Logical or physical organisation and data independence
|
|
|
- April Neal
- 10 years ago
- Views:
Transcription
1
2 Four FILE STRUCTURES Introduction This chpter is minly concerned with the wy in which file structures re used in document retrievl. Most surveys of file structures ddress themselves to pplictions in dt mngement which is reflected in the terminology used to describe the bsic concepts. I shll (on the whole) follow Hsio nd Hrry 1 whose terminology is perhps slightly nonstndrd but emphsises the logicl nture of file structures. A further dvntge is tht it enbles me to bridge the gp between dt mngement nd document retrievl esily. A few other good references on file structures re Roberts 2, Bertziss 3, Dodd 4, nd Climenson 5. Logicl or physicl orgnistion nd dt independence There is one importnt distinction tht must be mde t the outset when discussing file structures. And tht is the difference between the logicl nd physicl orgnistion of the dt. On the whole file structure will specify the logicl structure of the dt, tht is the reltionships tht will exist between dt items independently of the wy in which these reltionships my ctully be relised within ny computer. It is this logicl spect tht we will concentrte on. The physicl orgnistion is much more concerned with optimising the use of the storge medium when prticulr logicl structure is stored on, or in it. Typiclly for every unit of physicl store there will be number of units of the logicl structure (probbly records) to be stored in it. For exmple, if we were to store tree structure on mgnetic disk, the physicl orgnistion would be concerned with the best wy of pcking the nodes of the tree on the disk given the ccess chrcteristics of the disk. The work on dt bses hs been very much concerned with concept clled dt independence. The im of this work is to enble progrms to be written independently of the logicl structure of the dt they would interct with. The independence tkes the following form, should the file structure overnight be chnged from n inverted to seril file the progrm should remin unffected. This independence is chieved by interposing dt model between the user nd the dt bse. The user sees the dt model rther thn the dt bse, nd ll his progrms communicte with the model. The user therefore hs no interest in the structure of the file. There is school of thought tht sys tht sys tht pplictions in librry utomtion nd informtion retrievl should follow this pth s well 6,7. And so it should. Unfortuntely, there is still much debte bout wht good dt model should look like. Furthermore, opertionl implementtions of some of the more dvnced theoreticl systems do not exist yet. So ny suggestion tht n IR system might be implemented through dt bse pckge should still seem premture. Also, the scle of the problems in IR is such tht efficient implementtion of the ppliction still demnds close scrutiny of the file structure to be used. Nevertheless, it is worth tking seriously the trend wy from user knowledge of file structures, trend tht hs been stimulted considerbly by ttempts to construct theory of dt 8,9. There re number of proposls for deling with dt t n bstrct level. The best known of these by now is the one put forwrd by Codd 8, which hs become known s the reltionl model. In it dt re described by n-tuples of ttribute vlues. More formlly if the dt is described by reltions, reltion on set of domins D 1,..., D n cn be represented by set of ordered n-tuples ech of the form (d 1,..., d n ) where d i D i. As
3 50 File structures it is rther difficult to cope with generl reltions, vrious levels (three in fct) of normlistion hve been introduced restricting the kind of reltions llowed. A second pproch is the hierrchicl pproch. It is used in mny existing dt bse systems. This pproch works s one might expect: dt is represented in the form of hierrchies. Although it is more restrictive thn the reltionl pproch it often seems to be the nturl wy to proceed. It cn be rgued tht in mny pplictions hierrchic structure is good pproximtion to the nturl structure in the dt, nd tht the resulting loss in precision of representtion is worth the gin in efficiency nd simplicity of representtion. The third pproch is the network pproch ssocited with the proposls by the Dt Bse Tsk Group of CODASYL. Here dt items re linked into network in which ny given link between two items exists becuse it stisfies some condition on the ttributes of those items, for exmple, they shre n ttribute. It is more generl thn the hierrchic pproch in the sense tht node cn hve ny number of immedite superiors. It is lso equivlent to the reltionl pproch in descriptive power. The whole field of dt bse structures is still very much in stte of flux. The dvntges nd disdvntges of ech pproch re discussed very thoroughly in Dte 10, who lso gives excellent nnotted cittions to the current literture. There is lso recent Computing Survey ll which reviews the current stte of the rt. There hve been some very erly proponents of the reltionl pproch in IR, s erly s 1967 Mron 12 nd Levien 13 discussed the design nd implementtion of n IR system vi reltions, be it binry ones. Also Prywes nd Smith in their review chpter in the Annul Review of Informtion Science nd Technology more recently recommended the DBTG proposls s wys of implementing IR systems 7. Lurking in the bckground of ny discussion of file structures nowdys is lwys the question whether dt bse technology will overtke ll. Thus it my be tht ny ppliction in the field of librry utomtion nd informtion retrievl will be implemented through the use of some pproprite dt bse pckge. This is certinly possibility but not likely to hppen in the ner future. There re severl resons. One is tht dt bse systems re generl purpose systems wheres utomted librry nd retrievl systems re specil purpose. Normlly one pys price for generlity nd in this cse it is still too gret. Secondly, there now is considerble investment in providing specil purpose systems (for exmple, MARC) 14 nd this is not written off very esily. Nevertheless trend towrds incresing use of dt-bse technology exists nd is well illustrted by the incresed prominence given to it in the Annul Review of Informtion Science nd Technology. A lnguge for describing file structures Like ll subjects in computer science the terminology of file structures hs evolved higgledypiggledy without much concern for consistency, mbiguity, or whether it ws possible to mke the kind of distinctions tht were importnt. It ws only much lter tht the need for well-defined, unmbiguous lnguge to describe file structures becme pprent. In prticulr, there rose need to communicte ides bout file structures without getting bogged down by hrdwre considertions. This section will present forml description of file structures. The frmework described is importnt for the understnding of ny file structure. The terminology is bsed on tht introduced by Hsio nd Hrry (but lso see Hsio 15 nd Mnol nd Hsio 16 ). Their terminology hs been modified nd extended by Severnce 17, summry of this cn be found in vn Rijsbergen 18. Jonkers 19 hs formlised different frmework which provides n interesting contrst to the one described here. Bsic terminology Given set of 'ttributes' A nd set of 'vlues' V, then record R is subset of the crtesin product A x V in which ech ttribute hs one nd only one vlue. Thus R is set of
4 Introduction 51 ordered pirs of the form (n ttribute, its vlue). For exmple, the record for document which hs been processed by n utomtic content nlysis lgorithm would be R = {(K 1, x 1 ), (K 2, x 2 ),... (K m, x m )} The K i 's re keywords functioning s ttributes nd the vlue x i cn be thought of s numericl weight. Frequently documents re simply chrcterised by the bsence or presence of keywords, in which cse we write R = {K t1, K t2,..., K ti } where K ti is present if x ti = 1 nd is bsent otherwise. Records re collected into logicl units clled files. They enble one to refer to set of records by nme, the file nme. The records within file re often orgnised ccording to reltionships between the records. This logicl orgnistion hs become known s file structure (or dt structure). It is difficult in describing file structures to keep the logicl fetures seprte from the physicl ones. The ltter re chrcteristics forced upon us by the recording medi (e.g. tpe, disk). Some fetures cn be defined bstrctly (with little gin) but re more esily understood when illustrted concretely. One such feture is field. In ny implementtion of record, the ttribute vlues re usully positionl, tht is the identity of n ttribute is given by the position of its ttribute vlue within the record. Therefore the dt within record is registered sequentilly nd hs definite beginning nd end. The record is sid to be divided into fields nd the nth field crries the nth ttribute vlue. Pictorilly we hve n exmple of record with ssocited fields in Figure 4.1. R = K 1 K 2 K 3 K 4 P 1 P 2 P 3 P 4 Figure 4.1. An exmple of record with ssocited fields The fields re not necessrily constnt in length. To find the vlue of the ttribute K 4, we first find the ddress of the record R (which is ctully the ddress of the strt of the record) nd red the dt in the 4th field. In the sme picture I hve lso shown some fields lbelled P i. They re ddresses of other records, nd re commonly clled pointers. Now we hve extended the definition of record to set of ttribute-vlue pirs nd pointers. Ech pointer is usully ssocited with prticulr ttribute-vlue pir. For exmple, (see Figure 4.2) pointers could be used to link ll records for which the vlue x 1 (of ttribute K 1 ) is, similrly for x 2 equl to b, etc.
5 52 File structures R 1 R b R R b 2 R c c c Figure 4.2. A demonstrtion of the use of pointers to link records To indicte tht record is the lst record pointed to in list of records we use the null pointer. The pointer ssocited with ttribute K in record R will be clled K-pointer. An ttribute (keyword) tht is used in this wy to orgnise file is clled key. The unify the discussion of file structures we need some further concepts. Following Hsio nd Hrry gin, we define list L of records with respect to keyword K, or more briefly K-list s set of records contining K such tht: it is clled of the list. (1) the K-pointers re distinct; (2) ech non-null K-pointer in L gives the ddress of record within L; (3) there is unique record in L not pointed to by ny record contining K; the beginning of the list; nd (4) there is unique record in L contining the null K-pointer; it is the end (Hsio nd Hrry stte condition (2) slightly differently so tht no two K-lists hve record in common; this only ppers to complicte things.) From our previous exmple: K 1 -list : R 1, R 2, R 5 K 2 -list : R 2, R 4 K 4 -list : R 1, R 2, R 3 Finlly, we need the definition of directory of file. Let F be file whose records contin just m different keywords K 1, K 2,..., K m. Let n i be the number of records contining the keyword K i, nd h i be the number of K i -lists in F. Furthermore, we denote by ij the beginning ddress of the jth K i -list. Then the directory is the set of sequences (K i, n i, h i, i1, i2,... ihi ) i = 1, 2,... m We re now in position to give unified tretment of sequentil files, inverted files, index-sequentil files nd multi-list files. Sequentil files A sequentil file is the most primitive of ll file structures. It hs no directory nd no linking pointers. The records re generlly orgnised in lexicogrphic order on the vlue of some key. In other words, prticulr ttribute is chosen whose vlue will determine the order of the records. Sometimes when the ttribute vlue is constnt for lrge number of records second key is chosen to give n order when the first key fils to discriminte. The implementtion of this file structure requires the use of sorting routine.
6 Introduction 53 Its min dvntges re: (1) it is esy to implement; (2) it provides fst ccess to the next record using lexicogrphic order. Its disdvntges: (1) it is difficult to updte - inserting new record my require moving lrge proportion of the file; (2) rndom ccess is extremely slow. Sometimes file is considered to be sequentilly orgnised despite the fct tht it is not ordered ccording to ny key. Perhps the dte of cquisition is considered to be the key vlue, the newest entries re dded to the end of the file nd therefore pose no difficulty to updting. Inverted files The importnce of this file structure will become more pprent when Boolen Serches re discussed in the next chpter. For the moment we limit ourselves to describing its structure. An inverted file is file structure in which every list contins only one record. Remember tht list is defined with respect to keyword K, so every K-list contins only one record. This implies tht the directory will be such tht n i = h i for ll i, tht is, the number of records contining K i will equl the number of K i -lists. So the directory will hve n ddress for ech record contining K i. For document retrievl this mens tht given keyword we cn immeditely locte the ddresses of ll the documents contining tht keyword. For the previous exmple let us ssume tht non-blck entry in the field corresponding to n ttribute indictes the presence of keyword nd blck entry its bsence. Then the directory will point to the file in the wy shown in Figure 4.3. The definition of n inverted files does not require tht the ddresses in the directory re in ny order. However, to fcilitte opertions such s conjunction ('nd') nd disjunction ('or') on ny two inverted lists, the ddresses re normlly kept in record number order. This mens tht 'nd' nd 'or' opertions cn be performed with one pss through both lists. The penlty we py is of course tht the inverted file becomes slower to updte.
7 54 File structures File K, 3, 3,,, 1 K, 2, 2,, 2 Directory = = b K 3 c c K 4, 3,3, = b c 13 Figure 4.3. An inverted file Index-sequentil files An index-sequentil file is n inverted file in which for every keyword K i, we hve n i = h i = 1 nd 11 < < m1. This sitution cn only rise if ech record hs just one unique keyword, or one unique ttribute-vlue. In prctice therefore, this set of records my be order sequentilly by key. Ech key vlue ppers in the directory with the ssocited ddress of its record. An obvious interprettion of key of this kind would be the record number. In our exmple none of the ttributes would do the job except the record number. Digrmmticlly the index-sequentil file would therefore pper s shown in Figure 4.4. I hve delibertely written R i insted of K i to emphsise the nture of the key.
8 Introduction 55 Directory R 1, 1, 1, 11 R, 1, 1, 2 21 File c R 3, 1, 1, 31 b R 4, 1, 1, 41 R 5, 1, 1, 51 c c b Figure 4.4. An index-sequentil file In the literture n index-sequentil file is usully thought of s sequentil file with hierrchy of indices. This does not contrdict the previous definition, it merely describes the wy in which the directory is implemented. It is not surprising therefore tht the indexes ('index' = 'directory' here) re often oriented to the chrcteristics of the storge medium. For exmple (see Figure 4.5) there might be three levels of indexing: trck, cylinder nd mster. Ech entry in the trck index will contin enough informtion to locte the strt of the trck, nd the key of the lst record in the trck which is lso normlly the highest vlue on tht trck. There is trck index for ech cylinder. Ech entry in the cylinder index gives the lst record on ech cylinder nd the ddress of the trck index for tht cylinder. If the cylinder index itself is stored on trcks, then the mster index will give the highest key referenced for ech trck of the cylinder index nd the strting ddress of tht trck.
9 56 File structures Mster index [Core store] Cylinder nd trck contining index Highest key referenced for corresponding index 1/ / / Cylinder index [Cylinder 1, trck 010] Highest key referenced for corresponding index Trck ddress of record index Trck index [Cylinder 1, trck 030] Highest key in trck Strt of trck Dt re Trck Key Dt Figure 4.5. An exmple of n implementtion of n index-sequentil file (Adpted from D. R. Judd, The Use of Files, Mcdonld nd Elsevier, London nd New York 1973, pge 46)
10 Introduction 57 No mention hs been mde of the possibility of overflow during n updting process. Normlly provision is mde in the directory to dminister n overflow re. This of course increses the number of book-keeping entries in ech entry of the index. Multi-lists A multi-list is relly only slightly modified inverted file. There is one list per keyword, i.e. h i = 1. The records contining prticulr keyword K i re chined together to form the K i - list nd the strt of the K i -list is given in the directory, s illustrted in Figure 4.6. Since there is no K 3 -list, the field reserved for its pointer could well hve been omitted. So could ny blnk pointer field, so long s no mbiguity rises s to which pointer belongs to which keyword. One wy of ensuring this, prticulrly if the dt vlues (ttribute-vlues) re fixed formt, is to hve the pointer not pointing to the beginning of the record but pointing to the loction of the next pointer in the chin. The multi-list is designed to overcome the difficulties of updting n inverted file. The ddresses in the directory of n inverted file re normlly kept in record-number order. But, when the time comes to dd new record to the file, this sequence must be mintined, nd inserting the new ddress cn be expensive. No such problem rises with the multi-list, we updte the pproprite K-lists by simply chining in the new record. The penlty we py for this is of course the increse in serch time. This is in fct typicl of mny of the file structures. Inherent in their design is trde-off between serch time nd updte time. Cellulr multi-lists A further modifiction of the multi-list is inspired by the fct tht mny storge medi re divided into pges, which cn be retrieved one t time. A K-list my cross severl pge boundries which mens tht severl pges my hve to be ccessed to retrieve one record. A modified multi-list structure which voids this is clled cellulr multi-list. The K-lists re limited so tht they will not cross the pge (cell) boundries. At this point the full power of the nottion introduced before comes into ply. directory for cellulr multi-list will be the set of sequences (K i, n i, h i, i1,... ihi ) i = 1, 2,..., m where the h i hve been picked to ensure tht K i -list does not cross pge boundry. In n implementtion, just s in the implementtion of n index-sequentil file, further informtion will be stored with ech ddress to enble the right pge to be locted for ech key vlue. Ring structures A ring is simply liner list tht closes upon itself. In terms of the definition of K-list, the beginning nd end of the list re the sme record. This dt-structure is prticulrly useful to show clssifiction of dt. Let us suppose tht set of documents {D l, D 2, D 3, D 4, D 5, D 6, D 7, D 8 } hs been clssified into four groups, tht is {(D l, D 2 ), (D 3, D 4 ), (D 5, D 6 ), (D 7, D 8 )} Furthermore these hve themselves been clssified into two groups, {((D l, D 2 ), (D 3, D 4 )), ((D 5, D 6 ), (D 7, D 8 ))} The dendrogrm for this structure would be tht given in Figure 4.7. To represent this in storge by mens of ring structures is now simple mtter (see Figure 4.8). The
11 58 File structures Directory R, 2, 1, 2 11 R, 2, 1, = 41 File c R 3 21 b R 4, 3, 1, 41 c c Λ b Λ Λ Figure 4.6. A multi-list D 1 D 2 D 3 D 4 D 5 D 6 D 7 D 8 Figure 4.7. A dendrogrm
12 Introduction 59 C 7 C 5 6 C C C C C D D D D D D 5 6 D 7 D 8 Figure 4.8. An implementtion of dendrogrm vi ring structures The D i indictes description (representtion) of document. Notice how the rings t lower level re contined in those t higher level. The field mrked C i normlly contins some identifying informtion with respect to the ring it subsumes. For exmple, C 1 in some wy identifies the clss of documents {D 1, D 2 }. Were we to group documents ccording to the keywords they shred, then for ech keyword we would hve group of documents, nmely, those which hd tht keyword in common. C i would then be the field contining the keyword uniting tht prticulr group. The rings would of course overlp (Figure 4.9), s in this exmple: D 1 = {K 1, K 2 } D 2 = {K 2, K 3 } D 3 = {K 1, K 4 } The usefulness of this kind of structure will become more pprent when we discuss serching of clssifictions. If ech ring hs ssocited with it record which contins identifying informtion for its members, then, serch strtegy serching structure such s this will first look t C i (or K i in the second exmple) to determine whether to proceed or bndon the serch. Threded lists
13 60 File structures In this section n elementry knowledge of list processing will be ssumed. Reders who re unfmilir with this topic should consult the little book by Foster 20. K K 1 2 D D D Figure 4.9. Two overlpping rings A simple list representtion of the clssifiction ((D 1, D 2 ), (D 3, D 4 )), ((D 5, D 6 ), (D 7, D 8 )) is given in Figure Ech sublist in this structure hs ssocited with it record contining only two pointers. (We cn ssume tht D i is relly pointer to document D i.) The function of the pointers should be cler from the digrm. The min thing to note, however, is tht the record ssocited with list does not contin ny identifying informtion. A modifiction of the implementtion of list structure like this which mkes it resemble set of ring structures is to mke the right hnd pointer of the lst element of sublist point bck to the hed of the sublist. Ech sublist hs become effectively ring structure. We now hve wht is commonly clled threded list (see Figure 4.11). The representtion I hve given is slight oversimplifiction in tht we need to flg which elements re dt elements (giving ccess to the documents D i ) nd which elements re just pointer elements. The mjor dvntge ssocited with threded list is tht it cn be trversed without the id of stck. Normlly when trversing conventionl list structure the return ddresses re stcked, wheres in the threded list they hve been incorported in the dt structure.
14 Introduction 61 D 1 D D 2 3 D D 4 5 D 6 D 7 D 8 Figure A list structure implementtion of hierrchic clssifiction One disdvntge ssocited with the use of list nd ring structures for representing clssifictions is tht they cn only be entered t the 'top'. An dditionl index giving entry to the structure t ech of the dt elements increses the updte speed considerbly. D 1 2 D D 3 D D 4 5 D 6 D 7 D 8 Figure A threded list implementtion of hierrchic clssifiction Another modifiction of the simple list representtion hs been studied extensively by Stnfel 21,22 nd Ptt 23. The individul elements (or cells) of the list structure re modified to incorporte one extr field, so tht insted of ech element looking like this
15 62 File structures it now looks like this P P S P P where the P i s re pointers nd S is symbol. Otherwise no essentil chnge hs been mde to the simple representtion. This structure hs become known s the Doubly Chined Tree. Its properties hve minly been investigted for storing vrible length keys, where ech key is mde up by selecting symbols from finite (usully smll) lphbet. For exmple, let {A,B,C} be the set of key symbols nd let R 1, R 2, R 3, R 4, R 5 be five records to be stored. Let us ssign keys mde of the 3 symbols, to the record s follows: AAA R 1 AB R 2 AC R 3 BB R 4 BC R 5 An exmple of doubly chined tree contining the keys nd giving ccess to the records is given in Figure The topmost element contins no symbol, it merely functions s the strt of the structure. Given n rbitrry key its presence or bsence is detected by mtching it ginst keys in the structure. Mtching proceeds level by level, once mtching symbol hs been found t one level, the P 1 pointer is followed to the set of lterntive symbols t the next level down. The mtching will terminte either: mtch; or (1) when the key is exhusted, tht is, no more key symbols re left to (2) when no mtching symbol is found t the current level. Level 0 A B Level 1 B R C R A B R C R Level 2 A R 1 Level 3 Figure An exmple of doubly chined tree For cse (1) we hve:
16 Introduction 63 () (b) the key is present if the P1 pointer in the sme cell s the lst mtching symbol now points to record; P1 points to further symbol, tht is, the key 'flls short' nd is therefore not in the structure. For cse (2), we lso hve tht the key is not in the structure, but now there is mismtch. Stnfel nd Ptt hve concentrted on generting serch trees with minimum expected serch time, nd preserving this property despite updting. For the detiled mthemtics demonstrting tht this is possible the reder is referred to their cited work. Trees Although computer scientists hve dopted trees s file structures, their properties were originlly investigted by mthemticins. In fct, substntil prt of the Theory of Grphs is devoted to the study of trees. Excellent books on the mthemticl spects of trees (nd grphs) hve been written by Berge 24, Hrry et l., 25 nd Ore 26. Hrry's book lso contins useful glossry of concepts in grph theory. In ddition Bertziss 3 nd Knuth 27 discuss topics in grph theory with pplictions in informtion processing. There re numerous definitions of trees. I hve chosen prticulrly simple one from Berge. If we think of grph s set of nodes (or points or vertices) nd set of lines (or edges) such tht ech line connects exctly two nodes, then tree is defined to be finite connected grph with no cycles, nd possessing t lest two nodes. To define cycle we first define chin. We represent the line u k joining two nodes x nd y by u k = [x,y]. A chin is sequence of lines, in which ech line u k hs one node in common with the preceding line u k-1, nd the other vertex in common with the succeeding line u k+1. An exmple of chin is [,x 1 ], [x 1,x 2 ], [x 2,x 3 ], [x 3,b]. A cycle is finite chin which begins t node nd termintes t the sme node (i.e. in the exmple = b). Berge gives the following theorem showing mny equivlent chrcteristions of trees. Theorem. Let H be grph with t lest n nodes, where n > 1; ny one of the following equivlent properties chrcterises tree. (1) H is connected nd does not possess ny cycles. (2) H contins no cycles nd hs n - 1 lines. (3) H is connected nd hs n - l lines. (4) H is connected but loses this property if ny line is deleted. (5) Every pir of nodes is connected by one nd only one chin. One thing to be noticed in the discussion so fr is tht no mention hs been mde of direction ssocited with line. In most pplictions in computer science (nd IR) one node is singled out s specil. This node is normlly clled the root of the tree, nd every other node in the tree cn only be reched by strting t the root nd proceeding long chin of lines until the node sought is reched. Implicitly therefore, direction is ssocited with ech line. In fct, when one comes to represent tree inside computer by list structure, often the ddresses re stored in wy which llows movement in only one direction. It is convenient to think of tree s directed grph with reserved node s the root of the tree. Of course, if one hs root then ech pth (directed chin) strting t the root will eventully terminte t prticulr node from which no further brnches will emerge. These nodes re clled the terminl nodes of the tree. By now it is perhps pprent tht when we were tlking bout ring structures nd threded lists in some of our exmples we were relly demonstrting how to implement tree structure. The dendrogrm in Figure 4.7 cn esily be represented s tree (Figure
17 64 File structures 4.13). The documents re stored t the terminl nodes nd ech node represents clss (cluster) of documents. A serch for prticulr set of documents would be initited t the root nd would proceed long the rrows until the required clss ws found. Another exmple of tree structure is the directory ssocited with n index-sequentil file. It ws described s hierrchy of indexes, but could eqully well hve been described s tree structure. The use of tree structures in computer science dtes bck to the erly 1950s when it ws relised tht the so-clled binry serch could redily be represented by binry tree. A binry tree is one in which ech node (except the terminl nodes) hs exctly two brnches leving it. A binry serch is n efficient method for detecting the presence or bsence of key vlue mong set of keys. It presupposes tht the keys hve been sorted. It proceeds by successive division of the set, t ech division discrding hlf the current set s not contining the sought key. When the set contins N sorted keys the serch time is of order log 2 N. Furthermore, fter some thought one cn see how this process cn be simply represented by binry tree. Unfortuntely, in mny pplictions one wnts the bility to insert key which hs been found to be bsent. If the keys re stored sequentilly then the time tken by the insertion opertion my be of order N. If one, however, stores the keys in binry tree this lengthy insert time my be overcome, both serch nd insert time will be of order log 2 N. The keys re stored t the nodes, t ech node left brnch will led to 'smller' keys, right brnch will led to 'greter' keys. A serch terminting on terminl node will indicte tht the key is not present nd will need to be inserted. The structure of the tree s it grows is lrgely dependent on the order in which new keys re presented. Serch time my become unnecessrily long becuse of the lop-sidedness of the tree. Fortuntely, it cn be shown (Knuth 28 ) tht rndom insertions do not chnge the expected log 2 N time dependence of the tree serch. Nevertheless, methods re vilble to prevent the possibility of degenerte trees. These re trees in which the keys re stored in such wy tht the expected serch time is fr from optiml. For exmple, if the keys were to rrive for insertion lredy ordered then the tree to be built would simply be s shown in Figure 4.14.
18 Introduction 65 Root Top of tree D D D D D D D D Terminl nodes Bottom of tree Figure A tree representtion of dendrogrm It would tke us too fr field for me to explin the techniques for voiding degenerte trees. Essentilly, the binry tree is mintined in such wy tht t ny node the subtree on the left brnch hs pproximtely s mny levels s the subtree on the right brnch. Hence the nme blnced tree for such tree. The serch pths in blnced tree will never be more thn 45 per cent longer thn the optimum. The expected serch nd insert times re still of order log N. For further detils the reder is recommended to consult Knuth28. K 1 K 2 K 3 Figure An exmple of degenerte tree So fr we hve ssumed tht ech key ws eqully likely s serch rgument. If one hs dt giving the probbility tht the serch rgument is K i ( key lredy in the tree), nd the probbility tht the serch rgument lies between K i nd K i+1, then gin techniques re known for reordering the tree to optimise the expected serch time. Essentilly one mkes sure tht the more frequently ccessed keys hve the shortest serch pths from the root.
19 66 File structures One well-known technique used when only the second set of probbilities is known, nd the others ssigned the vlue zero, is the Hu-Tucker lgorithm. Agin the interested reder my consult Knuth. At this point it is probbly good ide to point out tht these efficiency considertions re lrgely irrelevnt when it comes to representing document clssifiction by tree structure. The sitution in document retrievl is different in the following spects: (1) we do not hve useful liner ordering on the documents; (2) serch request normlly does not seek the bsence or presence of document. In fct, wht we do hve is tht documents re more or less similr to ech other, nd request seeks documents which in some wy best mtch the request. A tree structure representing document clssifiction is therefore chosen so tht similr documents my be close together. Therefore to rerrnge tree structure to stisfy some 'blncedness' criterion is out of the question. The serch efficiency is chieved by bringing together documents which re likely to be required together. This is not to sy tht the bove efficiency considertions re unimportnt in the generl context of IR. Mny opertions, such s the serching of dictionry, nd using suffix stripping lgorithm cn be mde very efficient by ppropritely structuring the binry tree. The discussion so fr hs been limited to binry trees. In mny pplictions this twowy split is inpproprite. The nturl wy to represent document clssifictions is by generl tree structure, where there is no restriction on the number of brnches leving node. Another exmple is the directory of n index sequentil file which is normlly represented by n m-wy tree, where m is the number of brnches leving node. Finlly, more comments re in order bout the mnipultion of tree structures in mss storge devices. Up to now we hve ssumed tht to follow set of pointers poses no prticulr problems with regrd to retrievl speed. Unfortuntely, present rndom ccess devices re sufficiently slow for it to be impossible to llow n ccess for, sy, ech node in tree. There re wys of prtitioning trees in such wy tht the number of disk ccesses during tree serch cn be reduced. Essentilly, it involves storing number of nodes together in one 'pge' of disk storge. During disk ccess this pge is brought into fst memory, is then serched, nd the next pge to be ccessed is determined. Sctter storge or hsh ddressing One file structure which does not relte very well to the ones mentioned before is known s Sctter Storge. The technique by which the file structure is implemented is often clled Hsh Addressing. Its underlying principle is ppelingly simple. Given tht we my ccess the dt through number of keys K i, then the ddress of the dt in store is locted through key trnsformtion function f which when pplied to K i evlutes to give the ddress of the ssocited dt. We re ssuming here tht with ech key is ssocited only one dt item. Also for convenience we will ssume tht ech record (dt nd key) fits into one loction, whose ddress is in the imge spce of f. The ddresses given by the ppliction of f to the keys K i re clled the hsh ddresses nd f is clled hshing function. Idelly f should be such tht it spreds the hsh ddresses uniformly over the vilble storge. Of course this would be chieved if the function were one-to-one. Unfortuntely this cnnot be so becuse the rnge of possible key vlues is usully considerbly lrger thn the rnge of the vilble storge ddresses. Therefore, given ny hshing function we hve to contend with the fct tht two distinct keys K i nd K j re likely to mp to the sme ddress f(k i ) (=f(k j )). Before I explin some of the wys of deling with this I shll give few exmples of hshing functions. Let us ssume tht the vilble storge is of size 2 m then three simple trnsformtions re s follows:
20 Introduction 67 (1) if K i is the key, then tke the squre of its binry representtion nd select m bits from the middle of the result; (2) cut the binry representtion of K i into pieces ech of m bits nd dd these together. Now select the m lest significnt bits of the sum s the hsh ddress; (3) divide the integer corresponding to K i by the length of the vilble store 2 m nd use the reminder s the hsh ddress. Ech of these methods hs disdvntges. For exmple, the lst one my given the sme ddress rther frequently if there re ptterns in the keys. Before using prticulr method, the reder is dvised to consult the now extensive literture on the subject, e.g. Morris 29, or Lum et l. 30. As mentioned before there is the problem of collisions, tht is, when two distinct keys hsh to the sme ddress. The first point to be mde bout this problem is tht it destroys some of the simplicity of hshing. Initilly it my hve been thought tht the key need not be stored with the dt t the hsh ddress. Unfortuntely this is not so. No mtter wht method we use to resolve collisions we still need to store the key with the dt so tht t serch time when key is hshed we cn distinguish its dt from the dt ssocited with keys which hve hshed to the sme ddress. There re number of strtegies for deling with collisions. Essentilly they fll into two clsses, those which use pointers to link together collided keys nd those which do not. Let us first look t the ones which do not use pointers. These hve mechnism for serching the store, strting t the ddress where the collision occurred, for n empty storge loction if record needs to be inserted, or, for mtching key vlue t retrievl time. The simplest of these dvnces from the hsh ddress ech time moving long fixed number of loctions, sy s, until n empty loction or the mtching key vlue is found. The collision strtegy thus trces out well defined sequence of loctions. This method of deling with collisions is clled the liner method. The tendency with this method is to store collided records s closely to the initil hsh ddress s possible. This leds to n undesirble effect clled primry clustering. In this context ll this mens is tht the records tend to concentrte in groups or bunch-up. It destroys the uniform nture of the hshing function. To be more precise, it is desirble tht hsh ddresses re eqully likely, however, the first empty loction t the end of collision sequence increses in likelihood in proportion to the number of records in the collision sequence. To see this one needs only to relise tht key hshed to ny loction in the sequence will hve its record stored t the end of the sequence. Therefore big groups of records tend to grow even bigger. This phenomenon is ggrvted by smll step size s when seeking n empty loction. Sometimes s = 1 is used in which cse the collision strtegy is known s the open ddressing technique. Primry clustering is lso worse when the hsh tble (vilble storge) is reltively full. Vritions in the liner method which void primry clustering involve mking the step size vrible. One wy is to set s equl to i + bi 2 on the ith step. Another is to invoke rndom number genertor which clcultes the step size fresh ech time. These lst two collision hndling methods re clled the qudrtic nd rndom method respectively. Although they void primry clustering they re nevertheless subject to secondry clustering, which is cused by keys hshing to the sme ddress nd following the sme sequence in serch of n empty loction. Even this cn be voided, see for exmple Bell nd Kmn31. The second clss of collision hndling methods involves extr storge spce which is used to chin together collided records. When collision occurs t hsh ddress it my be becuse it is the hed of chin of records which hve ll hshed to tht ddress, or it my be tht record is stored there which belongs to chin strting t some other ddress. In both cses free loction is needed which in the first cse is simply linked in nd stores the new record, in the second cse the intermedite chin element is moved to the free loction nd the new record is stored t its own hsh ddress thus strting new chin ( oneelement chin so fr). A vrition on this method is to use two-level store. At the first level we hve hsh tble, t the second level we hve bump tble which contins ll the
21 68 File structures collided records. At hsh ddress in the hsh tble we will find either, record if no collisions hve tken plce t tht ddress, or, pointer to chin of records which collided t tht ddress. This ltter chining method hs the dvntge tht records need never be moved once they hve been entered in the bump tble. The storge overhed is lrger since records re put in the bump tble before the hsh tble is full. For both clsses of collision strtegies one needs to be creful bout deletions. For the liner, qudrtic etc. collision hndling strtegies we must ensure tht when we delete record t n ddress we do not mke records which collided t tht ddress unrechble. Similrly with the chining method we must ensure tht deleted record does not leve gp in the chin, tht is, fter deletion the chin must be reconnected. The dvntges of hshing re severl. Firstly it is simple. Secondly its insertion nd serch strtegies re identicl. Insertion is merely filed serch. If K i is the hshed key, then if serch of the collision sequence fils to turn up mtch in K i, its record is simply inserted t the end of the sequence t the next free loction. Thirdly, the serch time is independent of the number of keys to be inserted. The ppliction of hshing in IR hs tended to be in the re of tble construction nd look-up procedures. An obvious ppliction is when constructing the set of confltion clsses during text processing. In Chpter 2, I gve n exmple of document representtive s simply list of clss nmes, ech nme stnding for set of equivlent words. During retrievl opertion, query will first be converted into list of clss nmes. To do this ech significnt word needs to be looked up in dictionry which gives the nme of the clss to which it belongs. Clerly there is cse for hshing. We simply pply the hshing function to the word nd find the nme of the confltion clss to which it belongs t the hsh ddress. A similr exmple is given in gret detil by Murry 32. Finlly, let me recommend two very redble discussions on hshing, one is in Pge nd Wilson 33, the other is in Knuth's third volume 28. Clustered files It is now common prctice to refer to file processed by clustering lgorithm s clustered file, nd to refer to the resulting structure s file structure. For exmple Slton 34 (p. 288) lists clustered file s n lterntive orgnistion to inverted, seril, chined files, etc. Although it my be convenient terminologiclly, it does disguise the rel sttus of cluster methods. Cluster methods (or utomtic clssifiction methods) re more profitbly discussed t the level of bstrction t which reltions re discussed in connection with dt bses, tht is, in thoroughly dt independent wy. In other words, selecting n pproprite cluster method nd implementing it re two seprte problems. Unfortuntely not ll users of clustering techniques see it this wy, nd so the current scene is rther confused. One fctor contributing to the confusion is tht clustering techniques hve been used t very low level of implementtion of system softwre, for exmple, to reduce the number of pge exceptions in virtul memory. Therefore, those who use clustering merely to increse retrievl efficiency (in terms of storge nd speed) will tend to see clssifiction structure s file structure, wheres those who see clustering s mens of discovering (or summrising) some inherent structure in the dt will look upon the sme structure s description of the dt. Of course, this description my be used to chieve more efficient retrievl (nd in IR more effective retrievl in terms of sy precision nd recll). Furthermore, if one looks crefully t some of the implementtions of cluster methods one discovers tht the clssifictory system is represented inside the computer by one of the more conventionl file structures. Bibliogrphic remrks There is now vst literture on file structures lthough there re very few survey rticles. Where possible I shll point to some of the more detiled discussions which emphsise n ppliction in IR. Of course the chpter on file orgnistion in the Annul Review is good
22 Introduction 69 source of references s well. Chpter 7 of Slton's ltest book contins useful introduction to file orgnistion techniques 34. A generl rticle on dt structures of more philosophicl nture well worth reding is Meley 32. A description of the use of sequentil file in n on-line environment my be found in Negus nd Hll 36. The effectiveness nd efficiency of n inverted file hs been extensively compred with file structure bsed on clustering by Murry 37. Ein-Dor 38 hs done comprehensive comprison between n inverted file nd tree structured file. It is hrd to find discussion of n index-sequentil file which mkes specil reference to the needs of document retrievl. Index-sequentil orgnistion is now considered to be bsic softwre which cn be used to implement vriety of other file orgnistions. Nevertheless it is worth studying some of the spects of its implementtion. For this I recommend the pper by McDonell nd Montgomery 39 who give detiled description of n implementtion for mini-computer. Multi-lists nd cellulr multi-lists re firly well covered by Lefkovitz 40. Ring structures hve been very populr in CAD nd hve been written up by Gry 4l. Extensive use ws mde of modified threded list by vn Rijsbergen 42 in his cluster-bsed retrievl experiments. The doubly chined tree hs been dequtely delt with by Stnfel 21,22 nd Ptt 23. Work on tree structures in IR goes bck long wy s illustrted by the erly ppers by Slton 43 nd Sussenguth 44. Trees hve lwys ttrcted much ttention in computer science, minly for the bility to reduce expected serch times in dt retrievl. One of the erliest ppers on this topic is by Windley 45 but the most extensive discussion is still to be found in Knuth 28 where not only methods of construction re discussed but lso techniques of reorgnistion. More recently specil kind of tree, clled trie, hs ttrcted ttention. This is tree structure which hs records stored t its terminl nodes, nd discrimintors t the internl nodes. A discrimintor t node is mde up from the ttributes of the records dominted by tht node. Or s Knuth puts it: 'A trie is essentilly M-ry tree whose nodes re M- plce vectors with components corresponding to digits or chrcters. Ech node on level l represents the set of ll keys tht begin with certin sequence of l chrcters; the node specifies n M-wy brnch depending on the (l + 1)st chrcter.' Tries were invented by Fredkins 46, further considered by Sussenguth 44, nd more recently studied by Burkhrd 47, Rivest 48, nd Bentley 49. The use of tries in dt retrievl where one is interested in either mtch or mismtch is very similr to the construction of hierrchic document clssifiction, where ech node of the tree representing the hierrchy is lso ssocited with 'discrimintor' used to direct the serch for relevnt documents (see for exmple Figure 5.3 in Chpter 5). The use of hshing in document retrievl is delt with in Higgins nd Smith 50, nd Chous 51. It hs become fshionble to refer to document collections which hve been clustered s clustered files. I hve gone to some pins to void the use of this terminology becuse of the conceptul difference tht exists between structure which is inherent in the dt nd cn be discovered by clustering, nd n orgnistion of the dt to fcilitte its mnipultion inside computer. Unfortuntely this distinction becomes somewht blurred when clustering techniques re used to generte physicl orgnistion of dt. For exmple, the work by Bell et l. 52 is of this nture. Furthermore, it hs recently become populr to cluster records simply to improve the efficiency of retrievl. Buckhrd nd Keller 53 bse the design of file structure on mximl complete subgrphs (or cliques). Htfield nd Gerld 54 hve designed pging lgorithm for virtul memory store bsed on clustering. Simon nd Guiho 55 look t methods for preserving 'clusters' in the dt when it is mpped onto physicl storge device. Some of the work tht hs been lrgely ignored in this chpter, but which is nevertheless of importnce when considering the implementtion of file structure, is concerned directly
23 70 File structures with the physicl orgnistion of storge device in terms of block sizes, etc. Unfortuntely, generl sttements bout this re rther hrd to mke becuse the orgnistion tends to depend on the hrdwre chrcteristics of the device nd computer. Representtive of work in this re is the pper by Lum et l. 56. References 1. HSIAO, D. nd HARARY, F., 'A forml system for informtion retrievl from files', Communictions of the ACM, 13, ( 1970) 2. ROBERTS, D. C., 'File orgniztion techniques', Advnces in Computers, 12, (1972) 3. BERTZISS, A. T., Dt Structures: Theory nd Prctice, Acdemic Press, London nd New York (1971) 4. DODD, G. G., 'Elements of dt mngement systems', Computing Surveys, 1, (1969) 5. CLIMENSON, W. D., 'File orgniztion nd serch techniques', Annul Review of Informtion Science nd Technology, 1, ( 1966) 6. WARHEIT, 1. A., 'File orgniztion of librry records', Journl of Librry Automtion, 2, (1969) 7. PRYWES, N. S. nd SMITH, D. P., 'Orgniztion of informtion', Annul Review of Informtion Science nd Technology, 7, (1972) Technology, 7, (1972) 8. CODD, E. E., 'A reltionl model of dt for lrge shred dt bnks', Communictions of the A CM, 13, ( 1970) 9. SENKO, M. E., 'Informtion systems: records, reltions, sets, entities, nd things', Informtion Systems, 1, 3-13 (1975) 10. DATE, C. J., An Introduction to Dt Bse Systems, Addison-Wesley, Reding, Mss. (1975) 11. SIBLEY, E. H., 'Specil Issue: Dt bse mngement systems', Computing Surveys, 8, No. I (1976) 12. MARON, M. E., 'Reltionl dt file I: Design philosophy', In: Informtion Retrievl (Edited by Schecter 6), (1967) 13. LEVIEN, R., 'Reltionl dt file Il: Implementtion', In: Informtion Retrievl (Edited by Schecter 6), (1967) 14. HAYES, R. M. nd BECKER, J., Hndbook of Dt Processing for Librries, Melville Publishing Co., Los Angeles, Cliforni (1974) 15. HSIAO, D., 'A generlized record orgniztion', IEEE Trnsctions on Computers, C-20, (1971) 16. MANOLA, F. nd HSIAO, D. K., 'A model for keyword bsed file structures nd ccess', NRL Memorndum Report 2544, Nvl Reserch Lbortory, Wshington D.C. (1973) 17. SEVERANCE, D. G., 'A prmetric model of lterntive file structures', Informtion Systems, 1, (1975) 18. vn RIJSBERGEN, C. J., 'File orgniztion in librry utomtion nd informtion retrievl', Journl of Documenttion, 32, ( 1976) 19. JONKERS, H. L., 'A strightforwrd nd flexible design method for complex dt bse mngement systems', Informtion Storge nd Retrievl, 9, (1973) 20. FOSTER, J. M., List Processing, Mcdonld, London; nd Americn Elsevier Inc., New York ( 1967 )
24 Introduction STANFEL, L. E., 'Prcticl spect of doubly chined trees for retrievl', Journl of the ACM, 19, 425~36 (1972) 22. STANFEL, L. E., 'Optiml trees for clss of informtion retrievl problems', Informtion Storge nd Retrievl, 9, (1973) 23. PATT, Y. N., Minimum serch tree structure for dt prtitioned into pges', IEEE Trnstions on Computers, C-21, (1972) 24. BERGE, C., The Theory of Grphs nd its Applictions, Methuen, London (1966) 25. HARARY, F., NORMAN, R. Z. nd CARTWRIGHT, D., Structurl Models: An Introduction to the Theory of Directed Grphs, Wiley, New York (1966) 26. ORE, 0., Grphs nd their Uses, Rndom House, New York (1963) 27. KNUTH, D. E., The Art of Computer Progrmming, Vol. 1, Fundmentl Algorithms, Addison-Wesley, Reding, Msschusetts (1968) 28. KNUTH, D. E., The Art of Computer Progrmming, Vol 3, Sorting nd Serching, Addison- Wesley, Reding, Msschusetts (1973) 29. MORRIS, R., 'Sctter storge techniques', Communictions of the ACM, 11, (1968) 30. LUM, V. Y., YUEN, P. S. T. nd DODD, M., 'Key-to-ddress trnsform techniques: fundmentl performnce study on lrge existing formtted files', Communictions of the ACM, 14, (1971) 31. BELL, J. K. nd KAMAN, C. H., 'The liner quotient hsh code', Communictions of the ACM, 13, ( 1970) 32. MURRAY, D. M., 'A sctter storge scheme for dictionry lookups' In: Report ISR-16 to the Ntionl Science Foundtion, Section 11, Cornell University, Deprtment of Computer Science (1969) 33. PAGE, E. S. nd WILSON, L. B., Informtion Representtion nd Mnipultion in Computer, Cmbridge University Press, Cmbridge (1973) 34. SALTON, G., Dynmic Informtion nd Librry Processing, Prentice-Hll, Englewood Cliffs, N.J. (1975) 35. MEALEY, G.H., 'Another look t dt', Proceedings AFIP Fll Joint Computer Conference, (1967) 36. NEGUS, A.E. nd HALL, J.L., 'Towrds n effective on-line reference retrievl system', Librry Memo CLM-LM2/71, U.K. Atomic Energy Authority, Reserch Group (1971) 37. MURRAY, D.M., 'Document retrievl bsed on clustered files', Ph.D. Thesis, Cornell University Report ISR-20 to Ntionl Science Foundtion nd to the Ntionl Librry of Medicine (1972) 38. EIN-DOR, P., 'The comprtive efficiency of two dictionry structures for document retrievl', Infor Journl, 12, (1974) 39. McDONELL, K.J. nd MONTGOMERY, A.Y., 'The design of indexed sequentil files', The Austrlin Computer Journl, 5, (1973) 40. LEFKOVITZ, D., File Structures for On-Line Systems, Sprtn Books, New York (1969) 41. GRAY, J.C., 'Compound dt structure for computer ided design: survey', Proceedings ACM Ntionl Meeting, (1967) 42. vn RIJSBERGEN, C.J., 'An lgorithm for informtion structuring nd retrievl', Computer Journl, 14, (1971)
25 72 File structures 43. SALTON, G., Mnipultion of trees in informtion retrievl', Communictions of the ACM, 5, (1962) 44. SUSSENGUTH, E.H., 'Use of tree structures for processing files', Communictions of the ACM, 6, (1963) 45. WINDLEY, P.F., 'Trees, forests nd rerrnging', Computer Journl, 3, (1960) 46. FREDKIN, E., 'Trie memory', Communictions of the ACM, 3, (1960) 47. BURKHARD, W.A., 'Prtil mtch queries nd file designs', Proceedings of the Interntionl Conference on Very Lrge Dt Bses, (1975) 48. RIVEST, R., Anlysis of Associtive Retrievl Algorithms, Ph.D. Thesis, Stnford University, Computer Science (1974) 49. BENTLEY, J.L., 'Multidimensionl binry serch trees used for ssocitive serching', Communictions of the ACM, 13, (1975) 50. HIGGINS, L.D. nd SMITH, F.J., 'Disc ccess lgorithms', Computer Journl, 14, (1971) 51. CHOU, C.K., 'Algorithms for hsh coding nd document clssifiction', Ph.D. Thesis, University of Illinois (1972) 52. BELL, C.J., ALDRED, B.K. nd ROGERS, T.W., 'Adptbility to chnge in lrge dt bse informtion retrievl systems', Report No. UKSC-0027, UK Scientific Centre, IBM United Kingdom Limited, Neville Rod, Peterlee, County Durhm, U.K. (1972) 53. BURKHARD, W.A. nd KELLER, R.M., 'Some pproches to best-mtch file serching', Communictions of the ACM, 16, (1973) 54. HATFIELD, D.J. nd GERALD, J., 'Progrm restructuring for virtul memory', IBM Systems Journl, 10, (1971) 55. SIMON, J.C. nd GUIHO, G., 'On lgorithms preserving neighbourhood to file nd retrieve informtion in memory', Interntionl Journl Computer Informtion Sciences, 1, 3-15 (CR 23923) (1972) 56. LUM, V.Y., LING, H. nd SENKO, M.E., 'Anlysis of complex dt mngement ccess method by simultion modelling', Proceedings AFIP Fll Joint Computer Conference, (1970)
Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process
An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct
Reasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
How To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
Factoring Polynomials
Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY
MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of
SPECIAL PRODUCTS AND FACTORIZATION
MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come
Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.
Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd
Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.
The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only
How To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
Integration. 148 Chapter 7 Integration
48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but
Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999
Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,
Vectors 2. 1. Recap of vectors
Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms
Regular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
EQUATIONS OF LINES AND PLANES
EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint
Helicopter Theme and Variations
Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the
Decision Rule Extraction from Trained Neural Networks Using Rough Sets
Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT
9 CONTINUOUS DISTRIBUTIONS
9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete
JaERM Software-as-a-Solution Package
JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock
Binary Representation of Numbers Autar Kaw
Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy
Small Business Cloud Services
Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly
Econ 4721 Money and Banking Problem Set 2 Answer Key
Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in
Network Configuration Independence Mechanism
3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting
4.11 Inner Product Spaces
314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces
9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes
The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors
Graphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
6.2 Volumes of Revolution: The Disk Method
mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of
Hillsborough Township Public Schools Mathematics Department Computer Programming 1
Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,
Algebra Review. How well do you remember your algebra?
Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then
Introducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2
Interntionl Journl of Engineering Reserch & Science (IJOER) ISSN [2395-6992] [Vol-2, Issue-1, Jnury- 2016] Qulity Evlution of Entrepreneur Eduction on Grdute Students Bsed on AHP-fuzzy Comprehensive Evlution
MATH 150 HOMEWORK 4 SOLUTIONS
MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive
DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report
DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of
Data replication in mobile computing
Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL
According to Webster s, the
dt modeling Universl Dt Models nd P tterns By Len Silversn According Webster s, term universl cn be defined s generlly pplicble s well s pplying whole. There re some very common ptterns tht cn be generlly
Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff
Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention
5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.
5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued
Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.
2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this
All pay auctions with certain and uncertain prizes a comment
CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin
Experiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
Appendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:
Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you
Basic Analysis of Autarky and Free Trade Models
Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently
Solving BAMO Problems
Solving BAMO Problems Tom Dvis [email protected] http://www.geometer.org/mthcircles Februry 20, 2000 Abstrct Strtegies for solving problems in the BAMO contest (the By Are Mthemticl Olympid). Only
Health insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
2 DIODE CLIPPING and CLAMPING CIRCUITS
2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of
Homework 3 Solutions
CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.
The Velocity Factor of an Insulated Two-Wire Transmission Line
The Velocity Fctor of n Insulted Two-Wire Trnsmission Line Problem Kirk T. McDonld Joseph Henry Lbortories, Princeton University, Princeton, NJ 08544 Mrch 7, 008 Estimte the velocity fctor F = v/c nd the
1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam
1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges
Operations with Polynomials
38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply
Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100
hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by
Lecture 3 Gaussian Probability Distribution
Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike
Section 7-4 Translation of Axes
62 7 ADDITIONAL TOPICS IN ANALYTIC GEOMETRY Section 7-4 Trnsltion of Aes Trnsltion of Aes Stndrd Equtions of Trnslted Conics Grphing Equtions of the Form A 2 C 2 D E F 0 Finding Equtions of Conics In the
AntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
5 a LAN 6 a gateway 7 a modem
STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet
2. Transaction Cost Economics
3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service
Section 5-4 Trigonometric Functions
5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form
Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity
Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University
Health insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
Unleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
VoIP for the Small Business
Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll
Recognition Scheme Forensic Science Content Within Educational Programmes
Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses
GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
NOTES. Cohasset Associates, Inc. 2015 Managing Electronic Records Conference 8.1
Cohsset Assocites, Inc. Expnding Your Skill Set: How to Apply the Right Serch Methods to Your Big Dt Problems Juli L. Brickell H5 Generl Counsel MER Conference My 18, 2015 H5 POWERING YOUR DISCOVERY GLOBALLY
Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding
1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde
Integration by Substitution
Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is
A.7.1 Trigonometric interpretation of dot product... 324. A.7.2 Geometric interpretation of dot product... 324
A P P E N D I X A Vectors CONTENTS A.1 Scling vector................................................ 321 A.2 Unit or Direction vectors...................................... 321 A.3 Vector ddition.................................................
and thus, they are similar. If k = 3 then the Jordan form of both matrices is
Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If
Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom
Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the
Module Summary Sheets. C3, Methods for Advanced Mathematics (Version B reference to new book) Topic 2: Natural Logarithms and Exponentials
MEI Mthemtics in Ection nd Instry Topic : Proof MEI Structured Mthemtics Mole Summry Sheets C, Methods for Anced Mthemtics (Version B reference to new book) Topic : Nturl Logrithms nd Eponentils Topic
Object Semantics. 6.170 Lecture 2
Object Semntics 6.170 Lecture 2 The objectives of this lecture re to: to help you become fmilir with the bsic runtime mechnism common to ll object-oriented lnguges (but with prticulr focus on Jv): vribles,
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm
Bibhudendr chry, Girij Snkr Rth, Srt Kumr Ptr, nd Sroj Kumr Pnigrhy Novel Methods of Generting Self-Invertible Mtrix for Hill Cipher lgorithm Bibhudendr chry Deprtment of Electronics & Communiction Engineering
FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University
SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility
Value Function Approximation using Multiple Aggregation for Multiattribute Resource Management
Journl of Mchine Lerning Reserch 9 (2008) 2079-2 Submitted 8/08; Published 0/08 Vlue Function Approximtion using Multiple Aggregtion for Multittribute Resource Mngement Abrhm George Wrren B. Powell Deprtment
Orthogonally modeling video structuration and annotation: exploiting the concept of granularity
From: I Technicl Report WS-00-08. Compiltion copyright 2000, I (www.i.org). ll rights reserved. Orthogonlly modeling video structurtion nd nnottion: exploiting the concept of grnulrity M. Dums, R. Lozno,M.-C.Fuvet,H.MrtinndP.-C.Scholl
Vendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
Learner-oriented distance education supporting service system model and applied research
SHS Web of Conferences 24, 02001 (2016) DOI: 10.1051/ shsconf/20162402001 C Owned by the uthors, published by EDP Sciences, 2016 Lerner-oriented distnce eduction supporting service system model nd pplied
How fast can we sort? Sorting. Decision-tree model. Decision-tree for insertion sort Sort a 1, a 2, a 3. CS 3343 -- Spring 2009
CS 4 -- Spring 2009 Sorting Crol Wenk Slides courtesy of Chrles Leiserson with smll chnges by Crol Wenk CS 4 Anlysis of Algorithms 1 How fst cn we sort? All the sorting lgorithms we hve seen so fr re comprison
Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist
Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements
Math 135 Circles and Completing the Square Examples
Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for
Portfolio approach to information technology security resource allocation decisions
Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 [email protected] Abstrct This
Enterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
Engineer-to-Engineer Note
Engineer-to-Engineer Note EE-220 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t [email protected] nd t [email protected] Or visit our
DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.
Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER
Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org
Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,
TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING
TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX
How To Find Out What A Librry Is Like
Survey of Web Developers in Acdemic Librries by Ruth Sr Connell Avilble online 8 Februry 2008 A survey ws sent to librry Web designers from rndomly selected institutions to determine the bckground, tools,
Warm-up for Differential Calculus
Summer Assignment Wrm-up for Differentil Clculus Who should complete this pcket? Students who hve completed Functions or Honors Functions nd will be tking Differentil Clculus in the fll of 015. Due Dte:
Application-Level Traffic Monitoring and an Analysis on IP Networks
Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for
Health insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 11/12 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
Physics 43 Homework Set 9 Chapter 40 Key
Physics 43 Homework Set 9 Chpter 4 Key. The wve function for n electron tht is confined to x nm is. Find the normliztion constnt. b. Wht is the probbility of finding the electron in. nm-wide region t x
GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports
