Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles.

Size: px
Start display at page:

Download "Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org"

Transcription

1 Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 1

2 Where we re t: Humn Thought Abstrct design Chpters 9, 12 bstrct interfce H.L. Lnguge & Operting Sys. Compiler Chpters bstrct interfce Virtul Mchine Softwre hierrchy VM Trnsltor Chpters 7-8 bstrct interfce Assembly Lnguge Assembler Chpter 6 bstrct interfce Mchine Lnguge Computer Architecture Chpters 4-5 Hrdwre hierrchy bstrct interfce Hrdwre Pltform Gte Logic Chpters 1-3 bstrct interfce Chips & Logic Gtes Electricl Engineering Physics Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 2

3 The big picture Some... lnguge Some Other lnguge... Jck lnguge Some compiler Some Other compiler Jck compiler Chpters 9-13 VM lnguge Implemented in Projects 7-8 VM implementtion over CISC pltforms VM imp. over RISC pltforms VM emultor VM imp. over the Hck pltform Chpters 7-8 CISC mchine lnguge RISC mchine lnguge A Jv-bsed emultor is included in the course softwre suite... written in high-level lnguge Hck mchine lnguge Chpters 1-6 CISC mchine RISC mchine other digitl pltforms, ech equipped with its VM implementtion Any computer Hck computer Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 3

4 The VM lnguge Gol: Complete the specifiction nd implementtion of the VM model nd lnguge Arithmetic / Boolen commnds dd dd sub sub neg neg eq eq gt previous gt lecture lt lt nd nd or or not not Memory ccess commnds pop pop x (pop (pop into into x, x, which which is is vrible) vrible) y (y (y being being vrible vrible or or constnt) constnt) Progrm flow flow commnds lbel lbel (declrtion) (declrtion) goto goto (lbel) (lbel) if-goto if-goto (lbel) (lbel) Function clling commnds function function (declrtion) (declrtion) cll cll return return ( ( function) function) this lecture (from (from function) function) Method: () specify the bstrction (model s constructs nd commnds) (b) propose how to implement it over the Hck pltform. Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 4

5 The compiltion chllenge Source code (high-level lnguge) clss clss Min Min { { sttic sttic int int x; x; function function void void min() min() { { // // Inputs Inputs nd nd multiplies multiplies two two numbers numbers vr vr int int,, b, b, c; c; let let Keybord.redInt( Enter Keybord.redInt( Enter number ); number ); let let b b Keybord.redInt( Enter Keybord.redInt( Enter number ); number ); let let c c Keybord.redInt( Enter Keybord.redInt( Enter number ); number ); let let x x solve(,b,c); solve(,b,c); return; return; } } } } // // Solves Solves quderic quderic eqution eqution (sort (sort of) of) function function int int solve(int solve(int,, int int b, b, int int c) c) { { vr vr int int x; x; if if (~( (~( 0)) 0)) x(-b+sqrt(b*b 4**c))/(2*); x(-b+sqrt(b*b 4**c))/(2*); else else x-c/b; x-c/b; return return x; x; } } } } Our ultimte gol: Trnslte high-level progrms into executble code. Compiler Trget code Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 5

6 The compiltion chllenge / two-tier setting Jck source code if if (~( (~( 0)) 0)) x x (-b+sqrt(b*b 4**c))/(2*) (-b+sqrt(b*b 4**c))/(2*) else else x x -c/b -c/b Compiler We ll develop the compiler lter in the course We now turn to describe how to complete the implementtion of the VM lnguge Tht is -- how to trnslte ech VM commnd into ssembly commnds tht perform the desired semntics. VM (pseudo) code 0 0 eq eq if-goto if-goto elselbel elselbel b b neg neg b b b b cll cll mult mult 4 4 cll cll mult mult c c cll cll mult mult cll cll sqrt sqrt dd dd 2 2 cll cll mult mult div div pop pop x x goto goto contlble contlble elselbel: elselbel: c c neg neg b b cll cll div div pop pop x x contlble: contlble: VM trnsltor Mchine code Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 6

7 The compiltion chllenge Typicl compiler s source code input: // // Computes Computes x (-b (-b + sqrt(b^2 sqrt(b^2-4**c)) -4**c))/ 2* 2* if if (~( (~( 0)) 0)) x (-b (-b + sqrt(b sqrt(b * b 4 * * c)) c)) / (2 (2* ) ) else else x - c / b progrm flow logic (brnching) boolen expressions function cll nd return logic rithmetic expressions (this lecture) (previous lecture) (this lecture) (previous lecture) How to trnslte such high-level code into mchine lnguge? In two-tier compiltion model, the overll trnsltion chllenge is broken between front-end compiltion stge nd subsequent bck-end trnsltion stge In our Hck-Jck pltform, ll the bove sub-tsks (hndling rithmetic / boolen expressions nd progrm flow / function clling commnds) re done by the bck-end, i.e. by the VM trnsltor. Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 7

8 Lecture pln Arithmetic / Boolen commnds dd dd sub sub neg neg eq eq gt gt previous lecture lt lt nd nd or or not not Memory ccess commnds pop pop x (pop (pop into into x, x, which which is is vrible) vrible) y (y (y being being vrible vrible or or constnt) constnt) Progrm flow flow commnds lbel lbel (declrtion) (declrtion) goto goto (lbel) (lbel) if-goto if-goto (lbel) (lbel) Function clling commnds function function (declrtion) (declrtion) cll cll return return ( ( function) function) (from (from function) function) Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 8

9 Progrm flow commnds in the VM lnguge VM code exmple: function function mult mult 1 constnt constnt 0 pop pop locl locl 0 lbel lbel loop loop rgument rgument 0 constnt constnt 0 eq eq if-goto if-goto end end rgument rgument 0 1 sub sub pop pop rgument rgument 0 rgument rgument 1 locl locl 0 dd dd pop pop locl locl 0 goto goto loop loop lbel lbel end end locl locl 0 return return In the VM lnguge, the progrm flow bstrction is delivered using three commnds: lbel c // // lbel lbel declrtion goto goto c // // unconditionl jump jump to to the the // // VM VMcommnd following the the lbel lbel c if-goto c // // pops pops the the topmost stck stck element; // // if if it s it s not not zero, zero, jumps to to the the // // VM VMcommnd following the the lbel lbel c How to trnslte these three bstrctions into ssembly? Simple: lbel declrtions nd goto directives cn be effected directly by ssembly commnds More to the point: given ny one of these three VM commnds, the VM Trnsltor must emit one or more ssembly commnds tht effects the sme semntics on the Hck pltfrom How to do it? see project 8. Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 9

10 Lecture pln Arithmetic / Boolen commnds dd dd sub sub neg neg eq eq gt gt previous lecture lt lt nd nd or or not not Memory ccess commnds pop pop x (pop (pop into into x, x, which which is is vrible) vrible) y (y (y being being vrible vrible or or constnt) constnt) Progrm flow flow commnds lbel lbel (declrtion) (declrtion) goto goto (lbel) (lbel) if-goto if-goto (lbel) (lbel) Function clling commnds function function (declrtion) (declrtion) cll cll return return ( ( function) function) (from (from function) function) Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 10

11 Subroutines // // Compute Compute x (-b (-b + sqrt(b^2 sqrt(b^2-4**c)) -4**c))/ 2* 2* if if (~( (~( 0)) 0)) x (-b (-b + sqrt(b sqrt(b * b 4 * * c)) c)) / (2 (2* ) ) else else x - c / b Subroutines mjor progrmming rtifct Bsic ide: the given lnguge cn be extended t will by user-defined commnds ( k subroutines / functions / methods...) Importnt: the lnguge s primitive commnds nd the user-defined commnds hve the sme look-nd-feel This trnsprent extensibility is the most importnt bstrction delivered by high-level progrmming lnguges The chllenge: implement this bstrction, i.e. llow the progrm control to flow effortlessly between one subroutine to the other A well-designed system consists of collection of blck box modules, ech executing its effect like mgic (Steven Pinker, How The Mind Works) Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 11

12 Subroutines in the VM lnguge Clling code (exmple) // // computes computes (7 (7 + 2) 2) * 3-5 constnt constnt 7 constnt constnt 2 dd dd constnt constnt 3 cll cll mult mult constnt constnt 5 sub sub VM subroutine cll-nd-return commnds The invoction of the VM s primitive commnds nd subroutines follow exctly the sme rules: The cller es the necessry rgument(s) nd clls the commnd / function for its effect The clled commnd / function is responsible for removing the rgument(s) from the stck, nd for popping onto the stck the result of its execution. Clled code, k cllee (exmple) function function mult mult 1 constnt constnt 0 pop pop locl locl 0 // // result result (locl (locl 0) 0) 0 lbel lbel loop loop rgument rgument 0 constnt constnt 0 eq eq if-goto if-goto end end // // if if rg0 rg0 0, 0, jump jump to to end end rgument rgument 0 1 sub sub pop pop rgument rgument 0 // // rg0-- rg0-- rgument rgument 1 locl locl 0 dd dd pop pop locl locl 0 // // result result + + rg1 rg1 goto goto loop loop lbel lbel end end locl locl 0 // // result result return return Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 12

13 Function commnds in the VM lnguge function g nvrs // // here here strts function clled g, g, // // which hs hs nvrs locl locl vribles cll cll g nargs // // invoke function g for for its its effect; // // nargs rguments hve hve lredy been been ed onto onto the the stck stck return // // terminte execution nd nd return control to to the the cller Q: Why this prticulr syntx? A: Becuse it simplifies the VM implementtion (lter). Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 13

14 Function cll-nd-return conventions Clling function function function demo demo constnt constnt 7 7 constnt constnt 2 2 dd dd constnt constnt 3 3 cll cll mult mult clled function k cllee (exmple) function function mult mult 1 1 constnt constnt 0 0 pop pop locl locl 0 0 // // result result (locl (locl 0) 0) 0 0 lbel lbel loop loop // // rest rest of of code code ommitted ommitted lbel lbel end end locl locl 0 0 // // result result return return Although not obvious in this exmple, every VM function hs privte set of 5 memory segments (locl, rgument, this, tht, pointer) These resources exist s long s the function is running. Cll-nd-return progrmming convention The cller must the necessry rgument(s), cll the cllee, nd wit for it to return Before the cllee termintes (returns), it must return vlue At the point of return, the cllee s resources re recycled, the cller s stte is re-instted, execution continues from the commnd just fter the cll Cller s net effect: the rguments were replced by the return vlue (just like with primitive commnds) Behind the scene Recycling nd re-instting subroutine resources nd sttes is mjor hedche Some gent (either the VM or the compiler) should mnge it behind the scene like mgic In our implementtion, the mgic is VM / stck-bsed, nd is considered gret CS gem. Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 14

15 The function-cll-nd-return protocol The cller s view: Before Before clling clling function function g, g, I must must onto onto the the stck stck s s mny mny rguments rguments s s needed needed by by g Next, Next, I invoke invoke the the function function using using the the commnd commnd cll cllg nargs nargs After After g returns: returns: The The rguments rguments tht tht I ed ed before before the the cll cll hve hve disppered disppered from from the the stck, stck, nd nd return return vlue vlue (tht (tht lwys lwys exists) exists) ppers ppers t t the the top top of of the the stck stck All All my my memory memory segments segments (locl, (locl, rgument, rgument, this, this, tht, tht, pointer) pointer) re re the the sme sme s s before before the the cll. cll. function function g nvrs nvrs cll cll g nargs nargs return return Blue VM function writer s responsibility Blck blck box mgic, delivered by the VM implementtion Thus, the VM implementtion writer must worry bout the blck opertions only. The cllee s (g s) view: When When I strt strt executing, executing, my my rgument rgumentsegment hs hs been been initilized initilized with with ctul ctul rgument rgument vlues vlues pssed pssed by by the the cller cller My My locl loclvribles segment segment hs hs been been llocted llocted nd nd initilized initilized to to zero zero The The sttic stticsegment segment tht tht I see see hs hs been been set set to to the the sttic stticsegment segment of of the the VM VM file file to to which which I belong, belong, nd nd the the working working stck stck tht tht I see see is is empty empty Before Before exiting, exiting, I must must vlue vlue onto onto the the stck stck nd nd then then use use the the commnd commnd return. return. Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 15

16 The function-cll-nd-return protocol: the VM implementtion view When function f clls function g, the VM implementtion must: Sve the return ddress within f s code: the ddress of the commnd just fter the cll Sve the virtul segments of f Allocte, nd initilize to 0, s mny locl vribles s needed by g Set the locl nd rgument segment pointers of g Trnsfer control to g. function function g nvrs nvrs cll cll g nargs nargs return return When g termintes nd control should return to f, the VM implementtion must: Cler g s rguments nd other junk from the stck Restore the virtul segments of f Trnsfer control bck to f (jump to the sved return ddress). Q: How should we mke ll this work like mgic? A: We ll use the stck cleverly. Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 16

17 The implementtion of the VM s stck on the host Hck RAM Globl stck: the entire RAM re dedicted to hold the stck Working stck: from SP onwrds: the stck tht the current function sees At ny point of time, only one function (the current function) is executing; other functions my be witing up the clling chin Shded res: irrelevnt to the current function The current function sees only the working stck, s well s its virtul memory segments The rest of the stck holds the frozen sttes of ll the functions up the clling hierrchy. Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 17

18 Implementing the cll g nargs commnd cll cll g nargs nargs // // In In the the course course of of implementing the the code code of of f // //(the cller), cller), we we rrive rrive to to the the commnd commnd cll cll g nargs. nargs. // // we we ssume ssume tht tht nargs nargs rguments rguments hve hve been been ed ed // // onto onto the the stck. stck. Wht Wht do do we we do do next? next? // // We We generte generte symbol, symbol, let s let s cll cll it it returnaddress; // // Next, Next, we we effect effect the the following following logic: logic: returnaddress // // sves sves the the return return ddress ddress LCL LCL // // sves sves the the LCL LCL of of f ARG ARG // // sves sves the the ARG ARG of of f THIS THIS // // sves sves the the THIS THIS of of f THAT THAT // // sves sves the the THAT THAT of of f ARG ARG SP-nArgs-5 SP-nArgs-5 // // repositions SP SP for for g LCL LCL SP SP // // repositions LCL LCL for for g goto goto g // // trnsfers trnsfers control control to to g returnaddress: // // the the generted generted symbol symbol Implementtion: If the VM is implemented s progrm tht trnsltes VM code into ssembly code, the trnsltor must emit the bove logic in ssembly. None of this code is executed yet... At this point we re just generting code (or simulting the VM code on some pltform) Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 18

19 Implementing the function g nvrs commnd function function g nvrs nvrs // // to to implement implement the the commnd commnd function function g nvrs, nvrs, // // we we effect effect the the following following logic: logic: g: g: repet repet nvrs nvrs times: times: 0 Implementtion: If the VM is implemented s progrm tht trnsltes VM code into ssembly code, the trnsltor must emit the bove logic in ssembly. Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 19

20 Implementing the return commnd return return // // In In the the course course of of implementing the the code code of of g, g, // // we we rrive rrive to to the the commnd commnd return. return. // // We We ssume ssume tht tht return return vlue vlue hs hs been been ed ed // // onto onto the the stck. stck. // // We We effect effect the the following following logic: logic: frme frme LCL LCL // // frme frme is is temp. temp. vrible vrible retaddr retaddr *(frme-5) *(frme-5)// // retaddr retaddr is is temp. temp. vrible vrible *ARG *ARG pop pop // // repositions the the return return vlue vlue // // for for the the cller cller SPARG+1 SPARG+1 // // restores restores the the cller s cller s SP SP THAT THAT *(frme-1) *(frme-1) // // restores restores the the cller s cller s THAT THAT THIS THIS *(frme-2) *(frme-2) // // restores restores the the cller s cller s THIS THIS ARG ARG *(frme-3) *(frme-3) // // restores restores the the cller s cller s ARG ARG LCL LCL *(frme-4) *(frme-4) // // restores restores the the cller s cller s LCL LCL goto goto retaddr retaddr // // goto goto returnaddress Implementtion: If the VM is implemented s progrm tht trnsltes VM code into ssembly code, the trnsltor must emit the bove logic in ssembly. Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 20

21 Bootstrpping A high-level jck progrm (k ppliction) is set of clss files. By Jck convention, one clss must be clled Min, nd this clss must hve t lest one function, clled min. The contrct: when we tell the computer to execute Jck progrm, the function Min.min strts running Implementtion: After the progrm is compiled, ech clss file is trnslted into.vm file The operting system is lso implemented s set of.vm files (k librries ) tht co-exist longside the progrm s.vm files One of the OS librries, clled Sys.vm, includes method clled init. The Sys.init function strts with some OS initiliztion code (we ll del with this lter, when we discuss the OS), then it does cll Min.min Thus, to bootstrp, the VM implementtion hs to effect (e.g. in ssembly), the following opertions: SP SP // // initilize the the stck pointer to to 0x0100 cll cll Sys.init // // cll cll the the function tht tht clls Min.min Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 21

22 VM implementtion over the Hck pltform Extends the VM implementtion described in the lst lecture (chpter 7) The result: single ssembly progrm file with lots of greed-upon symbols: Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 22

23 Proposed API Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 23

24 Perspective Benefits of the VM pproch Code trnsportbility: compiling for different pltforms requires replcing only the VM implementtion Lnguge inter-operbility: code of multiple lnguges cn be shred using the sme VM Common softwre librries Code mobility: Internet VM implementtion over CISC pltforms Some... lnguge Some compiler... VM lnguge VM imp. over RISC pltforms Some Other lnguge Some Other compiler CISC RISC mchine mchine... lnguge lnguge... VM emultor... Jck compiler Trnsltor written in high-level lnguge Hck Some virtues of the modulrity implied by the VM pproch to progrm trnsltion: Improvements in the VM implementtion re shred by ll compilers bove it Every new digitl device with VM implementtion gins immedite ccess to n existing softwre bse New progrmming lnguges cn be implemented esily using simple compilers Benefits of mnged code: Security Arry bounds, index checking, Add-on code Etc. VM Cons Performnce. Elements of Computing Systems, Nisn & Schocken, MIT Press, Chpter 8: Virtul Mchine, Prt II slide 24

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam 1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100 hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6

More information

Algebra Review. How well do you remember your algebra?

Algebra Review. How well do you remember your algebra? Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

License Manager Installation and Setup

License Manager Installation and Setup The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

UNLOCKING TECHNOLOGY IVECO

UNLOCKING TECHNOLOGY IVECO UNLOCKING TECHNOLOGY IVECO IVECO - CONTENTS PPLICTIONS PGE DS136 IVECO 3 DS177 IVECO CN 3 DIGNOSTIC SOCKETS LOCTIONS IVECO 4 GENERL OPERTION 5 6 TIPS & HINTS 15 2 Version: 2.3 July 2011 Copyright 2009

More information

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:

More information

Object Semantics. 6.170 Lecture 2

Object Semantics. 6.170 Lecture 2 Object Semntics 6.170 Lecture 2 The objectives of this lecture re to: to help you become fmilir with the bsic runtime mechnism common to ll object-oriented lnguges (but with prticulr focus on Jv): vribles,

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab. Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER

More information

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors

More information

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

MATH 150 HOMEWORK 4 SOLUTIONS

MATH 150 HOMEWORK 4 SOLUTIONS MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Section 7-4 Translation of Axes

Section 7-4 Translation of Axes 62 7 ADDITIONAL TOPICS IN ANALYTIC GEOMETRY Section 7-4 Trnsltion of Aes Trnsltion of Aes Stndrd Equtions of Trnslted Conics Grphing Equtions of the Form A 2 C 2 D E F 0 Finding Equtions of Conics In the

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

Unambiguous Recognizable Two-dimensional Languages

Unambiguous Recognizable Two-dimensional Languages Unmbiguous Recognizble Two-dimensionl Lnguges Mrcell Anselmo, Dor Gimmrresi, Mri Mdoni, Antonio Restivo (Univ. of Slerno, Univ. Rom Tor Vergt, Univ. of Ctni, Univ. of Plermo) W2DL, My 26 REC fmily I REC

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

The Semantics of Graph Programs

The Semantics of Graph Programs The Semntics of Grph Progrms Detlef Plump Deprtment of Computer Science The University of York, UK Sndr Steinert Deprtment of Computer Science The University of York, UK GP (for Grph Progrms) is rule-bsed,

More information

Model Checking for Software Architectures

Model Checking for Software Architectures Model Checking for Softwre Architectures position pper Rdu Mteescu INRIA Rhône-Alpes / VASY 655, venue de l Europe F-38330 Montbonnot Sint Mrtin http://www.inrilpes.fr/vsy 1 Outline Introduction Constructing

More information

Understanding Life Cycle Costs How a Northern Pump Saves You Money

Understanding Life Cycle Costs How a Northern Pump Saves You Money Understnding Life Cycle Costs How Nrn Pump Sves You Money Reference: Hydrulic Institute (www.s.g) Introduction Wht Life Cycle Cost (LCC) Clculting Totl LCC LCC Components Wht Life Cycle Cost Life Cycle

More information

How To Reduce Telecommunictions Costs

How To Reduce Telecommunictions Costs Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001

CS99S Laboratory 2 Preparation Copyright W. J. Dally 2001 October 1, 2001 CS99S Lortory 2 Preprtion Copyright W. J. Dlly 2 Octoer, 2 Ojectives:. Understnd the principle of sttic CMOS gte circuits 2. Build simple logic gtes from MOS trnsistors 3. Evlute these gtes to oserve logic

More information

Binary Representation of Numbers Autar Kaw

Binary Representation of Numbers Autar Kaw Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

SPECIAL PRODUCTS AND FACTORIZATION

SPECIAL PRODUCTS AND FACTORIZATION MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Java CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser:

Java CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser: Jv CUP Jv CUP is prser-genertion tool, similr to Ycc. CUP uilds Jv prser for LALR(1) grmmrs from production rules nd ssocited Jv code frgments. When prticulr production is recognized, its ssocited code

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

SE3BB4: Software Design III Concurrent System Design. Sample Solutions to Assignment 1

SE3BB4: Software Design III Concurrent System Design. Sample Solutions to Assignment 1 SE3BB4: Softwre Design III Conurrent System Design Winter 2011 Smple Solutions to Assignment 1 Eh question is worth 10pts. Totl of this ssignment is 70pts. Eh ssignment is worth 9%. If you think your solution

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-56 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

On decidability of LTL model checking for process rewrite systems

On decidability of LTL model checking for process rewrite systems Act Informtic (2009) 46:1 28 DOI 10.1007/s00236-008-0082-3 ORIGINAL ARTICLE On decidbility of LTL model checking for process rewrite systems Lur Bozzelli Mojmír Křetínský Vojtěch Řehák Jn Strejček Received:

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Project 6 Aircraft static stability and control

Project 6 Aircraft static stability and control Project 6 Aircrft sttic stbility nd control The min objective of the project No. 6 is to compute the chrcteristics of the ircrft sttic stbility nd control chrcteristics in the pitch nd roll chnnel. The

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

RTL Power Optimization with Gate-level Accuracy

RTL Power Optimization with Gate-level Accuracy RTL Power Optimiztion with Gte-level Accurcy Qi Wng Cdence Design Systems, Inc Sumit Roy Clypto Design Systems, Inc 555 River Oks Prkwy, Sn Jose 95125 2903 Bunker Hill Lne, Suite 208, SntClr 95054 qwng@cdence.com

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Physics 43 Homework Set 9 Chapter 40 Key

Physics 43 Homework Set 9 Chapter 40 Key Physics 43 Homework Set 9 Chpter 4 Key. The wve function for n electron tht is confined to x nm is. Find the normliztion constnt. b. Wht is the probbility of finding the electron in. nm-wide region t x

More information

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19 Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE

More information

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

the printer and check the components

the printer and check the components Quick Setup Guide Strt Here HL-3040CN Before you cn use the printer, red this Quick Setup Guide for the correct setup nd instlltion. To view the Quick Setup Guide in other lnguges, plese visit http://solutions.brother.com/.

More information

Lectures 8 and 9 1 Rectangular waveguides

Lectures 8 and 9 1 Rectangular waveguides 1 Lectures 8 nd 9 1 Rectngulr wveguides y b x z Consider rectngulr wveguide with 0 < x b. There re two types of wves in hollow wveguide with only one conductor; Trnsverse electric wves

More information

Lecture 5. Inner Product

Lecture 5. Inner Product Lecture 5 Inner Product Let us strt with the following problem. Given point P R nd line L R, how cn we find the point on the line closest to P? Answer: Drw line segment from P meeting the line in right

More information

IFC3 India-Android Application Development

IFC3 India-Android Application Development IFC3 Indi-Android Appliction Development Android Operting System hs been progressing quite rpidly. Conceived s counterpoint IOS, Android is grph showing significnt development in this workshop Students

More information

One Minute To Learn Programming: Finite Automata

One Minute To Learn Programming: Finite Automata Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge

More information

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding 1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Where is the nearest post office? 1.64 miles from the community, at the intersection of Timmons and Westheimer.

Where is the nearest post office? 1.64 miles from the community, at the intersection of Timmons and Westheimer. Are GABLES 411: Gbles Post Ok Where is the nerest post office? 1.64 miles from the community, t the intersection of Timmons nd Westheimer. United Sttes Postl Office 2802 Timmons Ln. Houston, Tx 77027 713.572.3936

More information

Recognition Scheme Forensic Science Content Within Educational Programmes

Recognition Scheme Forensic Science Content Within Educational Programmes Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one. 5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Database-Backed Program Analysis for Scalable Error Propagation

Database-Backed Program Analysis for Scalable Error Propagation Dtbse-Bcked Progrm Anlysis for Sclble Error Propgtion Cthrin Weiss cthrin.weiss@gmil.com Cindy Rubio-González University of Cliforni, Dvis crubio@ucdvis.edu Ben Liblit University of Wisconsin Mdison liblit@cs.wisc.edu

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Friday 16 th May 2008. Time: 14:00 16:00

Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. Date: Friday 16 th May 2008. Time: 14:00 16:00 COMP20212 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE Digitl Design Techniques Dte: Fridy 16 th My 2008 Time: 14:00 16:00 Plese nswer ny THREE Questions from the FOUR questions provided

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

IaaS Configuration for Virtual Platforms

IaaS Configuration for Virtual Platforms IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To

More information