Eddie Edwrds eedwrds@doc.ic.c.uk http://www.doc.ic.c.uk/~eedwrds/compsys (Hevily sed
More informationEconomics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999
Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6
More informationData replication in mobile computing
Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL
More informationEQUATIONS OF LINES AND PLANES
EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint
More informationHow To Make A Network More Efficient
Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu
More informationNew Internet Radio Feature
XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry
More informationLINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of
More informationEnterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
More informationP.3 Polynomials and Factoring. P.3 an 1. Polynomial STUDY TIP. Example 1 Writing Polynomials in Standard Form. What you should learn
33337_0P03.qp 2/27/06 24 9:3 AM Chpter P Pge 24 Prerequisites P.3 Polynomils nd Fctoring Wht you should lern Polynomils An lgeric epression is collection of vriles nd rel numers. The most common type of
More informationGene Expression Programming: A New Adaptive Algorithm for Solving Problems
Gene Expression Progrmming: A New Adptive Algorithm for Solving Prolems Cândid Ferreir Deprtmento de Ciêncis Agráris Universidde dos Açores 9701-851 Terr-Chã Angr do Heroísmo, Portugl Complex Systems,
More informationLectures 8 and 9 1 Rectangular waveguides
1 Lectures 8 nd 9 1 Rectngulr wveguides y b x z Consider rectngulr wveguide with 0 < x b. There re two types of wves in hollow wveguide with only one conductor; Trnsverse electric wves
More informationQuick Reference Guide: One-time Account Update
Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)
More information0.1 Basic Set Theory and Interval Notation
0.1 Bsic Set Theory nd Intervl Nottion 3 0.1 Bsic Set Theory nd Intervl Nottion 0.1.1 Some Bsic Set Theory Notions Like ll good Mth ooks, we egin with definition. Definition 0.1. A set is well-defined
More information2 DIODE CLIPPING and CLAMPING CIRCUITS
2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of
More informationModular Generic Verification of LTL Properties for Aspects
Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte
More informationOr more simply put, when adding or subtracting quantities, their uncertainties add.
Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re
More informationYour duty, however, does not require disclosure of matter:
Your Duty of Disclosure Before you enter into contrct of generl insurnce with n insurer, you hve duty, under the Insurnce Contrcts Act 1984 (Cth), to disclose to the insurer every mtter tht you know, or
More informationAdvanced Baseline and Release Management. Ed Taekema
Advnced Bseline nd Relese Mngement Ed Tekem Introduction to Bselines Telelogic Synergy uses bselines to perform number of criticl configurtion mngement tsks. They record the stte of the evolving softwre
More informationString Search. Brute force Rabin-Karp Knuth-Morris-Pratt Right-Left scan
String Search Brute force Rabin-Karp Knuth-Morris-Pratt Right-Left scan String Searching Text with N characters Pattern with M characters match existence: any occurence of pattern in text? enumerate: how
More informationA Network Management System for Power-Line Communications and its Verification by Simulation
A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,
More informationBlackbaud The Raiser s Edge
Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com
More informationMeasuring Similarity between Graphs Based on the Levenshtein Distance
Appl. Mth. Inf. Sci. 7, No. 1L, 169-175 (01) 169 Applied Mthemtics & Informtion Sciences An Interntionl Journl Mesuring Similrity etween Grphs Bsed on the Levenshtein Distnce Bin Co, ing Li nd Jinwei in
More informationEFFICIENT VARIANTS OF THE BACKWARD-ORACLE-MATCHING ALGORITHM
Interntionl Journl of Foundtions of Computer Science Vol. 20, No. 6 (2009) 967 984 c World Scientific Pulishing Compny EFFICIENT VARIANTS OF THE BACKWARD-ORACLE-MATCHING ALGORITHM SIMONE FARO Diprtimento
More informationGFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationValue Function Approximation using Multiple Aggregation for Multiattribute Resource Management
Journl of Mchine Lerning Reserch 9 (2008) 2079-2 Submitted 8/08; Published 0/08 Vlue Function Approximtion using Multiple Aggregtion for Multittribute Resource Mngement Abrhm George Wrren B. Powell Deprtment
More informationEE247 Lecture 4. For simplicity, will start with all pole ladder type filters. Convert to integrator based form- example shown
EE247 Lecture 4 Ldder type filters For simplicity, will strt with ll pole ldder type filters Convert to integrtor bsed form exmple shown Then will ttend to high order ldder type filters incorporting zeros
More information4.11 Inner Product Spaces
314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationSection 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control
Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.
More informationVirtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org
Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,
More informationUnit 6: Exponents and Radicals
Eponents nd Rdicls -: The Rel Numer Sstem Unit : Eponents nd Rdicls Pure Mth 0 Notes Nturl Numers (N): - counting numers. {,,,,, } Whole Numers (W): - counting numers with 0. {0,,,,,, } Integers (I): -
More informationUse Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.
Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd
More informationJaERM Software-as-a-Solution Package
JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock
More informationFDIC Study of Bank Overdraft Programs
FDIC Study of Bnk Overdrft Progrms Federl Deposit Insurnce Corportion November 2008 Executive Summry In 2006, the Federl Deposit Insurnce Corportion (FDIC) initited two-prt study to gther empiricl dt on
More information6.2 Volumes of Revolution: The Disk Method
mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More information9 CONTINUOUS DISTRIBUTIONS
9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete
More informationE-Commerce Comparison
www.syroxemedi.co.uk E-Commerce Comprison We pride ourselves in creting innovtive inspired websites tht re designed to sell. Developed over mny yers, our solutions re robust nd relible in opertion, flexible
More informationScalable Mining of Large Disk-based Graph Databases
Sclle Mining of Lrge Disk-sed Grph Dtses Chen Wng Wei Wng Jin Pei Yongti Zhu Bile Shi Fudn University, Chin, {chenwng, weiwng1, 2465, shi}@fudn.edu.cn Stte University of New York t Bufflo, USA & Simon
More informationUnit 29: Inference for Two-Way Tables
Unit 29: Inference for Two-Wy Tbles Prerequisites Unit 13, Two-Wy Tbles is prerequisite for this unit. In ddition, students need some bckground in significnce tests, which ws introduced in Unit 25. Additionl
More informationT H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K
Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607
More information