issuitableforexecutiononasynchronous,tightly-coupledparallelmachine,suchasasuper-scalaror 1Introduction

Size: px
Start display at page:

Download "issuitableforexecutiononasynchronous,tightly-coupledparallelmachine,suchasasuper-scalaror 1Introduction"

Transcription

1 UniversityofCalifornia,Berkeley ComputerScienceDivision Berkeley,CA AlexanderAiken Resource-ConstrainedSoftwarePipelining DepartmentofInformationandComputerScience StevenNovacky DepartmentofInformationandComputerScience UniversityofCalifornia,Irvine AlexandruNicolau UniversityofCalifornia,Irvine Irvine,CA92717 Irvine,CA92717 experimentswithanimplementationarealsopresented. schedulingchoicesaremadewithtrulyglobalinformation.proofsofcorrectnessandtheresultsof generalityinthesoftwarepipeliningalgorithmisnotsacricedtohandleresourceconstraints,and smoothlyintegratesthemanagementofresourceconstraintswithsoftwarepipelining.furthermore, parallelismingeneralloops.thealgorithmaccountsformachineresourceconstraintsinawaythat Thispaperpresentsasoftwarepipeliningalgorithmfortheautomaticextractionofne-grain Abstract issuitableforexecutiononasynchronous,tightly-coupledparallelmachine,suchasasuper-scalaror 1Introduction VLIW(VeryLongInstructionWord)machine. Recentlytherehasbeenconsiderableinterestinaclassofcompilerparallelizationtechniquesknown overlappingtheoperationsofaloopbodyinmuchthesamewaythatahardwarepipelineoverlaps operationsinadynamicinstructionstream.theschedulecomputedbyasoftwarepipeliningalgorithm collectivelyassoftwarepipelining.softwarepipeliningalgorithmscomputeastaticparallelschedule tectures.thesecondreasonisthatthesetightly-coupledmachinesmustbeprogrammedataverylow computermanufacturers e.g.,hp,phillips,siemens arealsodevelopingvliworsuper-scalararchi- synchronousmachinebuilttodateismultiow'strace-14,whichhas14functionalunits.several super-scalarandvliwmachinesarebeingbuilt.ibm'ssystem6000canexecutefouroperationsin parallel;intel'si860andi960chipscanexecutethreeoperationsinparallel.thelargesttightly-coupled Softwarepipeliningalgorithmsareinterestingforatleastthreereasons.Therstreasonisthat ThisworksupportedinpartbyONRgrant#N K0215 ythisworksupportedinpartbyonrgrant#n k0215 1

2 intogoodparallelschedules. tiontimingsandresourceconictsbetweenfunctionalunits.thistaskisextremelytime-consumingand error-prone;compilationtechniquesareneededtotranslateprogramswrittenatareasonablyhighlevel meansthatpersonmustknowaboutandaccountfordetailsofthehardwaredesignsuchasinstruc- level.someonewritingaprogramforatightly-coupledmachinemustdevelopaparallelschedule,which fastercompilationtimethanotherschedulingtechniques.thispotentialisillustratedbytheexample infigure1.figure1ashowsasimplesequentialloopandfigures1band1cshowtwodierentparallel schedulesfortheloop.forconvenience,welabeltheoperationsintheoriginalloopa{dandreferonly totheselabelsintheparallelloops.inthisexample,someparallelismispresentwithintheloopbody (becauseoperationsbandccanbeexecutedsimultaneously)aswellasacrossiterations(becausedfrom Thenalreasonisthatsoftwarepipeliningtechniquesholdthepromiseofproducingbettercodewith oneiterationcanoverlapwithafromthenextiteration).theclassicalapproachtoschedulingtheloop infigure1aistounrolltheloopbodysomenumberoftimesandthenapplyschedulingheuristicswithin insideandacrossalliterationsofaloop;hencesoftwarepipeliningachievestheeectofschedulingwith impossibleorimpracticaltoobtain.softwarepipeliningprovidesadirectwayofexploitingparallelism bothinsideandacrossiterationscouldbeexploitedbythisapproach.however,fullunrollingisusually theunrolledloopbody[fis81]asillustratedinfigure1b.whilethisapproachallowsparallelismto fullunrolling.asoftware-pipelinedversionoftheoriginalloopisgiveninfigure1c. beexploitedbetweensomeiterationsoftheoriginalloop,thereisstillsequentialityimposedbetween iterationsoftheunrolledloopbody.ingeneral,iftheloopcouldbefullyunrolled,allparallelism includeasoftwarepipeliningalgorithmthatgeneratesoptimalcodeforloopswithoutconditionaltests 1.1PreviousWork Onebodyofworkonsoftwarepipelininghasfocussedonestablishingtheformalismrequiredtoadequately addresswhatsoftwarepipeliningalgorithmscanandcannotachieve.resultsinthislineofdevelopment [AN88a]andaproofthatoptimalsoftwarepipeliningisimpossibleingeneral[SGE91].However,this workhaslargelyignoredresourceconstraints. rithmsthetreatmentofresourceconstraintsisintimatelyconnectedtosoftwarepipelining thatis,the tersoftwarepipelining[npa88].severalsoftwarepipeliningalgorithmsaccountforresourceconstraints directlyaspartofthesoftwarepipeliningalgorithm,e.g.[rg81,lam87].however,inmostsuchalgorithmsdealwithonlyweakformsofresourceconstraints e.g.,thenumberofoperationsthatcanbe executedinparallel.othersassumeresourceconstraintsarehandledinaseparate\x-upphase"af- Existingsoftwarepipeliningalgorithmshandleresourceconstraintsinavarietyofways.Somealgo- softwarepipeliningisnotseparablefromthehandlingofresourceconstraints.oneofourinterestsisto separatewhatisreallyintrinsictosoftwarepipeliningfromother,orthogonalconcerns.amoreextensive discussionofpreviousandrelatedworkisincludedinsection9. 2

3 -a:i b:j c:k i+1 d:l? i+h - i+g 1:b,c 0:a? (a)anexampleloop. j+1 2:d,a 3:b,c 4:d (b)unrolledtwiceandscheduled.? -2:d,a 1:b,c 0:a? Figure1:LoopUnrollingandSoftwarePipelining (c)pipelinedloop.? 3

4 1.2OurApproach Inthispaper,wepresentanalgorithmthatsmoothlyintegratessoftwarepipeliningwiththetreatment ofresourceconstraints,whileatthesametimemaintainingastructureddesignthatseparatesorthogonal concerns.ouralgorithmservestwopurposes.first,webelievethealgorithmrepresentsapractical directionandcanformthebasisofimplementationsofsoftwarepipelining;wediscussanimplementation ofouralgorithminsection7.second,thealgorithmrepresentsasummaryofmanyofthemostinteresting aspectsofourinvestigationofsoftwarepipeliningoverthelastseveralyears[nic85,an88a,an88b,aik88, Aik90,AN91].Ouralgorithmhasseveralnovelfeatures: Thehandlingofresourceconstraintsisorthogonaltothesoftwarepipelining. Ateachstepthealgorithmhasglobalinformationabouttheoperationsthatcanbescheduled. allocationdecisions(seesection8)andnotbythedesignofthesoftwarepipeliningalgorithm. machine)andnochangeswouldberequiredintheoverallalgorithm.thesecondandthirdpointstogether implythatthequalityofthenalpipelinedloopislimitedonlybytheabilitytomakegoodresource InatechnicalsensedenedpreciselyinSection8,givensucientresourcesouralgorithmcan Theadvantageoftherstpointisthatthetreatmentofresourcescouldbemodied(say,foradierent Oursoftwarepipeliningalgorithmisbuiltfromtwocomponents:aschedulerandadependencean- producecodearbitrarilyclosetothetheoreticaloptimum. alyzer.themachine-dependentschedulerisusedtoincrementallybuildaparallelizedloopfromase- quentialloop.foreachparallelinstruction,theschedulerselectsoperationstoschedulebasedonthe constructed,thesoftwarepipeliningalgorithmchecksforrepeatingstatesthatcanbe\pipelined."the setofoperationsavailableforschedulinginthatinstructionandavailableresources.thesetofavailable onthescheduleranddependenceanalyzerthatguaranteethecorrectnessandterminationofthesoftware toplaceoperations,thesetofavailableoperationsisupdatedincrementally.together,thescheduler andthedependenceanalyzerencapsulateallmachine-dependentinformation.astheparallelizedloopis softwarepipeliningalgorithmitselfisverysimple;thedicultyliesinestablishingminimalrestrictions operationsismaintainedbyaglobaldependenceanalyzer;astheschedulermakesdecisionsaboutwhere correctness.section5givesanalgorithmforincrementallymaintainingthesetofavailableoperations. usedtodevelopthealgorithm.section3worksthroughasmallexampletogiveanintuitiveideaofhow thesoftwarepipeliningalgorithmworks.section4describesthealgorithmandpresentsaproofof Section6describestheintegrationofresourceconstraintsintothealgorithm.Handlingresourceswellis pipeliningalgorithm. criticalinrealisticapplicationsofsoftwarepipelining.section7brieydescribesanimplementationofour Therestofthispaperisdividedintoninesections.Section2denesthemodelofparallelcomputation algorithm,someadditionaloptimizations,andsomeexperimentalresults.theexperimentalresultsbear outthestrengthsofourapproachandpointoutsomeweaknesses;botharediscussedatlength.section8 presentsaresultthatsuggestsouralgorithmcanachievethebestschedulespossibleinthepresenceof 4

5 resourceconstraints.adiscussionofrelatedworkisinsection9.thenalsectionsummarizesand presentssomeconclusions. 2BasicTerminology Thissectiondevelopsasimplemodelofatightly-coupled,synchronousparallelmachine.Theformalism dividedintoassignmentsthatreadandwriteaglobalstore,tests(boolean-valuedfunctions)thataect isusedtoexplainoursoftwarepipeliningalgorithmandtoprovideabasisforaproofofcorrectness. theowofcontrol,andadistinguishedoperationstop. program.associatedwitheachstatenisops(n),theoperationsofn,whichareelementsofx.the statesrepresentparallelinstructions;intuitively,whencontrolreachesastaten,alloperationsinops(n) AprogramisanautomatonhX;;n0;Ni.Xisasetofnoperationsfx0;:::;xn 1g.Operationsare areexecutedsimultaneously.tosimplifythepresentation,weassumethatalloperationsexecuteinunit time.extensionstomulti-cycleoperationsandpipelinedfunctionalunitsarediscussedinsection6. ThebodyoftheprogramisasetNofstatesn0;:::;nm 1.Thestaten0isthestartstateofthe registers).thetransitionfunctionmapscongurationsintocongurations.anexecutionisasequence ofcongurationsh:::;hni;sii;:::isuchthat(hni;sii)=hni+1;si+1i. Acongurationisapairhn;siwherenisastateandsisastore(thecontentsofmemorylocationsand organizedasabinarydecisiontreewithauniqueroot.onebranchofeachtestinthedecisiontreeis parallel(multi-wayjumps).asanexample,inonepossiblemodeltestswithinastatenarealways functionsofsuper-scalarandvliwmachinesarecomplexandvaryconsiderablyfrommachinetomachine.thegreatestsourceofcomplexityisdeningwhatitmeanstoexecutemorethanonetestin parallelinstruction.wedeliberatelyavoiddeningatransitionfunctioninanydetail.thetransition Thetransitionfunctiondescribeshowatightly-coupled,synchronousmachineactuallyexecutesa labeledtrue,theotherislabeledfalse.eachleafofthedecisiontreeisapointertoanotherstate.when thestateisexecuted,allofthetestsareevaluatedinparallelinthestore.thenextstatetobeexecuted isdeterminedentirelybytests;thatis,theresultofevaluatingthetestsinastatedeterminesthenext havebeenproposedandimplemented[fis80,kn85,aag+86,ebc87].thesoftwarepipeliningalgorithm wepresentappliestoanyofthesecontrol-owmechanisms. istheleafthatterminatesthe(unique)pathfromtherootwhereeverybranchislabeledbythevalueof thattestinthestore.thereareotherpossibleimplementationsofmulti-wayjumps;manymechanisms state.abranchofastatenisatruthassignmenthx1=true;x2=false;:::itothetestsx1;x2;:::in consistingoftheemptytruthassignment.thefunctionsucc-on-branchmapsastatenandabranch c2branch(n)toasuccessornoden0(thenamesucc-on-branchstandsfor\successoronbranch").1we n.thesetofallbranchesofnisbranch(n);ifnhasnotests,thenbranch(n)isthesingletonsetfhig Weusethefollowingabstractionofcontrol-owthroughoutthispaper.Weassumethatcontrol-ow branchesseparatelyinouralgorithm;inanimplementationforaparticularcontrol-owmechanismmanybranchescanbe 1Notethatinmostcasesanodewithktestswillnothave2kdistinctsuccessors.Forgenerality,wetreateachofthe2k 5

6 evaluationoftestsincongurationhn;sisatisesthetruthassignmentc. assumethatifsucc-on-branch(n;c)=n0,thenthereisastatessuchthat(hn;si)=hn0;s0iandthatthe Denition2.1LetPbeaprogramhX;;n0;Ni.Ifthereisanexecutionhhn0;si;:::;hnk;s0iisuchthat pipeliningalgorithmiscorrect(i.e.thatitpreservesthemeaningoftheoriginalprogram). operationsandcannothaveanysuccessors. controlistransferredtosomen02succ(n).astatethatcontainstheoperationstopcannotcontainother Wenextdeneameaningfunctionforprograms,whichisusedintheproofthatoursoftware Thesetofsuccessorssucc(n)ofastatenisfn0j9cs:t:succ-on-branch(n;c)=n0g.Whennisexecuted, operationsx0;:::;xi 1andistatesn0;:::;ni 1wherenj=fxjg.Allbackedgesgotothestartstaten0; thatis,ifni2succ(nj)andijtheni=0.everystateisassumedtobereachablefromthestartstate. inparallelizing.forconvenience,weusethefollowingdenition.asequentialloopisaprogramwithi ops(nk)=fstopgthen(p;s)=s0.ifnosuchexecutionexists,then(p;s)=?. Softwarepipeliningisaloopparallelizationtechnique,sowemustdescribetheloopsweareinterested ProgramsP1andP2areequivalent(P1P2)if8s(P1;s)=(P2;s). schedulingasubsetoftheavailableoperationsasthestartstate,thealgorithmrecursivelyschedulesthe successorsofthestartstatebyconsideringwhatoperationscanbescheduledinthesuccessorstates,and fromthesequentiallooplthatlegallycanbescheduledasthestartstateoftheparallelloop.after L.Initially,theparallelizedloopisempty(hasnostates)andthealgorithmchoosesasetofoperations 3AnExample soon.themaindicultyisguaranteeingthatthisprocedureterminates.weshowthateventuallythe GivenasequentialloopL,oursoftwarepipeliningalgorithmincrementallybuildsaparallelizedloopfrom beingconstructed.howthissetisbuiltandmaintainedisdiscussedinsection5.fornowitisonly operations.ateachstep,acontainsasetofoperationsavailableforschedulinginthecurrentstate scheduledstatesmustfallintoadetectablerepeatingpattern,atwhichpointaloopcanbeconstructed statewithoutviolatingprogramsemantics. importanttounderstandthatsetacontainsalloperationsthatcouldbescheduledlegallyinthecurrent fromthispatternofrepeatingstates. Initially,thenewprogramgraphisemptyandAcontainsalloperationsavailableforschedulingin AnimportantdatastructureusedbythealgorithmisanincrementallymaintainedsetAofavailable therststate.considertheprograminfigure2.wedisplayprogramsascontrol-owgraphswiththe conventionthattruebranchesoftestsaretotheleftandfalsebranchesaretotheright.notalloperations canbescheduledintherststate;forexample,cmustbescheduledafterb,sincecreferencesavalue thatbwrites.instandardcompilerterminology,thereisadatadependencefrombtoc[kkp+81]. executionofastate,andwriteconictsarenotpermitted.inthismodel,theoperationsa,b,andfare treatedtogether. Forthisexample,weassumeamachinemodelinwhichallreadstakeplacebeforeanywritesduring 6

7 -a:a[i] b:j f(a[i 1]) d:b[j] A[j] c:ifa[j]<0? t@@@r fg:stop e:b[j] A[j] allavailableforschedulingintherststate.becausethealgorithmmayoverlapoperationsfromdierent iterations,wesuperscriptoperationswiththeschedulediterationfromwhichtheycame.inaddition, wesubscriptavailableoperationsetstokeeptrackofdierentvaluesfordierentstates.thus,initially A0=fa0;b0;f0g. Figure2:Anexampleloop. bytheintegeri.therestofthissectiondescribeshowthesoftwarepipeliningalgorithmcomputesthis ofoperationstoscheduleinthecurrentstate.together,theproceduretomaintainthesetofavailable algorithmitselfisbuiltontopofthesetwocomponents. operationsandtheschedulerencapsulateallmachine-dependentinformation.thesoftwarepipelining ApipelinedversionoftheloopinFigure2isgiveninFigure3.InFigure3,thestateniislabeled Anothercomponentofthepipeliningalgorithmisthescheduler.TheschedulerselectsfromAaset betwosuccessorsoftherststate oneforthecasewherefevaluatestotrue,andoneforthecasewhere parallelschedulefromthesequentialloop.fortherststaten0,assumingthatthemachinehassucient factthata0,b0andf0havebeenscheduledandthatthisbranchoff0istheloopexit.becausewrite resources,theschedulercouldchoosetoscheduleallavailableoperations.becausefisatest,therewill conictsarenotpermitted,d0ande0cannotbescheduledinthesamestate,butbothare\available" at fevaluatestofalse.thesetsofavailableoperationsaredierentforthetwosuccessors. programterminatesonthisbranch.thenewseta1ofavailableoperationsisfc0;d0;e0g,reectingthe Considerthesuccessorn1ofn0forthecasewheref0evaluatestofalse.Thiscaseiseasy,asthe 7

8 5:b,f0:a,b,f t-f 4:c,d,a?HHHHHj 6:e,b,f tf6 1:c,d 3:g?AAAU 2:e thispoint,alldependencesonthetwostatementshavebeensatised.assumethattheschedulerselects operationsc0andd0forstaten1.operationc0isatest,sotherearetwosuccessorsofthisstate.for thesuccessorn2wherec0evaluatestofalse,thesetofavailableoperationsa2isfe0g.assumethatthe schedulerplacese0inn2.forthesinglesuccessorn3ofn2thesetofavailableoperationsa3isjustfg0g, Figure3:Theloopaftersoftwarepipelining. isavailableforschedulinginparallelwithstatementsfromtherstiteration.asubtlepointisthat thestopoperation.thusn3containsonlyg0.backingupton1,thesetofavailableoperationsforthe newsetofavailableoperationsa4isfc0;d0;e0;a1g.notethattheoperationa1fromtheseconditeration branchwherec0evaluatestotrueisalsofg0g,sothesuccessorofn1onthispathisalson3. because(asbefore)d0ande0cannotbescheduledinthesamestate.eventhoughalloperationsthat operationb1isnotavailableforscheduling,eventhoughallreadstakeplacebeforeallwritesandall operationsfromtherstiterationthatreadvariablejareavailableina4.operationb1isnotavailable Thiscompletestheterminatingpathfromn0.Ontheotherpath,wheref0evaluatestotrue,the frombeingavailable. readjareina4,notallofthesecanbescheduledinn4,andthisfactpreventsstatementsthatwritej thissetisexactlythesameasa4.thesuperscriptsarejustawayofkeepingtrackoftheiterationof thesuccessorofn5onthepathwheref1istrueisfc1;d1;e1;a2g.notethat,exceptforthesuperscripts, eachoperation;thesetshavethesameoperations.ratherthancontinueschedulingatthispoint,the fb1;f1g.assumingthattheschedulerplacesbothoperationsinn2,thesetofavailableoperationsfor therearetwosuccessorsofthisstate.forthesuccessorn5wherec0evaluatestotrue,theseta5is Assumethattheschedulerselectsoperationsc0,d0,anda1forstaten4.Operationc0isatest,so successorofn5wheref1evaluatestofalseisfc1;d1;e1g.exceptforsuperscripts,thisisexactlythesame asa1.asbefore,thepipeliningalgorithmmakesn1asuccessorofn5. pipeliningalgorithmsimplymakesn4asuccessorofn5.similarly,thesetofavailableoperationsforthe 8

9 c:a[i+1] - b:a[i] a:j 2 (idiv50) A[i j]+k A[i+1 j]+h d:i++ (a)anotherexampleloop.? -1:b,c 0:a? Figure4:Anotherexampleloop. (b)anincorrectschedule. 2:d? ThesetofavailableoperationsA6isfe0;b1;f1g.Assumingthattheschedulerplacesallthreeoperations proceedsjustasitdidforn5.thealgorithmterminateswiththescheduleinfigure3. inn6,thesetsofavailableoperationsforthetwosuccessorsofn6arethesameasforn5andscheduling Backingup,thepipeliningalgorithmnextconsidersthesuccessorn6ofn4wherec0evaluatestofalse. becausetwosetsofavailableoperationshappentobethesamefortwodierentstates,thatdoesnot ithappenstobecorrect,butingeneralthisstepisnotcorrect.intuitively,theproblemisthatjust justifyingthestepwherepreviouslyscheduledstatesare\reused",suchaswhenthepipeliningalgorithm decidedtomaken4thesuccessorofn5.wehavesimplyimpliedthatthisiscorrect,andintheexample byitselfguaranteethatallsubsequentsetsofavailableoperationswouldbethesameinallsuccessorsof Therearethreetechnicallydicultaspectsofthesoftwarepipeliningalgorithm.Therstproblemis therearenoconditionalstatementsorexitsfromtheloop.assumingthatthevariableiisalwayszero thosestates. uponenteringtheloop,notethatstatementsbandcareindependentfortherst50iterationsanddata dependentforthenext50iterations.ifdependenceanalysisrecognizesthatbandcareindependentfor intherst50iterations.followingthepipeliningstrategyforthepreviousexample,repeatingstates therst50iterations,thenastheparallelizedloopisbuilttheschedulercouldplacebandctogether WeillustratethisproblemwiththeloopinFigure4a.Tomaketheexampleassimpleaspossible, wouldbedetectedintheseconditeration,leadingtotheparallelizedprograminfigure4b,whichis 9

10 Section4formalizesthesoftwarepipeliningalgorithmandprovidesconstraintsontheschedulerand clearlyincorrect.inthisexample,irregulardependenciesmakeitdiculttodetectrepeatingbehavior. setsincrementallywasrstpresentedin[en89]forprogramswithoutloops(i.e.withacycliccontrol-ow graphs).insection5,wepresentadetaileddescriptionofthecomputationandmaintenanceofavailable operationsforuseinsoftwarepipeliningofloops.ourpresentationissimplerandeasiertounderstand availableoperationinformationthatguaranteethecorrectnessandterminationofthesoftwarepipelining algorithm. andimplementthanthealgorithmin[en89]. Thesecondproblemiscomputingthesetsofavailableoperations.Analgorithmformaintainingthese tantifthealgorithmistobeusefulinpractice.insection6weshowhowniteresourcesisintegrated directlyonthecorrectnessofoursoftwarepipeliningalgorithm,goodresourceusageisobviouslyimpor- withsoftwarepipelininginoursystem. 4TheSoftwarePipeliningAlgorithm Thethirdsignicantproblemismanagingniteresources.Whileresourceallocationdoesnotbear TheexampleinSection3illustratesthatthekeystepinouralgorithmisdiscoveringwhenstatescanbe \reused"toformasoftwarepipeline.recognizingpatternsinthescheduledoperationsisnottrivialand isinfactnotvalidiftheschedulerandtheavailableoperationanalysisarenotconstrainedinsomeway. Forexample,iftheschedulermerelyselectsoperationstoscheduleatrandom,norepeatingbehaviorcan beinferred.similarly,evenifthescheduleriswell-behaved,theexampleinfigure4showsthatifthe availableoperationanalysisdoesnotexhibitadetectablepattern,softwarepipeliningisnotpossible. Finally,wediscussterminationofthesoftwarepipeliningalgorithm. softwarepipeliningpossible.theseconstraintsarequiteweakandareeasilysatisedinpractice.after presentingtheconstraints,wepresentthesoftwarepipeliningalgorithmitselfandproveitscorrectness. 4.1TheConstraints Inthissectionwepresentconstraintsontheschedulerandavailableoperationanalysisthatmake Denition4.1LetX=f:::;xji usedinthediscussionoftheconstraints. Recallthatxcidenotestheinstanceofoperationxifromiterationcofaloop.Thefollowingdenitionis mustschedulesomeoperationineverystate,and(3)theoperationchosencandependonthesetof operationsavailableandtherelativedistanceiniterationsbetweentheoperationsavailable,butnoton theactualiterationsoftheoperationsavailable.10 specicmachine.thefollowingconstraintrequiresthat:(1)theschedulerisafunction,(2)thescheduler AsdiscussedinSection3,onecomponentofthesoftwarepipeliningalgorithmisaschedulerfora i;:::gbeasetofoperations.thesetxcisthesetf:::;xji+c i;:::g.

11 Constraint4.2LetXbeasetofoperations.Theschedulermustbeafunctionmappingasetof alreadyscheduledoperationsandasetofavailableoperationstoasingleoperationorthevalue\none." Inaddition,schedule(X;A)6=noneifX=;.Wealsorequirethat tion.theoperationxkjreturnedbytheschedulerisanadditionalinstructiontobescheduledinthesame state.theprimaryrestrictionimposedbyconstraint4.2isthattheschedulerisafunctionofoperations availableinthestatebeingscheduled.thisconstraintisweakbecausethesetofavailableoperationsprovidesglobalinformationabouttheprogram theschedulercanchooseanystatementthatcouldbelegally j2ai)_(8ischedule(xi;ai)=none) Inouralgorithm,Xisthesetofoperationsalreadyscheduledinthestatecurrentlyunderconsidera- (9xj8ischedule(Xi;Ai)=xk+i jandxk+i separatestheschedulerfromtherestofthealgorithm,thusisolatingthemostmachine-dependentportion ofthecode.anyschedulersatisfyingconstraint4.2willworkwiththesoftwarepipeliningalgorithm.in Section6weshowhowtogeneralizeConstraint4.2toincluderesourceconstraints. scheduledinthecurrentstate.2thisparticularconstraintalsohasasignicantdesignbenet:itcleanly becausetheoperationsavailableforschedulinginastatencandependonthesetofoperationsalready scheduledinn.forexample,considerthesimpleprogramfragmentinfigure5.assumingthatthe availableoperationsforscheduling.however,theiterativemethoddescribedhereisnecessaryingeneral scheduled.insection3wepresentedasimpliedexampleinwhichtheschedulerchoosesasubsetofthe inginastate.whentheschedulerreturns\none",thestateisnishedandsuccessorsofthestateare Theschedulerisusedbythesoftwarepipeliningalgorithmtorepeatedlyselectoperationsforschedul- whichisincorrect. is,bisnotavailableforschedulinginn0unlessaisscheduledinn0.otherwise,ifthesetofavailable parallelmachineperformsreadsbeforewrites,itisclearthatbothaandbcanbescheduledtogetherin therst(andonly)staten0.however,bcannotbescheduledinn0unlessaisalsoscheduledinn0 that operationsweresimplyfa;bg,thentheschedulercouldchoosetoschedulebinn0andainn0'ssuccessor, iscompletewewishtocomputethesetofavailableoperationsinthesuccessorsofn.theprocedurecall next(n;a)mapsnandatoasetofpairsfhnj;ajigwhereforeverybranchcj2branch(n),njisanew ops(n)[fxigandthenewsetofavailableoperationsgiventhatxihasbeenscheduled.second,whenn Athatareavailableforschedulingassociatedwithastaten.TherearetwowaysthatAcanbeupdated. First,theprocedurecallupdate-one(n;A;xi)returnsapairconsistingoftheupdatedstatewithoperations Asecondconstraintisplacedontheavailableoperations.Atanymomentthereisasetofoperations (empty)node,nj=succ-on-branch(n;cj),andajisthesetofoperationsavailableinnj.implementations ofproceduresupdate-oneandnextaregiveninsection5. thatthisextratheoreticalpowertranslatesintoanypracticaladvantageovertheschemepresentedhere;seesection8. stateatatime,butallstatesatalltimes.becauseschedulingisinherentlyaveryhardproblem,however,itisnotclear 2Onecanimagineevenmorepowerfulschedulers;forexample,aschedulerhavingglobalinformationaboutnotjustone 11

12 Figure5:Asimpleprogram. b:i a:j? i+1 i Constraint4.3ConsideranarbitrarysetofavailableoperationsA,staten,andoperationx.Then thereexistsasetofoperationsbsuchthat 8iupdate-one(m;Ai;xj+i)=hm0;Biiwhereops(m)=ops(n)iand scheduledandtherelativedistance(initerations)betweenoperationsalreadyscheduled,butitcannot Furthermore,thereexistsetsofoperationsAjandstatesnjfor1jjbranch(n)jsuchthat Constraint4.3saysthattheoperationsavailablemaydependonwhichoperationshavealreadybeen 8inext(m;Ai)=fhnj;Aijigwhereops(m)=ops(n)i ops(m0)=ops(n)i[fxj+ig fact,asfarasweknow,everyproposedrepresentationofdependenceinformationsatisesthisconstraint. maintainoperationavailabilityinformation.standarddatadependencegraphssatisfyconstraint4.3,as doextensionstodependencegraphs,suchaslabelingedgeswithconstantdistancevectors[pbj+91].in ofupdate-one,theresultnodeissimplynupdatedtoincludetheoperationxj+i(seesection5.2). dependontheactualvaluesoftheiterationsofoperationsalreadyscheduled.intheimplementation Constraint4.3isneededtoruleoutpathologicalcaseslikeFigure4,whereirregulardependenceanalysis leadstoincorrectschedules. WhetherConstraint4.3issatisedornotdependsontheformofthedatadependenceanalysisusedto Thealgorithmneverbacktrackstoexplorealternativeschedules.Whileabacktrackingversioncouldbe availableoperations(moduloiterationnumbers)asecondtime,itusesthepreviouslyscheduledstate. forallthebranchesofthatstate,andsoon.ifatanypointthealgorithmencountersthesamesetof procedurepipelineinvokestheprocedureschedule-statetobuildasinglestate,andthentobuildstates ThesoftwarepipeliningalgorithmisgiveninFigure6.Givenaninitialsetofavailableoperations,the 4.2TheAlgorithm designedeasily,wefeelabacktrackingalgorithmwouldbetooslowtobepractical. dierenceinthenalparallelprogram.theorderinwhichstatesarescheduledcanmakeadierencein Theorderinwhichpipelineprocessesthesuccessorsofascheduledstateisunspeciedandmakesno 12

13 procedureschedule-state(n;a) procedurepipeline(a) whileschedule(ops(n);a)6=nonedo 8Xscheduled-before[X] returnhn;ai while9hn;ai2tododo letrbeanemptynodeintodo letx=schedule(ops(n);a)in update-one(n;a;x) elselethn;a0i=schedule-state(n;a)and if9js.t.scheduled-before[aj]6=nothen n scheduled-before[aj] todo fhn;aig f:::hni;aii:::g=next(n;a0)in fhr;aig theeciencyoftheavailableoperationscomputation;insection5wepresentaslightlymodiedversion scheduled-before[a] todo Figure6:Thesoftwarepipeliningalgorithm. (todo[f:::hni;aii:::g) fhn;aign ofthealgorithminfigure6thatprocessesstatesinanecientorder. totheoneinfigure6exceptthatitdoesnotreusepreviouslyscheduledstates.letl1bethe(innite) programsemantics.weusetheprograminfigure7toformalizethisintuition.thisprogramisidentical Figure6.LetLbeasequentialloopandletL0betheresultofsoftwarepipelining.WeshowthatLL0. Asarststepintheproof,wemustassumethattheavailableoperationanalysisiscorrect.Intuitively, theavailableoperationanalysisiscorrectifanyschedulethatisconsistentwiththeanalysispreserves WeuseConstraints4.2and4.3toprovethecorrectnessofthesoftwarepipeliningalgorithmin anychoiceofschedulerl1l. parallelprogramdenedbythisalgorithmforaloopl.theavailableoperationanalysisiscorrectiffor Proof:Theproofisbyinductionononthelengthofanexecution.Forthebasecase,lete=hhn0;s0ii Lemma4.4LetL0=pipeline(A)andletL1=pipeline2(A).Forallk,ifthereisanexecution hhn0;s0i;:::;hnk;skiiofl1,thenthereisanexecutionhhn0;s0i;:::;hn0k;skiiofl0. L1isalsoanexecutionofL0. Theessentialstepinprovingthecorrectnessofprocedurepipelineistoshowthateveryexecutionof beanexecutionofl1.considerhowtheinitialstatesofl1andl0arebuilt.theinitialsetofavailable operationsaisthesameforboth.now,inprocedurepipelinewehavescheduled-before[a]=no,because initiallynostatesarescheduled.thenschedule-state(n;a)=hn0;bi.clearlye=hhn0;s0iiisan executionofl0. 13

14 procedurepipeline2(a) while9hn;ai2tododo (Conditionofthewhileisalwaystrue) letrbeanemptynodein lethn;a0i=schedule-state(n;a)and f:::hni;aii:::g=next(n;a0)in fhr;aig hhn0;s0i;:::;hn0i;siiiisanexecutionofl0.furthermore,assumethatthereexistsaksuchthatwhen Fortheinductionstep,assumethate=hhn0;s0i;:::;hni;siiiisanexecutionofL1andthate0= Figure7:Analgorithmthatdenesaninniteparallelprogram. (todo[f:::hni;aii:::g) fhn;aig Akinprocedurepipelinerespectively.Finally,assumethatops(ni)=ops(n0i)k.Itiseasytocheckthat thestatesniandn0iwerescheduled,thesetsofavailableoperationswereainprocedurepipeline2and have alloftheseassumptionsholdafterthebasecase. Thestoresmustbethesameinthetwotransitionssince,byhypothesis,niandn0ihavethesame Ifni=fstopgthenniandn0iarenalstatesandwearedone.Otherwise,inthenexttransitionwe andn0ihavethesameoperationsevaluatedinthesamestore.tonishtheproof,weneedtoshowthat operations.letcbethebranchtakeninstatehni;sii.notecisalsotakeninstatehn0i;sii,becauseni (hni;sii)=hni+1;si+1i algorithm.thatis,wemustshowthatops(ni+1)=ops(n0i+1)jforsomej. ni+1andn0i+1havethesameoperations,possiblydieringiniterationnumbersusedbythepipelining (hn0i;sii)=hn0i+1;si+1i haveschedule-state(m0;bk)=hn0i+1;ckiandops(ni+1)=ops(n0i+1)k. listbypipeline.inl1,letschedule-state(m;b)=hni+1;ci.then,byconstraints4.2and4.3,inl0we cases.fortherstcase,assume8jscheduled-before[bj]=nowhenhm0;bkiisremovedfromthetodo wheremandm0arefresh,emptystatesonbranchcfromniandn0irespectively.nowtherearetwo uled.byconstraint4.3andtheinductionhypothesis,hm;bi2next(ni;a)andhm0;bki2next(n0i;ak) Consideroncemorethestateofthetwosoftwarepipeliningalgorithmswhenni+1andn0i+1aresched- suchthatscheduled-before[bj]=n0.thenn0wasscheduledinl0usingavailableoperationsbj.therest oftheargumentissymmetrictothecaseabove,usingbjinplaceofbkandthefactthatn0i+1=n0.2 sameoperationsavailablefortwostatesimpliesthatallpossiblebranchesfromthosestatesarealsobe Forthesecondcase,assumethat,whenhm0;Bkiisremovedfromthetodolistbypipeline,thereisaj Constraints4.2and4.3areneededtoproveLemma4.4.Theseconstraintsensurethathavingthe 14

15 assumptiontheavailableoperationsanalysisiscorrect.bylemma4.4everyexecutionofl1isalsoan thesame.combiningthecorrectnessconditionfortheavailableoperationanalysisandlemma4.4gives aproofofcorrectness. Theorem4.5IfprocedurepipelineproducesaloopL0fromaninitialloopL,thenLL0. Proof:ToproveLL0wemustshow8s(L;s)=(L0;s).First(L;s)=(L1;s),sinceby pipelineiseventuallyempty.thetodosetdecreasesinsizewhenthereisapairhn;aisuchthatfor showthatitalwaysterminates.toshowtermination,wemustprovethatthetodosetinprocedure 4.3Termination Theorem4.5provesthatthesoftwarepipeliningalgorithmproducesonlycorrectresults,butitdoesnot executionofl0,so(l;s)=(l0;s).2 somej,ajhasbeenscheduledpreviously.letbetheequivalencerelationonsetsofoperations AB,9js:t:A=Bj.Ifweassumethattheprocedureschedule-statealwaysterminates,thento proveterminationitissucienttoshowthatthereareonlynitelymanyequivalenceclassesunder. iftheasetssimplyincreaseinsizeoneachrecursivecall.anecessaryconditionforabisthat isnotnecessarilyterminatingundertheconstraintsgivensofar.consider,forexample,whathappens jaj=jbj;iftherearesetsofunboundedcardinality,thenthereareinnitelymanyequivalenceclasses. Anadditionalconstraintisplacedontheavailabilityinformationtolimitthesizeofthesetofoperations availableforscheduling. Unfortunately,theremaybeinnitelymanyequivalenceclassesandinfacttheprocedurepipeline Constraint4.6ThereisaconstantksuchthatforallpossibleavailabilitysetsA,ifxj2Athenno Lemma4.7Constraint4.6ensuresthatthereareonlynitelymanyequivalenceclassesofsetsofoperationsunder. scheduled,thewindowcannotbeshiftedtoincludeanewiterationattheend. Thisconstraintstatesthatoperationscanbeavailablefromatmostkconsecutiveiterationsatonetime. yh2aforanyhj+k. Proof:IftherearenoperationsinaloopbodyandkconsecutiveiterationscanappearinA,then Thus,theschedulerhasa\slidingwindow"ofoperationsanduntiloperationsintherstiterationare sameforeveryloopscheduled(i.e.,itcanbecomputeddynamically),butitmusthaveamaximumvalue foranyparticularloop.also,itisnotnecessarytomakethewindowanintegralnumberofiterations. Partialiterationsworkjustaswell,althoughthedetailsoftheimplementationareabitmorecomplex. everyavailableoperationsetisasubsetoff:::;xc+ji WhileConstraint4.6ismotivatedbytheneedtoguaranteetermination,italsoleadstoagood ThevaluekofConstraint4.6isaparameterofthesoftwarepipeliningalgorithm.Itneednotbethe i;:::gforsomec,0i<n,and0ji<k.2 implementationoftheprocedurepipeline.themostexpensivepartofpipelineischeckingwhetherthe 15

16 informationforiterationj,andthelastnbitsaresettoreecttheavailabilityofoperationsiniteration currentsetofavailableoperationsahaseverbeenscheduledbeforeforsomeaj.forawindowsizeof j+k.withthisrepresentation,checkingwhetherthesameavailabilityinformationhasbeenseenbefore scheduled(thisoccurswhentherstnbitsareall0)thebitvectorisshiftedleftnbits,discarding 1ifoperationxj+h abitvectoroflengthkn,wherenisthenumberofoperationsinthesequentialloop.thebithn+iis kiterations,operationavailabilityinformationforiterationsjthroughj+k 1canberepresentedas onlyrequirescheckingwhetherthesamebitvectorhasbeenseenbefore,whichcanbeimplementedvery ecientlythroughhashing. iisavailableforscheduling;otherwiseitis0.wheniterationjhasbeencompletely thissectionwegiveanewpresentationofavailableoperations.whilefunctionallyequivalenttothe givenin[en89](forhistoricalreasons,availableoperationsweretermed\uniable-ops"in[en89]).in Availableoperationsanalysisplaysaroleinouralgorithmsimilartotheroleglobaldata-owanalysis playsintraditionaloptimizingcompilers.analgorithmforcomputingavailableoperationswasrst 5AvailableOperations algorithmsof[en89],ourpresentationisbothsimplerandmoredirect,andthenalalgorithmsare easiertoimplement.thedevelopmentisdividedintotwoparts.first,weshowhowtocomputethe initialsetofavailableoperations.second,weshowhowtoincrementallyupdatetheinformationin responsetodecisionsmadebythescheduler.attheendofthesectionweprovethecorrectnessofthe analysisanddiscusssomeeciencyconsiderations. problemofcomputingavailableoperationstoananalysisoflooplessprograms. ofaloop.sinceanynumberofunrollediterationsformaloopless(acyclic)program,werestrictthe Therefore,tocomputetheoperationsavailableforschedulingitissucienttoexamineatmostkiterations RecallthatConstraint4.6forcestheavailableoperationstospannomorethankiterationsofaloop. 5.1ComputingAvailableOperations rithmsinthissectionarepresentedusinganabstractmechanismfordependence.byusingaparticular dependenceanalysisrepresentationthealgorithmscanbemademoreecient.weusethefollowing denitionstomodeldependenceanalysis. anditisbeyondthescopeofthispapertoincludethemhere[kkp+81,fow87,pbj+91].thealgo- manyvariationsondependenceanalysisintheliteraturethatsatisfyourrequirements(constraint4.3) Computingavailableoperationsrequirestheuseofdependenceanalysisbetweenoperations.Thereare Denition5.1Alocationiseitheramemoryaddressoraregister.Foroperationsxandyandsetsof operationsxwedene: 16

17 b:j:=j+1 a:ifa<b f write(x)=thesetoflocationsxmaywrite Figure8:Operationbcankillareferenceliveattheroot. c:h:=j Thesetwrite(x)(resp.read(x))mustincludeeverylocationxcouldeverwrite(resp.read).Theset read(x)=thesetoflocationsxmayread kill(x)=thesetoflocationsxmustwrite write(x)=sx2xwrite(x) becausedependenceanalysismustbeconservativeingeneral;itisnotalwayspossibletoknowatcompiletimeexactlywhichlocationsanoperationmayreadorwrite.thepredicatedepends(x;y)istrueifthere kill(x)mustincludeonlylocationsxalwayswrites.twodierentsetswrite(x)andkill(x)aredened depends(x;y)=write(x)\(read(y)[write(y))6=;depends(x;y)=9x2xs.t.depends(x;y) read(x)=sx2xread(x) kill(x)=sx2xkill(x) maybeadependencefromxtoy. reachablefromstatenthatarenotdatadependentonaninterveningoperation: beforex,resultinginadependenceviolation.thefollowingdataowequationspeciestheoperations ablebecauseofpotentialdatadependenceviolations.assumethatxprecedesyonapathanddepends(x;y) istrue.thenclearlyycannotbeavailableonthatpathuntilxisscheduled,orelseycouldbescheduled Deningcorrectavailableoperationanalysisrequiresidentifyingtheoperationsthatcannotbeavail- SincetheprogramfragmentPbeinganalyzedisloopless,nodeps(n)canbecomputedforallnbyasingle thiscase,operationbcannotbeavailableforschedulingintherststate,becauseitsdenitionofjcould bottom-uptraversalofthecontrol-owgraphforp. TheprograminFigure8illustratesanothersituationinwhichanoperationcannotbeavailable.In nodeps(n)=ops(n)[(([ n02succ(n)nodeps(n0)) fxjdepends(ops(n);x)g) jisliveattherststate,andbcankillc'sreferencetoj.clearly,anyoperationthatcankillalive changethevaluereadbythereferencetojinoperationc.instandardcompilerterminology,location referencecannotbeavailable. readandthereisnointerveningwriteofl.aconventionallivereferenceanalysisisnotsucientforour referencetolocationlisliveatastatenifthereisastatereachablefromnwherelis(potentially) purposes;instead,wewishtocomputelivereferencesdiscountingtheeectofaparticularoperationx. stateoftheprogram.inthiscase,tosay\xhasbeenmovedtotheroot"meansthatalloccurrencesof Moreprecisely,wewishtoknowthesetoflivereferencesassumingthatxhasbeenmovedtotheroot Thesecondcomponentoftheavailableoperationsanalysisisacomputationoflivereferences.A 17

18 xthatcanpotentiallymovetotherootarenotcountedinthelivevariablecomputation.theintuitive justicationbehindthiscomputationisthatwhenmovinganoperationxintheschedule,itisnecessary tocheckifxwillkilllivereferencesinitsnewposition.however,indecidingwhetherornotxwillkill livereferencesinitsnewpositiononeshouldnotcountreferencesofxitselfinitscurrentposition. Thefollowingdataowequationdenesthesetoflocationsliveatstatenmodulooperationx: live(n;x)=read(y)[(([ ThetwocasesinthedenitionofZn0distinguishbetweenthecaseswhereoccurrencesofxcanor wherey=ops(n) fxg wherezn0=(live(n0;x)ifx2nodeps(n0) n02succ(n)zn0) kill(y)) computation(i.e.,live(n0;x)).ifthereisnooccurrenceofxthatcanpotentiallymove,thenalllive bydatadependencies(i.e.,x2nodeps(n0))thenthatoccurrenceofxisdiscountedinthelivereference cannotbeblockedbydatadependencies.ifthereisanoccurrenceofxonapaththatisnotblocked live(n0;stop)otherwise procedurearediscussedattheendofthesection. bottom-uptraversalofthecontrol-owgraphforp.somefurtherimprovementstotheeciencyofthis withthecomputationofnodeps,live(n;x)canbecomputedforallstatesnandoperationsxbyasingle referencesarecounted(i.e.,live(n0;stop)countsallreferences,sincestophasnoeectonthestore).as betheminimumiterationnumberofanyoperationina. threeconditions:xisinnodeps(r),xdoesnotkillanylivereferenceinoperationsotherthanx,andxis inthe\slidingwindow"ofoperations.recallthatconstraint4.6requiresthatoperationsfromnomore thankconsecutiveiterationsbeavailableforanystate.forasetofavailableoperationsa,letmin-it(a) Letrbetheinitialstate(orroot)ofP.Anoperationxisavailableforschedulinginrifitsatises situation.unlikefigure8,thereferencetojinoperationcisnotliveattherootbecauseitreadsthe valuewrittenbyd.theimportantobservationisthatanyoperationthatcankillareferencethatisnot livereferencesataninternalstatenareincludedinnodeps(n).theprograminfigure9illustratesthis Notethatweareconcernedwithlivereferencesonlyattherootr;operationsthatpotentiallykill available(r)=fxijxi2randi min-it(r)<kg liveattheroot(e.g.bcankillc'sreferencetoj)mustbedependentonsomeprecedingoperation(e.g. wherer=nodeps(r) fxjwrite(x)\live(r;x)6=;g writesj;thisoperationpreventsotheroperationsthatcouldwritejfrombeingavailableattheroot. depends(d;b)).thatis,areferencetojthatisnotliveattherootmustbeprecededbyanoperationthat tocomputelive(r;x)foreveryx;itissucienttocomputeitonlyforthoseoperationsinnodeps(r), eciencyofthenaiveproceduredescribedabovecanbeimprovedintwoways.first,itisnotnecessary becausenodeps(r)isasupersetoftheoperationsavailableforscheduling.second,operationsthatkill Themostexpensivepartofcomputingavailable(r)iscomputinglive(r;x)foreveryoperationx.The 18

19 b:j:=j+1 a:ifa<b d:j:=1 f livereferencescouldbedetectedearlierinthecomputationinsteadofcheckingonlyattheroot;wehave notgiventhisalternativetosimplifythepresentation. Figure9:Operationbcankillj,butjisnotliveattheroot. c:h:=j 5.2MaintainingAvailableOperations availableforschedulinginstaterisavailable(r). (seefigure6).thisemptystaterwillbelledwithoperationschosenbythescheduler. Werstdescribeatahighlevelhowavailableoperationsaremaintained,afterwhichwegiveimplementationsoftheproceduresnextandupdate-one.LetPbeasequentiallooplessprogram.Weaddanempty stater(astatewithnooperations)topandmakeittheroot;ristheinitialstateinprocedurepipeline pointintheincrementaldevelopmentoftheparallelizedloop,everyfrontierstateoftheparallelloophas thetodosetandn'ssuccessorsareaddedtothetodoset.astateinthetodosetisafrontierstate.atany statenisscheduled,itisrstlledwithoperations(byschedule-state),andthenhn;aiisremovedfrom ThenextstepistocomputethedataowanalysisofSection5.1.Atthispointthesetofoperations thepropertythatitsknownpredecessorshavebeenscheduledanditssuccessorshaveyettobescheduled. (The\unknown"predecessorsarethosethatareaddedthroughbackedgesinsertedthatcompletethe OncetheinitialglobalanalysisofPiscompleted,wearereadytobeginschedulingstates.When the(modied)programpistheparallelloop. softwarepipelinedloop.)availableoperationsareneededonlyforthefrontierstates;predecessorsof frontierstatesarenevermodied.whenprocedurepipelineterminates,therearenofrontierstatesand loop;theyareusedinsteadtocomputetheavailableoperationsinformationforthefrontierstates. asatree,exceptwherebackedgeshavebeenaddedbypipelining.thestatesbetweenthelinesaandb arethefrontierstates.theseareemptystatesthathaveyettobelledwithoperations.thestatesbelow linebarestatesoftheoriginalsequentialloop.conceptually,thesestatesarenotpartoftheparallel abovethelinelabeledaareparallelstates,alreadyscheduledbythealgorithm.thesestatesarearranged Figure10givesagenericsnapshotofthealgorithm'sdatastructuresduringscheduling.Thestates pipelineselectsapairhr;available(r)ifromtodoandllsitwithoperationsbycallingschedule-state(r;available(r)). Theprocedureschedule-stateinturncallsupdate-oneoneormoretimestochoosethescheduledoper- Thersttodosetisfhr;available(r)ig.Thus,initiallyristheonlyfrontierstate.Theprocedure 19

20 A ations(seefigure6).theprocedurecallupdate-one(available(r);r;x)performstwotasks.first,xis Figure10:Asnapshotofsoftwarepipeliningduringscheduling. B xtorfromitsoriginalplaceinthesequentialschedule.(somecopiesofxmayhavetoremainininterior deletedfrominteriorstatesofpandxisaddedtothefrontierstater.thus,thistransformationmoves statesofpifxcannotmoveonallpathstothefrontierstate;seethediscussionbelow.)whenatestis available(r). andliveareupdatedwherenecessary. movedtorthecontrolowofpmustbemodiedtopreservep'ssemantics.second,thesetsnodeps randthecorrespondingsetsofavailableoperationsai.weimplementnext(r;a)byinsertinganew, ofmaintainingavailableoperationsreasonable.thenewsetofavailableoperationsis(theupdated) restrictedtoarelativelysmallsubsetofthestatesofp;thispropertymakestheincrementalcost Whentheschedulingofriscomplete,next(r;A)=fhri;Aiigisthesetof(empty)successorsriof Animportantfactisthatboththedeletionofxandupdatingofthenodepsandlivesetscanbe amongallelementsofthetodoset.asschedulingproceedstherewillbemultiplefrontierstatesinp, emptystateribeforeeachsucc(r;ci)onbranchci2branch(r).thesetavailable(ri)isexactlytheset P.ThisimplementationofnextallowsP(andthereforetheavailableoperationanalysis)tobeshared ofoperationsavailableforschedulingonbranchcifromr.notethattheriarenewfrontierstatesof Proof:ProcedurenextonlyinsertsemptynodesinP.2 update-one.wecoulddothistriviallyintermsofthelocaltransformationsofpercolationscheduling Lemma5.2LetP0bePwiththemodicationsperformedbynext.ThenP0P. oneforeachelementintodo.animplementationofnextisgiveninfigure11. Tocompletethedescriptionofavailableoperationswemustgiveanimplementationofprocedure 20

21 procedurenext(r;a) returnfhri;available(ri)ijriasdenedaboveg foreachci2branch(r)do letribeafreshemptystate,n=succ-on-branch(r;ci)in nodeps(ri) live(ri;x) succ-on-branch(r;ci) succ-on-branch(ri;hi) Figure11:Implementationofnext. live(n;x)foralloperationsx nodeps(n) n [Nic85],butforcompletenesswedescribeadirectimplementationthatisclosertothewayitshouldbe doneinpractice.letrbeafrontierstateofp,letx=schedule(ops(r);available(r)),andassumethat x6=none.werstdescribehowxisdeletedfrompandaddedtorwhenxisanassignment;thisis theeasiercase.movinganoperationxwhilepreservingp'ssemanticsisalittlesubtlebecausexmay onsomeoperationonthepath;clearly,ccannotbedeletedfromsuchapath.inaddition,theremay otherpathsfromtheroottoc(inthiscasepassingthroughthetruebranchofa)suchthatcisdependent thefalsebranchofa)suchthatcisnotdependentonanyoperationonthepath.however,theremaybe referencesliveattherootandbecausethereisapathfromtheroottoc(inthiscasepassingthrough Figure12aillustratesthissituation.Inthisexample,cisavailableattherootbecausecdoesnotkillany beavailableatthefrontierstatebutstillblockedbydatadependenciesonsomepaths.theprogramin Inthisexample,onlythesinglestatecontainingcneedstobeduplicated,butingeneralmultiplestates rootinfigure12itstillmustbepreservedonpathsfromotherfrontierstates. theoperationbeingmovedissharedbetweenpathswhereitcanmoveandpathswhereitcannotmove. evenbepathsfromotherfrontierstatestoc(representedbytheincomingedgefrome).ifcismovedto ItiseasytoverifythattheprograminFigure12cisequivalenttotheprograminFigure12a. mayhavetobeduplicated.infigure12c,statechasbeendeletedandtheoperationmovedtotheroot. AsillustratedinFigure12b,thisproblemcanberesolvedbyduplicatingstatessothatnoinstanceof innodeps(ni)foreverynionthepath: Astatenkiscoveredbyastaten1foroperationxifthereisapathhn1;:::;nkisuchthatoperationxis tionsandnotation.apathisasequenceofstateshn1;:::;nkisuchthatni+12succ(ni)forall1i<k. Toformalizewhichstatesareduplicatedandwhichstatesaredeletedweneedsomeadditionaldeni- shouldbeleftunchanged.thesimplestcaseisifeverypathtoxiscoveredby(r;x).wesayaloopless afrontierstatetoniscoveredby(r;x).ifpisdeleteconsistentfor(r;x),thenxisnotblockedbydata movedtoafrontierstateritshouldbedeletedonlyfrompathsthatarecoveredby(r;x);otherpaths programpisdeleteconsistentfor(r;x)ifforeveryn2covered(r;x)suchthatn=fxg,everypathfrom Wesayapathiscoveredby(n;x)ifeverystateofthepathisincovered(n;x).Whenanoperationxis covered(n1;x)=fnkjthereexistsisapathhn1;:::;nkis.t.8i;1ikx2nodeps(ni)g 21

22 b:j:=1 a:ifa<0 root:? c:j:=j+1 t? f?d e e@@@rj:=j+1 b:j:=1 a:ifa<0 root:? t? f root:j:=j+1 a:ifa<0 (b)deleteconsistent. d e@@@rj:=j+1 b:j:=1fd t@@@r? dependenciesonanypathtothefrontierstater.hence,wecandeletestatesn=fxgincovered(r;x), Figure12:Movinganassignment. (c)aftercismoved.?d updatethepredecessorsofntopointton'ssuccessor,andaddxtor. Lemma5.3Letxbeanassignmentsuchthatx2available(r)andletN=fnjn=fxgandn2 (Recallthathiistheemptybranch seesection2.) covered(r;x)g.assumethatpisdeleteconsistentfor(r;x).letp0bepwiththefollowingchanges. modifyeachn0wheresucc-on-branch(n0;c)=nforsomen2nsothatsucc-on-branch(n0;c)= r deleteeveryn2n succ(n;hi) Proof:Forbrevityweonlysketchtheproof.Thetransformationcanbeimplementedbyasequence ThenPP0. ofsemantics-preservingpercolationschedulingtransformationsbetweenadjacentnodes[nic85].since eachindividualpercolationschedulingtransformationpreservesprogramsemantics,theentiresequence r[fxg preservesprogramsemantics.2 succ(n0)g.thefollowinglemmagivesaneasytestfordeterminingwhetherpisdeleteconsistent. Lemma5.4Pisdeleteconsistentfor(r;x)in2covered(r;x))pred(n)covered(r;x). looplessprogramdeleteconsistentfor(r;x).thesetofpredecessorsofastatenispred(n)=fn0jn2 Ofcourse,Lemma5.3onlyappliesifPisdeleteconsistent.Wenextshowhowtomakeanarbitrary 22

23 root:? a:a:=1 (a)beforebismoved. c b:ifb<0 t@@@r? fd a:a:=1? root:ifb<0 fa0:a:=1 Proof:Ifeverypredecessorofamemberofcovered(r;x)isincovered(r;x),thenclearlyeverypathfrom Figure13:Movingatest. (b)afterbismoved. c d? theformhr0;:::;n0;ni.thispathisnotcoveredby(r;x).2 andforsomen02pred(n),n062covered(r;x).thentheremustbeapathfromsomefrontierstater0of rton2covered(r;x)iscoveredby(r;x).fortheotherdirection,assumethatthereisann2covered(r;x) followingtwostepsuntilnonischosenin(1): (2)Letn0beaduplicateofnandforeveryp2pred(n)suchthatp62C,ifsucc-on-branch(p;c)=n (1)Choosen2Csuchthatsomepinpred(n)isnotalsoinC. ThefollowingalgorithmmakesPdeleteconsistentfor(r;x).LetC=covered(r;x).Iteratethe consistentretainthenodepsandliveinformationoftheoriginalstate.thesetofstatesforwhichthe Allthatremainsistoupdatethenodepsandlivesets.StatesthatareduplicatedinmakingPdelete analysiscanchangeiscovered(r;x).sincebothnodepsandlivearecomputedbottom-up,theanalysis NotethatthisalgorithmcopiestheminimumnumberofstatesneededtomakePdeleteconsistent. OncePisdeleteconsistentthestepsofLemma5.3canbeappliedtomovextothefrontierstate. thenmodifypsothatsucc-on-branch(p;c)=n0. canbeupdatedinasinglebottom-uppassoverthepathscoveredby(r;x). transformationisillustratedinfigures13.theprograminfigure13aisalreadydeleteconsistentfor update-onetomoveatestxwhilepreservingp'ssemantics,itisnecessarytomodifythecontrolow successoronx'struebranch,theduplicatesetofpathsleadstothesuccessoronx'sfalsebranch.this byupdate-oneisatest.letrbeafrontierstateofp,andletx=schedule(ops(r);available(r)).for ofp.intuitively,weduplicateallthecoveredpathsfromrtox;theoriginalsetofpathsleadstothe Finally,weshowhowtoupdatetheavailableoperationsinthecasewheretheinstructionchosen biisoneoftrueorfalse.thefollowinglemmashowshowtomoveatesttoafrontierstate. preservecontrolow.recallthatabranchcisatruthassignmenttotestshx1=b1;:::;xn=bniwhere (root;b).whenbismovedtorootinfigure13b,stateaisduplicatedonb'strueandfalsebranchesto 23

24 modicationsperformedinorder: Lemma5.5LetPbeaprogramwithfrontierstaterandletx2available(r)wherexisatest.Assume Pisdeleteconsistentfor(r;x)andletX=covered(r;x)inP.ProgramP0isPwiththefollowing (1)Foreachn2X,letn0beastatesuchthatops(n)=ops(n0)andforeachc2branch(n) (2)Foreachn2X,ifsucc-on-branch(n;c)=n1andops(n1)=fxg,thenmodifynsothatsucc-on-branch(n;c)= succ-on-branch(n0;c)=8><>: wheren1=succ-on-branch(n;c). succ-on-branch(n1;hx=truei) succ-on-branch(n1;hx=falsei)ifn12covered(r;x)andops(n1)=fxg n1ifn162covered(r;x) n01ifn12covered(r;x)andops(n1)6=fxg (3)Foreachc2branch(r)wherec=hx1=b1;:::;xn=bniandn=succ-on-branch(r;c)do ThenPP0.3 (4)Letops(r) succ-on-branch(r;hx=false;x1=b1;:::;xn=bni)=(nifn62x succ-on-branch(r;hx=true;x1=b1;:::;xn=bni)=n Proof:Again,forbrevityweonlysketchtheproof.ItiseasytoverifythatP0preservesthecontrol ops(r)[fxg n0ifn2x transformationsbetweenadjacentnodes.2 owofp.asintheproofoflemma5.3,thetransformationcanbeexpressedasasequenceoflocal ofprocedureupdate-oneisgiveninfigure14. modiestheoriginalstatesincovered(r;x)sothattheyleadtothetruebranchofx.part(3)modiesthe branchesofrtopointtotheoriginalnodesifxistrueandtothecopiednodesifxisfalse.adescription andbyassigningsuccessorssothatthepathsformedbythen0leadtothefalsebranchofx.part(2) Theimplementationwehavedescribedissomewhatnaiveandthereareinecienciesthatcanbe Part(1)ofLemma5.5duplicatescoveredpathsbycreatingacopyn0ofeverystateincovered(r;x) eliminatedatthecostofgreatercomplexityinthealgorithm.mostofthepotentialproblemsarerelated code. tospaceexplosion,eitherinthesizeofthenalcodeorinthesizeofintermediatedatastructuresused Whenperformedonthestatesoftheparallelschedule,thisoptimizationreducesthesizeofthenal bythealgorithm.somestatesthatareinitiallydierentmaybecomeidenticalasaresultofscheduling operations.thisobservationappliestobothstatesintheparallelscheduleandstatesthathaveyetto bescheduled.agoodimplementationshouldmergestatesthatareidenticalandareonidenticalpaths. becausecontrol-owisredirectedaroundthem. 3NotethatinthisconstructiontheoriginalstatescontainingxarenotremovedfromP,buttheybecomeunreachable 24

DATING YOUR GUILD 1952-1960

DATING YOUR GUILD 1952-1960 DATING YOUR GUILD 1952-1960 YEAR APPROXIMATE LAST SERIAL NUMBER PRODUCED 1953 1000-1500 1954 1500-2200 1955 2200-3000 1956 3000-4000 1957 4000-5700 1958 5700-8300 1959 12035 1960-1969 This chart displays

More information

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Medical Administrative Aspects

NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS. Medical Administrative Aspects NEOSHO COUNTY COMMUNITY COLLEGE MASTER COURSE SYLLABUS COURSE IDENTIFICATION Course Code/Number: ALMA 120 Course Title: Medical Administrative Aspects Division: Applied Science (AS) Liberal Arts (LA) Workforce

More information

SOLICITATION/CONTRACT/ORDER FOR COMMERICAL ITEMS

SOLICITATION/CONTRACT/ORDER FOR COMMERICAL ITEMS SOLICITATION/CONTRACT/ORDER FOR COMMERICAL ITEMS 1. REQUISITION NUMBER PAGE 1 OF OFFEROR TO COMPLETE BLOCKS 12, 17, 23, 24 & 30 2. CONTRACT NO. 3. AWARD/EFFECTIVE DATE 4. ORDER NUMBER 5. RFQ NUMBER 6.

More information

Future Trends in Airline Pricing, Yield. March 13, 2013

Future Trends in Airline Pricing, Yield. March 13, 2013 Future Trends in Airline Pricing, Yield Management, &AncillaryFees March 13, 2013 THE OPPORTUNITY IS NOW FOR CORPORATE TRAVEL MANAGEMENT BUT FIRST: YOU HAVE TO KNOCK DOWN BARRIERS! but it won t hurt much!

More information

Visa Smart Debit/Credit Certificate Authority Public Keys

Visa Smart Debit/Credit Certificate Authority Public Keys CHIP AND NEW TECHNOLOGIES Visa Smart Debit/Credit Certificate Authority Public Keys Overview The EMV standard calls for the use of Public Key technology for offline authentication, for aspects of online

More information

DHL EXPRESS CANADA E-BILL STANDARD SPECIFICATIONS

DHL EXPRESS CANADA E-BILL STANDARD SPECIFICATIONS DHL EXPRESS CANADA E-BILL STANDARD SPECIFICATIONS 1 E-Bill Standard Layout A B C D E F G Field/ DHL Account Number Billing Customer Name Billing Customer Address Billing Customer City Billing Customer

More information

Acceptance Page 2. Revision History 3. Introduction 14. Control Categories 15. Scope 15. General Requirements 15

Acceptance Page 2. Revision History 3. Introduction 14. Control Categories 15. Scope 15. General Requirements 15 Acceptance Page 2 Revision History 3 Introduction 14 Control Categories 15 Scope 15 General Requirements 15 Control Category: 0.0 Information Security Management Program 17 Objective Name: 0.01 Information

More information

Ź Ź ł ź Ź ś ź ł ź Ś ę ż ż ł ż ż Ż Ś ę Ż Ż ę ś ź ł Ź ł ł ż ż ź ż ż Ś ę ż ż Ź Ł Ż Ż Ą ż ż ę ź Ń Ź ś ł ź ż ł ś ź ź Ą ć ś ś Ź Ś ę ę ć ż Ź Ą Ń Ą ł ć ć ł ł ź ę Ś ę ś ę ł ś ć ź ś ł ś ł ł ł ł ć ć Ś ł ź Ś ł

More information

Attachment "A" - List of HP Inkjet Printers

Attachment A - List of HP Inkjet Printers HP Deskjet 350c Printer HP Deskjet 350cbi Printer HP Deskjet 350cbi Printer w/roller-case HP Deskjet 420 Printer HP Deskjet 420c Printer HP Deskjet 610c Printer HP Deskjet 610cl Printer HP Deskjet 612c

More information

Two betting strategies that predict all compressible sequences

Two betting strategies that predict all compressible sequences Two betting strategies that predict all compressible sequences T. Petrović tomeepx@gmail.com Seventh International Conference on Computability, Complexity and Randomness (CCR 2012) T. Petrović (tomeepx@gmail.com)

More information

Community College of Philadelphia Calling Code 218 Employer Scan Client Approved: November 17, 2005 Region (CIRCLE) City MSA

Community College of Philadelphia Calling Code 218 Employer Scan Client Approved: November 17, 2005 Region (CIRCLE) City MSA Community College of Philadelphia Calling Code 218 Employer Scan Client Approved: November 17, 2005 Region (CIRCLE) City MSA Zip V0 V1 V2 Month/ Day/ Year of Contact: Business Name: Address: V3 City: V4

More information

Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years

Victims Compensation Claim Status of All Pending Claims and Claims Decided Within the Last Three Years Claim#:021914-174 Initials: J.T. Last4SSN: 6996 DOB: 5/3/1970 Crime Date: 4/30/2013 Status: Claim is currently under review. Decision expected within 7 days Claim#:041715-334 Initials: M.S. Last4SSN: 2957

More information

One Hundred Tenth Congress of the United States of America

One Hundred Tenth Congress of the United States of America H. R. 7327 One Hundred Tenth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Thursday, the third day of January, two thousand and eight An Act

More information

SERVER CERTIFICATES OF THE VETUMA SERVICE

SERVER CERTIFICATES OF THE VETUMA SERVICE Page 1 Version: 3.4, 19.12.2014 SERVER CERTIFICATES OF THE VETUMA SERVICE 1 (18) Page 2 Version: 3.4, 19.12.2014 Table of Contents 1. Introduction... 3 2. Test Environment... 3 2.1 Vetuma test environment...

More information

Pattern Co. Monkey Trouble Wall Quilt. Size: 48" x 58"

Pattern Co. Monkey Trouble Wall Quilt. Size: 48 x 58 .............................................................................................................................................. Pattern Co..........................................................................................

More information

Vehicle Identification Numbering System 00.03

Vehicle Identification Numbering System 00.03 Vehicle Identification Numbering System 00.03 IMPORTANT: See Subject 050 for the vehicle identification numbering system for vehicles built before May 1, 2000. Federal Motor Vehicle Safety Standard 115

More information

The consensus of the Pharmacy Practice Model Summit Am J Health-Syst Pharm. 2011; 68:1148-52 This list of the Pharmacy Practice

The consensus of the Pharmacy Practice Model Summit Am J Health-Syst Pharm. 2011; 68:1148-52 This list of the Pharmacy Practice The consensus of the summit The consensus of the Pharmacy Practice Model Summit Am J Health-Syst Pharm. 2011; 68:1148-52 This list of the Pharmacy Practice Model Summit s 147 points of consensus about

More information

THE DESIGN OF AN EFFICIENT LOAD BALANCING ALGORITHM EMPLOYING BLOCK DESIGN. Ilyong Chung and Yongeun Bae. 1. Introduction

THE DESIGN OF AN EFFICIENT LOAD BALANCING ALGORITHM EMPLOYING BLOCK DESIGN. Ilyong Chung and Yongeun Bae. 1. Introduction J. Appl. Math. & Computing Vol. 14(2004), No. 1-2, pp. 343-351 THE DESIGN OF AN EFFICIENT LOAD BALANCING ALGORITHM EMPLOYING BLOCK DESIGN Ilyong Chung and Yongeun Bae Abstract. In order to maintain load

More information

C relative to O being abc,, respectively, then b a c.

C relative to O being abc,, respectively, then b a c. 2 EP-Program - Strisuksa School - Roi-et Math : Vectors Dr.Wattana Toutip - Department of Mathematics Khon Kaen University 200 :Wattana Toutip wattou@kku.ac.th http://home.kku.ac.th/wattou 2. Vectors A

More information

Manpower Codes Lookup

Manpower Codes Lookup 00 NO PREFERENCE RECORDED 01 NO RELIGIOUS PREFERENCE 02 SEVENTH-DAY ADVENTIST 04 ASSEMBLIES OF GOD 05 GRACE GOSPEL FELLOWSHIP 06 AMERICAN BAPTIST CHURCHES 07 INDEPENDENT BAPTIST BIBLE MISSION 08 SOUTHERN

More information

H. R. 3692 IN THE HOUSE OF REPRESENTATIVES A BILL

H. R. 3692 IN THE HOUSE OF REPRESENTATIVES A BILL I TH CONGRESS 1ST SESSION H. R. To amend the Safe and Drug-Free Schools and Communities Act and the Omnibus Crime Control and Safe Streets Act of 1 to authorize the use of grant funds for bullying prevention,

More information

SteganographyinaVideoConferencingSystem? AndreasWestfeld1andGrittaWolf2 2InstituteforOperatingSystems,DatabasesandComputerNetworks 1InstituteforTheoreticalComputerScience DresdenUniversityofTechnology

More information

Algebra 1 Course Information

Algebra 1 Course Information Course Information Course Description: Students will study patterns, relations, and functions, and focus on the use of mathematical models to understand and analyze quantitative relationships. Through

More information

Vector Algebra CHAPTER 13. Ü13.1. Basic Concepts

Vector Algebra CHAPTER 13. Ü13.1. Basic Concepts CHAPTER 13 ector Algebra Ü13.1. Basic Concepts A vector in the plane or in space is an arrow: it is determined by its length, denoted and its direction. Two arrows represent the same vector if they have

More information

Establishing a website to aid growers in harvesting and irrigation decisions: PeanutFARM

Establishing a website to aid growers in harvesting and irrigation decisions: PeanutFARM Establishing a website to aid growers in harvesting and irrigation decisions: PeanutFARM D.L. ROWLAND 1, J.A. FERRELL 1, J.M. BENNETT 1, D.A. DREW 1, B.C. COLVIN 1, and W.H. FAIRCLOTH 2 1 Agronomy Department,

More information

3 3RG78 45 program overview

3 3RG78 45 program overview Overview RG78 45 light curtains and arrays with integrated processing unit for type 4 in accordance with IEC/EN 61496 With "Standard" function package Resolutions: 14, 0, 50, and 90 Protective zone height:

More information

กก CIMB Thai Biz-Channel

กก CIMB Thai Biz-Channel กก CIMB Thai Biz-Channel ก ()... (!"!# $%&)... 'ก(")(*+... (,("+-).ก+/)*+,ก0) 1!ก+(1+(,( $+('!ก CIMB Thai Biz-Channel (,("+-).ก+/ก0) ก %1" ก?$.(-@)?$.ก%1"?$.(@.".#1 1!ก?"+$.-.% )('AA, ก?$.(!"!,,ก??$./

More information

theiroutlinerepresentation,whichisanessentialinitialstepinconvertingtypefacesfromoutlinerepresenta-

theiroutlinerepresentation,whichisanessentialinitialstepinconvertingtypefacesfromoutlinerepresenta- ExtractionofTypographicElementsfromOutline InstituteofComputerScience,TheHebrewUniversityofJerusalem RepresentationsofFonts Jerusalem91904,Israel.farik,arirg@cs.huji.ac.il ArielShamirandAriRappoport typefacerepresentationssupportonlygeometricoutlinerepresentationsandbasicfontvariations.

More information

Metodi Numerici per la Bioinformatica

Metodi Numerici per la Bioinformatica Metodi Numerici per la Bioinformatica Biclustering A.A. 2008/2009 1 Outline Motivation What is Biclustering? Why Biclustering and not just Clustering? Bicluster Types Algorithms 2 Motivations Gene expression

More information

SERVER CERTIFICATES OF THE VETUMA SERVICE

SERVER CERTIFICATES OF THE VETUMA SERVICE Page 1 Version: 3.5, 4.11.2015 SERVER CERTIFICATES OF THE VETUMA SERVICE 1 (18) Page 2 Version: 3.5, 4.11.2015 Table of Contents 1. Introduction... 3 2. Test Environment... 3 2.1 Vetuma test environment...

More information

ENGINEERING MECHANICS STATIC

ENGINEERING MECHANICS STATIC EX 16 Using the method of joints, determine the force in each member of the truss shown. State whether each member in tension or in compression. Sol Free-body diagram of the pin at B X = 0 500- BC sin

More information

www.ms-biotech.wisc.edu

www.ms-biotech.wisc.edu S M A T - S TR ATEGY T MS I k W - k T S Y C 2005 P M H I INNOVAT ION T MS T - z k k k M F-S C 2008 S P D S C D I T M S k - z q k S - x M S U W- M D D MS k I / Y k Y x z x T MS N A qk R T MS 30 T k x x

More information

LIIKENNEMÄÄRÄT TRAFIKMÄNGDER TRAFFIC VOLUMES

LIIKENNEMÄÄRÄT TRAFIKMÄNGDER TRAFFIC VOLUMES IIÄÄÄ IÄ I II ÄÄ Å I I II /!,, % å f f f I f å å f å! å å f f % f å f ff w f f f I w! I w ff f I ff f, w % f å å f ff f / / 4 % / / 3 % / / / / 3 % 1 % 4 f å å 4 f ff / f / ff 7 4 3 1 / / / / 171 17 1

More information

Geneva CUSD 304 Content-Area Curriculum Frameworks Grades 6-12 Business

Geneva CUSD 304 Content-Area Curriculum Frameworks Grades 6-12 Business Geneva CUSD 304 Content-Area Curriculum Frameworks Grades 6-12 Business Mission Statement In the Business Department, our mission is to: Provide a variety of subject areas. Introduce students to current

More information

SCO TT G LEA SO N D EM O Z G EB R E-

SCO TT G LEA SO N D EM O Z G EB R E- SCO TT G LEA SO N D EM O Z G EB R E- EG Z IA B H ER e d it o r s N ) LICA TIO N S A N D M ETH O D S t DVD N CLUDED C o n t e n Ls Pr e fa c e x v G l o b a l N a v i g a t i o n Sa t e llit e S y s t e

More information

Stock & Index Release Notes

Stock & Index Release Notes Stock & Index Release Notes November 2012 Monthly Update These release notes pertain to the November 2012 Monthly release of the CRSP US Stock and Index databases. November 2012 data edits Individual Edits

More information

Calculation of Valu-Trac Statuses

Calculation of Valu-Trac Statuses Calculation of Intrinsic Value Yield Latest Cash Earnings (Net Income + Depreciation and Amortization) (put aside) Dividend (subtract) Provision for Depreciation (Net Assets x Inflation Rate) (subtract)

More information

Short Title

Short Title Short Title http://www.alcatel.com http://www.alcateldsl.com Q A MODEL NUMBER: CPYYWWNNNNN 3EC 18704BC AA01 Speed Touch Home POTS Network Terminator CP992300XXX Speed Touch Home NT Tested to

More information

May 2011 Monthly Update - Microsoft Wordpress

May 2011 Monthly Update - Microsoft Wordpress Stock & Index Release Notes May 2011 Monthly Update These release notes pertain to the May 2011 Monthly release of the CRSP US Stock and Index databases. May 2011 data edits permno company name begin date

More information

C-QUADRAT Stuttgarter AllStars aktiv.

C-QUADRAT Stuttgarter AllStars aktiv. C-QUADRAT Stuttgarter AllStars aktiv. LU0293750971 F&C Portfolios Fund F&C European SmallCap I EUR 16,09 LU0322253906 db x-trackers MSCI Europe Small Cap Index UCITS ETF (DR) 1C 15,50 LU0533033238 Lyxor

More information

MixingEmailwithBabel. CekiGulcu GeneTsudik. IBMResearchDivision,ZurichResearchLaboratory. Saumerstrasse4,CH-8803Ruschlikon.

MixingEmailwithBabel. CekiGulcu GeneTsudik. IBMResearchDivision,ZurichResearchLaboratory. Saumerstrasse4,CH-8803Ruschlikon. MixingEmailwithBabel CekiGulcu GeneTsudik IBMResearchDivision,ZurichResearchLaboratory Saumerstrasse4,CH-8803Ruschlikon Switzerland email:gts@zurich.ibm.com tel+4..724-8308 fax+4..70-3608 Abstract Increasinglylargenumbersofpeoplecommunicatetodayvia

More information

Master Degree in International Economics and Commerce (DM 270/2004) Curriculum Business Organization and Strategy

Master Degree in International Economics and Commerce (DM 270/2004) Curriculum Business Organization and Strategy Master Degree in International Economics and Commerce (DM 270/2004) Curriculum Business Organization and Strategy Lab of International D1 Lab of International D1 International Sales T31 Lab of International

More information

Samknows Broadband Report

Samknows Broadband Report Samknows Broadband Report London Borough of Enfield This report describes the current broadband landscape for the London Borough of Enfield both in terms of general availability and choice, and in terms

More information

Model Templates for PROCESS for SPSS and SAS c 2013-2015 Andrew F. Hayes and The Guilford Press. Model 1. Conceptual Diagram. Statistical Diagram.

Model Templates for PROCESS for SPSS and SAS c 2013-2015 Andrew F. Hayes and The Guilford Press. Model 1. Conceptual Diagram. Statistical Diagram. c 203-205 Andrew F. Hayes and The Guilford Press Model M b e M b 2 b 3 M Conditional effect of on = b + b 3 M c 203-205 Andrew F. Hayes and The Guilford Press Model Multicategorical M with k categories

More information

Al Musanna College of Technology Department of Information Technology Time Table Sep 2015

Al Musanna College of Technology Department of Information Technology Time Table Sep 2015 DIPLOMA YEAR 1 MATH 1102 Pure Mathematics 1 8:00-10:00 8:00-10:00 OB302-SA302 RKN MATH 1102 Pure Mathematics 2 12:00-2:00 12:00-2:00 OB207-SA205 RKN MATH 1102 Pure Mathematics 3 10:00-12:00 10:00-12:00

More information

Theory behind Normalization & DB Design. Satisfiability: Does an FD hold? Lecture 12

Theory behind Normalization & DB Design. Satisfiability: Does an FD hold? Lecture 12 Theory behind Normalization & DB Design Lecture 12 Satisfiability: Does an FD hold? Satisfiability of FDs Given: FD X Y and relation R Output: Does R satisfy X Y? Algorithm: a.sort R on X b.do all the

More information

alongwithexternalcollections;theyfrequentlywanttoretrieveinformation,ratherthan Abstract 510642-0930

alongwithexternalcollections;theyfrequentlywanttoretrieveinformation,ratherthan Abstract 510642-0930 TowardWork-CenteredDigitalInformationServices UniversityofCalifornia,Berkeley ComputerScienceDivision wilensky@cs.berkeley.edu Berkeley,CA94720 RobertWilensky 389SodaHall Weareengagedindevelopingtechnologiestosupportwork-centereddigitalinformationservices.Work-centereddigitalinformationservicesareasetoflibrary-likeservicesmeantto

More information

KSPN Gerontology Nursing Course Outcome Summary

KSPN Gerontology Nursing Course Outcome Summary KSPN Gerontology Nursing Course Outcome Summary Course Information Organization KSBN Development Date 9/8/2006 Revised Date 6/28/2007 Total Credits 2 Description This course is designed to explore issues

More information

BSc in Information Systems Degree Programme. Syllabus

BSc in Information Systems Degree Programme. Syllabus BSc in Information Systems Degree Programme Syllabus Semester 1 Title IS1012 Introduction to Computer Systems 30 - - 2 IS1022 Information Technology Concepts 30 - - 2 IS1033 Fundamentals of Programming

More information

SSN: This field shows the Social Security number(s) (SSNs) that were used as one of the Business Objects search data; the default is 000000000.

SSN: This field shows the Social Security number(s) (SSNs) that were used as one of the Business Objects search data; the default is 000000000. Refreshed 06/11/2007 9:02:48 AM Department of Human Services QN-112 SVES Title II SSA Retirement, Survivors, Disability and Health Insurance Benefits Information SSN: 123-45-6789 Birth Month: ALL Birth

More information

G d y n i a U s ł u g a r e j e s t r a c j i i p o m i a r u c z a s u u c z e s t n i k ó w i m p r e z s p o r t o w y c h G d y s k i e g o O r o d k a S p o r t u i R e k r e a c j i w r o k u 2 0

More information

UNDERSTANDING FLOW PROCESSING WITHIN THE CISCO ACE M ODULE Application de liv e r y pr odu cts can distr ib u te tr af f ic to applications and w e b se r v ice s u sing v ar y ing le v e ls of application

More information

COMMERCIAL AIRLINE FACT SHEET

COMMERCIAL AIRLINE FACT SHEET COMMERCIAL AIRLINE FACT SHEET PASSENGER 100% Process LIFEJACKETS Black ame: SURVITECpos_PMS.eps Colourway: 100% Pantone PMS 158c RFD 102 Mk 2BA (00002136) Demo model (40982001) RFD 102 Mk 3 (00002256)

More information

Database Design and Normalization

Database Design and Normalization Database Design and Normalization Chapter 10 (Week 11) EE562 Slides and Modified Slides from Database Management Systems, R. Ramakrishnan 1 Computing Closure F + Example: List all FDs with: - a single

More information

On Cyclotomic Polynomials with1 Coefficients

On Cyclotomic Polynomials with1 Coefficients On Cyclotomic Polynomials with1 Coefficients Peter Borwein and Kwok-Kwong Stephen Choi CONTENTS 1. Introduction 2. Cyclotomic Polynomials with Odd Coefficients 3. Cyclotomic Littlewood Polynomials 4. Cyclotomic

More information

FORT LAUDERDALE INTERNATIONAL BOAT SHOW BAHIA MAR IN-WATER SET-UP SCHEDULE

FORT LAUDERDALE INTERNATIONAL BOAT SHOW BAHIA MAR IN-WATER SET-UP SCHEDULE IN-WATER SET-UP SCHEDULE 200-221 B DOCK Friday, October 22 9:00 a.m. 1 FACE DOCK Saturday, October 23 10:00 a.m. 222-245 Friday, October 22 11:00 a.m. 2 Sunday, October 24 10:00 a.m. 3 Sunday, October

More information

ON AUTOMOBILE INSURANCE RATEMAKING Estimatnlg relativitms m ~ multiplicatwe model. JAN JUNG Stockholm

ON AUTOMOBILE INSURANCE RATEMAKING Estimatnlg relativitms m ~ multiplicatwe model. JAN JUNG Stockholm ON AUTOMOBILE INSURANCE RATEMAKING Estimatnlg relativitms m ~ multiplicatwe model JAN JUNG Stockholm Note: After the manuscript had been distributed to the participants of the Arnhem Colloquium, mr Baily

More information

APPENDIX R INFECTIOUS WASTE TREATMENT FACILITY PERMIT TO INSTALL APPLICATION

APPENDIX R INFECTIOUS WASTE TREATMENT FACILITY PERMIT TO INSTALL APPLICATION INFECTIOUS WASTE TREATMENT FACILITY PERMIT TO INSTALL APPLICATION Submittal Procedure - Submit four copies of the Permit to Install application (two copies to Central Office and two copies to the appropriate

More information

4D 2D V/D V/D V/D V/D

4D 2D V/D V/D V/D V/D CTS 1: Coax JK 30636 JK 30618 JK 30617 1-6: SOEST JK 30624 JK 30625 1-7: SOEST 1: New LIne: x60568 JK 30628 JK 30616 JK 30615 JK 30604 JK 30603 JK 30605 JK 30614 7D 6D IW35 JK JK 30635 JK30620 Position

More information

BSc in Information Technology Degree Programme. Syllabus

BSc in Information Technology Degree Programme. Syllabus BSc in Information Technology Degree Programme Syllabus Semester 1 Title IT1012 Introduction to Computer Systems 30 - - 2 IT1022 Information Technology Concepts 30 - - 2 IT1033 Fundamentals of Programming

More information

TECHNICAL CHARACTERISTICS. Series K---- Codification key SERIES

TECHNICAL CHARACTERISTICS. Series K---- Codification key SERIES Pneumatic cylinders mm according to ISO 643 and VDMA 56 with adjustable cushioning UNIVER pneumatic cylinders which comply with ISO 643 and VDMA 56 standards, take advantage of the improvements arising

More information

Scheduling and Load Balancing in Parallel and Distributed Systems

Scheduling and Load Balancing in Parallel and Distributed Systems Scheduling and Load Balancing in Parallel and Distributed Systems Behrooz A. Shirazi Ali R. Hurson Krishna M.Kayi IEEE Computer Society Press Los Alamitos, California Washington Brussels Tokyo - a?-/ Contents

More information

Service Instruction. 1.0 SUBJECT: ECi Accessory Cases for Lycoming 4-Cylinder engines with single magneto configurations and TITAN 361 Engines

Service Instruction. 1.0 SUBJECT: ECi Accessory Cases for Lycoming 4-Cylinder engines with single magneto configurations and TITAN 361 Engines Title: Service Instruction ECi Accessory Cases Installed on Engines S.I. No.: 03-1 Page: 1 of 7 Issued: 2/28/2003 Revision: 2 (4/13/2009) Technical Portions are FAA DER Approved. 1.0 SUBJECT: ECi Accessory

More information

T360 Barbecue. Assembly Manual. 85-3052-6 (G30531) Propane 1 YEAR LIMITED WARRANTY

T360 Barbecue. Assembly Manual. 85-3052-6 (G30531) Propane 1 YEAR LIMITED WARRANTY T360 Barbecue Assembly Manual 85-3052-6 (G30531) Propane 1 YEAR LIMITED WARRANTY READ AND SAVE MANUAL FOR FUTURE REFERENCE. If pre-assembled, leave this manual with unit for consumer s future reference.

More information

Local-Effect Games. Kevin Leyton-Brown and Moshe Tennenholtz. Abstract. 1 Introduction. 2 Local-Effect Games

Local-Effect Games. Kevin Leyton-Brown and Moshe Tennenholtz. Abstract. 1 Introduction. 2 Local-Effect Games Local-Effect Games Kevin Leyton-Brown and Moshe Tennenholtz kevinlb@stanford.edu; Computer Science Department, Stanford University, Stanford CA 430, USA moshet@ie.technion.ac.il; Faculty of Industrial

More information

1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain

1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain Notes on real-closed fields These notes develop the algebraic background needed to understand the model theory of real-closed fields. To understand these notes, a standard graduate course in algebra is

More information

Introduction to Complex Numbers in Physics/Engineering

Introduction to Complex Numbers in Physics/Engineering Introduction to Complex Numbers in Physics/Engineering ference: Mary L. Boas, Mathematical Methods in the Physical Sciences Chapter 2 & 14 George Arfken, Mathematical Methods for Physicists Chapter 6 The

More information

Football State Champions

Football State Champions Football State Champions YEAR SCHOOL CLASSIFICATION 2015-16 Damascus 3A Champions 2014-15 Northwest 4A Champions 2013-14 Northwest 4A Champions 2008-09 Sherwood 4A Champions 2007-08 Quince Orchard 4A Champions

More information

Scheduling and Load Balancing in Parallel and Distributed Systems

Scheduling and Load Balancing in Parallel and Distributed Systems Brochure More information from http://www.researchandmarkets.com/reports/2182702/ Scheduling and Load Balancing in Parallel and Distributed Systems Description: Advances in hardware and software technologies

More information

Introduction to Software Testing Chapter 7.1 Engineering Criteria for Technologies basiert auf Paul Ammann & Jeff Offutt angepaßt durch R.

Introduction to Software Testing Chapter 7.1 Engineering Criteria for Technologies basiert auf Paul Ammann & Jeff Offutt angepaßt durch R. Introduction to Software Testing Chapter 7.1 Engineering Criteria for Technologies basiert auf Paul Ammann & Jeff Offutt angepaßt durch R. Marrone www.introsoftwaretesting.com 1. Overview Section 7.1 Outline

More information

www.ktmschnellversand.de

www.ktmschnellversand.de w.ktmschnellversand.de INDEX SPARE CONNECTORS AA-AR SPARE CONNECTORS AS-BK SPARE CONNECTORS BL-BZ SPARE CONNECTORS CA-CP 1x 2x 3x 4x SPARE CONNECTORS CQ-DM SPARE CONNECTORS DN-EL 5x 6x x x All information

More information

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas

NSA/DHS National Centers of Academic Excellence in Information Assurance/Cyber Defense 2014 List of Knowledge Units and Focus Areas The CAE IA/CD academic requirements are based on meeting defined sets of Knowledge Units (KUs): 1. Core for 2 year programs - technical or applied emphasis 2. Core for 4 year + programs - technical or

More information

audi ELETTROVENTOLE RAFFREDDAMENTO MODULI RADIATORE ELECTROFAN MOTORS FOR RADIATOR COOLING SYSTEMS

audi ELETTROVENTOLE RAFFREDDAMENTO MODULI RADIATORE ELECTROFAN MOTORS FOR RADIATOR COOLING SYSTEMS GA0550 MOTORINI RISCALDAMENTO E VENTILAZIONE ABITACOLO - RAFFREDDAMENTO OLIO MOTORE-INIETTORI-CARBURATORE PASSENGERS COMPARTMENT HEATER MOTORS - MOTOR OIL-INJECTORS-CARBURATOR COOLING SYSTEMS 893800 357800

More information

No BI without Machine Learning

No BI without Machine Learning No BI without Machine Learning Francis Pieraut francis@qmining.com http://fraka6.blogspot.com/ 10 March 2011 MTI-820 ETS Too Much Data Supervised Learning (classification) Unsupervised Learning (clustering)

More information

2015 WIKA USA Manufacturer's Suggested Retail Price List

2015 WIKA USA Manufacturer's Suggested Retail Price List R 2015 WIKA USA Manufacturer's Suggested Retail Price List Electronic Pressure Measurement Effective January 1, 2015 2015 WIKA USA Maufacturer's Suggested Retail Price List Electronic Pressure Measurement

More information

Finding the Measure of Segments Examples

Finding the Measure of Segments Examples Finding the Measure of Segments Examples 1. In geometry, the distance between two points is used to define the measure of a segment. Segments can be defined by using the idea of betweenness. In the figure

More information

UK ResiEMEA Version 2.0.0

UK ResiEMEA Version 2.0.0 The following is Fitch Ratings file layout and fields for UK mortgage pools submitted to the Fitch Ratings UK RMBS Group as of 9 September 2009. Please e-mail mortgage files to the appropriate person in

More information

Generictoolsarenotcurrentlyavailablewithwhichtoaccuratelydeneimagecontent.The

Generictoolsarenotcurrentlyavailablewithwhichtoaccuratelydeneimagecontent.The AFractal-BasedClusteringApproachinLargeVisual StateUniversityofNewYorkatBualo DepartmentofComputerScience AidongZhangandBiaoCheng DatabaseSystems DepartmentofElectricalandComputerEngineering StateUniversityofNewYorkatBualo

More information

ARTHUR ROBINSON & HEDDERWICKS LIBRARY

ARTHUR ROBINSON & HEDDERWICKS LIBRARY ARTHUR ROBINSON & HEDDERWICKS LIBRARY 1994 THE PARLIAMENT OF THE COMMONWEALTH OF AUSTRALIA HOUSE OP REPRESENTATIVES HEALTH LEGISLATION (PRIVATE HEALTH JINSURANCE REFORM) AMENDMENT BILL 1994 EXPLANATORY

More information

FloatingpointvericationinHOLLight:theexponentialfunction 1 Floatingpointverication theexponentialfunction inhollight: UniversityofCambridge JohnHarrison Introduction Floatingpointcorrectness Ourimplementationlanguage

More information

"HIGHER EDUCATION VALUES AND OPINIONS SURVEY" ADVANCED PLACEMENT TEACHERS and GUIDANCE COUNSELORS May-June 1994

HIGHER EDUCATION VALUES AND OPINIONS SURVEY ADVANCED PLACEMENT TEACHERS and GUIDANCE COUNSELORS May-June 1994 "HIGHER EDUCATION VALUES AND OPINIONS SURVEY" ADVANCED PLACEMENT TEACHERS and GUIDANCE COUNSELORS May-June 1994 VARIABLE SURVEY ANSWER NAME QUESTION CATEGORIES Facsimile the original mail questionnaire

More information

GCE Mathematics (6360) Further Pure unit 4 (MFP4) Textbook

GCE Mathematics (6360) Further Pure unit 4 (MFP4) Textbook Version 36 klm GCE Mathematics (636) Further Pure unit 4 (MFP4) Textbook The Assessment and Qualifications Alliance (AQA) is a company limited by guarantee registered in England and Wales 364473 and a

More information

Tape & Reel Packaging For Surface Mount Devices. Date Code Marking:

Tape & Reel Packaging For Surface Mount Devices. Date Code Marking: Tape & Reel Packaging For Surface Mount Devices A utomation of surface-mount assembly by the use of pick-and-place equipment to handle tiny components has been enhanced by evolutionary improvements in

More information

A PRICING MODEL FOR NEW VEHICLE EXTENDED WARRANTIES

A PRICING MODEL FOR NEW VEHICLE EXTENDED WARRANTIES A PRICING MODEL FOR NEW VEHICLE EXTENDED WARRANTIES ABSTRACT In this paper, we use a pure premium approach to price a new vehicle extended warranty. Coverage provided by a new vehicle extended warranty

More information

How to create OpenDocument URL s with SAP BusinessObjects BI 4.0

How to create OpenDocument URL s with SAP BusinessObjects BI 4.0 How to create OpenDocument URL s with SAP BusinessObjects BI 4.0 Creator: Twitter: Blog: Pieter Verstraeten http://www.twitter.com/pverstraeten http://www.pieterverstraeten.com/blog Hi, Thanks for downloading

More information

Public Key Infrastructure. Certificates Standard X509v3

Public Key Infrastructure. Certificates Standard X509v3 Public Key Infrastructure Certificates Standard X509v3 Certificate and Certification Authority Problem. Make a subject s public key available to others so that they can verifiy the key authenticity and

More information

4.1. COMPLEX NUMBERS

4.1. COMPLEX NUMBERS 4.1. COMPLEX NUMBERS What You Should Learn Use the imaginary unit i to write complex numbers. Add, subtract, and multiply complex numbers. Use complex conjugates to write the quotient of two complex numbers

More information

UIFSA See UNIFORM INTERSTATE FAMILY SUPPORT ACT. UMBILICAL CORD BLOOD COLLECTION PROGRAM ACT Generally, 19a-32o to 19a-32v

UIFSA See UNIFORM INTERSTATE FAMILY SUPPORT ACT. UMBILICAL CORD BLOOD COLLECTION PROGRAM ACT Generally, 19a-32o to 19a-32v UIFSA See UNIFORM INTERSTATE FAMILY SUPPORT ACT. UMBILICAL CORD BLOOD COLLECTION PROGRAM ACT Generally, 19a-32o to 19a-32v UNDERGROUND FACILITIES See PUBLIC UTILITIES REGULATORY AUTHORITY. UNDERGROUND

More information

EXCERPTED SUMMARY AND RULE TEXT TWO YEAR TRANSCRIPTS. The following summary provides a brief overview of the draft amendments.

EXCERPTED SUMMARY AND RULE TEXT TWO YEAR TRANSCRIPTS. The following summary provides a brief overview of the draft amendments. EXCERPTED SUMMARY AND RULE TEXT TWO YEAR TRANSCRIPTS The following summary provides a brief overview of the draft amendments. Subchapter 5. General Certification Policies The Department proposes to amend

More information

5010 Gap Analysis for Dental Claims. Based on ASC X12 837 v5010 TR3 X224A2 Version 2.0 August 2010

5010 Gap Analysis for Dental Claims. Based on ASC X12 837 v5010 TR3 X224A2 Version 2.0 August 2010 5010 Gap Analysis for Dental Claims Based on ASC X12 837 v5010 TR3 X224A2 Version 2.0 August 2010 This information is provided by Emdeon for education and awareness use only. Even though Emdeon believes

More information

The cover SU(2) SO(3) and related topics

The cover SU(2) SO(3) and related topics The cover SU(2) SO(3) and related topics Iordan Ganev December 2011 Abstract The subgroup U of unit quaternions is isomorphic to SU(2) and is a double cover of SO(3). This allows a simple computation of

More information

DATA IMPORT FORMAT BASSET FIXED ASSET SYSTEM. Spreadsheet Field Data Column Name Type Length Decimal Notes

DATA IMPORT FORMAT BASSET FIXED ASSET SYSTEM. Spreadsheet Field Data Column Name Type Length Decimal Notes DATA IMPORT FORMAT BASSET FIXED ASSET SYSTEM Spreadsheet Field Data Column Name Type Length Decimal Notes A Description Character 25 Note 1 B Location Character 25 C Location State Character 25 D Company

More information

1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování 1.2.1.

1. Oblast rozvoj spolků a SU UK 1.1. Zvyšování kvalifikace Školení Zapojení do projektů Poradenství 1.2. Financování 1.2.1. 1. O b l a s t r o z v o j s p o l k a S U U K 1. 1. Z v y š o v á n í k v a l i f i k a c e Š k o l e n í o S t u d e n t s k á u n i e U n i v e r z i t y K a r l o v y ( d á l e j e n S U U K ) z í

More information

Analysis of Binary Search algorithm and Selection Sort algorithm

Analysis of Binary Search algorithm and Selection Sort algorithm Analysis of Binary Search algorithm and Selection Sort algorithm In this section we shall take up two representative problems in computer science, work out the algorithms based on the best strategy to

More information

Forces & Magnetic Dipoles. r r τ = μ B r

Forces & Magnetic Dipoles. r r τ = μ B r Foces & Magnetic Dipoles x θ F θ F. = AI τ = U = Fist electic moto invented by Faaday, 1821 Wie with cuent flow (in cup of Hg) otates aound a a magnet Faaday s moto Wie with cuent otates aound a Pemanent

More information

A Bill Regular Session, 2011 HOUSE BILL 1811

A Bill Regular Session, 2011 HOUSE BILL 1811 Stricken language would be deleted from and underlined language would be added to present law. Act of the Regular Session 0 State of Arkansas th General Assembly As Engrossed: H// A Bill Regular Session,

More information

Awaiting Information (AI) Reasons. July 2016

Awaiting Information (AI) Reasons. July 2016 July 2016 135 77 75 3 23 452 806 403 535 45 8 2 127 315 1,951 219 255 416 130 1 7 445 775 443 June 2016 620 190 97 86 8 26 942 463 641 7 2 51 63 397 1,799 262 250 401 141 5 3 522 754 425 May 2016 142 549

More information

TIMETABLE SYSTEM A NOTE FOR MODULE ORGANISERS AND TIME-TABLERS

TIMETABLE SYSTEM A NOTE FOR MODULE ORGANISERS AND TIME-TABLERS UNIVERSITY OF EAST ANGLIA TIMETABLE SYSTEM A NOTE FOR MODULE ORGANISERS AND TIME-TABLERS Timetable planning for the 2010/11 academic year and beyond will be undertaken in accordance with a new Basic scheme

More information

Why? A central concept in Computer Science. Algorithms are ubiquitous.

Why? A central concept in Computer Science. Algorithms are ubiquitous. Analysis of Algorithms: A Brief Introduction Why? A central concept in Computer Science. Algorithms are ubiquitous. Using the Internet (sending email, transferring files, use of search engines, online

More information