COSE312: Compilers. Lecture 5 Lexical Analysis (4)

Size: px
Start display at page:

Download "COSE312: Compilers. Lecture 5 Lexical Analysis (4)"

Transcription

1 COSE312: Compilers Lecture 5 Lexical Analysis (4) Hakjoo Oh 2017 Spring Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

2 Part 3: Automation Transform the lexical specification into an executable string recognizers: Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

3 From NFA to DFA Transform an NFA into an equivalent DFA (N, Σ, δ N, n 0, N A ) (D, Σ, δ D, d 0, D A ). Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

4 From NFA to DFA Transform an NFA into an equivalent DFA (N, Σ, δ N, n 0, N A ) (D, Σ, δ D, d 0, D A ). Running example: a start b 5 6 c Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

5 -Closures -closure(i): the set of states reachable from I without consuming any symbols. a start b 5 6 c closure({1}) = {1, 2, 3, 4, 6, 9} -closure({1, 5}) = {1, 2, 3, 4, 6, 9} {3, 4, 5, 6, 8, 9} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

6 Subset Construction Input: an NFA (N, Σ, δ N, n 0, N A ). Output: a DFA (D, Σ, δ D, d 0, D A ). Key Idea: the DFA simulates the NFA by considering every possibility at once. A DFA state d D is a set of NFA state, i.e., d N. Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

7 Running Example (1/5) The initial DFA state d 0 = -closure({0}) = {0}. start {0} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

8 Running Example (2/5) For the initial state S, consider every x Σ and compute the corresponding next states: -closure( δ(s, a)). s S Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

9 Running Example (2/5) For the initial state S, consider every x Σ and compute the corresponding next states: -closure( δ(s, a)). s S -closure( s {0} δ(s, a)) = {1, 2, 3, 4, 6, 9} -closure( s {0} δ(s, b)) = -closure( s {0} δ(s, c)) = start {0} a {1, 2, 3, 4, 6, 9} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

10 Running Example (3/5) For the state {1, 2, 3, 4, 6, 9}, compute the next states: -closure( s {1,2,3,4,6,9} δ(s, a)) = -closure( s {1,2,3,4,6,9} δ(s, b)) = {3, 4, 5, 6, 8, 9} -closure( s {1,2,3,4,6,9} δ(s, c)) = {3, 4, 6, 7, 8, 9} b {3, 4, 5, 6, 8, 9} start {0} a {1, 2, 3, 4, 6, 9} c {3, 4, 6, 7, 8, 9} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

11 Running Example (4/5) Compute the next states of {3, 4, 5, 6, 8, 9}: -closure( s {3,4,5,6,8,9} δ(s, a)) = -closure( s {3,4,5,6,8,9} δ(s, b)) = {3, 4, 5, 6, 8, 9} -closure( s {3,4,5,6,8,9} δ(s, c)) = {3, 4, 6, 7, 8, 9} b {3, 4, 5, 6, 8, 9} b start {0} a {1, 2, 3, 4, 6, 9} c c {3, 4, 6, 7, 8, 9} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

12 Running Example (5/5) Compute the next states of {3, 4, 6, 7, 8, 9}: -closure( s {3,4,6,7,8,9} δ(s, a)) = -closure( s {3,4,6,7,8,9} δ(s, b)) = {3, 4, 5, 6, 8, 9} -closure( s {3,4,6,7,8,9} δ(s, c)) = {3, 4, 6, 7, 8, 9} b {3, 4, 5, 6, 8, 9} b start {0} a {1, 2, 3, 4, 6, 9} c b c {3, 4, 6, 7, 8, 9} c Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

13 Subset Construction Algorithm Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

14 Running Example (1/5) a start b 5 6 c The initial state d 0 = -closure({0}) = {0}. Initialize D and W : D = {{0}}, W = {{0}} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

15 Running Example (2/5) Choose q = {0} from W. For all c Σ, update δ D : Update D and W : a b c {0} {1, 2, 3, 4, 6, 9} D = {{0}, {1, 2, 3, 4, 6, 9}}, W = {{1, 2, 3, 4, 6, 9}} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

16 Running Example (3/5) Choose q = {1, 2, 3, 4, 6, 9} from W. For all c Σ, update δ D : a b c {0} {1, 2, 3, 4, 6, 9} {1, 2, 3, 4, 6, 9} {3, 4, 5, 6, 8, 9} {3, 4, 6, 7, 8, 9} Update D and W : D = {{0}, {1, 2, 3, 4, 6, 9}, {3, 4, 5, 6, 8, 9}, {3, 4, 6, 7, 8, 9}} W = {{3, 4, 5, 6, 8, 9}, {3, 4, 6, 7, 8, 9}} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

17 Running Example (4/5) Choose q = {3, 4, 5, 6, 8, 9} from W. For all c Σ, update δ D : a b c {0} {1, 2, 3, 4, 6, 9} {1, 2, 3, 4, 6, 9} {3, 4, 5, 6, 8, 9} {3, 4, 6, 7, 8, 9} {3, 4, 5, 6, 8, 9} {3, 4, 5, 6, 8, 9} {3, 4, 6, 7, 8, 9} D and W : D = {{0}, {1, 2, 3, 4, 6, 9}, {3, 4, 5, 6, 8, 9}, {3, 4, 6, 7, 8, 9}} W = {{3, 4, 6, 7, 8, 9}} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

18 Running Example (5/5) Choose q = {3, 4, 6, 7, 8, 9} from W. For all c Σ, update δ D : a b c {0} {1, 2, 3, 4, 6, 9} {1, 2, 3, 4, 6, 9} {3, 4, 5, 6, 8, 9} {3, 4, 6, 7, 8, 9} {3, 4, 5, 6, 8, 9} {3, 4, 5, 6, 8, 9} {3, 4, 6, 7, 8, 9} {3, 4, 6, 7, 8, 9} {3, 4, 5, 6, 8, 9} {3, 4, 6, 7, 8, 9} D and W : D = {{0}, {1, 2, 3, 4, 6, 9}, {3, 4, 5, 6, 8, 9}, {3, 4, 6, 7, 8, 9}} W = The while loop terminates. The accepting states: D A = {{1, 2, 3, 4, 6, 9}, {3, 4, 5, 6, 8, 9}, {3, 4, 6, 7, 8, 9}} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

19 Algorithm for computing -Closures The definition -closure(i) is the set of states reachable from I without consuming any symbols. is neither formal nor constructive. Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

20 Algorithm for computing -Closures The definition -closure(i) is the set of states reachable from I without consuming any symbols. is neither formal nor constructive. A formal definition: T = -closure(i) is the smallest set such that I δ(s, ) T. s T Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

21 Algorithm for computing -Closures The definition -closure(i) is the set of states reachable from I without consuming any symbols. is neither formal nor constructive. A formal definition: T = -closure(i) is the smallest set such that I δ(s, ) T. s T Alternatively, T is the smallest solution of the equation where F (X) (X) F (X) = I s X δ(s, ). Such a solution is called the least fixed point of F. Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

22 Fixed Point Iteration The least fixed point of a function can be computed by the fixed point iteration: T = repeat T = T T = T F (T ) until T = T Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

23 Example a start b 5 6 c closure({1}): Iteration T T 1 {1} 2 {1} {1, 2} 3 {1, 2} {1, 2, 3, 9} 4 {1, 2, 3, 9} {1, 2, 3, 4, 6, 9} 5 {1, 2, 3, 4, 6, 9} {1, 2, 3, 4, 6, 9} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

24 Summary Key concepts in lexical analsis: Specification: Regular expressions Implementation: Deterministic Finite Automata Translation (homework 1) Next class: OCaml programming tutorial by TAs. Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20

Computability. What can be computed?

Computability. What can be computed? Computability What can be computed? Computability What can be computed? read/write tape 0 1 1 0 control Computability What can be computed? read/write tape 0 1 1 0 control Computability What can be computed?

More information

Advanced Automata Theory 4 Games

Advanced Automata Theory 4 Games Advanced Automata Theory 4 Games Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata Theory 4 Games p. 1 Repetition

More information

Turing Machines (TM)

Turing Machines (TM) 1 Introduction Turing Machines (TM) Jay Bagga A Turing Machine (TM) is a powerful model which represents a general purpose computer. The Church-Turing thesis states that our intuitive notion of algorithms

More information

CITS2211 Discrete Structures Turing Machines

CITS2211 Discrete Structures Turing Machines CITS2211 Discrete Structures Turing Machines October 23, 2017 Highlights We have seen that FSMs and PDAs are surprisingly powerful But there are some languages they can not recognise We will study a new

More information

Implementation of Recursively Enumerable Languages in Universal Turing Machine

Implementation of Recursively Enumerable Languages in Universal Turing Machine Implementation of Recursively Enumerable Languages in Universal Turing Machine Sumitha C.H, Member, ICMLC and Krupa Ophelia Geddam Abstract This paper presents the design and working of a Universal Turing

More information

Regular Expressions and Regular Languages. BBM Automata Theory and Formal Languages 1

Regular Expressions and Regular Languages. BBM Automata Theory and Formal Languages 1 Regular Expressions and Regular Languages BBM 401 - Automata Theory and Formal Languages 1 Operations on Languages Remember: A language is a set of strings Union: Concatenation: Powers: Kleene Closure:

More information

DVA325 Formal Languages, Automata and Models of Computation (FABER)

DVA325 Formal Languages, Automata and Models of Computation (FABER) DVA325 Formal Languages, Automata and Models of Computation (FABER) Lecture 1 - Introduction School of Innovation, Design and Engineering Mälardalen University 11 November 2014 Abu Naser Masud FABER November

More information

A Learning System for a Computational Science Related Topic

A Learning System for a Computational Science Related Topic Available online at www.sciencedirect.com Procedia Computer Science 9 (2012 ) 1763 1772 International Conference on Computational Science, ICCS 2012 A Learning System for a Computational Science Related

More information

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTER SCIENCE AND ENGINEERING DEPARTMENT OF CSE COURSE PLAN Course Code : CS0204 Course Title : Theory of Computation Semester : IV Course

More information

How Much Memory is Needed to Win in Partial-Observation Games

How Much Memory is Needed to Win in Partial-Observation Games How Much Memory is Needed to Win in Partial-Observation Games Laurent Doyen LSV, ENS Cachan & CNRS & Krishnendu Chatterjee IST Austria GAMES 11 How Much Memory is Needed to Win in Partial-Observation Games

More information

Automata and Formal Languages - CM0081 Turing Machines

Automata and Formal Languages - CM0081 Turing Machines Automata and Formal Languages - CM0081 Turing Machines Andrés Sicard-Ramírez Universidad EAFIT Semester 2018-1 Turing Machines Alan Mathison Turing (1912 1954) Automata and Formal Languages - CM0081. Turing

More information

JNTUH COLLEGE OF ENGINEERING, HYDERABAD (AUTONOMOUS) III Year B.Tech. I semester (Regular / Supply) EXAMINATIONS, NOVEMBER 2014 REVALUATION RESULTS

JNTUH COLLEGE OF ENGINEERING, HYDERABAD (AUTONOMOUS) III Year B.Tech. I semester (Regular / Supply) EXAMINATIONS, NOVEMBER 2014 REVALUATION RESULTS III Year B.Tech. I semester (Regular / Supply) EXAMINATIONS, NOVEMBER 2014 1 11011M2209 Optimization Techniques NO- 3 09011A0159 CIVIL Concrete Technology NO- 4 12011A0110 CIVIL RC Structural Desing and

More information

Technical framework of Operating System using Turing Machines

Technical framework of Operating System using Turing Machines Reviewed Paper Technical framework of Operating System using Turing Machines Paper ID IJIFR/ V2/ E2/ 028 Page No 465-470 Subject Area Computer Science Key Words Turing, Undesirability, Complexity, Snapshot

More information

Forward and backward DAWG matching. Slobodan Petrović

Forward and backward DAWG matching. Slobodan Petrović Forward and backward DAWG matching Slobodan Petrović 08.10.2013 Contents Introduction Forward DAWG matching (FDM) Backward DAWG matching (BDM) 2/29 Introduction A DAWG (Directed Acyclic Word Graph) representation

More information

of the hypothesis, but it would not lead to a proof. P 1

of the hypothesis, but it would not lead to a proof. P 1 Church-Turing thesis The intuitive notion of an effective procedure or algorithm has been mentioned several times. Today the Turing machine has become the accepted formalization of an algorithm. Clearly

More information

Multiple : The product of a given whole number and another whole number. For example, some multiples of 3 are 3, 6, 9, and 12.

Multiple : The product of a given whole number and another whole number. For example, some multiples of 3 are 3, 6, 9, and 12. 1.1 Factor (divisor): One of two or more whole numbers that are multiplied to get a product. For example, 1, 2, 3, 4, 6, and 12 are factors of 12 1 x 12 = 12 2 x 6 = 12 3 x 4 = 12 Factors are also called

More information

Gilbert Peterson and Diane J. Cook University of Texas at Arlington Box 19015, Arlington, TX

Gilbert Peterson and Diane J. Cook University of Texas at Arlington Box 19015, Arlington, TX DFA Learning of Opponent Strategies Gilbert Peterson and Diane J. Cook University of Texas at Arlington Box 19015, Arlington, TX 76019-0015 Email: {gpeterso,cook}@cse.uta.edu Abstract This work studies

More information

3.4 The Single-Loop Circuit Single-loop circuits

3.4 The Single-Loop Circuit Single-loop circuits 25 3.4 The Single-Loop Circuit Single-loop circuits Elements are connected in series All elements carry the same current We shall determine The current through each element The voltage across each element

More information

It is important that you show your work. The total value of this test is 220 points.

It is important that you show your work. The total value of this test is 220 points. June 27, 2001 Your name It is important that you show your work. The total value of this test is 220 points. 1. (10 points) Use the Euclidean algorithm to solve the decanting problem for decanters of sizes

More information

EECE251 Circuit Analysis I Lecture Integrated Program Set 2: Methods of Circuit Analysis

EECE251 Circuit Analysis I Lecture Integrated Program Set 2: Methods of Circuit Analysis EECE251 Circuit Analysis I Lecture Integrated Program Set 2: Methods of Circuit Analysis Shahriar Mirabbasi Department of Electrical and Computer Engineering University of British Columbia shahriar@ece.ubc.ca

More information

International Journal of Computer Sciences and Engineering. Research Paper Volume-5, Issue-5 E-ISSN:

International Journal of Computer Sciences and Engineering. Research Paper Volume-5, Issue-5 E-ISSN: International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-5, Issue-5 E-ISSN: 2347-2693 Snakes and Stairs Game Design using Automata Theory N. Raj 1*, R. Dubey 2 1 Dept.

More information

Automatic Enumeration and Random Generation for pattern-avoiding Permutation Classes

Automatic Enumeration and Random Generation for pattern-avoiding Permutation Classes Automatic Enumeration and Random Generation for pattern-avoiding Permutation Classes Adeline Pierrot Institute of Discrete Mathematics and Geometry, TU Wien (Vienna) Permutation Patterns 2014 Joint work

More information

You Should Be Scared of German Ghost

You Should Be Scared of German Ghost [DOI: 10.2197/ipsjjip.23.293] Regular Paper You Should Be Scared of German Ghost Erik D. Demaine 1,a) Fermi Ma 1,b) Matthew Susskind 1,c) Erik Waingarten 1,d) Received: August 1, 2014, Accepted: January

More information

Introduction To Automata Theory Languages And Computation Addison Wesley Series In Computer Science

Introduction To Automata Theory Languages And Computation Addison Wesley Series In Computer Science Introduction To Automata Theory Languages And Computation Addison Wesley Series In Computer Science INTRODUCTION TO AUTOMATA THEORY LANGUAGES AND COMPUTATION ADDISON WESLEY SERIES IN COMPUTER SCIENCE PDF

More information

TOPOLOGY, LIMITS OF COMPLEX NUMBERS. Contents 1. Topology and limits of complex numbers 1

TOPOLOGY, LIMITS OF COMPLEX NUMBERS. Contents 1. Topology and limits of complex numbers 1 TOPOLOGY, LIMITS OF COMPLEX NUMBERS Contents 1. Topology and limits of complex numbers 1 1. Topology and limits of complex numbers Since we will be doing calculus on complex numbers, not only do we need

More information

Warm-Up. Complete the second homework worksheet (the one you didn t do yesterday). Please begin working on FBF010 and FBF011.

Warm-Up. Complete the second homework worksheet (the one you didn t do yesterday). Please begin working on FBF010 and FBF011. Warm-Up Complete the second homework worksheet (the one you didn t do yesterday). Please begin working on FBF010 and FBF011. You have 20 minutes at the beginning of class to work on these three tasks.

More information

Outline. In One Slide. LR Parsing. LR Parsing. No Stopping The Parsing! Bottom-Up Parsing. LR(1) Parsing Tables #2

Outline. In One Slide. LR Parsing. LR Parsing. No Stopping The Parsing! Bottom-Up Parsing. LR(1) Parsing Tables #2 LR Parsing Bottom-Up Parsing #1 Outline No Stopping The Parsing! Bottom-Up Parsing LR Parsing Shift and Reduce LR(1) Parsing Algorithm LR(1) Parsing Tables #2 In One Slide An LR(1) parser reads tokens

More information

Exploring Finite State Automata with Junun Robots: A Case Study in Computability Theory

Exploring Finite State Automata with Junun Robots: A Case Study in Computability Theory Int'l Conf. Frontiers in Education: CS and CE FECS'15 3 Exploring Finite State Automata with Junun Robots: A Case Study in Computability Theory Vladimir Kulyukin Sarat Kiran Andhavarapu Melodi Oliver Christopher

More information

Simple Search Algorithms

Simple Search Algorithms Lecture 3 of Artificial Intelligence Simple Search Algorithms AI Lec03/1 Topics of this lecture Random search Search with closed list Search with open list Depth-first and breadth-first search again Uniform-cost

More information

Patterns and random permutations II

Patterns and random permutations II Patterns and random permutations II Valentin Féray (joint work with F. Bassino, M. Bouvel, L. Gerin, M. Maazoun and A. Pierrot) Institut für Mathematik, Universität Zürich Summer school in Villa Volpi,

More information

Towards Verification of a Service Orchestration Language. Tan Tian Huat

Towards Verification of a Service Orchestration Language. Tan Tian Huat Towards Verification of a Service Orchestration Language Tan Tian Huat 1 Outline Background of Orc Motivation of Verifying Orc Overview of Orc Language Verification using PAT Future Works 2 Outline Background

More information

UCSD CSE 21, Spring 2014 [Section B00] Mathematics for Algorithm and System Analysis

UCSD CSE 21, Spring 2014 [Section B00] Mathematics for Algorithm and System Analysis UCSD CSE 21, Spring 2014 [Section B00] Mathematics for Algorithm and System Analysis Lecture 3 Class URL: http://vlsicad.ucsd.edu/courses/cse21-s14/ Lecture 3 Notes Goal for today: CL Section 3 Subsets,

More information

Explain mathematically how a voltage that is applied to resistors in series is distributed among the resistors.

Explain mathematically how a voltage that is applied to resistors in series is distributed among the resistors. Objective of Lecture Explain mathematically how a voltage that is applied to resistors in series is distributed among the resistors. Chapter.5 in Fundamentals of Electric Circuits Chapter 5.7 Electric

More information

Electrical Circuits I (ENGR 2405) Chapter 2 Ohm s Law, KCL, KVL, Resistors in Series/Parallel

Electrical Circuits I (ENGR 2405) Chapter 2 Ohm s Law, KCL, KVL, Resistors in Series/Parallel Electrical Circuits I (ENG 2405) Chapter 2 Ohm s Law, KCL, KVL, esistors in Series/Parallel esistivity Materials tend to resist the flow of electricity through them. This property is called resistance

More information

Universiteit Leiden Opleiding Informatica

Universiteit Leiden Opleiding Informatica Universiteit Leiden Opleiding Informatica An Analysis of Dominion Name: Roelof van der Heijden Date: 29/08/2014 Supervisors: Dr. W.A. Kosters (LIACS), Dr. F.M. Spieksma (MI) BACHELOR THESIS Leiden Institute

More information

Computing Permutations with Stacks and Deques

Computing Permutations with Stacks and Deques Michael Albert 1 Mike Atkinson 1 Steve Linton 2 1 Department of Computer Science, University of Otago 2 School of Computer Science, University of St Andrews 7th Australia New Zealand Mathematics Convention

More information

code V(n,k) := words module

code V(n,k) := words module Basic Theory Distance Suppose that you knew that an English word was transmitted and you had received the word SHIP. If you suspected that some errors had occurred in transmission, it would be impossible

More information

CDT314 FABER Formal Languages, Automata and Models of Computation MARK BURGIN INDUCTIVE TURING MACHINES

CDT314 FABER Formal Languages, Automata and Models of Computation MARK BURGIN INDUCTIVE TURING MACHINES CDT314 FABER Formal Languages, Automata and Models of Computation MARK BURGIN INDUCTIVE TURING MACHINES 2012 1 Inductive Turing Machines Burgin, M. Inductive Turing Machines, Notices of the Academy of

More information

ECE 201, Section 3 Lecture 12. Prof. Peter Bermel September 17, 2012

ECE 201, Section 3 Lecture 12. Prof. Peter Bermel September 17, 2012 ECE 201, Section 3 Lecture 12 Prof. Peter ermel September 17, 2012 Exam #1: Thursday, Sep. 20 6:307:30 pm Most of you will be in WTHR 200, unless told otherwise Review session tonight at 8 pm (MTH 175)

More information

Distance-Vector Routing

Distance-Vector Routing Distance-Vector Routing Antonio Carzaniga Faculty of Informatics University of Lugano June 8, 2007 c 2005 2007 Antonio Carzaniga 1 Recap on link-state routing Distance-vector routing Bellman-Ford equation

More information

Lecture 2. 1 Nondeterministic Communication Complexity

Lecture 2. 1 Nondeterministic Communication Complexity Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols

More information

In this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics:

In this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics: In this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics: Links between Digital and Analogue Serial vs Parallel links Flow control

More information

MAT 115: Finite Math for Computer Science Problem Set 5

MAT 115: Finite Math for Computer Science Problem Set 5 MAT 115: Finite Math for Computer Science Problem Set 5 Out: 04/10/2017 Due: 04/17/2017 Instructions: I leave plenty of space on each page for your computation. If you need more sheet, please attach your

More information

Tablatures for Stringed Instruments and Generating Functions

Tablatures for Stringed Instruments and Generating Functions Tablatures for Stringed Instruments and enerating Functions avide accherini, onatella Merlini, and Renzo Sprugnoli ipartimento di Sistemi e Informatica viale Morgagni 65, 50134, Firenze, Italia, [baccherini,merlini,sprugnoli]@dsi.unifi.it

More information

Basic Science for Software Developers

Basic Science for Software Developers Basic Science for Software Developers David Lorge Parnas, P.Eng. Michael Soltys Department of Computing and Software Faculty of Engineering McMaster University, Hamilton, Ontario, Canada - L8S 4K1 1 Introduction

More information

Spring 06 Assignment 2: Constraint Satisfaction Problems

Spring 06 Assignment 2: Constraint Satisfaction Problems 15-381 Spring 06 Assignment 2: Constraint Satisfaction Problems Questions to Vaibhav Mehta(vaibhav@cs.cmu.edu) Out: 2/07/06 Due: 2/21/06 Name: Andrew ID: Please turn in your answers on this assignment

More information

Know how to represent permutations in the two rowed notation, and how to multiply permutations using this notation.

Know how to represent permutations in the two rowed notation, and how to multiply permutations using this notation. The third exam will be on Monday, November 21, 2011. It will cover Sections 5.1-5.5. Of course, the material is cumulative, and the listed sections depend on earlier sections, which it is assumed that

More information

CSE 355: Human-aware Robo.cs Introduction to Theoretical Computer Science

CSE 355: Human-aware Robo.cs Introduction to Theoretical Computer Science CSE 355: Introduction to Theoretical Computer Science Instructor: Dr. Yu ( Tony ) Zhang Lecture: WGHL101, Tue/Thu, 3:00 4:15 PM Office Hours: BYENG 594, Tue/Thu, 5:00 6:00PM 1 Subject of interest? 2 Robo.cs

More information

Final Exam, Math 6105

Final Exam, Math 6105 Final Exam, Math 6105 SWIM, June 29, 2006 Your name Throughout this test you must show your work. 1. Base 5 arithmetic (a) Construct the addition and multiplication table for the base five digits. (b)

More information

LECTURE 26: GAME THEORY 1

LECTURE 26: GAME THEORY 1 15-382 COLLECTIVE INTELLIGENCE S18 LECTURE 26: GAME THEORY 1 INSTRUCTOR: GIANNI A. DI CARO ICE-CREAM WARS http://youtu.be/jilgxenbk_8 2 GAME THEORY Game theory is the formal study of conflict and cooperation

More information

Verification and Validation for Safety in Robots Kerstin Eder

Verification and Validation for Safety in Robots Kerstin Eder Verification and Validation for Safety in Robots Kerstin Eder Design Automation and Verification Trustworthy Systems Laboratory Verification and Validation for Safety in Robots, Bristol Robotics Laboratory

More information

Resistors in Series or in Parallel

Resistors in Series or in Parallel Resistors in Series or in Parallel Key Terms series parallel Resistors in Series In a circuit that consists of a single bulb and a battery, the potential difference across the bulb equals the terminal

More information

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow

More information

Cardinality revisited

Cardinality revisited Cardinality revisited A set is finite (has finite cardinality) if its cardinality is some (finite) integer n. Two sets A,B have the same cardinality iff there is a one-to-one correspondence from A to B

More information

How to Gamble Against All Odds

How to Gamble Against All Odds How to Gamble Against All Odds Gilad Bavly 1 Ron Peretz 2 1 Bar-Ilan University 2 London School of Economics Heidelberg, June 2015 How to Gamble Against All Odds 1 Preface starting with an algorithmic

More information

3. Voltage and Current laws

3. Voltage and Current laws 1 3. Voltage and Current laws 3.1 Node, Branches, and loops A branch represents a single element such as a voltage source or a resistor A node is the point of the connection between two or more elements

More information

Finite and Infinite Sets

Finite and Infinite Sets Finite and Infinite Sets MATH 464/506, Real Analysis J. Robert Buchanan Department of Mathematics Summer 2007 Basic Definitions Definition The empty set has 0 elements. If n N, a set S is said to have

More information

Timed Games UPPAAL-TIGA. Alexandre David

Timed Games UPPAAL-TIGA. Alexandre David Timed Games UPPAAL-TIGA Alexandre David 1.2.05 Overview Timed Games. Algorithm (CONCUR 05). Strategies. Code generation. Architecture of UPPAAL-TIGA. Interactive game. Timed Games with Partial Observability.

More information

Introduction to Game Theory

Introduction to Game Theory Introduction to Game Theory (From a CS Point of View) Olivier Serre Serre@irif.fr IRIF (CNRS & Université Paris Diderot Paris 7) 14th of September 2017 Master Parisien de Recherche en Informatique Who

More information

Building a Safe Care-Providing Robot

Building a Safe Care-Providing Robot 2011 IEEE International Conference on Rehabilitation Robotics Rehab Week Zurich, ETH Zurich Science City, Switzerland, June 29 - July 1, 2011 Building a Safe Care-Providing Robot Leila Fotoohi Automation

More information

I am very pleased to teach this class again, after last year s course on electronics over the Summer Term. Based on the SOLE survey result, it is clear that the format, style and method I used worked with

More information

10703 Deep Reinforcement Learning and Control

10703 Deep Reinforcement Learning and Control 10703 Deep Reinforcement Learning and Control Russ Salakhutdinov Slides borrowed from Katerina Fragkiadaki Solving known MDPs: Dynamic Programming Markov Decision Process (MDP)! A Markov Decision Process

More information

Course Outline. Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004.

Course Outline. Textbook: G. Michael Schneider and Judith L. Gersting, Invitation to Computer Science C++ Version, 3rd Edition, Thomson, 2004. 2005/Sep/12 1 Course Outline Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004. Outline 1. The Algorithm Foundations of Computer

More information

CS 457 Lecture 16 Routing Continued. Spring 2010

CS 457 Lecture 16 Routing Continued. Spring 2010 CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing

More information

4. Let U = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}, X = {2, 3, 4}, Y = {1, 4, 5}, Z = {2, 5, 7}. Find a) (X Y) b) X Y c) X (Y Z) d) (X Y) Z

4. Let U = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}, X = {2, 3, 4}, Y = {1, 4, 5}, Z = {2, 5, 7}. Find a) (X Y) b) X Y c) X (Y Z) d) (X Y) Z Exercises 1. Write formal descriptions of the following sets. a) The set containing the numbers 1, 10, and 100 b) The set containing all integers that are greater than 5 c) The set containing all natural

More information

3-2 Lecture 3: January Repeated Games A repeated game is a standard game which isplayed repeatedly. The utility of each player is the sum of

3-2 Lecture 3: January Repeated Games A repeated game is a standard game which isplayed repeatedly. The utility of each player is the sum of S294-1 Algorithmic Aspects of Game Theory Spring 2001 Lecturer: hristos Papadimitriou Lecture 3: January 30 Scribes: Kris Hildrum, ror Weitz 3.1 Overview This lecture expands the concept of a game by introducing

More information

Recurrent neural networks Modelling sequential data. MLP Lecture 9 Recurrent Networks 1

Recurrent neural networks Modelling sequential data. MLP Lecture 9 Recurrent Networks 1 Recurrent neural networks Modelling sequential data MLP Lecture 9 Recurrent Networks 1 Recurrent Networks Steve Renals Machine Learning Practical MLP Lecture 9 16 November 2016 MLP Lecture 9 Recurrent

More information

Spring 06 Assignment 2: Constraint Satisfaction Problems

Spring 06 Assignment 2: Constraint Satisfaction Problems 15-381 Spring 06 Assignment 2: Constraint Satisfaction Problems Questions to Vaibhav Mehta(vaibhav@cs.cmu.edu) Out: 2/07/06 Due: 2/21/06 Name: Andrew ID: Please turn in your answers on this assignment

More information

Comparison of the NIST and NRC Josephson Voltage Standards (SIM.EM.BIPM-K10.b)

Comparison of the NIST and NRC Josephson Voltage Standards (SIM.EM.BIPM-K10.b) Comparison of the NIST and Josephson Voltage Standards (SIM.EM.BIPM-K10.b) Yi-hua Tang National Institute of Standards and Technology (NIST) Gaithersburg, MD 0899, USA Telephone: + (301) 975-4691, email:

More information

Lecture 4&5 CMOS Circuits

Lecture 4&5 CMOS Circuits Lecture 4&5 CMOS Circuits Xuan Silvia Zhang Washington University in St. Louis http://classes.engineering.wustl.edu/ese566/ Worst-Case V OL 2 3 Outline Combinational Logic (Delay Analysis) Sequential Circuits

More information

Pattern Avoidance in Poset Permutations

Pattern Avoidance in Poset Permutations Pattern Avoidance in Poset Permutations Sam Hopkins and Morgan Weiler Massachusetts Institute of Technology and University of California, Berkeley Permutation Patterns, Paris; July 5th, 2013 1 Definitions

More information

Distributed supervisory control for a system of path-network sharing mobile robots

Distributed supervisory control for a system of path-network sharing mobile robots 1 Distributed supervisory control for a system of path-network sharing mobile robots Elżbieta Roszkowska Bogdan Kreczmer Adam Borkowski Michał Gnatowski The Institute of Computer Engineering, Control and

More information

Regret Minimization in Games with Incomplete Information

Regret Minimization in Games with Incomplete Information Regret Minimization in Games with Incomplete Information Martin Zinkevich maz@cs.ualberta.ca Michael Bowling Computing Science Department University of Alberta Edmonton, AB Canada T6G2E8 bowling@cs.ualberta.ca

More information

Traffic Control for a Swarm of Robots: Avoiding Group Conflicts

Traffic Control for a Swarm of Robots: Avoiding Group Conflicts Traffic Control for a Swarm of Robots: Avoiding Group Conflicts Leandro Soriano Marcolino and Luiz Chaimowicz Abstract A very common problem in the navigation of robotic swarms is when groups of robots

More information

Computer Science and Philosophy Information Sheet for entry in 2018

Computer Science and Philosophy Information Sheet for entry in 2018 Computer Science and Philosophy Information Sheet for entry in 2018 Artificial intelligence (AI), logic, robotics, virtual reality: fascinating areas where Computer Science and Philosophy meet. There are

More information

arxiv: v2 [math.gm] 31 Dec 2017

arxiv: v2 [math.gm] 31 Dec 2017 New results on the stopping time behaviour of the Collatz 3x + 1 function arxiv:1504.001v [math.gm] 31 Dec 017 Mike Winkler Fakultät für Mathematik Ruhr-Universität Bochum, Germany mike.winkler@ruhr-uni-bochum.de

More information

Lecture 3 Presentations and more Great Groups

Lecture 3 Presentations and more Great Groups Lecture Presentations and more Great Groups From last time: A subset of elements S G with the property that every element of G can be written as a finite product of elements of S and their inverses is

More information

Pin-Permutations and Structure in Permutation Classes

Pin-Permutations and Structure in Permutation Classes and Structure in Permutation Classes Frédérique Bassino Dominique Rossin Journées de Combinatoire de Bordeaux, feb. 2009 liafa Main result of the talk Conjecture[Brignall, Ruškuc, Vatter]: The pin-permutation

More information

Chapter 6. The Production Function. Production Jargon. Production

Chapter 6. The Production Function. Production Jargon. Production Chapter 6 Production The Production Function A production function tells us the maximum output a firm can produce (in a given period) given available inputs. It is the economist s way of describing technology

More information

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 2012

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 2012 Game Theory Lecture Notes By Y. Narahari Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 01 Rationalizable Strategies Note: This is a only a draft version,

More information

Lecture 7: The Principle of Deferred Decisions

Lecture 7: The Principle of Deferred Decisions Randomized Algorithms Lecture 7: The Principle of Deferred Decisions Sotiris Nikoletseas Professor CEID - ETY Course 2017-2018 Sotiris Nikoletseas, Professor Randomized Algorithms - Lecture 7 1 / 20 Overview

More information

Problem 2A Consider 101 natural numbers not exceeding 200. Prove that at least one of them is divisible by another one.

Problem 2A Consider 101 natural numbers not exceeding 200. Prove that at least one of them is divisible by another one. 1. Problems from 2007 contest Problem 1A Do there exist 10 natural numbers such that none one of them is divisible by another one, and the square of any one of them is divisible by any other of the original

More information

Multiplayer Pushdown Games. Anil Seth IIT Kanpur

Multiplayer Pushdown Games. Anil Seth IIT Kanpur Multiplayer Pushdown Games Anil Seth IIT Kanpur Multiplayer Games we Consider These games are played on graphs (finite or infinite) Generalize two player infinite games. Any number of players are allowed.

More information

Lecture 2: Problem Formulation

Lecture 2: Problem Formulation 1. Problem Solving What is a problem? Lecture 2: Problem Formulation A goal and a means for achieving the goal The goal specifies the state of affairs we want to bring about The means specifies the operations

More information

Class 8: Factors and Multiples (Lecture Notes)

Class 8: Factors and Multiples (Lecture Notes) Class 8: Factors and Multiples (Lecture Notes) If a number a divides another number b exactly, then we say that a is a factor of b and b is a multiple of a. Factor: A factor of a number is an exact divisor

More information

Convexity Invariants of the Hoop Closure on Permutations

Convexity Invariants of the Hoop Closure on Permutations Convexity Invariants of the Hoop Closure on Permutations Robert E. Jamison Retired from Discrete Mathematics Clemson University now in Asheville, NC Permutation Patterns 12 7 11 July, 2014 Eliakim Hastings

More information

CPCS 222 Discrete Structures I Counting

CPCS 222 Discrete Structures I Counting King ABDUL AZIZ University Faculty Of Computing and Information Technology CPCS 222 Discrete Structures I Counting Dr. Eng. Farag Elnagahy farahelnagahy@hotmail.com Office Phone: 67967 The Basics of counting

More information

MEDIUM SPEED ANALOG-DIGITAL CONVERTERS

MEDIUM SPEED ANALOG-DIGITAL CONVERTERS CMOS Analog IC Design Page 10.7-1 10.7 - MEDIUM SPEED ANALOG-DIGITAL CONVERTERS INTRODUCTION Successive Approximation Algorithm: 1.) Start with the MSB bit and work toward the LSB bit. 2.) Guess the MSB

More information

1 of Lesson Alignment Guide Mathematics Cranston Public Schools

1 of Lesson Alignment Guide Mathematics Cranston Public Schools Multiplyig Fractions 2.2 (Note: There have been changes to the scope and sequence of units 2.2 and 2.3) 1 of 4 1-4 5.NF.4a. Interpret the product (a/b) x q as a parts of a partition of q into b equal parts;

More information

G51PGP: Software Paradigms. Object Oriented Coursework 4

G51PGP: Software Paradigms. Object Oriented Coursework 4 G51PGP: Software Paradigms Object Oriented Coursework 4 You must complete this coursework on your own, rather than working with anybody else. To complete the coursework you must create a working two-player

More information

5. Handy Circuit Analysis Techniques

5. Handy Circuit Analysis Techniques 1 5. Handy Circuit Analysis Techniques The nodal and mesh analysis require a complete set of equations to describe a particular circuit, even if only one current, voltage, or power quantity is of interest

More information

Lab 2: Blinkie Lab. Objectives. Materials. Theory

Lab 2: Blinkie Lab. Objectives. Materials. Theory Lab 2: Blinkie Lab Objectives This lab introduces the Arduino Uno as students will need to use the Arduino to control their final robot. Students will build a basic circuit on their prototyping board and

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Intelligent Agents & Search Problem Formulation. AIMA, Chapters 2,

Intelligent Agents & Search Problem Formulation. AIMA, Chapters 2, Intelligent Agents & Search Problem Formulation AIMA, Chapters 2, 3.1-3.2 Outline for today s lecture Intelligent Agents (AIMA 2.1-2) Task Environments Formulating Search Problems CIS 421/521 - Intro to

More information

Lecture Week 4. Homework Voltage Divider Equivalent Circuit Observation Exercise

Lecture Week 4. Homework Voltage Divider Equivalent Circuit Observation Exercise Lecture Week 4 Homework Voltage Divider Equivalent Circuit Observation Exercise Homework: P6 Prove that the equation relating change in potential energy to voltage is dimensionally consistent, using the

More information

Electrical Circuits (2)

Electrical Circuits (2) Electrical Circuits (2) Lecture 1 Intro. & Review Dr.Eng. Basem ElHalawany Course Info Title Electric Circuits (2) Lecturer: Lecturer Webpage: Teaching Assistant (TA) Course Webpage References Software

More information

Modeling, Analysis and Optimization of Networks. Alberto Ceselli

Modeling, Analysis and Optimization of Networks. Alberto Ceselli Modeling, Analysis and Optimization of Networks Alberto Ceselli alberto.ceselli@unimi.it Università degli Studi di Milano Dipartimento di Informatica Doctoral School in Computer Science A.A. 2015/2016

More information

Aim #35.1: How do we graph using a table?

Aim #35.1: How do we graph using a table? A) Take out last night's homework Worksheet - Aim 34.2 B) Copy down tonight's homework Finish aim 35.1 Aim #35.1: How do we graph using a table? C) Plot the following points... a) (-3, 5) b) (4, -2) c)

More information

Adding Fractions with Different Denominators. Subtracting Fractions with Different Denominators

Adding Fractions with Different Denominators. Subtracting Fractions with Different Denominators Adding Fractions with Different Denominators How to Add Fractions with different denominators: Find the Least Common Denominator (LCD) of the fractions Rename the fractions to have the LCD Add the numerators

More information

Mobility management in cellular communication systems using fuzzy systems

Mobility management in cellular communication systems using fuzzy systems Mobility management in cellular communication systems using fuzzy systems J.J. Astrain 1, J. Villadangos 2, M. Castillo 1, J.R. Garitagoitia 1, and F. Fariña 1 1 Dpt. Matemática e Informática 2 Dpt. Automática

More information