Protocol Analysis / Analysis of Software Artifacts Kevin Bierhoff
|
|
- Anabel Richardson
- 8 years ago
- Views:
Transcription
1 Protocol Anlysis / Anlysis of Softwre Artifcts Kevin Bierhoff
2 Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention to Interprocedurl control flow Alising of objects Disjoint sets nd cpbilities cn hndle lising correctly 2
3 Agend Exmple protocols Modeling protocols s stte mchines Protocol nlysis pproches Annottions vs. interprocedurl nlyses Alising chllenges Trcking lises in methods nd fields Protocol implementtion checking 3
4 Strems cn be red until they re closed public interfce InputStrem { public int red(); public void close(); } Strem smple client InputStrem f = new FileInputStrem( ); int c = f.red(); // red first chrcter while(c >= 0) { // do something with c c = f.red(); // red next chrcter } f.close(); Strem protocol stte mchine red() open close() closed 4
5 Sockets go through welldefined sequence of creted, connected, closed }) public clss Socket creted ) public creted, connected ) public void connect( connected ) public InputStrem getinputstrem() Jv Socket protocol creted connect( ) getinputstrem() connected connected ) public OutputStrem connected, closed ) public void close(); close() closed 5
6 Jv Applets hve funny bck edge Jv Applet protocol creted strt() init() initilized strt() running stop() stopped destroy() destroyed Exmple bsed on: G. Firbnks, D. Grln & W. Scherlis. Design frgments mke using frmeworks esier. In Proceedings of OOPSLA 06, pp ACM Press,
7 Crystl3 nlyses hve the sme bck edge creted Crystl3 method nlysis protocol beforeallmethods() nlyzemethod( ) running beforeallmethods() fterallmethods() done Unwreness of this bck edge cn led to outdted error reports 7
8 Protocols constrin temporl ordering of events Protocols define restrictions on which methods cn be clled when Clients hve to follow protocols in order to void runtime errors Protocols cn often be modeled s stte mchines 8
9 Protocol documenttion Protocols re informlly documented Exmple: jv.io.inputstrem Detiled Jvdoc for every method Exmple: jv.net.socket Exceptions describe when methods cnnot be clled Not lwys complete nd precise 9
10 formlized in vrious wys Formliztion Annottions on clsses nd methods Regulr expressions Stte mchine defined in one plce (similr to Metl) Socket creted, connected, closed }) public clss Socket creted ) public creted, connected ) public void connect( ) connect (getinputstrem getoutputstrem)* close creted : connect( ) -> connected connected : getinputstrem() -> connected close() -> closed We will use nnottions on clsses nd methods 10
11 Agend Exmple protocols Modeling protocols s stte mchines Protocol nlysis pproches Annottions vs. interprocedurl nlyses Alising chllenges Trcking lises in methods nd fields Protocol implementtion checking 11
12 Protocol nlysis trcks sttes of vribles Socket sock = new Socket(); sock.connect(new InetSocketAddress( " InputStrem in = sock.getinputstrem(); sock.close(); Post-stte Creted Connected Connected Closed Wht if sock is ssigned to nother vrible? Wht if sock is ssigned to field? Wht if sock is pssed to nother method? 12
13 Clling other methods public clss SocketClient { privte String redsocket(socket s) { InputStrem in = s.getinputstrem(); // red nd return string } public String redremotedt() { Socket sock = new Socket(); sock.connect(new InetSocketAddress( " String result = redsocket(sock); sock.close(); return result; } } Is this cll ok? Is this cll ok? Need to hndle inter-procedurl control flow 13
14 Interprocedurl nlysis techniques Need to hndle inter-procedurl control flow Every method cll could potentilly ffect nlysis results Need to figure out wht hppens in clled methods Some possible pproches Defult ssumptions Interprocedurl CFG More nnottions 14
15 Defults too inflexible for protocol nlysis Simple pproch: defult ssumptions Assumption bout method prmeters nd result Check tht cll nd return sites respect the defult Exmple: Mybe-null ssumption in null nlysis (HW6) Assume tht method prmeters my be null Check methods with tht ssumption All cll nd return sites utomticlly mybe-null No resonble defult for protocol nlysis Any stte too imprecise (lots of flse positives) Optimistic ssumption ( prticulr stte) might be wrong lot of the times 15
16 Interprocedurl CFG inlines method clls Interprocedurl CFG Pretend tht clled methods re prt of current method Every method ppers once Problem: sclbility One big CFG for the entire progrm BEGIN sock = new Socket(); sock.connect( ); redsocket(sock); sock.close(); BEGIN s.getinputstrem(); END END Interprocedurl CFG hrd to use t scle 16
17 Assume nd Check Annottions Annottions Strting dtflow vlue for ll prmeters Dtflow vlue for result Verifiction Initil info: strting vlue for prmeters Verify result nnottion result Ending vlue for result obeys nnottion Verify rg nnottion rg String connected ) Socket s) { InputStrem in = s.getinputstrem(); } Actul rguments obey nnottions on forml prmeter 17
18 Agend Exmple protocols Modeling protocols s stte mchines Protocol nlysis pproches Annottions vs. interprocedurl nlyses Alising chllenges Trcking lises in methods nd fields Protocol implementtion checking 18
19 Looks fmilir? Alising is problem tht you cn esily hve t1 t2 t3 SimpleProtocolTest t1 = new SimpleProtocolTest(); SimpleProtocolTest t2 = new SimpleProtocolTest(); -- SimpleProtocolTest t3 = t1; t1.tob(); b // t1 lis t3 in b, t2 in t1 = t2; // t3 in b, t1 lis t2 in t1.tob(); t3.btoc(); Spurious wrnings b b ERR t2.inb(); b ERR // t1 lis t2 in b, t3 in c Alising = multiple nmes for the sme thing 19
20 Trck locl lises s disjoint sets (k equivlence clsses) Trck lised vribles s disjoint sets Lttice informtion A = { S1,, Sn } S1,, Sn disjoint sets of vribles Copy instructions x = y Get y s lises S A where y S Add x to S (nd remove it from ny other set) Object lloctions x = new C( ) Remove x from existing sets A = A { x } (i.e., dd new set with just x) (Need to lso set initil stte for x) Trck stte for ech disjoint set Method clls x = y.m( ) Get y s lises S = { y1,, yn } where y S Updte S s stte ccording to m s spec 20
21 Disjoint sets correctly hndle locl lises in exmple lising t1 t2 t3 SimpleProtocolTest t1 = new SimpleProtocolTest(); {t1} SimpleProtocolTest t2 = new SimpleProtocolTest(); {t1}, {t2} -- SimpleProtocolTest t3 = t1; {t1,t3}, {t2} t1.tob(); {t1,t3}, {t2} b b // t1 lis t3 in b, t2 in t1 = t2; {t1,t2}, {t3} b // t3 in b, t1 lis t2 in t1.tob(); {t1,t2}, {t3} b b b t3.btoc(); {t1,t2}, {t3} b b c t2.inb(); {t1,t2}, {t3} b b c // t1 lis t2 in b, t3 in c Sttes of lised vribles re updted correctly 21
22 Clling other methods cn ffect fields public clss AlisingFun() b ) privte SimpleProtocolTest t2; Our pproch so fr does not issue ny wrnings privte void cllfield() { t2.inb(); Field nnottion mkes this cll go through } public void lisingfun() { SimpleProtocolTest t1 = new t2 is SimpleProtocolTest(); ctully in c when clled t1.tob(); internl(t1); This cll violtes t2 s nnottion t1.btoc(); cllfield(); privte void internl(@instte( b ) SimpleProtocolTest t) { t2 = t; t2 lises t nd t1 } } Fields hold on to objects beyond durtion of methods 22
23 Alising through fields different from locl vribles Alising in locl vribles ffects current method only We cn hndle tht with disjoint sets Fields hold on to objects Assignment to field in one method cn ffect other methods Chnging stte of locl vrible cn indvertently chnge stte of field Other situtions with similr problems? 23
24 Cpbilities trck whether n object is ccessible Cpbilities: Access objects only if not stored in field Exctly one cpbility for ech object Cn cll methods only if cpbility vilble x.m( ) only vlid if cller hs cpbility for x Cpbility creted with new Field ssignments x.f = y Cpture cpbility for y Annotte methods with if cpbility needed but not if cpbility needed nd returned 24
25 Cpbilities correctly hndle field ssignments nd method clls public clss AlisingFun() b ) privte SimpleProtocolTest t; privte void cllfield() { t.inb(); } public void lisingfun() { SimpleProtocolTest t1 = new SimpleProtocolTest(); } t1.tob(); internl(t1); t1.btoc(); cllfield(); Error: No cpbility for t1 privte void internl(@borrowed SimpleProtocolTest t) { } privte void internl(@cptured SimpleProtocolTest t) { t2 = t; } 25
26 Disjoint sets nd cpbilities cn hndle lising correctly Trck disjoint sets of locl lises Hndle copies between locl vribles One cpbility for ech object Hndle ssignments to fields Cpbility nnottions on methods Hndle lising during method clls F. Smith, D. Wlker & G. Morrisett. Alis types. In Europen Symposium on Progrmming, pges Springer, R. DeLine & M. Fähndrich. Enforcing high-level protocols in low-level softwre. In ACM Conference on Progrmming Lnguge Design nd Implementtion, pges 59-69,
27 Cpbilities re sometimes not enough Source clls receive(byte) to deposit chrcters ReceivedLst() signls no more chrcters in in Pipe out out Reder clls red() to retrieve chrcters Reder clls close() to close the pipe Unsfe to cll close() before source finished within eof closed red() returns -1 Pipe is modified through two independent lises 27
28 Permissions for shred ccess Permissions generlize cpbilities Permission required for ll object ccess Mny permissions to the sme object cn exist But keep trck of how mny permissions there re Unique(x) is the only existing permission for object referenced by x Similr to cpbility for x Hlf(x) is one of two permissions for x Hlf(x) + Hlf(x) = Unique(x) 28
29 Permissions in pipe exmple Source clls receive(byte) to deposit chrcters ReceivedLst() signls no more chrcters Hlf(snk) in in Pipe out out Reder clls red() to retrieve chrcters Reder clls close() to close the pipe Unsfe to cll close() before source finished Hlf(s) Unique(s) Hlf + Hlf => Unique Hlf(this) within eof closed red() returns -1 Chnge to eof with Hlf permission Unique permission needed to close the pipe 29
30 Agend Exmple protocols Modeling protocols s stte mchines Protocol nlysis pproches Annottions vs. interprocedurl nlyses Alising chllenges Trcking lises in methods nd fields Protocol implementtion checking 30
31 Implementtion checking trcks chnges to fields So fr we looked t clients Code clling methods on sockets etc. Assumed tht declred protocol ws right Checking protocol implementtions Does this chnge stte s declred? Stte chnges = field mnipultions Protocols ensure tht something hppened lredy (or hs not hppened yet) Something cn (only) be recorded in fields 31
32 Stte invrints define sttes in terms of fields client Buffered strem public clss BufferedInputStrem { privte InputStrem in; privte byte[] buffer; privte int pos, count; // open: in instte (within eof) && buffer!= null && 0 pos count && count buffer.length // closed: in == null && buffer == null in Underlying strem Stte invrints constrin fields Constrints on field vlues E.g., greter thn zero or non-null Expected stte of referenced object E.g., underlying strem should be within or eof but only while in prticulr stte close() will chnge fields ccordingly 32
33 Don t forget lising! client Buffered strem in Underlying strem public clss BufferedInputStrem { privte InputStrem in; privte byte[] buffer; privte int pos, count; // open: in instte (within eof) && buffer!= null && 0 pos count && count buffer.length // closed: in == null && buffer == null Wht hppens when the underlying strem clls bck to the buffer? As it turns out, such re-entrnt cllbck cn violte count s invrint, leding to n ccess to buffer outside its bounds. 33
Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org
Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,
More informationUse Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.
Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd
More informationObject Semantics. 6.170 Lecture 2
Object Semntics 6.170 Lecture 2 The objectives of this lecture re to: to help you become fmilir with the bsic runtime mechnism common to ll object-oriented lnguges (but with prticulr focus on Jv): vribles,
More informationPolynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
More informationHomework 3 Solutions
CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.
More informationSection 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control
Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.
More informationRegular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
More informationEnterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
More information1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam
1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges
More informationHow To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationAntiSpyware Enterprise Module 8.5
AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationReasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
More informationUnleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
More informationData replication in mobile computing
Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationHealth insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
More informationVendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
More informationJava CUP. Java CUP Specifications. User Code Additions You may define Java code to be included within the generated parser:
Jv CUP Jv CUP is prser-genertion tool, similr to Ycc. CUP uilds Jv prser for LALR(1) grmmrs from production rules nd ssocited Jv code frgments. When prticulr production is recognized, its ssocited code
More informationDatabase-Backed Program Analysis for Scalable Error Propagation
Dtbse-Bcked Progrm Anlysis for Sclble Error Propgtion Cthrin Weiss cthrin.weiss@gmil.com Cindy Rubio-González University of Cliforni, Dvis crubio@ucdvis.edu Ben Liblit University of Wisconsin Mdison liblit@cs.wisc.edu
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
More informationQuick Reference Guide: One-time Account Update
Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More informationProject 6 Aircraft static stability and control
Project 6 Aircrft sttic stbility nd control The min objective of the project No. 6 is to compute the chrcteristics of the ircrft sttic stbility nd control chrcteristics in the pitch nd roll chnnel. The
More informationOne Minute To Learn Programming: Finite Automata
Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge
More informationMathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100
hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by
More informationMath 135 Circles and Completing the Square Examples
Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for
More informationHow To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
More informationNetwork Configuration Independence Mechanism
3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting
More informationEcon 4721 Money and Banking Problem Set 2 Answer Key
Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in
More informationIn-circuit temporal monitors for runtime verification of reconfigurable designs
In-circuit temporl monitors for runtime verifiction of reconfigurble designs Tim Todmn Deprtment of Computing Imperil College London tephn tilkerich Airbus Group Innovtions Willy-Messerschmitt tr., Wyne
More informationSmall Business Cloud Services
Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly
More informationJaERM Software-as-a-Solution Package
JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock
More informationModular Generic Verification of LTL Properties for Aspects
Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte
More informationbaby on the way, quit today
for mums-to-be bby on the wy, quit tody WHAT YOU NEED TO KNOW bout smoking nd pregnncy uitting smoking is the best thing you cn do for your bby We know tht it cn be difficult to quit smoking. But we lso
More informationVoIP for the Small Business
Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll
More informationPROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY
MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive
More informationASG Techniques of Adaptivity
ASG Techniques of Adptivity Hrld Meyer nd Dominik Kuropk nd Peter Tröger Hsso-Plttner-Institute for IT-Systems-Engineering t the University of Potsdm Prof.-Dr.-Helmert-Strsse 2-3, 14482 Potsdm, Germny
More informationIntegration. 148 Chapter 7 Integration
48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but
More informationWhat is the closest Metro/Train or Bus station? The T - (www.the-t.com)
Are GABLES 411: Sutter Creek Where is the closest post office? Locted 5.3 miles from the community, t the intersection of E Prk Row Dr. nd New York Ave. Below is the ddress nd phone number for your reference.
More informationTechniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist
Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements
More informationLicense Manager Installation and Setup
The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.
More information2. Transaction Cost Economics
3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6
More informationTreatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.
The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only
More informationGFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports
More informationHelicopter Theme and Variations
Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the
More informationIntegration by Substitution
Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationKofax Reporting. Administrator's Guide 2.0.0 2013-09-19
Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE
More informationFactoring Polynomials
Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles
More informationSolving BAMO Problems
Solving BAMO Problems Tom Dvis tomrdvis@erthlink.net http://www.geometer.org/mthcircles Februry 20, 2000 Abstrct Strtegies for solving problems in the BAMO contest (the By Are Mthemticl Olympid). Only
More informationMATH 150 HOMEWORK 4 SOLUTIONS
MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive
More informationAlgebra Review. How well do you remember your algebra?
Algebr Review How well do you remember your lgebr? 1 The Order of Opertions Wht do we men when we write + 4? If we multiply we get 6 nd dding 4 gives 10. But, if we dd + 4 = 7 first, then multiply by then
More informationExample 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.
2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this
More informationApplication Bundles & Data Plans
Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help
More information6.2 Volumes of Revolution: The Disk Method
mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationLearning Workflow Petri Nets
Lerning Workflow Petri Nets Jvier Esprz, Mrtin Leucker, nd Mximilin Schlund Technische Universität München, Boltzmnnstr. 3, 85748 Grching, Germny {esprz,leucker,schlund}@in.tum.de Abstrct. Workflow mining
More informationTest Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist
Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems
More informationSmall Businesses Decisions to Offer Health Insurance to Employees
Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationFortiClient (Mac OS X) Release Notes VERSION 5.0.10
FortiClient (Mc OS X) Relese Notes VERSION 5.0.10 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO LIBRARY http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE
More informationSource Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix
Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt
More informationDecision Rule Extraction from Trained Neural Networks Using Rough Sets
Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT
More informationAppendix D: Completing the Square and the Quadratic Formula. In Appendix A, two special cases of expanding brackets were considered:
Appendi D: Completing the Squre nd the Qudrtic Formul Fctoring qudrtic epressions such s: + 6 + 8 ws one of the topics introduced in Appendi C. Fctoring qudrtic epressions is useful skill tht cn help you
More informationpiecewise Liner SLAs and Performance Timetagment
i: Incrementl Cost bsed Scheduling under Piecewise Liner SLAs Yun Chi NEC Lbortories Americ 18 N. Wolfe Rd., SW3 35 Cupertino, CA 9514, USA ychi@sv.nec lbs.com Hyun Jin Moon NEC Lbortories Americ 18 N.
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationFacilitating Rapid Analysis and Decision Making in the Analytical Lab.
Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires
More informationthe machine and check the components
Quick Setup Guide Strt Here DCP-7055W / DCP-7057W DCP-7070DW Plese red the Sfety nd Legl ooklet first efore you set up your mchine. Then, plese red this Quick Setup Guide for the correct setup nd instlltion.
More informationA Decision Theoretic Framework for Ranking using Implicit Feedback
A Decision Theoretic Frmework for Rnking using Implicit Feedbck Onno Zoeter Michel Tylor Ed Snelson John Guiver Nick Crswell Mrtin Szummer Microsoft Reserch Cmbridge 7 J J Thomson Avenue Cmbridge, United
More information4.11 Inner Product Spaces
314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationHow To Reduce Telecommunictions Costs
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationAnthem Blue Cross Life and Health Insurance Company University of Southern California Custom Premier PPO 800/20%/20%
Anthem Blue Cross Life nd Helth Insurnce Compny University of Southern Cliforni Custom Premier 800/20%/20% Summry of Benefits nd Coverge: Wht this Pln Covers & Wht it Costs Coverge Period: 01/01/2015-12/31/2015
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 11/12 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationContextualizing NSSE Effect Sizes: Empirical Analysis and Interpretation of Benchmark Comparisons
Contextulizing NSSE Effect Sizes: Empiricl Anlysis nd Interprettion of Benchmrk Comprisons NSSE stff re frequently sked to help interpret effect sizes. Is.3 smll effect size? Is.5 relly lrge effect size?
More informationNew Internet Radio Feature
XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry
More informationLearning to Search Better than Your Teacher
Ki-Wei Chng University of Illinois t Urbn Chmpign, IL Akshy Krishnmurthy Crnegie Mellon University, Pittsburgh, PA Alekh Agrwl Microsoft Reserch, New York, NY Hl Dumé III University of Mrylnd, College
More informationCorporate Compliance vs. Enterprise-Wide Risk Management
Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will
More informationAssumption Generation for Software Component Verification
Assumption Genertion for Softwre Component Verifiction Dimitr Ginnkopoulou Corin S. Păsărenu RIACS/USRA Kestrel Technologies LLC NASA Ames Reserch Center Moffett Field, CA 94035-1000, USA {dimitr, pcorin}@emil.rc.ns.gov
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationBinary Representation of Numbers Autar Kaw
Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy
More informationVectors 2. 1. Recap of vectors
Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms
More informationVoIP for the Small Business
Reducing your telecommunictions costs TechAdvisory.org SME Reports sponsored by Cybernut Solutions provides outsourced IT support from welth of knowledgeble technicins nd system dministrtors certified
More informationWelch Allyn CardioPerfect Workstation Installation Guide
Welch Allyn CrdioPerfect Worksttion Instlltion Guide INSTALLING CARDIOPERFECT WORKSTATION SOFTWARE & ACCESSORIES ON A SINGLE PC For softwre version 1.6.5 or lter For network instlltion, plese refer to
More informationOutline of the Lecture. Software Testing. Unit & Integration Testing. Components. Lecture Notes 3 (of 4)
Outline of the Lecture Softwre Testing Lecture Notes 3 (of 4) Integrtion Testing Top-down ottom-up ig-ng Sndwich System Testing cceptnce Testing istriution of ults in lrge Industril Softwre System (ISST
More informationand thus, they are similar. If k = 3 then the Jordan form of both matrices is
Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationAllocation Strategies of Virtual Resources in Cloud-Computing Networks
RESEARCH ARTICLE OPEN ACCESS Alloction Strtegies of Virtul Resources in Cloud-Computing Networks 1 K.Delhi Bbu, 2 D.Giridhr Kumr Deprtment of Computer Science nd Engineering, SreeVidynikethnEngg.College,
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More information