COSE312: Compilers. Lecture 5 Lexical Analysis (4)
|
|
- Eric Price
- 6 years ago
- Views:
Transcription
1 COSE312: Compilers Lecture 5 Lexical Analysis (4) Hakjoo Oh 2017 Spring Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
2 Part 3: Automation Transform the lexical specification into an executable string recognizers: Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
3 From NFA to DFA Transform an NFA into an equivalent DFA (N, Σ, δ N, n 0, N A ) (D, Σ, δ D, d 0, D A ). Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
4 From NFA to DFA Transform an NFA into an equivalent DFA (N, Σ, δ N, n 0, N A ) (D, Σ, δ D, d 0, D A ). Running example: a start b 5 6 c Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
5 -Closures -closure(i): the set of states reachable from I without consuming any symbols. a start b 5 6 c closure({1}) = {1, 2, 3, 4, 6, 9} -closure({1, 5}) = {1, 2, 3, 4, 6, 9} {3, 4, 5, 6, 8, 9} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
6 Subset Construction Input: an NFA (N, Σ, δ N, n 0, N A ). Output: a DFA (D, Σ, δ D, d 0, D A ). Key Idea: the DFA simulates the NFA by considering every possibility at once. A DFA state d D is a set of NFA state, i.e., d N. Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
7 Running Example (1/5) The initial DFA state d 0 = -closure({0}) = {0}. start {0} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
8 Running Example (2/5) For the initial state S, consider every x Σ and compute the corresponding next states: -closure( δ(s, a)). s S Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
9 Running Example (2/5) For the initial state S, consider every x Σ and compute the corresponding next states: -closure( δ(s, a)). s S -closure( s {0} δ(s, a)) = {1, 2, 3, 4, 6, 9} -closure( s {0} δ(s, b)) = -closure( s {0} δ(s, c)) = start {0} a {1, 2, 3, 4, 6, 9} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
10 Running Example (3/5) For the state {1, 2, 3, 4, 6, 9}, compute the next states: -closure( s {1,2,3,4,6,9} δ(s, a)) = -closure( s {1,2,3,4,6,9} δ(s, b)) = {3, 4, 5, 6, 8, 9} -closure( s {1,2,3,4,6,9} δ(s, c)) = {3, 4, 6, 7, 8, 9} b {3, 4, 5, 6, 8, 9} start {0} a {1, 2, 3, 4, 6, 9} c {3, 4, 6, 7, 8, 9} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
11 Running Example (4/5) Compute the next states of {3, 4, 5, 6, 8, 9}: -closure( s {3,4,5,6,8,9} δ(s, a)) = -closure( s {3,4,5,6,8,9} δ(s, b)) = {3, 4, 5, 6, 8, 9} -closure( s {3,4,5,6,8,9} δ(s, c)) = {3, 4, 6, 7, 8, 9} b {3, 4, 5, 6, 8, 9} b start {0} a {1, 2, 3, 4, 6, 9} c c {3, 4, 6, 7, 8, 9} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
12 Running Example (5/5) Compute the next states of {3, 4, 6, 7, 8, 9}: -closure( s {3,4,6,7,8,9} δ(s, a)) = -closure( s {3,4,6,7,8,9} δ(s, b)) = {3, 4, 5, 6, 8, 9} -closure( s {3,4,6,7,8,9} δ(s, c)) = {3, 4, 6, 7, 8, 9} b {3, 4, 5, 6, 8, 9} b start {0} a {1, 2, 3, 4, 6, 9} c b c {3, 4, 6, 7, 8, 9} c Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
13 Subset Construction Algorithm Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
14 Running Example (1/5) a start b 5 6 c The initial state d 0 = -closure({0}) = {0}. Initialize D and W : D = {{0}}, W = {{0}} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
15 Running Example (2/5) Choose q = {0} from W. For all c Σ, update δ D : Update D and W : a b c {0} {1, 2, 3, 4, 6, 9} D = {{0}, {1, 2, 3, 4, 6, 9}}, W = {{1, 2, 3, 4, 6, 9}} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
16 Running Example (3/5) Choose q = {1, 2, 3, 4, 6, 9} from W. For all c Σ, update δ D : a b c {0} {1, 2, 3, 4, 6, 9} {1, 2, 3, 4, 6, 9} {3, 4, 5, 6, 8, 9} {3, 4, 6, 7, 8, 9} Update D and W : D = {{0}, {1, 2, 3, 4, 6, 9}, {3, 4, 5, 6, 8, 9}, {3, 4, 6, 7, 8, 9}} W = {{3, 4, 5, 6, 8, 9}, {3, 4, 6, 7, 8, 9}} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
17 Running Example (4/5) Choose q = {3, 4, 5, 6, 8, 9} from W. For all c Σ, update δ D : a b c {0} {1, 2, 3, 4, 6, 9} {1, 2, 3, 4, 6, 9} {3, 4, 5, 6, 8, 9} {3, 4, 6, 7, 8, 9} {3, 4, 5, 6, 8, 9} {3, 4, 5, 6, 8, 9} {3, 4, 6, 7, 8, 9} D and W : D = {{0}, {1, 2, 3, 4, 6, 9}, {3, 4, 5, 6, 8, 9}, {3, 4, 6, 7, 8, 9}} W = {{3, 4, 6, 7, 8, 9}} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
18 Running Example (5/5) Choose q = {3, 4, 6, 7, 8, 9} from W. For all c Σ, update δ D : a b c {0} {1, 2, 3, 4, 6, 9} {1, 2, 3, 4, 6, 9} {3, 4, 5, 6, 8, 9} {3, 4, 6, 7, 8, 9} {3, 4, 5, 6, 8, 9} {3, 4, 5, 6, 8, 9} {3, 4, 6, 7, 8, 9} {3, 4, 6, 7, 8, 9} {3, 4, 5, 6, 8, 9} {3, 4, 6, 7, 8, 9} D and W : D = {{0}, {1, 2, 3, 4, 6, 9}, {3, 4, 5, 6, 8, 9}, {3, 4, 6, 7, 8, 9}} W = The while loop terminates. The accepting states: D A = {{1, 2, 3, 4, 6, 9}, {3, 4, 5, 6, 8, 9}, {3, 4, 6, 7, 8, 9}} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
19 Algorithm for computing -Closures The definition -closure(i) is the set of states reachable from I without consuming any symbols. is neither formal nor constructive. Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
20 Algorithm for computing -Closures The definition -closure(i) is the set of states reachable from I without consuming any symbols. is neither formal nor constructive. A formal definition: T = -closure(i) is the smallest set such that I δ(s, ) T. s T Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
21 Algorithm for computing -Closures The definition -closure(i) is the set of states reachable from I without consuming any symbols. is neither formal nor constructive. A formal definition: T = -closure(i) is the smallest set such that I δ(s, ) T. s T Alternatively, T is the smallest solution of the equation where F (X) (X) F (X) = I s X δ(s, ). Such a solution is called the least fixed point of F. Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
22 Fixed Point Iteration The least fixed point of a function can be computed by the fixed point iteration: T = repeat T = T T = T F (T ) until T = T Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
23 Example a start b 5 6 c closure({1}): Iteration T T 1 {1} 2 {1} {1, 2} 3 {1, 2} {1, 2, 3, 9} 4 {1, 2, 3, 9} {1, 2, 3, 4, 6, 9} 5 {1, 2, 3, 4, 6, 9} {1, 2, 3, 4, 6, 9} Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
24 Summary Key concepts in lexical analsis: Specification: Regular expressions Implementation: Deterministic Finite Automata Translation (homework 1) Next class: OCaml programming tutorial by TAs. Hakjoo Oh COSE Spring, Lecture 5 March 20, / 20
Computability. What can be computed?
Computability What can be computed? Computability What can be computed? read/write tape 0 1 1 0 control Computability What can be computed? read/write tape 0 1 1 0 control Computability What can be computed?
More informationAdvanced Automata Theory 4 Games
Advanced Automata Theory 4 Games Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata Theory 4 Games p. 1 Repetition
More informationTuring Machines (TM)
1 Introduction Turing Machines (TM) Jay Bagga A Turing Machine (TM) is a powerful model which represents a general purpose computer. The Church-Turing thesis states that our intuitive notion of algorithms
More informationCITS2211 Discrete Structures Turing Machines
CITS2211 Discrete Structures Turing Machines October 23, 2017 Highlights We have seen that FSMs and PDAs are surprisingly powerful But there are some languages they can not recognise We will study a new
More informationImplementation of Recursively Enumerable Languages in Universal Turing Machine
Implementation of Recursively Enumerable Languages in Universal Turing Machine Sumitha C.H, Member, ICMLC and Krupa Ophelia Geddam Abstract This paper presents the design and working of a Universal Turing
More informationRegular Expressions and Regular Languages. BBM Automata Theory and Formal Languages 1
Regular Expressions and Regular Languages BBM 401 - Automata Theory and Formal Languages 1 Operations on Languages Remember: A language is a set of strings Union: Concatenation: Powers: Kleene Closure:
More informationDVA325 Formal Languages, Automata and Models of Computation (FABER)
DVA325 Formal Languages, Automata and Models of Computation (FABER) Lecture 1 - Introduction School of Innovation, Design and Engineering Mälardalen University 11 November 2014 Abu Naser Masud FABER November
More informationA Learning System for a Computational Science Related Topic
Available online at www.sciencedirect.com Procedia Computer Science 9 (2012 ) 1763 1772 International Conference on Computational Science, ICCS 2012 A Learning System for a Computational Science Related
More informationSRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY
SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTER SCIENCE AND ENGINEERING DEPARTMENT OF CSE COURSE PLAN Course Code : CS0204 Course Title : Theory of Computation Semester : IV Course
More informationHow Much Memory is Needed to Win in Partial-Observation Games
How Much Memory is Needed to Win in Partial-Observation Games Laurent Doyen LSV, ENS Cachan & CNRS & Krishnendu Chatterjee IST Austria GAMES 11 How Much Memory is Needed to Win in Partial-Observation Games
More informationAutomata and Formal Languages - CM0081 Turing Machines
Automata and Formal Languages - CM0081 Turing Machines Andrés Sicard-Ramírez Universidad EAFIT Semester 2018-1 Turing Machines Alan Mathison Turing (1912 1954) Automata and Formal Languages - CM0081. Turing
More informationJNTUH COLLEGE OF ENGINEERING, HYDERABAD (AUTONOMOUS) III Year B.Tech. I semester (Regular / Supply) EXAMINATIONS, NOVEMBER 2014 REVALUATION RESULTS
III Year B.Tech. I semester (Regular / Supply) EXAMINATIONS, NOVEMBER 2014 1 11011M2209 Optimization Techniques NO- 3 09011A0159 CIVIL Concrete Technology NO- 4 12011A0110 CIVIL RC Structural Desing and
More informationTechnical framework of Operating System using Turing Machines
Reviewed Paper Technical framework of Operating System using Turing Machines Paper ID IJIFR/ V2/ E2/ 028 Page No 465-470 Subject Area Computer Science Key Words Turing, Undesirability, Complexity, Snapshot
More informationForward and backward DAWG matching. Slobodan Petrović
Forward and backward DAWG matching Slobodan Petrović 08.10.2013 Contents Introduction Forward DAWG matching (FDM) Backward DAWG matching (BDM) 2/29 Introduction A DAWG (Directed Acyclic Word Graph) representation
More informationof the hypothesis, but it would not lead to a proof. P 1
Church-Turing thesis The intuitive notion of an effective procedure or algorithm has been mentioned several times. Today the Turing machine has become the accepted formalization of an algorithm. Clearly
More informationMultiple : The product of a given whole number and another whole number. For example, some multiples of 3 are 3, 6, 9, and 12.
1.1 Factor (divisor): One of two or more whole numbers that are multiplied to get a product. For example, 1, 2, 3, 4, 6, and 12 are factors of 12 1 x 12 = 12 2 x 6 = 12 3 x 4 = 12 Factors are also called
More informationGilbert Peterson and Diane J. Cook University of Texas at Arlington Box 19015, Arlington, TX
DFA Learning of Opponent Strategies Gilbert Peterson and Diane J. Cook University of Texas at Arlington Box 19015, Arlington, TX 76019-0015 Email: {gpeterso,cook}@cse.uta.edu Abstract This work studies
More information3.4 The Single-Loop Circuit Single-loop circuits
25 3.4 The Single-Loop Circuit Single-loop circuits Elements are connected in series All elements carry the same current We shall determine The current through each element The voltage across each element
More informationIt is important that you show your work. The total value of this test is 220 points.
June 27, 2001 Your name It is important that you show your work. The total value of this test is 220 points. 1. (10 points) Use the Euclidean algorithm to solve the decanting problem for decanters of sizes
More informationEECE251 Circuit Analysis I Lecture Integrated Program Set 2: Methods of Circuit Analysis
EECE251 Circuit Analysis I Lecture Integrated Program Set 2: Methods of Circuit Analysis Shahriar Mirabbasi Department of Electrical and Computer Engineering University of British Columbia shahriar@ece.ubc.ca
More informationInternational Journal of Computer Sciences and Engineering. Research Paper Volume-5, Issue-5 E-ISSN:
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-5, Issue-5 E-ISSN: 2347-2693 Snakes and Stairs Game Design using Automata Theory N. Raj 1*, R. Dubey 2 1 Dept.
More informationAutomatic Enumeration and Random Generation for pattern-avoiding Permutation Classes
Automatic Enumeration and Random Generation for pattern-avoiding Permutation Classes Adeline Pierrot Institute of Discrete Mathematics and Geometry, TU Wien (Vienna) Permutation Patterns 2014 Joint work
More informationYou Should Be Scared of German Ghost
[DOI: 10.2197/ipsjjip.23.293] Regular Paper You Should Be Scared of German Ghost Erik D. Demaine 1,a) Fermi Ma 1,b) Matthew Susskind 1,c) Erik Waingarten 1,d) Received: August 1, 2014, Accepted: January
More informationIntroduction To Automata Theory Languages And Computation Addison Wesley Series In Computer Science
Introduction To Automata Theory Languages And Computation Addison Wesley Series In Computer Science INTRODUCTION TO AUTOMATA THEORY LANGUAGES AND COMPUTATION ADDISON WESLEY SERIES IN COMPUTER SCIENCE PDF
More informationTOPOLOGY, LIMITS OF COMPLEX NUMBERS. Contents 1. Topology and limits of complex numbers 1
TOPOLOGY, LIMITS OF COMPLEX NUMBERS Contents 1. Topology and limits of complex numbers 1 1. Topology and limits of complex numbers Since we will be doing calculus on complex numbers, not only do we need
More informationWarm-Up. Complete the second homework worksheet (the one you didn t do yesterday). Please begin working on FBF010 and FBF011.
Warm-Up Complete the second homework worksheet (the one you didn t do yesterday). Please begin working on FBF010 and FBF011. You have 20 minutes at the beginning of class to work on these three tasks.
More informationOutline. In One Slide. LR Parsing. LR Parsing. No Stopping The Parsing! Bottom-Up Parsing. LR(1) Parsing Tables #2
LR Parsing Bottom-Up Parsing #1 Outline No Stopping The Parsing! Bottom-Up Parsing LR Parsing Shift and Reduce LR(1) Parsing Algorithm LR(1) Parsing Tables #2 In One Slide An LR(1) parser reads tokens
More informationExploring Finite State Automata with Junun Robots: A Case Study in Computability Theory
Int'l Conf. Frontiers in Education: CS and CE FECS'15 3 Exploring Finite State Automata with Junun Robots: A Case Study in Computability Theory Vladimir Kulyukin Sarat Kiran Andhavarapu Melodi Oliver Christopher
More informationSimple Search Algorithms
Lecture 3 of Artificial Intelligence Simple Search Algorithms AI Lec03/1 Topics of this lecture Random search Search with closed list Search with open list Depth-first and breadth-first search again Uniform-cost
More informationPatterns and random permutations II
Patterns and random permutations II Valentin Féray (joint work with F. Bassino, M. Bouvel, L. Gerin, M. Maazoun and A. Pierrot) Institut für Mathematik, Universität Zürich Summer school in Villa Volpi,
More informationTowards Verification of a Service Orchestration Language. Tan Tian Huat
Towards Verification of a Service Orchestration Language Tan Tian Huat 1 Outline Background of Orc Motivation of Verifying Orc Overview of Orc Language Verification using PAT Future Works 2 Outline Background
More informationUCSD CSE 21, Spring 2014 [Section B00] Mathematics for Algorithm and System Analysis
UCSD CSE 21, Spring 2014 [Section B00] Mathematics for Algorithm and System Analysis Lecture 3 Class URL: http://vlsicad.ucsd.edu/courses/cse21-s14/ Lecture 3 Notes Goal for today: CL Section 3 Subsets,
More informationExplain mathematically how a voltage that is applied to resistors in series is distributed among the resistors.
Objective of Lecture Explain mathematically how a voltage that is applied to resistors in series is distributed among the resistors. Chapter.5 in Fundamentals of Electric Circuits Chapter 5.7 Electric
More informationElectrical Circuits I (ENGR 2405) Chapter 2 Ohm s Law, KCL, KVL, Resistors in Series/Parallel
Electrical Circuits I (ENG 2405) Chapter 2 Ohm s Law, KCL, KVL, esistors in Series/Parallel esistivity Materials tend to resist the flow of electricity through them. This property is called resistance
More informationUniversiteit Leiden Opleiding Informatica
Universiteit Leiden Opleiding Informatica An Analysis of Dominion Name: Roelof van der Heijden Date: 29/08/2014 Supervisors: Dr. W.A. Kosters (LIACS), Dr. F.M. Spieksma (MI) BACHELOR THESIS Leiden Institute
More informationComputing Permutations with Stacks and Deques
Michael Albert 1 Mike Atkinson 1 Steve Linton 2 1 Department of Computer Science, University of Otago 2 School of Computer Science, University of St Andrews 7th Australia New Zealand Mathematics Convention
More informationcode V(n,k) := words module
Basic Theory Distance Suppose that you knew that an English word was transmitted and you had received the word SHIP. If you suspected that some errors had occurred in transmission, it would be impossible
More informationCDT314 FABER Formal Languages, Automata and Models of Computation MARK BURGIN INDUCTIVE TURING MACHINES
CDT314 FABER Formal Languages, Automata and Models of Computation MARK BURGIN INDUCTIVE TURING MACHINES 2012 1 Inductive Turing Machines Burgin, M. Inductive Turing Machines, Notices of the Academy of
More informationECE 201, Section 3 Lecture 12. Prof. Peter Bermel September 17, 2012
ECE 201, Section 3 Lecture 12 Prof. Peter ermel September 17, 2012 Exam #1: Thursday, Sep. 20 6:307:30 pm Most of you will be in WTHR 200, unless told otherwise Review session tonight at 8 pm (MTH 175)
More informationDistance-Vector Routing
Distance-Vector Routing Antonio Carzaniga Faculty of Informatics University of Lugano June 8, 2007 c 2005 2007 Antonio Carzaniga 1 Recap on link-state routing Distance-vector routing Bellman-Ford equation
More informationLecture 2. 1 Nondeterministic Communication Complexity
Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols
More informationIn this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics:
In this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics: Links between Digital and Analogue Serial vs Parallel links Flow control
More informationMAT 115: Finite Math for Computer Science Problem Set 5
MAT 115: Finite Math for Computer Science Problem Set 5 Out: 04/10/2017 Due: 04/17/2017 Instructions: I leave plenty of space on each page for your computation. If you need more sheet, please attach your
More informationTablatures for Stringed Instruments and Generating Functions
Tablatures for Stringed Instruments and enerating Functions avide accherini, onatella Merlini, and Renzo Sprugnoli ipartimento di Sistemi e Informatica viale Morgagni 65, 50134, Firenze, Italia, [baccherini,merlini,sprugnoli]@dsi.unifi.it
More informationBasic Science for Software Developers
Basic Science for Software Developers David Lorge Parnas, P.Eng. Michael Soltys Department of Computing and Software Faculty of Engineering McMaster University, Hamilton, Ontario, Canada - L8S 4K1 1 Introduction
More informationSpring 06 Assignment 2: Constraint Satisfaction Problems
15-381 Spring 06 Assignment 2: Constraint Satisfaction Problems Questions to Vaibhav Mehta(vaibhav@cs.cmu.edu) Out: 2/07/06 Due: 2/21/06 Name: Andrew ID: Please turn in your answers on this assignment
More informationKnow how to represent permutations in the two rowed notation, and how to multiply permutations using this notation.
The third exam will be on Monday, November 21, 2011. It will cover Sections 5.1-5.5. Of course, the material is cumulative, and the listed sections depend on earlier sections, which it is assumed that
More informationCSE 355: Human-aware Robo.cs Introduction to Theoretical Computer Science
CSE 355: Introduction to Theoretical Computer Science Instructor: Dr. Yu ( Tony ) Zhang Lecture: WGHL101, Tue/Thu, 3:00 4:15 PM Office Hours: BYENG 594, Tue/Thu, 5:00 6:00PM 1 Subject of interest? 2 Robo.cs
More informationFinal Exam, Math 6105
Final Exam, Math 6105 SWIM, June 29, 2006 Your name Throughout this test you must show your work. 1. Base 5 arithmetic (a) Construct the addition and multiplication table for the base five digits. (b)
More informationLECTURE 26: GAME THEORY 1
15-382 COLLECTIVE INTELLIGENCE S18 LECTURE 26: GAME THEORY 1 INSTRUCTOR: GIANNI A. DI CARO ICE-CREAM WARS http://youtu.be/jilgxenbk_8 2 GAME THEORY Game theory is the formal study of conflict and cooperation
More informationVerification and Validation for Safety in Robots Kerstin Eder
Verification and Validation for Safety in Robots Kerstin Eder Design Automation and Verification Trustworthy Systems Laboratory Verification and Validation for Safety in Robots, Bristol Robotics Laboratory
More informationResistors in Series or in Parallel
Resistors in Series or in Parallel Key Terms series parallel Resistors in Series In a circuit that consists of a single bulb and a battery, the potential difference across the bulb equals the terminal
More informationStanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011
Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow
More informationCardinality revisited
Cardinality revisited A set is finite (has finite cardinality) if its cardinality is some (finite) integer n. Two sets A,B have the same cardinality iff there is a one-to-one correspondence from A to B
More informationHow to Gamble Against All Odds
How to Gamble Against All Odds Gilad Bavly 1 Ron Peretz 2 1 Bar-Ilan University 2 London School of Economics Heidelberg, June 2015 How to Gamble Against All Odds 1 Preface starting with an algorithmic
More information3. Voltage and Current laws
1 3. Voltage and Current laws 3.1 Node, Branches, and loops A branch represents a single element such as a voltage source or a resistor A node is the point of the connection between two or more elements
More informationFinite and Infinite Sets
Finite and Infinite Sets MATH 464/506, Real Analysis J. Robert Buchanan Department of Mathematics Summer 2007 Basic Definitions Definition The empty set has 0 elements. If n N, a set S is said to have
More informationTimed Games UPPAAL-TIGA. Alexandre David
Timed Games UPPAAL-TIGA Alexandre David 1.2.05 Overview Timed Games. Algorithm (CONCUR 05). Strategies. Code generation. Architecture of UPPAAL-TIGA. Interactive game. Timed Games with Partial Observability.
More informationIntroduction to Game Theory
Introduction to Game Theory (From a CS Point of View) Olivier Serre Serre@irif.fr IRIF (CNRS & Université Paris Diderot Paris 7) 14th of September 2017 Master Parisien de Recherche en Informatique Who
More informationBuilding a Safe Care-Providing Robot
2011 IEEE International Conference on Rehabilitation Robotics Rehab Week Zurich, ETH Zurich Science City, Switzerland, June 29 - July 1, 2011 Building a Safe Care-Providing Robot Leila Fotoohi Automation
More informationI am very pleased to teach this class again, after last year s course on electronics over the Summer Term. Based on the SOLE survey result, it is clear that the format, style and method I used worked with
More information10703 Deep Reinforcement Learning and Control
10703 Deep Reinforcement Learning and Control Russ Salakhutdinov Slides borrowed from Katerina Fragkiadaki Solving known MDPs: Dynamic Programming Markov Decision Process (MDP)! A Markov Decision Process
More informationCourse Outline. Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004.
2005/Sep/12 1 Course Outline Textbook: G. Michael Schneider and Judith L. Gersting, "Invitation to Computer Science C++ Version," 3rd Edition, Thomson, 2004. Outline 1. The Algorithm Foundations of Computer
More informationCS 457 Lecture 16 Routing Continued. Spring 2010
CS 457 Lecture 16 Routing Continued Spring 2010 Scaling Link-State Routing Overhead of link-state routing Flooding link-state packets throughout the network Running Dijkstra s shortest-path algorithm Introducing
More information4. Let U = {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}, X = {2, 3, 4}, Y = {1, 4, 5}, Z = {2, 5, 7}. Find a) (X Y) b) X Y c) X (Y Z) d) (X Y) Z
Exercises 1. Write formal descriptions of the following sets. a) The set containing the numbers 1, 10, and 100 b) The set containing all integers that are greater than 5 c) The set containing all natural
More information3-2 Lecture 3: January Repeated Games A repeated game is a standard game which isplayed repeatedly. The utility of each player is the sum of
S294-1 Algorithmic Aspects of Game Theory Spring 2001 Lecturer: hristos Papadimitriou Lecture 3: January 30 Scribes: Kris Hildrum, ror Weitz 3.1 Overview This lecture expands the concept of a game by introducing
More informationRecurrent neural networks Modelling sequential data. MLP Lecture 9 Recurrent Networks 1
Recurrent neural networks Modelling sequential data MLP Lecture 9 Recurrent Networks 1 Recurrent Networks Steve Renals Machine Learning Practical MLP Lecture 9 16 November 2016 MLP Lecture 9 Recurrent
More informationSpring 06 Assignment 2: Constraint Satisfaction Problems
15-381 Spring 06 Assignment 2: Constraint Satisfaction Problems Questions to Vaibhav Mehta(vaibhav@cs.cmu.edu) Out: 2/07/06 Due: 2/21/06 Name: Andrew ID: Please turn in your answers on this assignment
More informationComparison of the NIST and NRC Josephson Voltage Standards (SIM.EM.BIPM-K10.b)
Comparison of the NIST and Josephson Voltage Standards (SIM.EM.BIPM-K10.b) Yi-hua Tang National Institute of Standards and Technology (NIST) Gaithersburg, MD 0899, USA Telephone: + (301) 975-4691, email:
More informationLecture 4&5 CMOS Circuits
Lecture 4&5 CMOS Circuits Xuan Silvia Zhang Washington University in St. Louis http://classes.engineering.wustl.edu/ese566/ Worst-Case V OL 2 3 Outline Combinational Logic (Delay Analysis) Sequential Circuits
More informationPattern Avoidance in Poset Permutations
Pattern Avoidance in Poset Permutations Sam Hopkins and Morgan Weiler Massachusetts Institute of Technology and University of California, Berkeley Permutation Patterns, Paris; July 5th, 2013 1 Definitions
More informationDistributed supervisory control for a system of path-network sharing mobile robots
1 Distributed supervisory control for a system of path-network sharing mobile robots Elżbieta Roszkowska Bogdan Kreczmer Adam Borkowski Michał Gnatowski The Institute of Computer Engineering, Control and
More informationRegret Minimization in Games with Incomplete Information
Regret Minimization in Games with Incomplete Information Martin Zinkevich maz@cs.ualberta.ca Michael Bowling Computing Science Department University of Alberta Edmonton, AB Canada T6G2E8 bowling@cs.ualberta.ca
More informationTraffic Control for a Swarm of Robots: Avoiding Group Conflicts
Traffic Control for a Swarm of Robots: Avoiding Group Conflicts Leandro Soriano Marcolino and Luiz Chaimowicz Abstract A very common problem in the navigation of robotic swarms is when groups of robots
More informationComputer Science and Philosophy Information Sheet for entry in 2018
Computer Science and Philosophy Information Sheet for entry in 2018 Artificial intelligence (AI), logic, robotics, virtual reality: fascinating areas where Computer Science and Philosophy meet. There are
More informationarxiv: v2 [math.gm] 31 Dec 2017
New results on the stopping time behaviour of the Collatz 3x + 1 function arxiv:1504.001v [math.gm] 31 Dec 017 Mike Winkler Fakultät für Mathematik Ruhr-Universität Bochum, Germany mike.winkler@ruhr-uni-bochum.de
More informationLecture 3 Presentations and more Great Groups
Lecture Presentations and more Great Groups From last time: A subset of elements S G with the property that every element of G can be written as a finite product of elements of S and their inverses is
More informationPin-Permutations and Structure in Permutation Classes
and Structure in Permutation Classes Frédérique Bassino Dominique Rossin Journées de Combinatoire de Bordeaux, feb. 2009 liafa Main result of the talk Conjecture[Brignall, Ruškuc, Vatter]: The pin-permutation
More informationChapter 6. The Production Function. Production Jargon. Production
Chapter 6 Production The Production Function A production function tells us the maximum output a firm can produce (in a given period) given available inputs. It is the economist s way of describing technology
More informationGame Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 2012
Game Theory Lecture Notes By Y. Narahari Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 01 Rationalizable Strategies Note: This is a only a draft version,
More informationLecture 7: The Principle of Deferred Decisions
Randomized Algorithms Lecture 7: The Principle of Deferred Decisions Sotiris Nikoletseas Professor CEID - ETY Course 2017-2018 Sotiris Nikoletseas, Professor Randomized Algorithms - Lecture 7 1 / 20 Overview
More informationProblem 2A Consider 101 natural numbers not exceeding 200. Prove that at least one of them is divisible by another one.
1. Problems from 2007 contest Problem 1A Do there exist 10 natural numbers such that none one of them is divisible by another one, and the square of any one of them is divisible by any other of the original
More informationMultiplayer Pushdown Games. Anil Seth IIT Kanpur
Multiplayer Pushdown Games Anil Seth IIT Kanpur Multiplayer Games we Consider These games are played on graphs (finite or infinite) Generalize two player infinite games. Any number of players are allowed.
More informationLecture 2: Problem Formulation
1. Problem Solving What is a problem? Lecture 2: Problem Formulation A goal and a means for achieving the goal The goal specifies the state of affairs we want to bring about The means specifies the operations
More informationClass 8: Factors and Multiples (Lecture Notes)
Class 8: Factors and Multiples (Lecture Notes) If a number a divides another number b exactly, then we say that a is a factor of b and b is a multiple of a. Factor: A factor of a number is an exact divisor
More informationConvexity Invariants of the Hoop Closure on Permutations
Convexity Invariants of the Hoop Closure on Permutations Robert E. Jamison Retired from Discrete Mathematics Clemson University now in Asheville, NC Permutation Patterns 12 7 11 July, 2014 Eliakim Hastings
More informationCPCS 222 Discrete Structures I Counting
King ABDUL AZIZ University Faculty Of Computing and Information Technology CPCS 222 Discrete Structures I Counting Dr. Eng. Farag Elnagahy farahelnagahy@hotmail.com Office Phone: 67967 The Basics of counting
More informationMEDIUM SPEED ANALOG-DIGITAL CONVERTERS
CMOS Analog IC Design Page 10.7-1 10.7 - MEDIUM SPEED ANALOG-DIGITAL CONVERTERS INTRODUCTION Successive Approximation Algorithm: 1.) Start with the MSB bit and work toward the LSB bit. 2.) Guess the MSB
More information1 of Lesson Alignment Guide Mathematics Cranston Public Schools
Multiplyig Fractions 2.2 (Note: There have been changes to the scope and sequence of units 2.2 and 2.3) 1 of 4 1-4 5.NF.4a. Interpret the product (a/b) x q as a parts of a partition of q into b equal parts;
More informationG51PGP: Software Paradigms. Object Oriented Coursework 4
G51PGP: Software Paradigms Object Oriented Coursework 4 You must complete this coursework on your own, rather than working with anybody else. To complete the coursework you must create a working two-player
More information5. Handy Circuit Analysis Techniques
1 5. Handy Circuit Analysis Techniques The nodal and mesh analysis require a complete set of equations to describe a particular circuit, even if only one current, voltage, or power quantity is of interest
More informationLab 2: Blinkie Lab. Objectives. Materials. Theory
Lab 2: Blinkie Lab Objectives This lab introduces the Arduino Uno as students will need to use the Arduino to control their final robot. Students will build a basic circuit on their prototyping board and
More informationGame Theory and Randomized Algorithms
Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international
More informationIntelligent Agents & Search Problem Formulation. AIMA, Chapters 2,
Intelligent Agents & Search Problem Formulation AIMA, Chapters 2, 3.1-3.2 Outline for today s lecture Intelligent Agents (AIMA 2.1-2) Task Environments Formulating Search Problems CIS 421/521 - Intro to
More informationLecture Week 4. Homework Voltage Divider Equivalent Circuit Observation Exercise
Lecture Week 4 Homework Voltage Divider Equivalent Circuit Observation Exercise Homework: P6 Prove that the equation relating change in potential energy to voltage is dimensionally consistent, using the
More informationElectrical Circuits (2)
Electrical Circuits (2) Lecture 1 Intro. & Review Dr.Eng. Basem ElHalawany Course Info Title Electric Circuits (2) Lecturer: Lecturer Webpage: Teaching Assistant (TA) Course Webpage References Software
More informationModeling, Analysis and Optimization of Networks. Alberto Ceselli
Modeling, Analysis and Optimization of Networks Alberto Ceselli alberto.ceselli@unimi.it Università degli Studi di Milano Dipartimento di Informatica Doctoral School in Computer Science A.A. 2015/2016
More informationAim #35.1: How do we graph using a table?
A) Take out last night's homework Worksheet - Aim 34.2 B) Copy down tonight's homework Finish aim 35.1 Aim #35.1: How do we graph using a table? C) Plot the following points... a) (-3, 5) b) (4, -2) c)
More informationAdding Fractions with Different Denominators. Subtracting Fractions with Different Denominators
Adding Fractions with Different Denominators How to Add Fractions with different denominators: Find the Least Common Denominator (LCD) of the fractions Rename the fractions to have the LCD Add the numerators
More informationMobility management in cellular communication systems using fuzzy systems
Mobility management in cellular communication systems using fuzzy systems J.J. Astrain 1, J. Villadangos 2, M. Castillo 1, J.R. Garitagoitia 1, and F. Fariña 1 1 Dpt. Matemática e Informática 2 Dpt. Automática
More information