Size: px
Start display at page:

Download ""

Transcription

1 FloatingpointvericationinHOLLight:theexponentialfunction 1 Floatingpointverication theexponentialfunction inhollight: UniversityofCambridge JohnHarrison Introduction Floatingpointcorrectness Ourimplementationlanguage Thealgorithm OutlineoftheHOLproof Generalconclusions JohnHarrison UniversityofCambridge,December1997

2 FloatingpointvericationinHOLLight:theexponentialfunction 2 Introduction Floatingpointalgorithmsarefairlysmall,but Therehavebeenerrorsincommercial oftencomplicatedmathematically. Inthecaseoftranscendentalfunctionsit's systems,e.g.thepentiumfdivbugin1994. Vericationusingmodelcheckersisdicult diculteventosaywhatcorrectnessmeans. apparatus. becauseoftheneedformathematical Itcanevenbedicultusingtheoremprovers sincenotmanyofthemhavegoodtheoriesof realnumbersetc. JohnHarrison UniversityofCambridge,December1997

3 FloatingpointvericationinHOLLight:theexponentialfunction 3 Floatingpointcorrectness Wewanttospecifythecorrectnessaccordingto thefollowingdiagram: v(a) exp 6 -v(exp(a)) exp(v(a)) 6 v v a EXP -EXP(a) andexp(v(a))in`unitsinthelastplace'of Wemeasurethedierencebetweenv(EXP(a)) EXP(a). JohnHarrison UniversityofCambridge,December1997

4 FloatingpointvericationinHOLLight:theexponentialfunction 4 Ourimplementationlanguage Thisincludesthefollowingconstructs: command=variable:= command; expression if expressionthen command else command command while if expressionthen expressiondo do commandwhile expression command skip WedeneasimplerelationalsemanticsinHOL, fexpressiong correctnessrules.wethenprovetotalcorrectness andderiveweakestpreconditionsandtotal Theideaisthatthislanguagecanbeformally viavcgeneration. linkedtoc,verilog,handel,...

5 FloatingpointvericationinHOLLight:theexponentialfunction 5 Thealgorithm TanginACMTransactionsonMathematical Thealgorithmweverifyistakenfromapaperby Similartechniquesarewidelyusedforoating Software,1989. pointlibraries,and,probably,forhardware implementations. constants.tang'spapergivesactualvaluesashex Thealgorithmreliesonatableofprecomputed Thealgorithmworksinthreephases: representationsofieeenumbers. Performrangereduction Usepolynomialapproximation Reconstructanswerusingtables Thecorrectnessproofreectsthis.

6 FloatingpointvericationinHOLLight:theexponentialfunction 6 Codeforthealgorithm ifisnan(x)thene:=x elseifabs(x)>threshold_1then elseifx==plus_infinitythene:=plus_infinity elseifx==minus_infinitythene:=plus_zero elseifabs(x)<threshold_2thene:=plus_one+x elsee:=plus_zero ifx>plus_zerothene:=plus_infinity (N:=INTRND(X*Inv_L); N2:=N%Int_32; N1:=N-N2; else ifabs(n)>=int_2e9then R1:=X-Tofloat(N)*L1; R1:=(X-Tofloat(N1)*L1)-Tofloat(N2)*L1 M:=N1/Int_32; J:=N2; R2:=Tofloat(--N)*L2; R:=R1+R2; Q:=R*R*(A1+R*A2); E1:=S_Lead(J)+(S_Trail(J)+S*P); S:=S_Lead(J)+S_Trail(J); P:=R1+(R2+Q); )E:=Scalb(E1,M)

7 FloatingpointvericationinHOLLight:theexponentialfunction 7 StructureoftheHOLproof / Realnumbers / \ Programming / \ language / \ IEEEspec / Realanalysis \ / // Squarefreedecomp& // Sturm'stheorem Algorithm / /// \\\ /// \\\ FPlemmas /// \\\ /// Verification

8 FloatingpointvericationinHOLLight:theexponentialfunction 8 Floatingpointlemmas(1) roundingarealnumberxtoaoatingpoint Wedenetheerrorerror(x)resultingfrom value. Becauseoftheregularwayinwhichthe operationsaredened,alltheoperationsthen counterpartsaccordingtothesamepattern: relatetotheirabstractmathematical -Finite(a)^Finite(b)^ =)Finite(a+b)^ abs(val(a)+val(b))<threshold(float_format) error(val(a)+val(b))) (Val(a+b)=(Val(a)+Val(b))+ Thecomparisonsareevenmorestraightforward: -Finite(a)^Finite(b) =)(a<b=val(a)<val(b)) JohnHarrison UniversityofCambridge,December1997

9 FloatingpointvericationinHOLLight:theexponentialfunction 9 Floatingpointlemmas(2) Wehaveseverallemmasquantifyingtheerror,e.g. -abs(x)<threshold(float_format)^ abs(x)<(&2powj/&2pow125) Therearemanyimportantsituations,however, =)abs(error(x))<=&2powj/&2pow150 isexactlyrepresentable,e.g.subtractionof wheretheoperationsareexact,becausetheresult nearbyvalueswiththesamesign: -Finite(a)^Finite(b)^ =)Finite(a-b)^ &2*abs(Val(a)-Val(b))<=abs(Val(a)) Thisisaclassicresultinoatingpointerror (Val(a-b)=Val(a)-Val(b)) analysis. JohnHarrison UniversityofCambridge,December1997

10 FloatingpointvericationinHOLLight:theexponentialfunction 10 Informalerroranalysis HOL.Oneneedsto: Tang'serroranalysistranslatesquitedirectlyinto 1.Provethatcleverimplementationtricks ensurecertainremaindertermsarecalculated exactly.thisreliesoncancellation,andthe zeroes. factthatpre-storedconstantshavetrailing 2.Provethatthepolynomialapproximation 3.Provethattheroundingerrorswhen obeystheappropriateerrorbounds. large. reconstructingthenalanswerdonotgettoo afewlines,while3isgivenalonganddetailed InTang'spaper,1isquitebrief,2isdismissedin proof.

11 FloatingpointvericationinHOLLight:theexponentialfunction 11 HOLerroranalysis reversed! IntheHOLversion,thisorderofdicultyis 1.Therstpartisnotfundamentallydicult, butquitetrickybecauseitinvolvesalotof 2.Thesecondpartinvolvesnumerical specialcasesandlow-levelproofs. translateintoaformalproof(e.g.taylor approximation,whichneedsalotofworkto makesasmallmistakehere,thoughitdoesn't series,sturm'stheorem...).infacttang 3.Thelastpartisquiteroutine,andwecan aectthenalresult. automatically.actually,wederivebetter programholtocomposetheroundingerrors boundsthantangdoessinceweavoid thework. makingsimplifyingassumptionstocutdown

12 FloatingpointvericationinHOLLight:theexponentialfunction 12 Thenalresult conrmtang'sbottom-lineresult: Underthevarious`denitional'assumptions,we (X==Plus_infinity_ (Isnan(X)=)Isnan(E))^ Finite(X)^ (X==Minus_infinity=)E==Plus_zero)^ exp(valx)>=threshold(float_format) (Finite(X)^exp(ValX)<threshold(float_format) =)E==Plus_infinity)^ =)Isnormal(E)^ _(Isdenormal(E)_Iszero(E))^ abs(val(e)-exp(valx))<(&54/&100)*ulp(e) Infact,thisspecicationisabitmoreprecise abs(val(e)-exp(valx))<(&77/&100)*ulp(e)) overowthreshold. thantang's,e.g.weareexplicitaboutthe JohnHarrison UniversityofCambridge,December1997

13 FloatingpointvericationinHOLLight:theexponentialfunction 13 Conclusions Weconrm(andstrengthen)themainresults anduncoversubtleissues.thisclassofproofs ofthehandproof.butwedetectafewslips Theproofwasverylong(over3monthsof isagoodtargetforverication. work),butmostofthiswasdevotedto It'samistaketobelievethatonly`trivial' generalresultsthatcouldbere-used. mathematicsisneededforverication theoriesareessential. applications.hollight'smathematical Automationoflineararithmeticispractically indispensable.bettertoolsfornonlinear Theproofruntimesareverylongowingtothe reasoningareneeded. extensiveuseofarithmeticdonebyinference.

Remote Monitor RC554M Website Registration and Setup Instructions.

Remote Monitor RC554M Website Registration and Setup Instructions. Remote Monitor RC554M Website Registration and Setup Instructions. -For Remote Monitor Installation Instructions See: http://www.rola-chem.com/manuals/new2016/554407-rc554m-remote-monitor-installation-manual.pdf

More information

PROPERTECHNIQUEOFSOFTWARE INSPECTIONUSING GUARDED COMMANDLANGUAGE

PROPERTECHNIQUEOFSOFTWARE INSPECTIONUSING GUARDED COMMANDLANGUAGE International Journal of Computer ScienceandCommunication Vol. 2, No. 1, January-June2011, pp. 153-157 PROPERTECHNIQUEOFSOFTWARE INSPECTIONUSING GUARDED COMMANDLANGUAGE Neeraj Kumar Singhania University,

More information

Coding and decoding with convolutional codes. The Viterbi Algor

Coding and decoding with convolutional codes. The Viterbi Algor Coding and decoding with convolutional codes. The Viterbi Algorithm. 8 Block codes: main ideas Principles st point of view: infinite length block code nd point of view: convolutions Some examples Repetition

More information

June 2012 FORESTSAFE 4 ENTARIAN LIMITED. ForestSafe Service Configuration Adrian Owen and Jani Järvinen

June 2012 FORESTSAFE 4 ENTARIAN LIMITED. ForestSafe Service Configuration Adrian Owen and Jani Järvinen June 2012 ENTARIAN LIMITED FORESTSAFE 4 ForestSafe Adrian Owen and Jani Järvinen Table of Contents 1 INTRODUCTON...3 2 LOCAL ADMINISTRATOR GROUP...3 2.1 STEPS...3 2.2 VERIFICATION...3 3 WINDOWS DOMAIN

More information

Non Depository/Mortgage Institutions Schedule D Loans Origination

Non Depository/Mortgage Institutions Schedule D Loans Origination 6/30/2015 Total Number Amount Discount Weighted (1) First mortgage FHA-15 yrs 24 $ 2,165 $0 $ 15 3.95 (2) First mortgage VA-15 yrs 12 2,428 15 13 3.61 (3) First mortgage conventional conforming 15 yrs

More information

Algorithms are the threads that tie together most of the subfields of computer science.

Algorithms are the threads that tie together most of the subfields of computer science. Algorithms Algorithms 1 Algorithms are the threads that tie together most of the subfields of computer science. Something magically beautiful happens when a sequence of commands and decisions is able to

More information

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

Certificate Authorities and Public Keys. How they work and 10+ ways to hack them. Certificate Authorities and Public Keys How they work and 10+ ways to hack them. -- FoxGuard Solutions Www.FoxGuardSolutions.com melkins@foxguardsolutions.com Version.05 9/2012 1 Certificate Use Overview

More information

SteganographyinaVideoConferencingSystem? AndreasWestfeld1andGrittaWolf2 2InstituteforOperatingSystems,DatabasesandComputerNetworks 1InstituteforTheoreticalComputerScience DresdenUniversityofTechnology

More information

SECURE EMAIL USER GUIDE OUTLOOK 2000

SECURE EMAIL USER GUIDE OUTLOOK 2000 WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP

More information

MACM 101 Discrete Mathematics I

MACM 101 Discrete Mathematics I MACM 101 Discrete Mathematics I Exercises on Combinatorics, Probability, Languages and Integers. Due: Tuesday, November 2th (at the beginning of the class) Reminder: the work you submit must be your own.

More information

3. Add an Event: Alarm Alarm 0 a. Add an Action: Set Variable i. Applies to: Self ii. Variable: time_left iii. Value: +1 iv. Check the Relative box

3. Add an Event: Alarm Alarm 0 a. Add an Action: Set Variable i. Applies to: Self ii. Variable: time_left iii. Value: +1 iv. Check the Relative box Creating a Timer: You can have a timer that shows how long the player has been playing the game. 1. Create a new object and give it a name. This example is called object_timer. 2. Add an Event: Create

More information

Section 4.2: The Division Algorithm and Greatest Common Divisors

Section 4.2: The Division Algorithm and Greatest Common Divisors Section 4.2: The Division Algorithm and Greatest Common Divisors The Division Algorithm The Division Algorithm is merely long division restated as an equation. For example, the division 29 r. 20 32 948

More information

EKT150 Introduction to Computer Programming. Wk1-Introduction to Computer and Computer Program

EKT150 Introduction to Computer Programming. Wk1-Introduction to Computer and Computer Program EKT150 Introduction to Computer Programming Wk1-Introduction to Computer and Computer Program A Brief Look At Computer Computer is a device that receives input, stores and processes data, and provides

More information

Welcome to Meridian Mail Voice Messaging

Welcome to Meridian Mail Voice Messaging Welcome to Meridian Mail Voice Messaging Meridian Mail Voice Messaging from Nortel Networks is an advanced business messaging system that offers convenience and efficiency for managing your incoming and

More information

RING CYCLES ADMINISTRATIVE LINE FEATURES. AUTO DIAL Electronic Sets: 1. To program, press AUTO DIAL key 2. Dial number to be stored

RING CYCLES ADMINISTRATIVE LINE FEATURES. AUTO DIAL Electronic Sets: 1. To program, press AUTO DIAL key 2. Dial number to be stored Telephone Instructions All Washington University residence halls, fraternities and administrative offices for the Danforth Campus share the same telephone system. All lines begin with the prefix 935 or

More information

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE BOARD OF PATENT APPEALS AND INTERFERENCES

UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE BOARD OF PATENT APPEALS AND INTERFERENCES UNITED STATES PATENT AND TRADEMARK OFFICE BEFORE THE BOARD OF PATENT APPEALS AND INTERFERENCES Ex parte B. REILLY BARRY, MARK A. CHODORONEK, ERIC DEROSE, CAROL Y. DEVINE, MARK N. STUDNESS, ANGELA R. JAMES,

More information

Binary Multiplication

Binary Multiplication Binary Multiplication Q: How do we multiply two numbers? eg. 12, 345 6, 789 111105 987600 8641500 + 74070000 83, 810, 205 10111 10101 10111 00000 1011100 0000000 + 101110000 111100011 Pad, multiply and

More information

How to Create a Broker Account

How to Create a Broker Account How to Create a Broker Account 1. Once you have created your NY.gov ID and set your password (see the guide, How to Create a NY.gov ID ), return to the Broker tab from the NYSOH home page and select CLICK

More information

Motor and Household Insurance: Pricing to Maximise Profit in a Competitive Market

Motor and Household Insurance: Pricing to Maximise Profit in a Competitive Market Motor and Household Insurance: Pricing to Maximise Profit in a Competitive Market by Tom Wright, Partner, English Wright & Brockman 1. Introduction This paper describes one way in which statistical modelling

More information

GarbageCollectioninObjectOriented DatabasesUsingTransactionalCyclic PrasanRoy1 ReferenceCounting S.Sudarshan1 S.Seshadri1S.Ashwin1 AviSilberschatz2 fprasan,seshadri,sudarshag@cse.iitb.ernet.in 1IndianInstituteofTechnology,

More information

FIRST DATA GLOBAL GATEWAY

FIRST DATA GLOBAL GATEWAY FIRST DATA GLOBAL GATEWAY Virtual Terminal Enhancements Spring 2010 Release Zero ($0) Dollar Authorizations Periodic Billing 9.15.2010 UPDATE QUICK REFERENCE MANUAL v4.2 September 14, 2010 Table of Contents

More information

Rigorous Software Engineering Hoare Logic and Design by Contracts

Rigorous Software Engineering Hoare Logic and Design by Contracts Rigorous Software Engineering Hoare Logic and Design by Contracts Simão Melo de Sousa RELEASE (UBI), LIACC (Porto) Computer Science Department University of Beira Interior, Portugal 2010-2011 S. Melo de

More information

Work Instruction. Reverse Check Payment 11/05/07

Work Instruction. Reverse Check Payment 11/05/07 Reverse Check Payment 11/05/07 FCH8 Purpose Use this procedure to cancel a check and re-open the invoices/ credit memos in the system for future payment. The check will be voided in the system and the

More information

Ordering Guide New Tech Solutions Information Technology Enterprise Solutions Hardware (ITES-3H)

Ordering Guide New Tech Solutions Information Technology Enterprise Solutions Hardware (ITES-3H) Ordering Guide New Tech Solutions Information Technology Enterprise Solutions Hardware (ITES-3H) NTS Overview: New Tech Solutions, Inc (NTS) was founded in 1997 NTS is a privately held, SLEB Certified

More information

Section IV.1: Recursive Algorithms and Recursion Trees

Section IV.1: Recursive Algorithms and Recursion Trees Section IV.1: Recursive Algorithms and Recursion Trees Definition IV.1.1: A recursive algorithm is an algorithm that solves a problem by (1) reducing it to an instance of the same problem with smaller

More information

Verification of Computing Policies and Other Hard Problems

Verification of Computing Policies and Other Hard Problems Verification of Computing Policies and Other Hard Problems Mohamed G Gouda University of Texas at Austin gouda@cs.utexas.edu Presentation at METIS-2014 1 Computing Policy A computing policy is a formalism

More information

Telephone Instructions. Auto Dial

Telephone Instructions. Auto Dial Telephone Instructions Auto Dial The AUTO DIAL button is one that is programmed into a key. Some of you may have this button (or several buttons) programmed on the phone by the IS Dept. To store an AUTO

More information

Instructions for Configuring Microsoft Exchange 2007/2010 Journaling

Instructions for Configuring Microsoft Exchange 2007/2010 Journaling Instructions for Configuring Microsoft Exchange 2007/2010 Journaling Versions Addressed: Microsoft Exchange 2007/2010 Document Updated: March 21, 2015 Co nfidential Copyright 2015 Smarsh, Inc. All Purpose:

More information

Using UMCmarket to make micro-donations to our church!

Using UMCmarket to make micro-donations to our church! Using UMCmarket to make micro-donations to our church! You can use UMCmarket from your desktop PC, laptop, smartphone or tablet. Follow these instructions to get started using UMCmarket and help our church.

More information

R u t c o r Research R e p o r t. A Method to Schedule Both Transportation and Production at the Same Time in a Special FMS.

R u t c o r Research R e p o r t. A Method to Schedule Both Transportation and Production at the Same Time in a Special FMS. R u t c o r Research R e p o r t A Method to Schedule Both Transportation and Production at the Same Time in a Special FMS Navid Hashemian a Béla Vizvári b RRR 3-2011, February 21, 2011 RUTCOR Rutgers

More information

UPMC Financial Assistance Application Information

UPMC Financial Assistance Application Information UPMC Financial Assistance Application Information UPMC offers financial assistance for medical care provided by UPMC facilities and UPMC affiliated physicians to eligible individuals and families. Based

More information

Documenting your research: logbooks, online reports, code archive

Documenting your research: logbooks, online reports, code archive Documenting your research: logbooks, online reports, code archive One of the most difficult things to learn, yet one of the most important for future success in physics research, is mastering the "art"

More information

Table: Security Services (X.800)

Table: Security Services (X.800) SECURIT SERVICES X.800 defines a security service as a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers. Also the

More information

An Information-Flow Type-System for Mixed Protocol Secure Computation

An Information-Flow Type-System for Mixed Protocol Secure Computation An Information-Flow Type-System for Mixed Protocol Secure Computation Florian Kerschbaum SAP Applied Research Karlsruhe, Germany florian.kerschbaum@sap.com ABSTRACT There are a number of domain-specific

More information

Formal models of bank cards for free

Formal models of bank cards for free Formal models of bank cards for free Fides Aarts, Joeri de Ruiter and Erik Poll Digital Security, Radboud University Nijmegen Introduction Active learning on bank cards Learn state machines of implementations

More information

CHARITY CARE APPLICATION REQUIRED DOCUMENTATION CHECK LIST

CHARITY CARE APPLICATION REQUIRED DOCUMENTATION CHECK LIST CHARITY CARE APPLICATION REQUIRED DOCUMENTATION CHECK LIST Please return the items below if they apply to your situation. Theses items are required to process your application for charity care assistance.

More information

Chapter 3. Credit Cards. Ken Long New River Community College Dublin, VA 24084 http://www.nr.cc.va/fin107

Chapter 3. Credit Cards. Ken Long New River Community College Dublin, VA 24084 http://www.nr.cc.va/fin107 Chapter 3 Credit Cards Ken Long New River Community College Dublin, VA 24084 http://www.nr.cc.va/fin107 1 Should I switch to a lower rate credit card? Maybe No Not if the new card uses the two-cycle method

More information

Flagship Fuel Processing Module - A Quick Overview

Flagship Fuel Processing Module - A Quick Overview Flagship The Flagship fuel processing module is designed to make short work of the process of loading fuel transactions into your fleet management system. We can convert many of the industry standard transaction

More information

IntelliPay Billpay Application Documentation

IntelliPay Billpay Application Documentation IntelliPay Billpay Application Documentation Contents Billpay Introduction First Time Payment (With username and password) First Time Payment (Without username and password) Returning Customer Introduction:

More information

Welcome to Golden Belt Bank We Appreciate Your Business

Welcome to Golden Belt Bank We Appreciate Your Business Switch Your Checking Account to Golden Belt Bank the Easy Way Welcome to Golden Belt Bank We Appreciate Your Business It has never been easier to begin enjoying the exceptional personal service you can

More information

PayBiz Bank Accounts

PayBiz Bank Accounts PayBiz Bank Accounts 30/01/2014 Document Contents Bank Accounts...2 Window Control Buttons....3 Create an Opening Balance....4 Create a Bank Transaction....5 Create the Bank Statement....5 Enter Unpresented

More information

Application Note 120 Communicating Through the 1-Wire Master

Application Note 120 Communicating Through the 1-Wire Master www.dalsemi.com Application Note 120 Communicating Through the 1-Wire Master INTRODUCTION The DS1WM 1-Wire Master was created to facilitate host CPU communication with devices over a 1-Wire bus without

More information

RSA and Primality Testing

RSA and Primality Testing and Primality Testing Joan Boyar, IMADA, University of Southern Denmark Studieretningsprojekter 2010 1 / 81 Correctness of cryptography cryptography Introduction to number theory Correctness of with 2

More information

3-17 15-25 5 15-10 25 3-2 5 0. 1b) since the remainder is 0 I need to factor the numerator. Synthetic division tells me this is true

3-17 15-25 5 15-10 25 3-2 5 0. 1b) since the remainder is 0 I need to factor the numerator. Synthetic division tells me this is true Section 5.2 solutions #1-10: a) Perform the division using synthetic division. b) if the remainder is 0 use the result to completely factor the dividend (this is the numerator or the polynomial to the

More information

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler Rebecca.cutler@tufts.edu Mentor: Professor Chris Gregg Abstract Modern day authentication systems

More information

NAND Flash Memories. Using Linux MTD compatible mode. on ELNEC Universal Device Programmers. (Quick Guide)

NAND Flash Memories. Using Linux MTD compatible mode. on ELNEC Universal Device Programmers. (Quick Guide) NAND Flash Memories Using Linux MTD compatible mode on ELNEC Universal Device Programmers (Quick Guide) Application Note April 2012 an_elnec_linux_mtd, version 1.04 Version 1.04/04.2012 Page 1 of 16 As

More information

Auditable Version Control Systems

Auditable Version Control Systems Auditable Version Control Systems Bo Chen Reza Curtmola Department of Computer Science New Jersey Institute of Technology bc47@njit.edu crix@njit.edu Abstract Version control provides the ability to track

More information

MATLAB Programming. Problem 1: Sequential

MATLAB Programming. Problem 1: Sequential Division of Engineering Fundamentals, Copyright 1999 by J.C. Malzahn Kampe 1 / 21 MATLAB Programming When we use the phrase computer solution, it should be understood that a computer will only follow directions;

More information

Loan Modification & Your Title Policy

Loan Modification & Your Title Policy Loan Modification & Your Title Policy Frank L. Tortora III, Esq. Senior Title Officer July 22, 2014 Title Insurance 101 Title Insurance a contract agreeing to indemnify the insured up to a specified amount

More information

OAMulator. Online One Address Machine emulator and OAMPL compiler. http://myspiders.biz.uiowa.edu/~fil/oam/

OAMulator. Online One Address Machine emulator and OAMPL compiler. http://myspiders.biz.uiowa.edu/~fil/oam/ OAMulator Online One Address Machine emulator and OAMPL compiler http://myspiders.biz.uiowa.edu/~fil/oam/ OAMulator educational goals OAM emulator concepts Von Neumann architecture Registers, ALU, controller

More information

Factoring Algorithms

Factoring Algorithms Factoring Algorithms The p 1 Method and Quadratic Sieve November 17, 2008 () Factoring Algorithms November 17, 2008 1 / 12 Fermat s factoring method Fermat made the observation that if n has two factors

More information

Verizon Enterprise Center

Verizon Enterprise Center Verizon Enterprise Center ONLINE ACCOUNT MANAGEMENT FROM VIRTUALLY ANYWHERE, AT ANY TIME. Manage your business wireless account online through Verizon Enterprise Center. Verizon Enterprise Center offers

More information

Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation

Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation 1 Agenda EPID overview EPID usages Device Authentication Government Issued ID EPID performance and standardization efforts 2

More information

ALLIED PAPER : DISCRETE MATHEMATICS (for B.Sc. Computer Technology & B.Sc. Multimedia and Web Technology)

ALLIED PAPER : DISCRETE MATHEMATICS (for B.Sc. Computer Technology & B.Sc. Multimedia and Web Technology) ALLIED PAPER : DISCRETE MATHEMATICS (for B.Sc. Computer Technology & B.Sc. Multimedia and Web Technology) Subject Description: This subject deals with discrete structures like set theory, mathematical

More information

PATHWAY I: Early Learning Scholarship Application

PATHWAY I: Early Learning Scholarship Application -2014 PATHWAY I: Early Learning Scholarship Application This section to be completed by the Regional Administration Office: Application Identifier #: Region: District Number and Type: Is the Family Income

More information

UNDERGRADUATE TEACHER CERTIFICATION ENROLLMENT FORM

UNDERGRADUATE TEACHER CERTIFICATION ENROLLMENT FORM UNDERGRADUATE TEACHER CERTIFICATION ENROLLMENT FORM ELED, SPED and ECED are not available through the Teacher s Certification program. For any K 12 programs listed below, please seek advising from the

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

Configuring ECMP for Host Routes

Configuring ECMP for Host Routes CHAPTER 8 This chapter describes how to configure the equal-cost multipathing (ECMP) protocol for host routes on the Cisco NX-OS switch. This chapter includes the following sections: Information About

More information

Settling Multiple Debts Efficiently: Problems

Settling Multiple Debts Efficiently: Problems Settling Multiple Debts Efficiently: Problems Tom Verhoeff Faculty of Mathematics and Computing Science Eindhoven University of Technology Email: T.Verhoeff@TUE.NL June 04 Abstract I present a series of

More information

Make a difference in your local or national community!

Make a difference in your local or national community! We are passionate about giving back to our community with socially responsible commerce that enables businesses to start or expand their charitable giving without interruption or cost CHARITY SuitePay

More information

CIT 203-I01 Access Certification Preparation Online

CIT 203-I01 Access Certification Preparation Online CIT 203-I01 Access Certification Preparation Online 1001 Using Microsoft Access 2013 3 credits Fall 2015 August 31 December 18 Please read completely through this syllabus and print it for future reference.

More information

More VA loan approvals and more closings

More VA loan approvals and more closings More VA loan approvals and more closings VA loans remain a very desirable and profitable product. As with most loan applications, a good submission equals a good approval. Here are some tips specific to

More information

Cardholder Bank Disputed Transactions

Cardholder Bank Disputed Transactions Cardholder Bank Disputed Transactions Merchant Card Services Office of Business and Financial Services Welcome! Table of Contents: Introduction Types of Disputed Transactions Bank Transaction Processing

More information

Outline. Conditional Statements. Logical Data in C. Logical Expressions. Relational Examples. Relational Operators

Outline. Conditional Statements. Logical Data in C. Logical Expressions. Relational Examples. Relational Operators Conditional Statements For computer to make decisions, must be able to test CONDITIONS IF it is raining THEN I will not go outside IF Count is not zero THEN the Average is Sum divided by Count Conditions

More information

VEHICLE SURVIVABILITY AND TRAVEL MILEAGE SCHEDULES

VEHICLE SURVIVABILITY AND TRAVEL MILEAGE SCHEDULES DOT HS 809 952 January 2006 Technical Report VEHICLE SURVIVABILITY AND TRAVEL MILEAGE SCHEDULES Published By: NHTSA s National Center for Statistics and Analysis This document is available to the public

More information

Secure information flow: opportunities and challenges for security & forensics

Secure information flow: opportunities and challenges for security & forensics flow: and for flow: and for Michael 1 1 Department of Computing Imperial College London flow: and for Talk for ACSF1, 13 July 2006 Liverpool, United Kingdom flow: and for 1 flow: and for 2 3 4 flow: and

More information

ACCOUNTS PAYABLE VOUCHER ADJUSTMENT

ACCOUNTS PAYABLE VOUCHER ADJUSTMENT ACCOUNTS PAYABLE VOUCHER ADJUSTMENT TRANSACTION ENTRY OVERVIEW Use Vision Transaction Center to enter and maintain data on various types of transactions, such as disbursements, expenses, invoices, and

More information

WEB TRANSACTIONS. Shoppers Charge Accounts Co.

WEB TRANSACTIONS. Shoppers Charge Accounts Co. WEB TRANSACTIONS Shoppers Charge Accounts Co. Table of Contents Page 2 SCA s Online Merchant Services Website Benefits to Dealers How to Use It Log In Main Menu Consumer Credit Application Consumer Credit

More information

EXCEL SOLVER TUTORIAL

EXCEL SOLVER TUTORIAL ENGR62/MS&E111 Autumn 2003 2004 Prof. Ben Van Roy October 1, 2003 EXCEL SOLVER TUTORIAL This tutorial will introduce you to some essential features of Excel and its plug-in, Solver, that we will be using

More information

Methods for Finding Bases

Methods for Finding Bases Methods for Finding Bases Bases for the subspaces of a matrix Row-reduction methods can be used to find bases. Let us now look at an example illustrating how to obtain bases for the row space, null space,

More information

IntegraSoft Credit Card Processing

IntegraSoft Credit Card Processing IntegraSoft Credit Card Processing Reference Manual November 2005 Level 2.13 Copyright 2005 Tech Systems, Inc., Bettendorf, IA 52722 Printed in U.S. A. The names used in this publication are not of individuals

More information

Master's projects at ITMO University. Daniil Chivilikhin PhD Student @ ITMO University

Master's projects at ITMO University. Daniil Chivilikhin PhD Student @ ITMO University Master's projects at ITMO University Daniil Chivilikhin PhD Student @ ITMO University General information Guidance from our lab's researchers Publishable results 2 Research areas Research at ITMO Evolutionary

More information

Medi-Cal Retroactive Claim Submissions

Medi-Cal Retroactive Claim Submissions Medi-Cal Retroactive Claim Submissions This training made possible by funding from the CMSP Governing Board Presented by Penni Wright, EDS/Medi-Cal, Provider Training Introduction Some CMSP members may

More information

Appointment Manager. Centricity Business 4.3. Melody Frye 517-432-0898 melody.frye@ht.msu.edu. MSU HealthTeam BASIC: Front Desk

Appointment Manager. Centricity Business 4.3. Melody Frye 517-432-0898 melody.frye@ht.msu.edu. MSU HealthTeam BASIC: Front Desk Appointment Manager Centricity Business 4.3 Training and Education (M-F 8a 5p) Melody Frye 517-432-0898 melody.frye@ht.msu.edu 1 Overview Front Desk is functionality within the scheduling application where

More information

New Zealand End of Year Payroll

New Zealand End of Year Payroll New Zealand End of Year Payroll Page 1 of 9 Table of Contents NZ End of Year Payroll Overview... 3 Important Prerequisites Before Rolling... 3 Date Left Field For Past Employees... 3 Printing Proof Payroll

More information

Mary Washington Healthcare 1001 Sam Perry Boulevard Fredericksburg, VA 22401 Phone (540) 741-2844 or (855) 330-4857 Fax (540) 741-4054

Mary Washington Healthcare 1001 Sam Perry Boulevard Fredericksburg, VA 22401 Phone (540) 741-2844 or (855) 330-4857 Fax (540) 741-4054 Mary Washington Healthcare Phone (540) 741-2844 or (855) 330-4857 Fax (540) 741-4054 Dear Mary Washington Healthcare patient, Thank you for choosing Mary Washington Healthcare for your healthcare needs.

More information

PART 10 COMPUTER SYSTEMS

PART 10 COMPUTER SYSTEMS PART 10 COMPUTER SYSTEMS 10-1 PART 10 COMPUTER SYSTEMS The following is a general outline of steps to follow when contemplating the purchase of data processing hardware and/or software. The State Board

More information

Termination Checking: Comparing Structural Recursion and Sized Types by Examples

Termination Checking: Comparing Structural Recursion and Sized Types by Examples Termination Checking: Comparing Structural Recursion and Sized Types by Examples David Thibodeau Decemer 3, 2011 Abstract Termination is an important property for programs and is necessary for formal proofs

More information

PATHWAY II: Early Learning Scholarship Award

PATHWAY II: Early Learning Scholarship Award PATHWAY II: Early Learning Scholarship Award This section to be completed by the Regional Administration Office: Application Identifier #: Region: District # and Type: Child Identifier #: County: Child

More information

Chapter 1 Fundamentals of Java Programming

Chapter 1 Fundamentals of Java Programming Chapter 1 Fundamentals of Java Programming Computers and Computer Programming Writing and Executing a Java Program Elements of a Java Program Features of Java Accessing the Classes and Class Members The

More information

ipayment Gateway API (IPG API)

ipayment Gateway API (IPG API) ipayment Gateway API (IPG API) Accepting e-commerce payments for merchants Version 3.2 Intercard Finance AD 2007 2015 Table of Contents Version control... 4 Introduction... 5 Security and availability...

More information

16. Recursion. COMP 110 Prasun Dewan 1. Developing a Recursive Solution

16. Recursion. COMP 110 Prasun Dewan 1. Developing a Recursive Solution 16. Recursion COMP 110 Prasun Dewan 1 Loops are one mechanism for making a program execute a statement a variable number of times. Recursion offers an alternative mechanism, considered by many to be more

More information

What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm

What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm 1 Question: What has quantum mechanics to do with factoring? Answer: Nothing! 2 Question: What

More information

IBM Emulation Mode Printer Commands

IBM Emulation Mode Printer Commands IBM Emulation Mode Printer Commands Section 3 This section provides a detailed description of IBM emulation mode commands you can use with your printer. Control Codes Control codes are one-character printer

More information

Acquirer Device Validation Toolkit (ADVT)

Acquirer Device Validation Toolkit (ADVT) Acquirer Device Validation Toolkit (ADVT) Frequently Asked Questions (FAQs) Version: 2.0 January 2007 This document provides users of Visa s Acquirer Device Validation Toolkit (ADVT) with answers to some

More information

Military Duty Absence and Retirement Benefits Frequently Asked Questions

Military Duty Absence and Retirement Benefits Frequently Asked Questions Military Duty Absence and Retirement Benefits Frequently Asked Questions Answers to your frequently asked questions (FAQ s) about absences for military duty. 1 Published May 30, 2014 FAQ s - Military Documentation

More information

Rigorous Software Development CSCI-GA 3033-009

Rigorous Software Development CSCI-GA 3033-009 Rigorous Software Development CSCI-GA 3033-009 Instructor: Thomas Wies Spring 2013 Lecture 11 Semantics of Programming Languages Denotational Semantics Meaning of a program is defined as the mathematical

More information

R.N./LPN SCHOLARSHIP APPLICATION FOR LONG-TERM CARE

R.N./LPN SCHOLARSHIP APPLICATION FOR LONG-TERM CARE R.N./LPN SCHOLARSHIP APPLICATION FOR LONG-TERM CARE To assist qualifi ed persons who wish to become registered nurses or licensed practical nurses and practice in the long-term care profession, Health

More information

Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem)

Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem) Some facts about polynomials modulo m (Full proof of the Fingerprinting Theorem) In order to understand the details of the Fingerprinting Theorem on fingerprints of different texts from Chapter 19 of the

More information

What Is Recursion? Recursion. Binary search example postponed to end of lecture

What Is Recursion? Recursion. Binary search example postponed to end of lecture Recursion Binary search example postponed to end of lecture What Is Recursion? Recursive call A method call in which the method being called is the same as the one making the call Direct recursion Recursion

More information

Solving Quadratic & Higher Degree Inequalities

Solving Quadratic & Higher Degree Inequalities Ch. 8 Solving Quadratic & Higher Degree Inequalities We solve quadratic and higher degree inequalities very much like we solve quadratic and higher degree equations. One method we often use to solve quadratic

More information

ISO 9001:2008 Document Management Guidance

ISO 9001:2008 Document Management Guidance ISO 9001:2008 Document Management Guidance Contents Introduction... 3 About the Document Management Solution... 3 Forms & Records... 3 Document Reference Numbering... 3 Navigating the Documents... 3 Updating

More information

Eligibility and Assistance for Military Personnel

Eligibility and Assistance for Military Personnel Eligibility and Assistance for Military Personnel N.C. Foreclosure Prevention Fund: Purpose To help homeowners recovering from unemployment or other hardships and veterans transitioning to civilian employment

More information

MONETA.Assistant API Reference

MONETA.Assistant API Reference MONETA.Assistant API Reference Contents 2 Contents Abstract...3 Chapter 1: MONETA.Assistant Overview...4 Payment Processing Flow...4 Chapter 2: Quick Start... 6 Sandbox Overview... 6 Registering Demo Accounts...

More information

5 Homogeneous systems

5 Homogeneous systems 5 Homogeneous systems Definition: A homogeneous (ho-mo-jeen -i-us) system of linear algebraic equations is one in which all the numbers on the right hand side are equal to : a x +... + a n x n =.. a m

More information

INSTRUCTIONS FOR COMPLETING MONTANA BOARD OF HOUSING REVERSE ANNUITY MORTGAGE LOAN APPLICATION

INSTRUCTIONS FOR COMPLETING MONTANA BOARD OF HOUSING REVERSE ANNUITY MORTGAGE LOAN APPLICATION INSTRUCTIONS FOR COMPLETING MONTANA BOARD OF HOUSING REVERSE ANNUITY MORTGAGE LOAN APPLICATION Attached is the form of the application to be used in applying for a Reverse Annuity Mortgage Loan (RAM).

More information

0.1 Phase Estimation Technique

0.1 Phase Estimation Technique Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design

More information

Wes, Delaram, and Emily MA751. Exercise 4.5. 1 p(x; β) = [1 p(xi ; β)] = 1 p(x. y i [βx i ] log [1 + exp {βx i }].

Wes, Delaram, and Emily MA751. Exercise 4.5. 1 p(x; β) = [1 p(xi ; β)] = 1 p(x. y i [βx i ] log [1 + exp {βx i }]. Wes, Delaram, and Emily MA75 Exercise 4.5 Consider a two-class logistic regression problem with x R. Characterize the maximum-likelihood estimates of the slope and intercept parameter if the sample for

More information

Outline. 1 Denitions. 2 Principles. 4 Implementation and Evaluation. 5 Debugging. 6 References

Outline. 1 Denitions. 2 Principles. 4 Implementation and Evaluation. 5 Debugging. 6 References Outline Computer Science 331 Introduction to Testing of Programs Mike Jacobson Department of Computer Science University of Calgary Lecture #3-4 1 Denitions 2 3 4 Implementation and Evaluation 5 Debugging

More information