Analysis of Software Variants

Size: px
Start display at page:

Download "Analysis of Software Variants"

Transcription

1 Analysis of Software Variants Christian Lindig CAROL Software Technology Group Technical University of Braunschweig Germany -BRA

2 Outline Computer platform diversity causes software diversity software exists in variants. Most common strategy: separation at the module level and source code preprocessing for individual platforms. variant HP-UX Unix CPP Solaris Linux Aim: A better understanding of all the variants a specific source can generate. æ How many variants exist? æ How are variants related? æ How to generate a specific variant? æ Is there an easier way to create the same set of variants?

3 Example getopt.c /* This tells Alpha OSF/ not to define a getopt prototype in <stdio.h>. Ditto for AIX. and <stdlib.h>. */ #ifndef _NO_PROTO #define _NO_PROTO #ifdef HAVE_CONFIG_H #if defined (emacs) defined (CONFIG_BROKETS) /* We use <config.h> instead of "config.h" so that a compilation using -I. -I\$srcdir will use./config.h rather than \$srcdir/config.h (which it would do because it found this file in \$srcdir). */ #include <config.h> #else #include "config.h" #ifndef STDC /* This is a separate conditional since some stdc systems reject defined (const). */ #ifndef const #define const

4 Result Result of an analysis: the variant lattice for a source file. 7,5 8 5 expressions segments It shows: æ all variants and their relations, æ how to create them, æ and redundant expressions. Analysis technique: formal concept analysis.

5 Concept Analysis Unix-System-Calls access chdir chmod chown creat fork fstat mkdir rmdir access change check create directory file get group input mode new output owner permission process status remove Keywords A (formal) context is a triple (O, A, R) where O and A are sets of objects and attributes respectively and R O Ais a relation among them. AsetO(A) of objects (attributes) shares a set of common attributes (objects): O A def = {a A o O:(o, a) R} def = {o O a A:(o, a) R} [Krone, Snelting ICSE 9] defined O as ω(o) and A as α(a)

6 access change check create directory file get group input mode new output owner permission process remove status Context Table access chdir chmod chown creat fork fstat mkdir rmdir Keywords Unix-System-Calls

7 Concept Unix-System-Calls access chdir chmod chown creat fork fstat mkdir rmdir access change check create directory file get group input mode new output owner permission process status remove Keywords A concept c = (O, A) of a context (O, A, R) is a pair where O = A and A = O and also O O,A A. Concepts are (partially) ordered: (O,A ) (O,A ) O O ( A A ) The set of all concepts of (O, A, R) is denoted by B(O, A, R).

8 Concept Lattice Keywords attribute object file change create Unix-System-Calls access chdir chmod chown creat fork fstat mkdir rmdir access change check create directory file get group input mode new output owner permission process remove status directory new attribute permission group remove output input status access mode owner process get check rmdir chdir fstat access mkdir chmod chown creat fork object Basic theorem of context analysis by Wille: Let (O, A, R) be a context. Then B(O, A, R) is a complete lattice, the concept lattice of (O, A, R). (O,A ) (O,A ) = (O O,(O O ) ) (O,A ) (O,A ) = ((A A ),A A ) The maximal number of concepts is n where n = max( O, A ). Ganter s algorithm computes all concepts of (O, A, R) with time complexity O( B(O,A,R) ).

9 Concept Lattice Keywords access change check create directory file get group input mode new output owner permission process remove status attribute object file change create Unix-System-Calls access chdir chmod chown creat fork fstat mkdir rmdir directory new attribute permission group remove output input status access mode owner process get check rmdir chdir fstat access mkdir chmod chown creat fork object

10 The Idea #if defined(e ) && defined(e ) && defined(e 8 ) S #if defined (E ) && defined(e 5 ) && defined(e 7 ) S S #if defined(e ) && defined(e 5 ) && defined(e 7 ) S #ifdef E #if defined(e ) && defined(e ) S #ifdef E 8 S 5 Expression Segment E E E E E 5 E E 7 E 8 S S S S S 5 S Encode the meaning of CPP-expressions into a binary relation (i.e. formal context) and analyze it using concept analysis [cf. Krone, Snelting, ICSE 9].

11 A Model of CPP æ A configuration function f evaluates expressions e E: f :E {0,}. æ Avariant is a set of segments, selected by a configuration function f from a configuration table (S, E, T ): f(s,e,t)={s S f(e)= for all (s, e) T}. æ Configuration functions f and f are called equivalent (with respect to (S, E, T )), if they have the same effect: f f f (S, E, T ) = f (S, E, T ) [f ] denotes configuration functions equivalent to f. Expression f f Segment E E E E E 5 E E 7 E 8 S S S S S 5 S

12 Variants T E E f Segment E E E E E 5 E E 7 E 8 S S S S S 5 (S, E) S We find: [f ] is an equivalence class where f(s,e,t)=s iff (S, E) B(S,E,T ). This means: every concept of the inverted configuration table describes an equivalence class. Proof sketch: there is no variant not described by a concept in (S, E, T ). E T E E T E E T E S S S

13 Variant Lattice The example s variant lattice (i.e. the concept lattice of (S, E, T )). 7,5 8 5 expressions segments Each concept describes a variant and the canonical way to create it. T f Segment E E E E E 5 E E 7 E 8 S S S S S 5 S

14 Variant Lattice vs. Configuration Lattice The variant lattice for the example: 7,5 8 5 expressions segments And its configuration lattice [cf. Krone, Snelting, ICSE 9]. 8 7,5 5 expression segment

15 Redundancies Are there expressions in my source file that can be safely eliminated? T Segment E E E E E 5 E E 7 E 8 S S S S S 5 S An expression is called redundant if it can be removed from a configuration table without effect on any configuration function. Formally, e is redundant iff the following holds for any f : f(s,e,t)=f(s,e,t ) where E =E\{e}and T =T (S E )

16 Detecting Redundancies Redundant expressions show up in the concept lattice of the inverted configuration table as -reducible concepts: (redundant) 5 7,5 8 5 expressions segments Formally: e Eis redundant in (S, E, T ) if X E,e X exists in (S, E, T ) such that {e} = X. X e e X e e e e e e e '= X' e '= X' e super concept super concept

17 Problems #if defined(a) defined (b) C #if (defined(a) defined(b)) && defined (c) C #if!defined(a) &&!defined(b) C Expression Segment a b c a b C C C C,C C,C,C C C,C Consider f with f {a b, a, b} then theory says: S ={C,C } is a variant. Problem: Theory does not take interdependencies into account (yet). Future work: use background implications to express dependencies.

18 Future Work æ Extend theory with background implications to overcome limitations. æ Implementation Concept analysis tool written in C available (send !) Re of a concept analysis library in progress Implementation will be based on new library æ Evaluation

19 Conclusions æ Concept analysis is a promising theory for software re-engineering æ Variants generated from a source have a rich structure which can be effectively analyzed using concept analysis æ Variant description may contain redundant expressions which can be detected and removed æ This is work in progress still much room for improvement and research.

Formal Concept Analysis used for object-oriented software modelling Wolfgang Hesse FB Mathematik und Informatik, Univ. Marburg

Formal Concept Analysis used for object-oriented software modelling Wolfgang Hesse FB Mathematik und Informatik, Univ. Marburg FCA-SE 10 Formal Concept Analysis used for object-oriented software modelling Wolfgang Hesse FB Mathematik und Informatik, Univ. Marburg FCA-SE 20 Contents 1 The role of concepts in software development

More information

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer

Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical

More information

Certifying the Security of Android Applications with Cassandra

Certifying the Security of Android Applications with Cassandra 1 15 th International School on Foundations of Software Security and Design August 31 st, 2015, Bertinoro Certifying the Security of Android Applications with Cassandra Steffen Lortz, Heiko Mantel, David

More information

Tutorial on Linux Basics. KARUNYA LINUX CLUB

Tutorial on Linux Basics. KARUNYA LINUX CLUB Tutorial on Linux Basics KARUNYA LINUX CLUB www.karunya.edu/linuxclub Outline 1. Overview of Linux System 2. Basic Commands 3. Relative & Absolute Path 4. Redirect, Append and Pipe 5. Permission 6. Process

More information

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study

CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what

More information

Table of Contents. The RCS MINI HOWTO

Table of Contents. The RCS MINI HOWTO Table of Contents The RCS MINI HOWTO...1 Robert Kiesling...1 1. Overview of RCS...1 2. System requirements...1 3. Compiling RCS from Source...1 4. Creating and maintaining archives...1 5. ci(1) and co(1)...1

More information

MPATE-GE 2618: C Programming for Music Technology. Unit 1.1

MPATE-GE 2618: C Programming for Music Technology. Unit 1.1 MPATE-GE 2618: C Programming for Music Technology Unit 1.1 What is an algorithm? An algorithm is a precise, unambiguous procedure for producing certain results (outputs) from given data (inputs). It is

More information

USER GUIDE. Snow Inventory Client for Unix Version 1.1.03 Release date 2015-04-29 Document date 2015-05-20

USER GUIDE. Snow Inventory Client for Unix Version 1.1.03 Release date 2015-04-29 Document date 2015-05-20 USER GUIDE Product Snow Inventory Client for Unix Version 1.1.03 Release date 2015-04-29 Document date 2015-05-20 CONTENT ABOUT THIS DOCUMENT... 3 OVERVIEW... 3 OPERATING SYSTEMS SUPPORTED... 3 PREREQUISITES...

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

Work No. 1 Samba. What is Samba?

Work No. 1 Samba. What is Samba? Work No. 1 Samba What is Samba? Samba is an implementation of a Server Message Block (SMB) protocol server that can be run on almost every variant of UNIX in existence. Samba is an open source project,

More information

How to use PDFlib products with PHP

How to use PDFlib products with PHP How to use PDFlib products with PHP Last change: July 13, 2011 Latest PDFlib version covered in this document: 8.0.3 Latest version of this document available at: www.pdflib.com/developer/technical-documentation

More information

An Open Source Wide-Area Distributed File System. Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com

An Open Source Wide-Area Distributed File System. Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com An Open Source Wide-Area Distributed File System Jeffrey Eric Altman jaltman *at* secure-endpoints *dot* com What is AFS? A global wide-area Distributed File System providing location independent authenticated

More information

pure::variants Transformer for Software Configuration Management Manual

pure::variants Transformer for Software Configuration Management Manual pure-systems GmbH Copyright 2003-2007 pure-systems GmbH 2007 Table of Contents 1. Synopsis... 1 2. Concept... 1 2.1. Client Authorization... 2 3. Installing the Transformer... 3 4. Using the Transformer...

More information

The Relative Worst Order Ratio for On-Line Algorithms

The Relative Worst Order Ratio for On-Line Algorithms The Relative Worst Order Ratio for On-Line Algorithms Joan Boyar 1 and Lene M. Favrholdt 2 1 Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, joan@imada.sdu.dk

More information

CSE 135: Introduction to Theory of Computation Decidability and Recognizability

CSE 135: Introduction to Theory of Computation Decidability and Recognizability CSE 135: Introduction to Theory of Computation Decidability and Recognizability Sungjin Im University of California, Merced 04-28, 30-2014 High-Level Descriptions of Computation Instead of giving a Turing

More information

Arithmetic Coding: Introduction

Arithmetic Coding: Introduction Data Compression Arithmetic coding Arithmetic Coding: Introduction Allows using fractional parts of bits!! Used in PPM, JPEG/MPEG (as option), Bzip More time costly than Huffman, but integer implementation

More information

CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor

CSE543 - Introduction to Computer and Network Security. Module: Reference Monitor CSE543 - Introduction to Computer and Network Security Module: Reference Monitor Professor Trent Jaeger 1 Living with Vulnerabilities So, software is potentially vulnerable In a variety of ways So, how

More information

Introduction to Linux and Cluster Basics for the CCR General Computing Cluster

Introduction to Linux and Cluster Basics for the CCR General Computing Cluster Introduction to Linux and Cluster Basics for the CCR General Computing Cluster Cynthia Cornelius Center for Computational Research University at Buffalo, SUNY 701 Ellicott St Buffalo, NY 14203 Phone: 716-881-8959

More information

Tutorial 0A Programming on the command line

Tutorial 0A Programming on the command line Tutorial 0A Programming on the command line Operating systems User Software Program 1 Program 2 Program n Operating System Hardware CPU Memory Disk Screen Keyboard Mouse 2 Operating systems Microsoft Apple

More information

Generating Visual Studio Project Files

Generating Visual Studio Project Files Table of Contents 1. Overview... 1 2. About this tutorial... 1 3. Setting up the pure::variants project... 1 4. Setting up the feature model... 3 5. Setting up the family model... 3 6. Setting up the transformation...

More information

Lecture 24 Systems Programming in C

Lecture 24 Systems Programming in C Lecture 24 Systems Programming in C A process is a currently executing instance of a program. All programs by default execute in the user mode. A C program can invoke UNIX system calls directly. A system

More information

Lab Manual. Unix and Linux Programming (Pr) COT-218 and IT-214

Lab Manual. Unix and Linux Programming (Pr) COT-218 and IT-214 Lab Manual Unix and Linux Programming (Pr) COT-218 and IT-214 Lab Instructions Several practicals / programs? Whether an experiment contains one or several practicals /programs One practical / program

More information

NIST/ITL CSD Biometric Conformance Test Software on Apache Hadoop. September 2014. National Institute of Standards and Technology (NIST)

NIST/ITL CSD Biometric Conformance Test Software on Apache Hadoop. September 2014. National Institute of Standards and Technology (NIST) NIST/ITL CSD Biometric Conformance Test Software on Apache Hadoop September 2014 Dylan Yaga NIST/ITL CSD Lead Software Designer Fernando Podio NIST/ITL CSD Project Manager National Institute of Standards

More information

SAP HANA Client Installation and Update Guide

SAP HANA Client Installation and Update Guide PUBLIC SAP HANA Platform SPS 12 Document Version: 1.0 2016-05-11 Content 1 Introduction....3 1.1 Supported Platforms.... 3 1.2 Software Download.... 4 2 SAP HANA Client on UNIX or Linux....7 2.1 Planning

More information

Enabling Secure Payment Processing On Your Site. A guide to accepting and managing online payments for e-commerce

Enabling Secure Payment Processing On Your Site. A guide to accepting and managing online payments for e-commerce Enabling Secure Payment Processing On Your Site A guide to accepting and managing online payments for e-commerce Table of Contents Introduction 1 Getting started: Setting up your 3 Internet Merchant Account

More information

Installation and Configuration Guide. NetIQ Sentinel UNIX Agent

Installation and Configuration Guide. NetIQ Sentinel UNIX Agent Installation and Configuration Guide NetIQ Sentinel UNIX Agent March 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Informatique Fondamentale IMA S8

Informatique Fondamentale IMA S8 Informatique Fondamentale IMA S8 Cours 1 - Intro + schedule + finite state machines Laure Gonnord http://laure.gonnord.org/pro/teaching/ Laure.Gonnord@polytech-lille.fr Université Lille 1 - Polytech Lille

More information

pure::variants Connector for Version Control Systems Manual

pure::variants Connector for Version Control Systems Manual pure::variants Connector for Version Control Systems Manual pure-systems GmbH Version 3.2.17 for pure::variants 3.2 Copyright 2003-2015 pure-systems GmbH 2015 Table of Contents 1. Synopsis... 1 1.1. Software

More information

The Design of a Cryptographic Security Architecture

The Design of a Cryptographic Security Architecture The Design of a Cryptographic Security Architecture Peter Gutmann University of Auckland, New Zealand The Problem... design a versatile, multiplatform, crypto architecture Standard environment considerations

More information

Forming a P2P System In order to form a P2P system, the 'central-server' should be created by the following command.

Forming a P2P System In order to form a P2P system, the 'central-server' should be created by the following command. CSCI 5211 Fall 2015 Programming Project Peer-to-Peer (P2P) File Sharing System In this programming assignment, you are asked to develop a simple peer-to-peer (P2P) file sharing system. The objective of

More information

Other trademarks and Registered trademarks include: LONE-TAR. AIR-BAG. RESCUE-RANGER TAPE-TELL. CRONY. BUTTSAVER. SHELL-LOCK

Other trademarks and Registered trademarks include: LONE-TAR. AIR-BAG. RESCUE-RANGER TAPE-TELL. CRONY. BUTTSAVER. SHELL-LOCK Quick Start Guide Copyright Statement Copyright Lone Star Software Corp. 1983-2013 ALL RIGHTS RESERVED. All content viewable or accessible from this guide is the sole property of Lone Star Software Corp.

More information

Candidates should attempt FOUR questions. All questions carry 25 marks.

Candidates should attempt FOUR questions. All questions carry 25 marks. UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE

More information

File Manager User Guide

File Manager User Guide File Manager User Guide Please note: EasySiteOptimizer Version 1.6 is supplied with Web Hosting (IBP) and Advanced Web Hosting only. File Manager Introduction to File Manager To access File Manager, select

More information

static void insecure (localhost *unix)

static void insecure (localhost *unix) static void insecure (localhost *unix) Eric Pancer epancer@infosec.depaul.edu Information Security Team DePaul University http://infosec.depaul.edu Securing UNIX Hosts from Local Attack p.1/32 Overview

More information

Research and Design of Universal and Open Software Development Platform for Digital Home

Research and Design of Universal and Open Software Development Platform for Digital Home Research and Design of Universal and Open Software Development Platform for Digital Home CaiFeng Cao School of Computer Wuyi University, Jiangmen 529020, China cfcao@126.com Abstract. With the development

More information

TN203. Porting a Program to Dynamic C. Introduction

TN203. Porting a Program to Dynamic C. Introduction TN203 Porting a Program to Dynamic C Introduction Dynamic C has a number of improvements and differences compared to many other C compiler systems. This application note gives instructions and suggestions

More information

Transferring vs. Transporting Between SAS Operating Environments Mimi Lou, Medical College of Georgia, Augusta, GA

Transferring vs. Transporting Between SAS Operating Environments Mimi Lou, Medical College of Georgia, Augusta, GA CC13 Transferring vs. Transporting Between SAS Operating Environments Mimi Lou, Medical College of Georgia, Augusta, GA ABSTRACT Prior to SAS version 8, permanent SAS data sets cannot be moved directly

More information

Chapter 13 - The Preprocessor

Chapter 13 - The Preprocessor Chapter 13 - The Preprocessor Outline 13.1 Introduction 13.2 The#include Preprocessor Directive 13.3 The#define Preprocessor Directive: Symbolic Constants 13.4 The#define Preprocessor Directive: Macros

More information

Linux für bwgrid. Sabine Richling, Heinz Kredel. Universitätsrechenzentrum Heidelberg Rechenzentrum Universität Mannheim. 27.

Linux für bwgrid. Sabine Richling, Heinz Kredel. Universitätsrechenzentrum Heidelberg Rechenzentrum Universität Mannheim. 27. Linux für bwgrid Sabine Richling, Heinz Kredel Universitätsrechenzentrum Heidelberg Rechenzentrum Universität Mannheim 27. June 2011 Richling/Kredel (URZ/RUM) Linux für bwgrid FS 2011 1 / 33 Introduction

More information

Outside In Image Export Technology SDK Quick Start Guide

Outside In Image Export Technology SDK Quick Start Guide Reference: 2009/02/06-8.3 Outside In Image Export Technology SDK Quick Start Guide This document provides an overview of the Outside In Image Export Software Developer s Kit (SDK). It includes download

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information

Using Network Attached Storage with Linux. by Andy Pepperdine

Using Network Attached Storage with Linux. by Andy Pepperdine Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to

More information

Linux Kernel Architecture

Linux Kernel Architecture Linux Kernel Architecture Amir Hossein Payberah payberah@yahoo.com Contents What is Kernel? Kernel Architecture Overview User Space Kernel Space Kernel Functional Overview File System Process Management

More information

License Management Guide

License Management Guide License Management Guide IDL Version 5.4 September, 2000 Edition Copyright Research Systems, Inc. All Rights Reserved Restricted Rights Notice The IDL software program and the accompanying procedures,

More information

cloud-kepler Documentation

cloud-kepler Documentation cloud-kepler Documentation Release 1.2 Scott Fleming, Andrea Zonca, Jack Flowers, Peter McCullough, El July 31, 2014 Contents 1 System configuration 3 1.1 Python and Virtualenv setup.......................................

More information

Framework 8.1. External Authentication. Reference Manual

Framework 8.1. External Authentication. Reference Manual Framework 8.1 External Authentication Reference Manual The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys

More information

LWIOD Access Audit Module

LWIOD Access Audit Module LWIOD Access Audit Module Andrew Pilloud andrew.pilloud@isilon.com Last updated: June 24, 2010 Current Revision: Abstract Current releases of OneFS use Samba to provide CIFS protocol support. Samba has

More information

Data Sheet VISUAL COBOL 2.2.1 WHAT S NEW? COBOL JVM. Java Application Servers. Web Tools Platform PERFORMANCE. Web Services and JSP Tutorials

Data Sheet VISUAL COBOL 2.2.1 WHAT S NEW? COBOL JVM. Java Application Servers. Web Tools Platform PERFORMANCE. Web Services and JSP Tutorials Visual COBOL is the industry leading solution for COBOL application development and deployment on Windows, Unix and Linux systems. It combines best in class development tooling within Eclipse and Visual

More information

vsftpd - An Introduction to the Very Secure FTP Daemon

vsftpd - An Introduction to the Very Secure FTP Daemon LinuxFocus article number 341 http://linuxfocus.org vsftpd - An Introduction to the Very Secure FTP Daemon by Mario M. Knopf About the author: Mario enjoys to keep busy with

More information

After you place your order, we ll send you an e-mail survey to help collect some of the information we need.

After you place your order, we ll send you an e-mail survey to help collect some of the information we need. Professional Magento Installation Published: March 3, 2010 Installing Magento in and of itself is not terribly difficult. However, there is a lot of work to be done between the install and launch of a

More information

REMOTE DEVELOPMENT OPTION

REMOTE DEVELOPMENT OPTION Leading the Evolution DATA SHEET MICRO FOCUS SERVER EXPRESS TM REMOTE DEVELOPMENT OPTION Executive Overview HIGH PRODUCTIVITY DEVELOPMENT FOR LINUX AND UNIX DEVELOPERS Micro Focus Server Express is the

More information

Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007

Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Constant Propagation Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Osnat Minz and Mati Shomrat Introduction This

More information

ELEC 377. Operating Systems. Week 1 Class 3

ELEC 377. Operating Systems. Week 1 Class 3 Operating Systems Week 1 Class 3 Last Class! Computer System Structure, Controllers! Interrupts & Traps! I/O structure and device queues.! Storage Structure & Caching! Hardware Protection! Dual Mode Operation

More information

Near Optimal Solutions

Near Optimal Solutions Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.

More information

pure::variants Connector for Source Code Management Manual

pure::variants Connector for Source Code Management Manual pure::variants Connector for Source Code Management Manual pure-systems GmbH Version 3.2.17 for pure::variants 3.2 Copyright 2003-2015 pure-systems GmbH 2015 Table of Contents 1. Introduction... 1 1.1.

More information

Building Applications Using Micro Focus COBOL

Building Applications Using Micro Focus COBOL Building Applications Using Micro Focus COBOL Abstract If you look through the Micro Focus COBOL documentation, you will see many different executable file types referenced: int, gnt, exe, dll and others.

More information

6.087 Lecture 1 January 11, 2010

6.087 Lecture 1 January 11, 2010 6.087 Lecture 1 January 11, 2010 Introduction to C Writing C Programs Our First C Program 1 What is C? Dennis Ritchie AT&T Bell Laboratories 1972 16-bit DEC PDP-11 computer (right) Widely used today extends

More information

GenICam 3.0 Faster, Smaller, 3D

GenICam 3.0 Faster, Smaller, 3D GenICam 3.0 Faster, Smaller, 3D Vision Stuttgart Nov 2014 Dr. Fritz Dierks Director of Platform Development at Chair of the GenICam Standard Committee 1 Outline Introduction Embedded System Support 3D

More information

CP Lab 2: Writing programs for simple arithmetic problems

CP Lab 2: Writing programs for simple arithmetic problems Computer Programming (CP) Lab 2, 2015/16 1 CP Lab 2: Writing programs for simple arithmetic problems Instructions The purpose of this Lab is to guide you through a series of simple programming problems,

More information

Tutorial Guide to the IS Unix Service

Tutorial Guide to the IS Unix Service Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular

More information

Writing Portable Programs COS 217

Writing Portable Programs COS 217 Writing Portable Programs COS 217 1 Goals of Today s Class Writing portable programs in C Sources of heterogeneity Data types, evaluation order, byte order, char set, Reading period and final exam Important

More information

See the installation page http://wiki.wocommunity.org/display/documentation/deploying+on+linux

See the installation page http://wiki.wocommunity.org/display/documentation/deploying+on+linux Linux Installation See the installation page http://wiki.wocommunity.org/display/documentation/deploying+on+linux Added goodies (project Wonder) Install couple of more goodies from Wonder. I Installed

More information

Secure Shell Demon setup under Windows XP / Windows Server 2003

Secure Shell Demon setup under Windows XP / Windows Server 2003 Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}

More information

Cisco Setting Up PIX Syslog

Cisco Setting Up PIX Syslog Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring

More information

How to Build an RPM OVERVIEW UNDERSTANDING THE PROCESS OF BUILDING RPMS. Author: Chris Negus Editor: Allison Pranger 09/16/2011

How to Build an RPM OVERVIEW UNDERSTANDING THE PROCESS OF BUILDING RPMS. Author: Chris Negus Editor: Allison Pranger 09/16/2011 How to Build an RPM Author: Chris Negus Editor: Allison Pranger 09/16/2011 OVERVIEW You have created some software that you want to install on Red Hat Enterprise Linux systems. Now that it is done, the

More information

SerNet. Samba Status Update. Munich 13. March 2008. Volker Lendecke SerNet Samba Team. Network Service in a Service Network

SerNet. Samba Status Update. Munich 13. March 2008. Volker Lendecke SerNet Samba Team. Network Service in a Service Network Samba Status Update Munich 13. March 2008 Volker Lendecke SerNet Samba Team 03/2008, Volker Lendecke, SerNet Service Network GmbH, Seite 1 Volker Lendecke Co-founder SerNet - Service Network GmbH Free

More information

This document explains how to configure and use the IOPRINT+ Print Server in the Unix TCP/IP environment.

This document explains how to configure and use the IOPRINT+ Print Server in the Unix TCP/IP environment. Unix - TCP/IP This document explains how to configure and use the IOPRINT+ Print Server in the Unix TCP/IP environment. Software Requirements TCP/IP protocol, FTP (Optional: - BOOTP, Rarp, Telnet) LPD

More information

MultiValue Dashboard. Installation Guide

MultiValue Dashboard. Installation Guide MultiValue Dashboard Installation Guide Introduction to MultiValue Dashboard MultiValue Dashboard is a dynamic Web-based development tool for the creation of desktop widgets utilizing your knowledge of

More information

Best Practices: Implementing Large Scale Collections with F- Response

Best Practices: Implementing Large Scale Collections with F- Response Best Practices: Implementing Large Scale Collections with F- Response Note: This guide assumes you have familiarity with F-Response Enterprise or Consultant Edition. For more information, please reference

More information

Project 5 Twitter Analyzer Due: Fri. 2015-12-11 11:59:59 pm

Project 5 Twitter Analyzer Due: Fri. 2015-12-11 11:59:59 pm Project 5 Twitter Analyzer Due: Fri. 2015-12-11 11:59:59 pm Goal. In this project you will use Hadoop to build a tool for processing sets of Twitter posts (i.e. tweets) and determining which people, tweets,

More information

Opswise Managed File Transfer 5.2.0 for UNIX Quick Start Guide

Opswise Managed File Transfer 5.2.0 for UNIX Quick Start Guide Opswise Managed File Transfer 5.2.0 for UNIX Quick Start Guide 2015 by Stonebranch, Inc. All Rights Reserved. Opswise Managed File Transfer 5.2.0 for UNIX Quick Start Guide Objective System Requirements

More information

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research

MapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With

More information

SecureVault Online Backup Service FAQ

SecureVault Online Backup Service FAQ SecureVault Online Backup Service FAQ C0110 SecureVault FAQ (EN) - 1 - Rev. 19-Nov-2007 Table of Contents 1. General 4 Q1. Can I exchange the client type between SecureVault PC Backup Manager and SecureVault

More information

CA SiteMinder. Web Agent Installation Guide for Apache-based Servers. r12.5. 2nd Edition

CA SiteMinder. Web Agent Installation Guide for Apache-based Servers. r12.5. 2nd Edition CA SiteMinder Web Agent Installation Guide for Apache-based Servers r12.5 2nd Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred

More information

Basic Linux Skills. oh, cool

Basic Linux Skills. oh, cool Basic Linux Skills oh, cool 1 who am i? i m cyle i m a systems developer and architect i use linux all day every day i like this kind of stuff 2 why use linux? specifically, a no-gui linux it s fast. so

More information

Patch Assessment Content Update Release Notes for CCS 11.1. Version: 2016-02 Update

Patch Assessment Content Update Release Notes for CCS 11.1. Version: 2016-02 Update Patch Assessment Content Update Release Notes for CCS 11.1 Version: 2016-02 Update Patch Assessment Content Update 2016-02 Release Notes for CCS 11.1 Legal Notice Copyright 2016 Symantec Corporation. All

More information

Linux FTP Server Setup

Linux FTP Server Setup 17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started

More information

Procase Consulting. APEX 4.1 Introduction. Oleg Mochkin

Procase Consulting. APEX 4.1 Introduction. Oleg Mochkin Procase Consulting APEX 4.1 Introduction Oleg Mochkin 1 APEX Users 2 APEX Express Use Cases 3 APEX as Solution Unique RAD tools for Oracle Database Browser based development Declarative way to build Web

More information

Host-Oriented Security Test Suite (HOSTS)

Host-Oriented Security Test Suite (HOSTS) 1 Host-Oriented Security Test Suite (HOSTS) James A. Finegan 18th Annual Computer Security Applications Conference Enterprise Security December 12, 2002 1 2 Agenda Problem Description What is HOSTS? -

More information

Reflection X Advantage Help. Date

Reflection X Advantage Help. Date Reflection X Advantage Help Date Copyrights and Notices Attachmate Reflection 2015 Copyright 2015 Attachmate Corporation. All rights reserved. No part of the documentation materials accompanying this Attachmate

More information

14. CUCM 8 - free sftp solution for backup on ubuntu 10.04 server

14. CUCM 8 - free sftp solution for backup on ubuntu 10.04 server Published on cdesigner.eu (http://www.cdesigner.eu) Home > VoIP > 14. CUCM 8 - free sftp solution for backup on ubuntu 10.04 server 14. CUCM 8 - free sftp solution for backup on ubuntu 10.04 server All

More information

The Plan Today... System Calls and API's Basics of OS design Virtual Machines

The Plan Today... System Calls and API's Basics of OS design Virtual Machines System Calls + The Plan Today... System Calls and API's Basics of OS design Virtual Machines System Calls System programs interact with the OS (and ultimately hardware) through system calls. Called when

More information

Operating Instructions for the GDPdU-Data Media provision Using SAP DART

Operating Instructions for the GDPdU-Data Media provision Using SAP DART AvenDATA GmbH Kaiserin-Augusta-Allee 14 10553 Berlin, Germany Telefon: +49-(0)30/700 157 500 Telefax: +49-(0)30/700 157 599 AG Charlottenburg HRB 89998 www.avendata.de Author: jh, ter Version: 1.1 Manual_SAP_DART_1.1.doc

More information

Hadoop Shell Commands

Hadoop Shell Commands Table of contents 1 DFShell... 3 2 cat...3 3 chgrp...3 4 chmod...3 5 chown...4 6 copyfromlocal... 4 7 copytolocal... 4 8 cp...4 9 du...4 10 dus... 5 11 expunge... 5 12 get... 5 13 getmerge... 5 14 ls...

More information

Introduction. dnotify

Introduction. dnotify Introduction In a multi-user, multi-process operating system, files are continually being created, modified and deleted, often by apparently unrelated processes. This means that any software that needs

More information

Hadoop Shell Commands

Hadoop Shell Commands Table of contents 1 FS Shell...3 1.1 cat... 3 1.2 chgrp... 3 1.3 chmod... 3 1.4 chown... 4 1.5 copyfromlocal...4 1.6 copytolocal...4 1.7 cp... 4 1.8 du... 4 1.9 dus...5 1.10 expunge...5 1.11 get...5 1.12

More information

Optimize Results By Integrating People, Process and IT. Services. Why Mirage Data?

Optimize Results By Integrating People, Process and IT. Services. Why Mirage Data? Optimize Results By Integrating People, Process and IT For Mirage Data, consulting is about providing the highest level of quality and service. With an extensive understanding and focus on corporate needs,

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Getting Started with Oracle Data Integrator 12c Virtual Machine Installation Guide December 2014 Oracle Fusion Middleware Getting Started with Oracle Data Integrator, 12c Copyright

More information

Using Bonds for Describing Method Dispatch in Role-Oriented Software Models

Using Bonds for Describing Method Dispatch in Role-Oriented Software Models Using Bonds for Describing Method Dispatch in Role-Oriented Software Models Henri Mühle Technische Universität Dresden Institut für Algebra Henri.Muehle@tu-dresden.de Abstract. Role-oriented software modeling

More information

CS154. Turing Machines. Turing Machine. Turing Machines versus DFAs FINITE STATE CONTROL AI N P U T INFINITE TAPE. read write move.

CS154. Turing Machines. Turing Machine. Turing Machines versus DFAs FINITE STATE CONTROL AI N P U T INFINITE TAPE. read write move. CS54 Turing Machines Turing Machine q 0 AI N P U T IN TAPE read write move read write move Language = {0} q This Turing machine recognizes the language {0} Turing Machines versus DFAs TM can both write

More information

Automated Offsite Backup with rdiff-backup

Automated Offsite Backup with rdiff-backup Automated Offsite Backup with rdiff-backup Michael Greb 2003-10-21 Contents 1 Overview 2 1.1 Conventions Used........................................... 2 2 Setting up SSH 2 2.1 Generating SSH Keys........................................

More information

Print Server User s Manual Version: 2.0 (January, 2006)

Print Server User s Manual Version: 2.0 (January, 2006) Print Server User s Manual Version: 2.0 (January, 2006) COPYRIGHT Copyright 2006/2007 by this company. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

Shipping Products Chart. Contents

Shipping Products Chart. Contents Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11e ()... 2 Director Management Console (console

More information

Shell Scripting Crash Course

Shell Scripting Crash Course Shell Scripting Crash Course Travis Phillips JAX LUG Overview What is a shell script What can I do with a shell script How to build shell scripts Syntax basics Basic useful shell commands Pipes and redirectors

More information

Birmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0

Birmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0 Birmingham Environment for Academic Research Introduction to Linux Quick Reference Guide Research Computing Team V1.0 Contents The Basics... 4 Directory / File Permissions... 5 Process Management... 6

More information

StreamServe Persuasion SP5 Supported platforms and software

StreamServe Persuasion SP5 Supported platforms and software StreamServe Persuasion SP5 Supported platforms and software Reference Guide Rev A StreamServe Persuasion SP5 Reference Guide Rev A 2001-2010 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520

More information

Notes on Complexity Theory Last updated: August, 2011. Lecture 1

Notes on Complexity Theory Last updated: August, 2011. Lecture 1 Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look

More information

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session

More information

Getting off the ground when creating an RVM test-bench

Getting off the ground when creating an RVM test-bench Getting off the ground when creating an RVM test-bench Rich Musacchio, Ning Guo Paradigm Works rich.musacchio@paradigm-works.com,ning.guo@paradigm-works.com ABSTRACT RVM compliant environments provide

More information