FABER Formal Languages, Automata and Models of Computation
|
|
- Stephanie Taylor
- 7 years ago
- Views:
Transcription
1 DVA 325 FABR Forml Lnguges, Automt nd Models of Computtion Lecture 7 chool of Innovtion, Design nd ngineering Mälrdlen University 27 November
2 Content ü Regulr vs. Non-regulr Lnguges ü Context-Free Lnguges ü Context-Free Grmmrs ü Derivtion Trees. Ambiguity ü Applictions ü Push-Down Automt (PDA) 2
3 Time to tke the next step: beyond Regulr Lnguges n l n l { b c : n, l 0} { n! : n 0} Non-regulr Context-Free lnguges Lnguges n n R { b } { ww } Regulr Lnguges 3
4 Automt theory: forml lnguges nd forml grmmrs Grmmr Lnguges Automton Type-0 Type-1 Type-2 Recursively enumerble Contextsensitive Context-free Turing mchine Liner-bounded nondeterministic Turing mchine Non-deterministic pushdown utomton Type-3 Regulr Finite stte utomton Production rules No restrictions nd 4
5 Context-Free Lnguges Bsed on C Busch, RPI, Models of Computtion 5
6 Context-Free Lnguges Context-Free Grmmrs Pushdown Automt 6
7 Context-Free Grmmrs 7
8 V T P : : : : Grmmr Forml Definition G = ( V, T,, P) et of vribles et of terminl symbols trt vrible et of production rules 8
9 Repetition: Regulr Grmmrs Grmmr G = ( V, T,, P) Vribles Terminl symbols trt vribles Right or Left Liner Grmmrs. Productions of the form: A xb A Bx or C x x is string of terminls 9
10 Definition: Context-Free Grmmrs Grmmr G = ( V, T,, P) Vribles Terminl symbols trt vribles Productions of the form: A x x is string of vribles nd terminls 10
11 Regulr vs. Context-free Grmmr A regulr grmmr is either right or left liner, wheres context free* grmmr is ny combintion of terminls nd non-terminls. Hence regulr grmmrs re subset of context-free grmmrs. Grmmr generting plindromes is not regulr: A B ABA something something *The nme context-free grmmr is explined by the property of productions tht re independent of the surrounding symbols. There re lso context-sensitive grmmrs where productions depend on the context (symbols tht surround vribles). 11
12 xmple 1: A context-free grmmr G b A derivtion λ b bb bb 12
13 A context-free grmmr G b λ Another derivtion b bb bbb bbb 13
14 b λ n L (G) = { b : n 0} n!( ( ( ( ) ) ) )! 14
15 xmple 2: A context-free grmmr G bb λ A derivtion bb bb 15
16 A context-free grmmr G bb λ Another derivtion bb bb 16
17 bb λ R L( G) = { ww : w {, b}*} 17
18 xmple 3: A context-free grmmr G b λ A derivtion b b b 18
19 A context-free grmmr G b λ A derivtion b b bb bb 19
20 20 λ b } prefix in ny ) ( ) ( nd ), ( ) ( : { ) ( v v n v n w n w n w G L b b = =! )! ) ( ( ) ) ) ( ( )( (
21 xmple 4: Lnguge L = { b :n m} For the 1 A For the B 1 A, A. cse n n b λ, m cse n > m : B, 1 bb b. b λ, < m : is context - free.
22 bb b B A A b λ B A bb b. B b λ B, m n < :, A. A b λ, A m n >, : is: the lnguge for grmmr The m} :n b { L m n =
23 Definition: Context-Free Grmmrs Grmmr G = ( V, T,, P) Vribles Terminl symbols trt vribles Productions of the form: A x x is string of vribles nd terminls 23
24 Definition: Context-Free Lnguges A lnguge L is context-free if nd only if there is context-free grmmr L = L(G) G with 24
25 A A B B AB A λ Bb λ Derivtion Order Leftmost derivtion AB AB BBb b
26 A A B B λ λ Derivtion Order AB A Bb Rightmost derivtion 1 4 AB 5 ABb 2 3 AbAbb 26
27 A AB bbb B A λ Leftmost derivtion AB bbbb babb bbbbbb bbbbb bbbb 27
28 A AB bbb B A λ Rightmost derivtion AB A bbb bab bbbbb bbbb 28
29 Derivtion Trees 29
30 Derivtion cn be represented in tree form AB A A λ B Bb λ AB A B 30
31 AB A A λ B Bb λ AB AB A B A 31
32 AB A A λ B Bb λ AB AB ABb A B A B b 32
33 AB A A λ B Bb λ AB AB ABb Bb A B A B b λ 33
34 AB A A λ B Bb λ AB AB ABb Bb b Derivtion Tree A B A B b λ λ 34
35 AB A A λ B Bb λ AB AB ABb Bb b Derivtion Tree A B yield A B b λλ b = b λ λ 35
36 Prtil Derivtion Trees AB A A λ B Bb λ AB Prtil derivtion tree A B 36
37 AB AB Prtil derivtion tree A B A 37
38 AB AB sententil form Prtil derivtion tree yield A B AB A 38
39 ometimes, derivtion order doesn t mtter Leftmost: AB AB B Bb b Rightmost: AB ABb Ab Ab b The sme derivtion tree A B A B b λ λ 39
40 Ambiguity 40
41 41 ) ( leftmost derivtion derivtion (* denotes multipliction)
42 42 ) ( derivtion leftmost derivtion
43 ( ) 43
44 ( ) Two derivtion trees 44
45 45 The grmmr ) ( is mbiguous! tring hs two derivtion trees
46 46 hs two leftmost derivtions: * The grmmr ) ( is mbiguous s the string
47 Definition A context-free grmmr G is mbiguous if some string w L(G) hs two or more derivtion trees (two or more leftmost/rightmost derivtions). 47
48 Why do we cre bout mbiguity? = 2 48
49 Why do we cre bout mbiguity?
50 2 2 Why do we cre bout mbiguity? = = 8 50
51 Correct result: =
52 Ambiguity is bd for progrmming lnguges We wnt to remove mbiguity! 52
53 53 We fix the mbiguous grmmr ) ( by introducing prentheses () to indicte grouping, (precedence) F F F T F T T T T ) ( Non-mbiguous grmmr
54 54 F F F T F T T T T ) ( F F F F T T T F T T T T F T F F T
55 Unique derivtion tree T T T F F F 55
56 G The grmmr : T T T T F T F F ( ) is non-mbiguous. very string derivtion tree. w L(G) F hs unique 56
57 57 Inherent Ambiguity ome context free lnguges hve only mbiguous grmmrs! xmple: } { } { m m n m n n c b c b L = λ 1 1 Ab A A c λ 2 2 bbc B B 1 2
58 The string n b n c hs two derivtion trees n c 2 58
59 n l n l { b c : n, l 0} { n! : n 0} Non-regulr Context-Free lnguges Lnguges n n R { b } { ww } Regulr Lnguges 59
60 Applictions: Compilers 60
61 Progrm v = 5; if (v>5) x = 12 v; while (x!=3) { x = x - 3; v = 10; }... Compiler Mchine Code Add v,v,0 cmp v,5 jmplt L THN: dd x, 12,v L: WHIL: cmp x,
62 Compiler Lexicl nlyzer prser input output progrm mchine code 62
63 A prser knows the grmmr of the progrmming lnguge 63
64 PROGRAM TMT_LIT TMT Prser TMT_LIT TMT; TMT_LIT TMT; XPR IF_TMT WHIL_TMT { TMT_LIT } XPR IF_TMT WHIL_TMT XPR XPR XPR - XPR ID if (XPR) then TMT if (XPR) then TMT else TMT while (XPR) do TMT 64
65 The prser finds the derivtion of prticulr input input 10 2 * 5 Prser * INT derivtion * 10 * 10 2 * 10 2 * 5 65
66 derivtion derivtion tree * 10 * 10 2 * 10 2 * 5 10 *
67 derivtion tree mchine code mult, 2, 5 10 * dd b, 10,
68 Prsing exmples 68
69 input string Prser grmmr derivtion 69
70 xmple: input bb Prser b b derivtion? λ 70
71 xhustive erch b b λ Phse 1: Find derivtion of b bb b λ All possible derivtions of length 1 71
72 bb b b λ 72
73 73 Phse 2 b bb b b Phse 1 b b bb b bb b b b λ b b
74 Phse 2 b b λ b bb b b b bb Phse 3 b bb bb 74
75 Finl result of exhustive serch (top-down prsing) Prser input b bb b λ derivtion b bb bb 75
76 Another use of context free grmmrs: Context Free Art 76
77 Context Free Art 77
78 Context-Free Lnguges Context-Free Grmmrs Pushdown Automt stck utomton 78
79 Pushdown Automt PDAs 79
80 Pushdown Automton - PDA Input tring tck ttes 80
81 The tck A PDA cn write symbols on stck nd red them lter on. POP reding symbol PUH writing symbol All ccess to the stck only on the top! (tck top is written leftmost in the string, e.g. yxz) A stck is vluble s it cn hold n unlimited mount of informtion. The stck llows pushdown utomt to recognize some non-regulr lnguges.! y x z 81
82 The ttes Input symbol Pop old reding stck symbol Push new writing stck symbol, b / c q 1 q 2 82
83 , b / c q 1 q 2 input!!!! stck b top Replce c e h $ e h $ (An lterntive is to strt nd finish with empty stck) 83
84 ,λ / c q 1 q 2 input!!!! stck c b top Push b e h $ e h $ 84
85 input,b / λ q 1 q 2!!!! stck b top Pop e h $ e h $ 85
86 , λ / λ q 1 q 2 input!!!! stck b top No Chnge b e h $ e h $ 86
87 Forml Definition Pushdown Automton is defined s 7-tuple M = ( Q, Σ, Γ, δ, q0, z, F) ttes Finl sttes Input lphbet tck lphbet Trnsition function strt stte tck strt symbol 87
88 xmple 3.7 lling: A PDA for simple nested prenthesis strings Time 0 ( ( ( ) ) ) ε Input tck (, ε / ( ), ( / ε strt s ),(/ε q end 88
89 xmple 3.7 Input ( ( ( ) ) ) ( ε Time 1 tck (, ε / ( ), ( / ε strt s ),(/ε q end 89
90 xmple 3.7 Time 2 Input ( ( ( ) ) ) ( ( ε (, ε / ( ), ( / ε tck strt s ),(/ε end q 90
91 xmple 3.7 Input ( ( ( ) ) ) ( ( Time 3 ( ε (, ε / ( ), ( / ε tck strt s ),(/ε q end 91
92 xmple 3.7 Input ( ( ( ) ) ) ( ( Time 4 (, ε / ( ), ( / ε ( ε tck strt s ),(/ε q end 92
93 xmple 3.7 Input ( ( ( ) ) ) (, ε / ( ), ( / ε ( ( ε tck Time 5 strt s ),(/ ε q end 93
94 xmple 3.7 Input ( ( ( ) ) ) ( ε Time 6 (, ε / ( ), ( / ε tck strt s ),(/ε q end 94
95 xmple 3.7 Input ( ( ( ) ) ) ε Time 7 tck (, ε / ( ), ( / ε strt s ),(/ε q end 95
One Minute To Learn Programming: Finite Automata
Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge
More informationRegular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
More informationHomework 3 Solutions
CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.
More informationA Visual and Interactive Input abb Automata. Theory Course with JFLAP 4.0
Strt Puse Step Noninverted Tree A Visul nd Interctive Input Automt String ccepted! 5 nodes generted. Theory Course with JFLAP 4.0 q0 even 's, even 's q2 even 's, odd 's q1 odd 's, even 's q3 odd 's, odd
More informationflex Regular Expressions and Lexical Scanning Regular Expressions and flex Examples on Alphabet A = {a,b} (Standard) Regular Expressions on Alphabet A
flex Regulr Expressions nd Lexicl Scnning Using flex to Build Scnner flex genertes lexicl scnners: progrms tht discover tokens. Tokens re the smllest meningful units of progrm (or other string). flex is
More informationRegular Languages and Finite Automata
N Lecture Notes on Regulr Lnguges nd Finite Automt for Prt IA of the Computer Science Tripos Mrcelo Fiore Cmbridge University Computer Lbortory First Edition 1998. Revised 1999, 2000, 2001, 2002, 2003,
More informationPROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY
MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive
More informationSolution to Problem Set 1
CSE 5: Introduction to the Theory o Computtion, Winter A. Hevi nd J. Mo Solution to Prolem Set Jnury, Solution to Prolem Set.4 ). L = {w w egin with nd end with }. q q q q, d). L = {w w h length t let
More informationAlgebra Review. How well do you remember your algebra?
Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then
More informationJava CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser:
Jv CUP Jv CUP is prser-genertion tool, similr to Ycc. CUP uilds Jv prser for LALR(1) grmmrs from production rules nd ssocited Jv code frgments. When prticulr production is recognized, its ssocited code
More informationSolutions for Selected Exercises from Introduction to Compiler Design
Solutions for Selected Exercises from Introduction to Compiler Design Torben Æ. Mogensen Lst updte: My 30, 2011 1 Introduction This document provides solutions for selected exercises from Introduction
More informationPushdown Automata. place the input head on the leftmost input symbol. while symbol read = b and pile contains discs advance head remove disc from pile
Pushdown Automata In the last section we found that restricting the computational power of computing devices produced solvable decision problems for the class of sets accepted by finite automata. But along
More informationBasically, logarithmic transformations ask, a number, to what power equals another number?
Wht i logrithm? To nwer thi, firt try to nwer the following: wht i x in thi eqution? 9 = 3 x wht i x in thi eqution? 8 = 2 x Biclly, logrithmic trnformtion k, number, to wht power equl nother number? In
More informationUnambiguous Recognizable Two-dimensional Languages
Unmbiguous Recognizble Two-dimensionl Lnguges Mrcell Anselmo, Dor Gimmrresi, Mri Mdoni, Antonio Restivo (Univ. of Slerno, Univ. Rom Tor Vergt, Univ. of Ctni, Univ. of Plermo) W2DL, My 26 REC fmily I REC
More information1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam
1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges
More informationPolynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
More informationThe Velocity Factor of an Insulated Two-Wire Transmission Line
The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the
More informationMath 135 Circles and Completing the Square Examples
Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for
More informationtrademark and symbol guidelines FOR CORPORATE STATIONARY APPLICATIONS reviewed 01.02.2007
trdemrk nd symbol guidelines trdemrk guidelines The trdemrk Cn be plced in either of the two usul configurtions but horizontl usge is preferble. Wherever possible the trdemrk should be plced on blck bckground.
More informationExample 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.
2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this
More informationGraphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
More informationProtocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff
Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention
More informationBinary Representation of Numbers Autar Kaw
Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy
More informationPushdown automata. Informatics 2A: Lecture 9. Alex Simpson. 3 October, 2014. School of Informatics University of Edinburgh als@inf.ed.ac.
Pushdown automata Informatics 2A: Lecture 9 Alex Simpson School of Informatics University of Edinburgh als@inf.ed.ac.uk 3 October, 2014 1 / 17 Recap of lecture 8 Context-free languages are defined by context-free
More informationFORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION EXERCISES ON REGULAR LANGUAGES
FORMAL LANGUAGES, AUTOMATA AND THEORY OF COMPUTATION EXERCISES ON REGULAR LANGUAGES Introduction This compendium contins exercises out regulr lnguges for the course Forml Lnguges, Automt nd Theory of Computtion
More informationAdvanced Baseline and Release Management. Ed Taekema
Advnced Bseline nd Relese Mngement Ed Tekem Introduction to Bselines Telelogic Synergy uses bselines to perform number of criticl configurtion mngement tsks. They record the stte of the evolving softwre
More informationVirtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org
Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,
More informationQuick Reference Guide: Reset Password
Quick Reference Guide: Reset Pssword How to reset pssword This Quick Reference Guide shows you how to reset your pssword if you hve forgotten it. There re three wys to reset your SingPss pssword: 1) Online
More informationMathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100
hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationHillsborough Township Public Schools Mathematics Department Computer Programming 1
Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationUse Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.
Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationReasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More informationAutomata and Computability. Solutions to Exercises
Automata and Computability Solutions to Exercises Fall 25 Alexis Maciel Department of Computer Science Clarkson University Copyright c 25 Alexis Maciel ii Contents Preface vii Introduction 2 Finite Automata
More informationLecture 5. Inner Product
Lecture 5 Inner Product Let us strt with the following problem. Given point P R nd line L R, how cn we find the point on the line closest to P? Answer: Drw line segment from P meeting the line in right
More informationVendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationConcept Formation Using Graph Grammars
Concept Formtion Using Grph Grmmrs Istvn Jonyer, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer Science nd Engineering University of Texs t Arlington Box 19015 (416 Ytes St.), Arlington, TX 76019-0015
More informationHonors Class (Foundations of) Informatics. Tom Verhoeff. Department of Mathematics & Computer Science Software Engineering & Technology
Honors Class (Foundations of) Informatics Tom Verhoeff Department of Mathematics & Computer Science Software Engineering & Technology www.win.tue.nl/~wstomv/edu/hci c 2011, T. Verhoeff @ TUE.NL 1/20 Information
More informationPDF hosted at the Radboud Repository of the Radboud University Nijmegen
PDF hosted t the Rdboud Repository of the Rdboud University Nijmegen The following full text is publisher's version. For dditionl informtion bout this publiction click this link. http://hdl.hndle.net/2066/111343
More informationOn decidability of LTL model checking for process rewrite systems
Act Informtic (2009) 46:1 28 DOI 10.1007/s00236-008-0082-3 ORIGINAL ARTICLE On decidbility of LTL model checking for process rewrite systems Lur Bozzelli Mojmír Křetínský Vojtěch Řehák Jn Strejček Received:
More informationMODULE 3. 0, y = 0 for all y
Topics: Inner products MOULE 3 The inner product of two vectors: The inner product of two vectors x, y V, denoted by x, y is (in generl) complex vlued function which hs the following four properties: i)
More informationFAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University
SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility
More informationSPECIAL PRODUCTS AND FACTORIZATION
MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationOperations with Polynomials
38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply
More informationBabylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity
Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More information! What can a computer do? ! What can a computer do with limited resources? ! Don't talk about specific machines or problems.
Introduction to Theoreticl CS ecture 18: Theory of Computtion Two fundmentl questions.! Wht cn computer do?! Wht cn computer do with limited resources? Generl pproch. Pentium IV running inux kernel.4.!
More informationOr more simply put, when adding or subtracting quantities, their uncertainties add.
Propgtion of Uncertint through Mthemticl Opertions Since the untit of interest in n eperiment is rrel otined mesuring tht untit directl, we must understnd how error propgtes when mthemticl opertions re
More informationIntegration by Substitution
Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is
More informationE-Commerce Comparison
www.syroxemedi.co.uk E-Commerce Comprison We pride ourselves in creting innovtive inspired websites tht re designed to sell. Developed over mny yers, our solutions re robust nd relible in opertion, flexible
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6
More informationLicense Manager Installation and Setup
The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.
More informationHow To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationGenerating In-Line Monitors For Rabin Automata
Generting In-Line Monitors For Rin Automt Hugues Chot, Rphel Khoury, nd Ndi Twi Lvl University, Deprtment of Computer Science nd Softwre Engineering, Pvillon Adrien-Pouliot, 1065, venue de l Medecine Queec
More informationCS154. Turing Machines. Turing Machine. Turing Machines versus DFAs FINITE STATE CONTROL AI N P U T INFINITE TAPE. read write move.
CS54 Turing Machines Turing Machine q 0 AI N P U T IN TAPE read write move read write move Language = {0} q This Turing machine recognizes the language {0} Turing Machines versus DFAs TM can both write
More informationVectors 2. 1. Recap of vectors
Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms
More informationLearning Workflow Petri Nets
Lerning Workflow Petri Nets Jvier Esprz, Mrtin Leucker, nd Mximilin Schlund Technische Universität München, Boltzmnnstr. 3, 85748 Grching, Germny {esprz,leucker,schlund}@in.tum.de Abstrct. Workflow mining
More informationÖVNINGSUPPGIFTER I SAMMANHANGSFRIA SPRÅK. 15 april 2003. Master Edition
ÖVNINGSUPPGIFTER I SAMMANHANGSFRIA SPRÅK 5 april 23 Master Edition CONTEXT FREE LANGUAGES & PUSH-DOWN AUTOMATA CONTEXT-FREE GRAMMARS, CFG Problems Sudkamp Problem. (3.2.) Which language generates the grammar
More information9 CONTINUOUS DISTRIBUTIONS
9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete
More informationWhen Simulation Meets Antichains (on Checking Language Inclusion of NFAs)
When Simultion Meets Antichins (on Checking Lnguge Inclusion of NFAs) Prosh Aziz Abdull 1, Yu-Fng Chen 1, Lukáš Holík 2, Richrd Myr 3, nd Tomáš Vojnr 2 1 Uppsl University 2 Brno University of Technology
More informationLinear Equations in Two Variables
Liner Equtions in Two Vribles In this chpter, we ll use the geometry of lines to help us solve equtions. Liner equtions in two vribles If, b, ndr re rel numbers (nd if nd b re not both equl to 0) then
More informationwww.mathsbox.org.uk e.g. f(x) = x domain x 0 (cannot find the square root of negative values)
www.mthsbo.org.uk CORE SUMMARY NOTES Functions A function is rule which genertes ectl ONE OUTPUT for EVERY INPUT. To be defined full the function hs RULE tells ou how to clculte the output from the input
More informationAutomated Grading of DFA Constructions
Automted Grding of DFA Constructions Rjeev Alur nd Loris D Antoni Sumit Gulwni Dileep Kini nd Mhesh Viswnthn Deprtment of Computer Science Microsoft Reserch Deprtment of Computer Science University of
More informationAREA OF A SURFACE OF REVOLUTION
AREA OF A SURFACE OF REVOLUTION h cut r πr h A surfce of revolution is formed when curve is rotted bout line. Such surfce is the lterl boundr of solid of revolution of the tpe discussed in Sections 7.
More informationFlood-Fill. Flood-fill. Flood-Fill from Seed. Recursive Flood-Fill. 8-connected vs. 4-connected. Recursive Flood-Fill Algorithm
Flood-fill Flood-Fill Used in interctive pint systems. The user specify seed by pointing to the interior of the region to initite flood opertion Recursive Flood-Fill Fill imge-spce region with some intensity
More information3 The Utility Maximization Problem
3 The Utility Mxiiztion Proble We hve now discussed how to describe preferences in ters of utility functions nd how to forulte siple budget sets. The rtionl choice ssuption, tht consuers pick the best
More informationAntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
More informationBypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems
Bypssing Spce Explosion in Regulr Expression Mtching for Network Intrusion Detection n Prevention Systems Jignesh Ptel, Alex Liu n Eric Torng Dept. of Computer Science n Engineering Michign Stte University
More informationTuring Machines: An Introduction
CIT 596 Theory of Computation 1 We have seen several abstract models of computing devices: Deterministic Finite Automata, Nondeterministic Finite Automata, Nondeterministic Finite Automata with ɛ-transitions,
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationEcon 4721 Money and Banking Problem Set 2 Answer Key
Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in
More informationFormal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
More informationLINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of
More informationThe Semantics of Graph Programs
The Semntics of Grph Progrms Detlef Plump Deprtment of Computer Science The University of York, UK Sndr Steinert Deprtment of Computer Science The University of York, UK GP (for Grph Progrms) is rule-bsed,
More informationProject 6 Aircraft static stability and control
Project 6 Aircrft sttic stbility nd control The min objective of the project No. 6 is to compute the chrcteristics of the ircrft sttic stbility nd control chrcteristics in the pitch nd roll chnnel. The
More information19. The Fermat-Euler Prime Number Theorem
19. The Fermt-Euler Prime Number Theorem Every prime number of the form 4n 1 cn be written s sum of two squres in only one wy (side from the order of the summnds). This fmous theorem ws discovered bout
More informationQuick Reference Guide: One-time Account Update
Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)
More informationStart Here. IMPORTANT: To ensure that the software is installed correctly, do not connect the USB cable until step 17. Remove tape and cardboard
Strt Here 1 IMPORTANT: To ensure tht the softwre is instlled correctly, do not connect the USB cle until step 17. Follow the steps in order. If you hve prolems during setup, see Trouleshooting in the lst
More informationthe machine and check the components
Quick Setup Guide Strt Here HL-2270DW Before using this mchine for the first time, red this Quick Setup Guide to setup nd instll your mchine. To view the Quick Setup Guide in other lnguges, plese visit
More informationReview guide for the final exam in Math 233
Review guide for the finl exm in Mth 33 1 Bsic mteril. This review includes the reminder of the mteril for mth 33. The finl exm will be cumultive exm with mny of the problems coming from the mteril covered
More informationPolynomials. Common Mistakes
Polnomils Polnomils Definition A polnomil is single term or sum or difference of terms in which ll vribles hve whole-number eponents nd no vrible ppers in the denomintor. Ech term cn be either constnt,
More informationExperiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationDecision Rule Extraction from Trained Neural Networks Using Rough Sets
Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT
More informationFortiClient (Mac OS X) Release Notes VERSION 5.0.10
FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
More informationSection 5-4 Trigonometric Functions
5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form
More informationSECTION 10-5 Multiplication Principle, Permutations, and Combinations
10-5 Multiplication Principle, Permutations, and Combinations 761 54. Can you guess what the next two rows in Pascal s triangle, shown at right, are? Compare the numbers in the triangle with the binomial
More informationHow fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009
CS 4 -- Spring 2009 Sorting Crol Wenk Slides courtesy of Chrles Leiserson with smll chnges by Crol Wenk CS 4 Anlysis of Algorithms 1 How fst cn we sort? All the sorting lgorithms we hve seen so fr re comprison
More information2 DIODE CLIPPING and CLAMPING CIRCUITS
2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of
More informationAnthem Blue Cross Life and Health Insurance Company University of Southern California Custom Premier PPO 800/20%/20%
Anthem Blue Cross Life nd Helth Insurnce Compny University of Southern Cliforni Custom Premier 800/20%/20% Summry of Benefits nd Coverge: Wht this Pln Covers & Wht it Costs Coverge Period: 01/01/2015-12/31/2015
More informationRotating DC Motors Part II
Rotting Motors rt II II.1 Motor Equivlent Circuit The next step in our consiertion of motors is to evelop n equivlent circuit which cn be use to better unerstn motor opertion. The rmtures in rel motors
More information(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems.
3130CIT: Theory of Computation Turing machines and undecidability (IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. An undecidable problem
More informationUnleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
More informationSection 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control
Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.
More information3515ICT Theory of Computation Turing Machines
Griffith University 3515ICT Theory of Computation Turing Machines (Based loosely on slides by Harald Søndergaard of The University of Melbourne) 9-0 Overview Turing machines: a general model of computation
More informationReversing Medications That Cause Bleeding
Reversing Medictions Tht Cuse Bleeding Dine M. Birnbumer, M.D., FACEP Professor of Medicine University of Cliforni, Los Angeles Senior Fculty Deprtment of Emergency Medicine Hrbor-UCLA Medicl Center The
More information