Software Quality Exercise 1
|
|
|
- Esther Richards
- 10 years ago
- Views:
Transcription
1 Software Quality Exercise Model Checking Information. Dates Release: pm Deadline: pm Discussion:.0.0. Formalities While this exercise can be solved and handed in in groups of three, every member of a group must be able to answer questions about the group s solution. Please package the files containing your solution into a zip (or tar.gz) file and submit it via to [email protected]. The subject of the must begin with [FS SWQ]. Answer the questions in a pdf document and include the source code (java, pml and ltl files) of your solutions. Do not include binary files such as class files, metadata (such as.svn folders or.project files) nor derived files like pan.c.. SPIN These exercises are based on spin, a model checker. You can find pointers to documentation about this tool from last year course on The tool has been installed on the computers in the lab (room: BINZ 0.B.04). Here are some helpful commands for these exercises:
2 Simulate a model (append -p -g for more verbose output) spin model.pml Verify a property on a model. spin -a -F property.ltl model.pml gcc -o pan pan.c./pan -a Replay a trace found by the verifier (append -p -g for more verbose output). spin -t model.pml Note: In some MacOSX and Linux distributions SPIN has problems to process LTL files given with the -F modifier. This issue can be avoided by specifying the LTL formula directly in the command line within double quotes after the -f modifier. For example: spin -a -f " [] greenlight" model.pml The LTL formula can then be saved in an LTL file before submitting the solution. Colony of Chameleons A friend of yours is the director of a zoo. He has described you the latest acquisition he was considering for his zoo: a rare colony of chameleons. This colony of chameleons includes 4 red, 5 blue, and 0 green individuals. Whenever two chameleons of different colors meet, each changes to the third color. The color mutation is an unique feature and your friend expects to attract many visitor with this colony. Still, the director has a doubt: if, by any chance, all 99 chameleons are in the same color, there will not be any color change any more and the colony would loose its value.. State Space a) Give a rough estimation of the number of states in which the colony can be. b) How many states present the undesired property?. Promela Model of the Colony Download the file Colony.pml.txt on the website of the exercises and rename it to Colony.pml. Study this model with the help of Promela documentation. a) What are the main components of a Promela model? b) The behavior of chameleons is not deterministic, in the sense that they meet each other randomly. How is this non-determinism expressed in the Promela model of the colony? c) Which other aspect of Promela is not deterministic? d) Explain briefly what are d step blocks and the reason of their presence in the Promela model of the colony. In which sense is the first instruction of such a block different than the others? e) Despite their relation with the color change phenomenon, the duration of a color change and the probability of a change have not been modeled. Explain, in maximum 5 sentences, why they are not relevant for the problem at hand.
3 . Simulation and Verification a) Run a few simulations of the model. Have you ended up in a state where all chameleons are of the same color? b) Express the property there are always at least two chameleons of different color in an LTL formula using the variables defined in the Promela model of the colony. Save this formula in a textfile named ColorChange.ltl. Note that you cannot define predicates in an ltl file; you have to define them as macros in the Promela model. For example: #define noredchameleonleft (!nred) c) Is it a safety or a liveness property? Why? d) Using spin, investigate whether the colony can reach a state where this property does not hold. Note that spin looks for executions that satisfy an LTL property, so, you have to negate the formula in ColorChange.ltl. What will you recommand to your friend? e) In the report of pan, the number of states stored is the number of reachable states. How many states were reachable? Compare with your answer in...a). f) In the report of pan, the number of transitions is the number of transitions that have been visited during the search. How many transitions were investigated by pan? g) A few days later, the director of the zoo informs you: a green chameleon escaped during the delivery. Has he any reason to worry? h) What is the depth of the trace (that is, the number of steps) found by pan?.4 Extending the Model After a few weeks, you visit the zoo. Looking at this chameleon colony, you feel a strong relief: there are still chameleons of every color and they change colors happily. Still, by observing them, you figure out that your friend did not describe the behavior of the chameleons very precisely. You make the following additional observations: When chameleons of different colors meet, they argue violently and kill eachother. When chameleons of the same color meet, they give birth to a new chameleon of their color. At the day of your visit, there were 0 red, 8 blue, and 6 green individuals. a) Extend the Promela model of the colony with processes so that it reflects your new observations. b) Run a few simulations of this model. What happens? Explain. c) Let s make an assumption here: chameleons only give birth if there are less than N chameleons of that color in the colony ( N = 5). Modify the model accordingly. d) Express the property soon or later, there will be no chameleon left in an LTL formula. Save this formula in a textfile named Extinction.ltl. e) Is it a safety or a liveness property? Why? f) Using spin, investigate whether the colony can die off. Are chameleons threatened with extinction? g) Modify you model again so that chameleons only give birth if there are in total less than N chameleons in the colony (initially, set N to 0). Are chameleons still threatened with extinction? h) Change the the number N to 50 instead of 0. As you did previously, investigate whether the colony can die off. What happens? Why?
4 p₃ t₂ p₁ t₁ p₂ cap(p₂) = 5 Figure : Example of Petri net i) Set the max search depth to steps when performing the verification. Do you obtain a different result? What is the depth of the trace? Which depth has been reached during the search? j) Change the order of process declarations in the Promela model by swapping the fight process with the birth process and re-verify the model. What is the depth of the trace and which depth has been reached during the verification? Explain the difference with your previous results. Your explanation must account the fact that the behavior of the model remains unchanged by your modification..5 Scalability This exercise is based on the extended model of the colony built in the exercise..4. No LTL property will be checked on the model. While keeping the max search depth to steps, perform an exhaustive search on the model for N = 60, N = 0, N = 80, N = 0 and N = 400. Note that you have to invoke pan without the option -a, since no LTL property was specified. For every execution of pan, report the following information in a table: the time spent for the verification. the number of transitions explored. the length of the longest trace explorated. the number of reachable states. the memory used for the verification. Petri Nets Petri nets can easily be translated into Promela models. For example, the Petri net in figure can be translated in the following Promela code: byte p, p, p; /* assumption: at most 56 tokens on each place */ init { p = ; p = 0; p = ; /* initial marking */ do /*t*/ :: d_step {p >= && p <= 4; p = p - ; p = p + ;} /*t*/ :: d_step {p >= ; p = p - ; p = p + ;} od } 4
5 Create a Promela model based on the Petri net depicted in figure. Using spin, verify whether (a) this Petri net is free of deadlock, (b) the transition t 4 can be fired at least once, (c) the transition t can be fired an infinite number of times and whether (d) as soon as p 4 receives a token, it never gets empty again. If applicable, give an execution trace to justify your answer. In each case, explain briefly how you did the verification with spin. cap(p₁) = 6 cap(p₄) = p₁ p₄ t₁ p₂ t₃ t₂ cap(p 5 ) = 4 p 5 5 t 5 t₄ Figure : Petri net to be translated in Promela 5
Lecture 9 verifying temporal logic
Basics of advanced software systems Lecture 9 verifying temporal logic formulae with SPIN 21/01/2013 1 Outline for today 1. Introduction: motivations for formal methods, use in industry 2. Developing models
Introduction to SPIN. Acknowledgments. Parts of the slides are based on an earlier lecture by Radu Iosif, Verimag. Ralf Huuck. Features PROMELA/SPIN
Acknowledgments Introduction to SPIN Parts of the slides are based on an earlier lecture by Radu Iosif, Verimag. Ralf Huuck Ralf Huuck COMP 4152 1 Ralf Huuck COMP 4152 2 PROMELA/SPIN PROMELA (PROcess MEta
Fundamentals of Software Engineering
Fundamentals of Software Engineering Model Checking with Temporal Logic Ina Schaefer Institute for Software Systems Engineering TU Braunschweig, Germany Slides by Wolfgang Ahrendt, Richard Bubel, Reiner
Software Engineering using Formal Methods
Software Engineering using Formal Methods Model Checking with Temporal Logic Wolfgang Ahrendt 24th September 2013 SEFM: Model Checking with Temporal Logic /GU 130924 1 / 33 Model Checking with Spin model
Today s Agenda. Automata and Logic. Quiz 4 Temporal Logic. Introduction Buchi Automata Linear Time Logic Summary
Today s Agenda Quiz 4 Temporal Logic Formal Methods in Software Engineering 1 Automata and Logic Introduction Buchi Automata Linear Time Logic Summary Formal Methods in Software Engineering 2 1 Buchi Automata
System modeling. Budapest University of Technology and Economics Department of Measurement and Information Systems
System modeling Business process modeling how to do it right Partially based on Process Anti-Patterns: How to Avoid the Common Traps of Business Process Modeling, J Koehler, J Vanhatalo, IBM Zürich, 2007.
Introduction to Promela and SPIN. LACL, Université Paris 12
Introduction to Promela and SPIN LACL, Université Paris 12 Promela = Process Meta Language A specification language! No programming language! Used for system description : Specify an abstraction of the
INF5140: Specification and Verification of Parallel Systems
INF5140: Specification and Verification of Parallel Systems Lecture 7 LTL into Automata and Introduction to Promela Gerardo Schneider Department of Informatics University of Oslo INF5140, Spring 2007 Gerardo
The Model Checker SPIN
The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(
Software Quality Exercise 2
Software Quality Exercise 2 Testing and Debugging 1 Information 1.1 Dates Release: 12.03.2012 12.15pm Deadline: 19.03.2012 12.15pm Discussion: 26.03.2012 1.2 Formalities Please submit your solution as
Memory Management Simulation Interactive Lab
Memory Management Simulation Interactive Lab The purpose of this lab is to help you to understand deadlock. We will use a MOSS simulator for this. The instructions for this lab are for a computer running
Formal Verification by Model Checking
Formal Verification by Model Checking Natasha Sharygina Carnegie Mellon University Guest Lectures at the Analysis of Software Artifacts Class, Spring 2005 1 Outline Lecture 1: Overview of Model Checking
SHARED HASH TABLES IN PARALLEL MODEL CHECKING
SHARED HASH TABLES IN PARALLEL MODEL CHECKING IPA LENTEDAGEN 2010 ALFONS LAARMAN JOINT WORK WITH MICHAEL WEBER AND JACO VAN DE POL 23/4/2010 AGENDA Introduction Goal and motivation What is model checking?
A Classification of Model Checking-based Verification Approaches for Software Models
A Classification of Model Checking-based Verification Approaches for Software Models Petra Brosch, Sebastian Gabmeyer, Martina Seidl Sebastian Gabmeyer Business Informatics Group Institute of Software
TECH. Requirements. Why are requirements important? The Requirements Process REQUIREMENTS ELICITATION AND ANALYSIS. Requirements vs.
CH04 Capturing the Requirements Understanding what the customers and users expect the system to do * The Requirements Process * Types of Requirements * Characteristics of Requirements * How to Express
University of Pennsylvania Department of Electrical and Systems Engineering Digital Audio Basics
University of Pennsylvania Department of Electrical and Systems Engineering Digital Audio Basics ESE250 Spring 2013 Lab 9: Process CPU Sharing Friday, March 15, 2013 For Lab Session: Thursday, March 21,
CS170 Lab 11 Abstract Data Types & Objects
CS170 Lab 11 Abstract Data Types & Objects Introduction: Abstract Data Type (ADT) An abstract data type is commonly known as a class of objects An abstract data type in a program is used to represent (the
MODEL CHECKING OF SERVICES WORKFLOW RECONFIGURATION: A PERSPECTIVE ON DEPENDABILITY
MODEL CHECKING OF SERVICES WORKFLOW RECONFIGURATION: A PERSPECTIVE ON DEPENDABILITY 1 Juan Carlos Polanco Aguilar 1 Koji Hasebe 1 Manuel Mazzara 2 Kazuhiko Kato 1 1 University of Tsukuba Department of
Stylianos Basagiannis
Interlocking control by Distributed Signal Boxes Technical Report (TR) 4 Stylianos Basagiannis Supervisors: Dr Andrew Pombortsis, Dr Panagiotis Katsaros Aristotle University of Thessaloniki Department
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises
ONLINE EXERCISE SYSTEM A Web-Based Tool for Administration and Automatic Correction of Exercises Daniel Baudisch, Manuel Gesell and Klaus Schneider Embedded Systems Group, University of Kaiserslautern,
T-79.186 Reactive Systems: Introduction and Finite State Automata
T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software
Abstract. For notes detailing the changes in each release, see the MySQL for Excel Release Notes. For legal information, see the Legal Notices.
MySQL for Excel Abstract This is the MySQL for Excel Reference Manual. It documents MySQL for Excel 1.3 through 1.3.6. Much of the documentation also applies to the previous 1.2 series. For notes detailing
Part 1 Foundations of object orientation
OFWJ_C01.QXD 2/3/06 2:14 pm Page 1 Part 1 Foundations of object orientation OFWJ_C01.QXD 2/3/06 2:14 pm Page 2 1 OFWJ_C01.QXD 2/3/06 2:14 pm Page 3 CHAPTER 1 Objects and classes Main concepts discussed
Dalhousie University CSCI 2132 Software Development Winter 2015 Lab 7, March 11
Dalhousie University CSCI 2132 Software Development Winter 2015 Lab 7, March 11 In this lab, you will first learn how to use pointers to print memory addresses of variables. After that, you will learn
Assignment 4 Real-world programming
University of New South Wales, SENG 2011 Software Engineering Workshop 2A 2014 Session 1 Assignment 4 Real-world programming Due Friday of Week 13, that is 6 June 2014 at 23:59 The instructions for completing
Forensic Imaging and Artifacts analysis of Linux & Mac (EXT & HFS+)
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
Lab 11. Simulations. The Concept
Lab 11 Simulations In this lab you ll learn how to create simulations to provide approximate answers to probability questions. We ll make use of a particular kind of structure, called a box model, that
AB-Clock. Manual. Copyright 1996-2004 by GRAHL software design
Manual Contents Contents Welcome! 4 4... The AB-Clock Menu 4... AB-Clock Settings 5... Start and Exit AB-Clock 5 Start AB-Clock... 5 Exit AB-Clock... 5 Start Parameters... 6 Procedures... 6 How to... run
Your Personal Trading Journal
Your Personal Trading Journal This guide provides instructions for the setup and helps you getting started with your Edgewonk trading journal. It is recommended that you read it thoroughly to fully leverage
HDFS Users Guide. Table of contents
Table of contents 1 Purpose...2 2 Overview...2 3 Prerequisites...3 4 Web Interface...3 5 Shell Commands... 3 5.1 DFSAdmin Command...4 6 Secondary NameNode...4 7 Checkpoint Node...5 8 Backup Node...6 9
Introduction of Virtualization Technology to Multi-Process Model Checking
Introduction of Virtualization Technology to Multi-Process Model Checking Watcharin Leungwattanakit [email protected] Masami Hagiya [email protected] Mitsuharu Yamamoto Chiba University
Instructions for the evaluation of project reports, student research projects, and bachelor s theses
Instructions for the evaluation of project reports, student research projects, and bachelor s theses Principle The evaluation of project reports, student research projects, and bachelor s theses is done
JobScheduler Installation by Copying
JobScheduler - Job Execution and Scheduling System JobScheduler Installation by Copying Deployment of multiple JobSchedulers on distributed servers by copying a template JobScheduler March 2015 March 2015
Static Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
PMOD Installation on Linux Systems
User's Guide PMOD Installation on Linux Systems Version 3.7 PMOD Technologies Linux Installation The installation for all types of PMOD systems starts with the software extraction from the installation
i2b2 Installation Guide
Informatics for Integrating Biology and the Bedside i2b2 Installation Guide i2b2 Server and Clients Document Version: 1.7.00-003 Document Management Revision Number Date Author Comment 1.7.00-001 03/06/2014
Instructions for Department of Public Health (DPH) WebConnect (Mac)
Instructions for Department of Public Health (DPH) WebConnect (Mac) UCSF at SFGH Computing and Network Services Hours of Operation: Monday Friday 8 AM to 5PM Pacific Time Website: http://tiny.ucsf.edu/sfghcns
SENIOR PROCUREMENT EXECUTIVES SMALL AGENCY COUNCIL MEMBERS
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 OFFICE OF FEDERAL PROCUREMENT POLICY MEMORANDUM FOR: FROM: SUBJECT: May 31, 2011 CHIEF ACQUISITION OFFICERS SENIOR
University of Twente. A simulation of the Java Virtual Machine using graph grammars
University of Twente Department of Computer Science A simulation of the Java Virtual Machine using graph grammars Master of Science thesis M. R. Arends, November 2003 A simulation of the Java Virtual Machine
Offline Audit Tool Version 3.0
Offline Audit Tool Version 3.0 Contents Downloading Java Development Kit... 2 Downloading the Offline Client... 7 Completing Your Audit & Utilizing the Offline Audit Tool... 14 Importing Your Audit into
Software safety - DEF-STAN 00-55
Software safety - DEF-STAN 00-55 Where safety is dependent on the safety related software (SRS) fully meeting its requirements, demonstrating safety is equivalent to demonstrating correctness with respect
Backing Up CNG SAFE Version 6.0
Backing Up CNG SAFE Version 6.0 The CNG-Server consists of 3 components. 1. The CNG Services (Server, Full Text Search and Workflow) 2. The data file repository 3. The SQL Server Databases The three services
Towards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder
Towards a Framework for Generating Tests to Satisfy Complex Code Coverage in Java Pathfinder Matt Department of Computer Science and Engineering University of Minnesota [email protected] Abstract We present
Illustration 1: Diagram of program function and data flow
The contract called for creation of a random access database of plumbing shops within the near perimeter of FIU Engineering school. The database features a rating number from 1-10 to offer a guideline
CS 2112 Spring 2014. 0 Instructions. Assignment 3 Data Structures and Web Filtering. 0.1 Grading. 0.2 Partners. 0.3 Restrictions
CS 2112 Spring 2014 Assignment 3 Data Structures and Web Filtering Due: March 4, 2014 11:59 PM Implementing spam blacklists and web filters requires matching candidate domain names and URLs very rapidly
Assignment # 2: Design Patterns and GUIs
CSUS COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science CSc 133 Object-Oriented Computer Graphics Programming Spring 2014 John Clevenger Assignment # 2: Design Patterns and GUIs
Go to CGTech Help Library. Installing CGTech Products
Go to CGTech Help Library Installing CGTech Products VERICUT Installation Introduction to Installing VERICUT Installing and configuring VERICUT is simple, typically requiring only a few minutes for most
WebSphere Business Monitor V6.2 KPI history and prediction lab
Copyright IBM Corporation 2009 All rights reserved IBM WEBSPHERE BUSINESS MONITOR 6.2 LAB EXERCISE WebSphere Business Monitor V6.2 KPI history and prediction lab What this exercise is about... 1 Lab requirements...
Kirsten Sinclair SyntheSys Systems Engineers
Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Spicing-up IBM s Enterprise Architecture tools with Petri Nets On Today s Menu Appetiser: Background Starter: Use
Animated Lighting Software Overview
Animated Lighting Software Revision 1.0 August 29, 2003 Table of Contents SOFTWARE OVERVIEW 1) Dasher Pro and Animation Director overviews 2) Installing the software 3) Help 4) Configuring the software
Green = 0,255,0 (Target Color for E.L. Gray Construction) CIELAB RGB Simulation Result for E.L. Gray Match (43,215,35) Equal Luminance Gray for Green
Red = 255,0,0 (Target Color for E.L. Gray Construction) CIELAB RGB Simulation Result for E.L. Gray Match (184,27,26) Equal Luminance Gray for Red = 255,0,0 (147,147,147) Mean of Observer Matches to Red=255
App Building Guidelines
App Building Guidelines App Building Guidelines Table of Contents Definition of Apps... 2 Most Recent Vintage Dataset... 2 Meta Info tab... 2 Extension yxwz not yxmd... 3 Map Input... 3 Report Output...
A block based storage model for remote online backups in a trust no one environment
A block based storage model for remote online backups in a trust no one environment http://www.duplicati.com/ Kenneth Skovhede (author, [email protected]) René Stach (editor, [email protected]) Abstract
Replication on Virtual Machines
Replication on Virtual Machines Siggi Cherem CS 717 November 23rd, 2004 Outline 1 Introduction The Java Virtual Machine 2 Napper, Alvisi, Vin - DSN 2003 Introduction JVM as state machine Addressing non-determinism
Formal Verification Toolkit for Requirements and Early Design Stages
Formal Verification Toolkit for Requirements and Early Design Stages Julia M. Badger 1 and Sheena Judson Miller 2 1 NASA Johnson Space Center, Houston, TX 77058, USA 2 Barrios Technology, Houston, TX 77058,
How to resolve Root Certificate Expiry Issue for Enterprise Manager - Database Control (10.2.0.4)
PURPOSE 14 th June, 2011 This paper demonstrates how to resolve the Oracle Enterprise Manager Database Control configuration errors in Oracle Database versions 10.2.0.4 or 10.2.0.5, arising due to the
Department of Veterans Affairs. Open Source Electronic Health Record Services
Department of Veterans Affairs Open Source Electronic Health Record Services MTools Installation and Usage Guide Version 1.0 June 2013 Contract: VA118-12-C-0056 Table of Contents 1. Installation... 3 1.1.
Electronic Documents: Enhancing Construction Management Courses. Introduction
Kevin R Miller University of Florida Gainesville, FL Jay P. Christofferson, Ph.D. Brigham Young University Provo, UT Construction plans and specification (construction documents) should be incorporated
IBM SmartCloud Workload Automation - Software as a Service. Agent Installation and Uninstallation Messages
IBM SmartCloud Workload Automation - Software as a Service Agent Installation and Uninstallation Messages IBM SmartCloud Workload Automation - Software as a Service Agent Installation and Uninstallation
Modeling and Verification. Devoir Maison 6 : DSL
Modeling and Verification Devoir Maison 6 : DSL Alexis Marechal & Levi Lucio April 20, 2009 Introduction In homework 3 we saw an introduction to BPMN. BPMN is a well known formalism to define a system
Using the JNIOR with the GDC Digital Cinema Server. Last Updated November 30, 2012
Using the JNIOR with the GDC Digital Cinema Server Last Updated November 30, 2012 The following is an explanation of how to utilize the JNIOR with the GDC Digital Cinema Server. Please contact INTEG via
This Method will show you exactly how you can profit from this specific online casino and beat them at their own game.
This Method will show you exactly how you can profit from this specific online casino and beat them at their own game. It s NOT complicated, and you DON T need a degree in mathematics or statistics to
EEC 119B Spring 2014 Final Project: System-On-Chip Module
EEC 119B Spring 2014 Final Project: System-On-Chip Module Dept. of Electrical and Computer Engineering University of California, Davis Issued: March 14, 2014 Subject to Revision Final Report Due: June
Software localisation: Working with PASSOLO
Software localisation: Working with PASSOLO I Software localisation Localisation is the process of adapting a program for a specific international market, including translating the user interface, resizing
Explain the relationship between a class and an object. Which is general and which is specific?
A.1.1 What is the Java Virtual Machine? Is it hardware or software? How does its role differ from that of the Java compiler? The Java Virtual Machine (JVM) is software that simulates the execution of a
Autodesk Navisworks 2015 Service Pack 3
Autodesk Navisworks 2015 Service Pack 3 Thank you for downloading Autodesk Navisworks 2015 Service Pack 3. This readme contains the latest information about the installation and use of the service pack.
Lab 1: Introduction to the network lab
CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
Sweet Home 3D user's guide
1 de 14 08/01/2013 13:08 Features Download Online Gallery Blog Documentation FAQ User's guide Video tutorial Developer's guides History Reviews Support 3D models Textures Translations Forum Report a bug
What is File Management. Methods for Categorizing Data. Viewing Data on a Computer
What is File Management As described earlier, file management is basically the process of designing new folders and assigning files to those folders. The main goal in file management is to have a system
BECKHOFF. Application Notes. www.beckhoffautomation.com. BC9000: Getting Started Guide. For additional documentation, please visit.
BECKHOFF Application Notes www.beckhoffautomation.com BC9000: Getting Started Guide BC-AppNote-002 1.0 27 August 2007 This application note is intended for the first time user of the BC9000 and TwinCAT
Resource Scheduler 2.0 Using VARCHART XGantt
Resource Scheduler 2.0 Using VARCHART XGantt NETRONIC Software GmbH Pascalstrasse 15 52076 Aachen, Germany Phone +49 (0) 2408 141-0 Fax +49 (0) 2408 141-33 Email: [email protected] www.netronic.com Copyright
Setting Up a Windows Virtual Machine for SANS FOR526
Setting Up a Windows Virtual Machine for SANS FOR526 As part of the Windows Memory Forensics course, SANS FOR526, you will need to create a Windows virtual machine to use in class. We recommend using VMware
CONTENTS OF DAY 2. II. Why Random Sampling is Important 9 A myth, an urban legend, and the real reason NOTES FOR SUMMER STATISTICS INSTITUTE COURSE
1 2 CONTENTS OF DAY 2 I. More Precise Definition of Simple Random Sample 3 Connection with independent random variables 3 Problems with small populations 8 II. Why Random Sampling is Important 9 A myth,
Programming LEGO NXT Robots using NXC
Programming LEGO NXT Robots using NXC This text programming language derived from C language is bended together with IDE BricxCC on standard firmware LEGO Mindstorms. This can be very convenient for those,
Change Impact Analysis
Change Impact Analysis Martin Ward Reader in Software Engineering [email protected] Software Technology Research Lab De Montfort University Change Impact Analysis Impact analysis is a process that predicts
Chapter 2 Data Storage
Chapter 2 22 CHAPTER 2. DATA STORAGE 2.1. THE MEMORY HIERARCHY 23 26 CHAPTER 2. DATA STORAGE main memory, yet is essentially random-access, with relatively small differences Figure 2.4: A typical
EXPRESSION OF INTEREST (EOI) Citizenship Information Management System (CIMS) Ministry of Home Affairs Singh Durbar, Kathmandu, Nepal
EXPRESSION OF INTEREST (EOI) On Citizenship Information Management System (CIMS) Ministry of Home Affairs Singh Durbar, Kathmandu, Nepal Ministry of Home Affairs Singh Durbar, Kathmandu, Nepal Government
SAIP 2012 Performance Engineering
SAIP 2012 Performance Engineering Author: Jens Edlef Møller ([email protected]) Instructions for installation, setup and use of tools. Introduction For the project assignment a number of tools will be used.
The goal with this tutorial is to show how to implement and use the Selenium testing framework.
APPENDIX B: SELENIUM FRAMEWORK TUTORIAL This appendix is a tutorial about implementing the Selenium framework for black-box testing at user level. It also contains code examples on how to use Selenium.
Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI)
Sonatype CLM Enforcement Points - Continuous Integration (CI) i Sonatype CLM Enforcement Points - Continuous Integration (CI) Sonatype CLM Enforcement Points - Continuous Integration (CI) ii Contents 1
CS 1133, LAB 2: FUNCTIONS AND TESTING http://www.cs.cornell.edu/courses/cs1133/2015fa/labs/lab02.pdf
CS 1133, LAB 2: FUNCTIONS AND TESTING http://www.cs.cornell.edu/courses/cs1133/2015fa/labs/lab02.pdf First Name: Last Name: NetID: The purpose of this lab is to help you to better understand functions:
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres
FORENSIC ANALYSIS OF USB MEDIA EVIDENCE Jesús Alexander García Luis Alejandro Franco Juan David Urrea Carlos Alfonso Torres Manuel Fernando Gutiérrez UPB 2012 Content INTRODUCTION... 3 OBJECTIVE 4 EVIDENCE
Worksheet for Teaching Module Probability (Lesson 1)
Worksheet for Teaching Module Probability (Lesson 1) Topic: Basic Concepts and Definitions Equipment needed for each student 1 computer with internet connection Introduction In the regular lectures in
Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com
SAINT Integrated Network Vulnerability Scanning and Penetration Testing www.saintcorporation.com Introduction While network vulnerability scanning is an important tool in proactive network security, penetration
Merkle Hash Trees for Distributed Audit Logs
Merkle Hash Trees for Distributed Audit Logs Subject proposed by Karthikeyan Bhargavan [email protected] April 7, 2015 Modern distributed systems spread their databases across a large number
Finding Liveness Errors with ACO
Hong Kong, June 1-6, 2008 1 / 24 Finding Liveness Errors with ACO Francisco Chicano and Enrique Alba Motivation Motivation Nowadays software is very complex An error in a software system can imply the
Data Networks Project 2: Design Document for Intra-Domain Routing Protocols
Data Networks Project 2: Design Document for Intra-Domain Routing Protocols Assigned: Wed, 30 May 2007 Due: 11:59pm, Wed, 20 June 2007 1 Introduction You have just joined Bisco Systems, a networking equipment
Simba XMLA Provider for Oracle OLAP 2.0. Linux Administration Guide. Simba Technologies Inc. April 23, 2013
Simba XMLA Provider for Oracle OLAP 2.0 April 23, 2013 Simba Technologies Inc. Copyright 2013 Simba Technologies Inc. All Rights Reserved. Information in this document is subject to change without notice.
Waspmote IDE. User Guide
Waspmote IDE User Guide Index Document Version: v4.1-01/2014 Libelium Comunicaciones Distribuidas S.L. INDEX 1. Introduction... 3 1.1. New features...3 1.2. Other notes...3 2. Installation... 4 2.1. Windows...4
Effective Java Programming. measurement as the basis
Effective Java Programming measurement as the basis Structure measurement as the basis benchmarking micro macro profiling why you should do this? profiling tools Motto "We should forget about small efficiencies,
THE BUSINESS VALUE OF AN ERP SYSTEM
THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG THE BUSINESS VALUE OF AN ERP SYSTEM AJMAL BEG ii Copyright c 2010 by Ajmal Beg. All rights reserved. This technology described in this publication is based
Server Configuration and Deployment (part 1) Lotus Foundations Essentials
Server Configuration and Deployment (part 1) Lab Manual Lotus Foundations Essentials Introduction: In this lab, students will configure an IBM Lotus Foundations server using a virtual image to perform
Performance Monitoring API for Java Enterprise Applications
Performance Monitoring API for Java Enterprise Applications Purpose Perfmon4j has been successfully deployed in hundreds of production java systems over the last 5 years. It has proven to be a highly successful
