The Rodin Platform. Jean-Raymond Abrial. 2nd Rodin Industrial Day. September 10th 2007

Size: px
Start display at page:

Download "The Rodin Platform. Jean-Raymond Abrial. 2nd Rodin Industrial Day. September 10th 2007"

Transcription

1 The Rodin Platform Jean-Raymond Abrial 2nd Rodin Industrial Day September 10th 2007

2 Prelude 1

3 Prelude 2 - Georges Charpak is a French physicist (Nobel Prize winner in 1992)

4 Prelude 3 - Georges Charpak is a French physicist (Nobel Prize winner in 1992) - Contribution: "The invention and development of particle detectors"

5 Prelude 4 - Georges Charpak is a French physicist (Nobel Prize winner in 1992) - Contribution: "The invention and development of particle detectors" - Question asked to Charpak: "Are you a theoretician?"

6 Prelude 5 - Georges Charpak is a French physicist (Nobel Prize winner in 1992) - Contribution: "The invention and development of particle detectors" - Question asked to Charpak: "Are you a theoretician?" - Answer: "No, I am not. Although I know the theory"

7 Prelude 6 - Georges Charpak is a French physicist (Nobel Prize winner in 1992) - Contribution: "The invention and development of particle detectors" - Question asked to Charpak: "Are you a theoretician?" - Answer: "No, I am not. Although I know the theory" - Answer (cont d):

8 Prelude 7 - Georges Charpak is a French physicist (Nobel Prize winner in 1992) - Contribution: "The invention and development of particle detectors" - Question asked to Charpak: "Are you a theoretician?" - Answer: "No, I am not. Although I know the theory" - Answer (cont d): "AND MY TOOL IS THE MIRROR OF THE THEORY"

9 Which Theory? 8 - The theory of discrete transition systems

10 Which Theory? 9 - The theory of discrete transition systems - As engineers, a theory is used to build a methodology

11 Which Theory? 10 - The theory of discrete transition systems - As engineers, a theory is used to build a methodology - A methodology describes the process allowing to apply a theory

12 Which Theory? 11 - The theory of discrete transition systems - As engineers, a theory is used to build a methodology - A methodology describes the process allowing to apply a theory - The methodology must precede the tool

13 Which Theory? 12 - The theory of discrete transition systems - As engineers, a theory is used to build a methodology - A methodology describes the process allowing to apply a theory - The methodology must precede the tool - But the tool will help us applying the methodology

14 Which Methodology? 13 - That of developing systems which will be correct by construction

15 Which Methodology? 14 - That of developing systems which will be correct by construction - Developing formal models in many different system areas:

16 Which Methodology? 15 - That of developing systems which will be correct by construction - Developing formal models in many different system areas: - distributed

17 Which Methodology? 16 - That of developing systems which will be correct by construction - Developing formal models in many different system areas: - distributed - concurrent

18 Which Methodology? 17 - That of developing systems which will be correct by construction - Developing formal models in many different system areas: - distributed - concurrent - parallel

19 Which Methodology? 18 - That of developing systems which will be correct by construction - Developing formal models in many different system areas: - distributed - concurrent - parallel - sequential

20 Which Methodology? 19 - That of developing systems which will be correct by construction - Developing formal models in many different system areas: - distributed - concurrent - parallel - sequential - including external environment

21 Which Methodology? 20 - That of developing systems which will be correct by construction - Developing formal models in many different system areas: - distributed - concurrent - parallel - sequential - including external environment - The tool must be an aid for doing this, not a burden

22 Formal Models with Event-B (reminder) 21 - Models are made of machines and contexts Machine variables invariants theorems events Context carrier sets constants axioms theorems

23 Relationships Between Machines and Contexts (reminder) 22 Machine sees Context refines Machine sees Context extends refines extends

24 Structure of Machines and Contexts in Event-B (reminder) 23 Each section contains modeling elements machine < machine identifier > refines < machine identifier > sees < context identifier >... variables < variable identifier >... invariants < label >: < predicate >... theorems < label >: < predicate >... variant < variant > events < event >... end context < context identifier > extends < context identifier >... sets < set identifier >... constants < constant identifier >... axioms < label >: < predicate >... theorems < label >: < predicate >... end

25 Initial Quick Demo 24

26 Structure of Events in Event-B (reminder) 25 < event identifier > = status {ordinary, convergent, anticipated} refines < event identifier >... any < parameter identif ier >... where < label >: < predicate >... with < label >: < witness >... then < label >: < action >... end

27 Initial Quick Demo (cont d) 26

28 The "Compiler" of Tomorrow 27 D E S I G N A N D V E R I F I C A T I O N P L U G I N S Static Checker Proof Obligation Generator Provers Model Checker D E S I G N D A T A B A S E Animator UML to B Tool I N T E R F A C E Translator

29 The "Compiler" of Tomorrow 28 D E S I G N A N D V E R I F I C A T I O N P L U G I N S Static Checker Proof Obligation Generator Provers Model Checker D E S I G N D A T A B A S E Animator UML to B Tool I N T E R F A C E Translator

30 Outline of Talk 29 - The team

31 Outline of Talk 30 - The team - Main characteristics of the Rodin Platform

32 Outline of Talk 31 - The team - Main characteristics of the Rodin Platform - A Grand Tour of the Rodin Platform by means of an example

33 Outline of Talk 32 - The team - Main characteristics of the Rodin Platform - A Grand Tour of the Rodin Platform by means of an example - Various demos performed during example presentation

34 The ETH Team (a superb team) 33 - Laurent Voisin: Main Architect

35 The ETH Team (a superb team) 34 - Laurent Voisin: Main Architect - Stefan Hallerstede: Static Checker, Builder, PO Generator

36 The ETH Team (a superb team) 35 - Laurent Voisin: Main Architect - Stefan Hallerstede: Static Checker, Builder, PO Generator - Thai Son Hoang: User Interface, Interactive Prover Rules

37 The ETH Team (a superb team) 36 - Laurent Voisin: Main Architect - Stefan Hallerstede: Static Checker, Builder, PO Generator - Thai Son Hoang: User Interface, Interactive Prover Rules - Farhad Mehta: Proof Manager, Well-definedness

38 The ETH Team (a superb team) 37 - Laurent Voisin: Main Architect - Stefan Hallerstede: Static Checker, Builder, PO Generator - Thai Son Hoang: User Interface, Interactive Prover Rules - Farhad Mehta: Proof Manager, Well-definedness - Francois Terrier: New Prover

39 The ETH Team (a superb team) 38 - Laurent Voisin: Main Architect - Stefan Hallerstede: Static Checker, Builder, PO Generator - Thai Son Hoang: User Interface, Interactive Prover Rules - Farhad Mehta: Proof Manager, Well-definedness - Francois Terrier: New Prover - External participants: Dominique Cansell and Christophe Metayer

40 Main Characteristics of the Rodin Platform 39 - Build on top of Eclipse

41 Main Characteristics of the Rodin Platform 40 - Build on top of Eclipse - Running on Windows, Mac-OS, and Linux

42 Main Characteristics of the Rodin Platform 41 - Build on top of Eclipse - Running on Windows, Mac-OS, and Linux - Development: 3 years

43 Main Characteristics of the Rodin Platform 42 - Build on top of Eclipse - Running on Windows, Mac-OS, and Linux - Development: 3 years - 120,000 lines of Java (after removing blank lines and comment lines)

44 Main Characteristics of the Rodin Platform 43 - Build on top of Eclipse - Running on Windows, Mac-OS, and Linux - Development: 3 years - 120,000 lines of Java (after removing blank lines and comment lines) - Open source

45 Main Characteristics of the Rodin Platform 44 - Build on top of Eclipse - Running on Windows, Mac-OS, and Linux - Development: 3 years - 120,000 lines of Java (after removing blank lines and comment lines) - Open source - Extensible (plug-ins)

46 The Example 45 - A hotel key card system

47 The Example 46 - A hotel key card system - It is not a software system

48 The Example 47 - A hotel key card system - It is not a software system - The model will allow us to analyze this system

49 The Example 48 - A hotel key card system - It is not a software system - The model will allow us to analyze this system - References:

50 The Example 49 - A hotel key card system - It is not a software system - The model will allow us to analyze this system - References: - Daniel Jackson, Software Abstractions. MIT Press, 2006

51 The Example 50 - A hotel key card system - It is not a software system - The model will allow us to analyze this system - References: - Daniel Jackson, Software Abstractions. MIT Press, Tobias Nipkow, Verifying a Hotel Key Card System. ICTAC, 2006

52 The Specification of a Hotel Key Card System 51 - Upon checking-in, you are given a magnetic card.

53 The Specification of a Hotel Key Card System 52 - Upon checking-in, you are given a magnetic card. - Between your check-in and your check-out, the system must:

54 The Specification of a Hotel Key Card System 53 - Upon checking-in, you are given a magnetic card. - Between your check-in and your check-out, the system must: (1) allow you to enter the room you booked,

55 The Specification of a Hotel Key Card System 54 - Upon checking-in, you are given a magnetic card. - Between your check-in and your check-out, the system must: (1) allow you to enter the room you booked, (2) guarantee that no one else can do so.

56 The Specification of a Hotel Key Card System 55 - Upon checking-in, you are given a magnetic card. - Between your check-in and your check-out, the system must: (1) allow you to enter the room you booked, (2) guarantee that no one else can do so. - At check-out, you are not obliged to return the magnetic card

57 The Specification of a Hotel Key Card System 56 - Upon checking-in, you are given a magnetic card. - Between your check-in and your check-out, the system must: (1) allow you to enter the room you booked, (2) guarantee that no one else can do so. - At check-out, you are not obliged to return the magnetic card - In a classical hotel metallic key system, (2) is not guaranteed (a previous user may have "borrowed" the metallic key)

58 A Proposed Implementation of the Key Card System (1) 57 - Each check-in starts a new booking

59 A Proposed Implementation of the Key Card System (1) 58 - Each check-in starts a new booking - Each booking is associated with a key-card

60 A Proposed Implementation of the Key Card System (1) 59 - Each check-in starts a new booking - Each booking is associated with a key-card - Each key-card carries two electronic keys:

61 A Proposed Implementation of the Key Card System (1) 60 - Each check-in starts a new booking - Each booking is associated with a key-card - Each key-card carries two electronic keys: (1) Its own new key: guaranteed to be fresh

62 A Proposed Implementation of the Key Card System (1) 61 - Each check-in starts a new booking - Each booking is associated with a key-card - Each key-card carries two electronic keys: (1) Its own new key: guaranteed to be fresh (2) the "previous" booking key: the "new" key from the previous booking card

63 A Proposed Implementation of the Key Card System (2) 62 - Each door has an independent electronic lock

64 A Proposed Implementation of the Key Card System (2) 63 - Each door has an independent electronic lock - The lock at the door holds one electronic key

65 A Proposed Implementation of the Key Card System (2) 64 - Each door has an independent electronic lock - The lock at the door holds one electronic key - You insert your card in the lock

66 A Proposed Implementation of the Key Card System (2) 65 - Each door has an independent electronic lock - The lock at the door holds one electronic key - You insert your card in the lock - The lock reads your card

67 A Proposed Implementation of the Key Card System (2) 66 - Each door has an independent electronic lock - The lock at the door holds one electronic key - You insert your card in the lock - The lock reads your card - The door opens if the door key is one of the two keys of your card

68 A Proposed Implementation of the Key Card System (2) 67 - Each door has an independent electronic lock - The lock at the door holds one electronic key - You insert your card in the lock - The lock reads your card - The door opens if the door key is one of the two keys of your card - The door key is replaced by your own key (as read on the card)

69 k1 door key

70 k2 k1 new key previous key k1 door key

71 k2 k1 k2 k1 k1 k2

72 k2

73 k2 k1 k2

74 k2 k1 k2 k1 k2 k2

75 k2

76 k3 k2 k2

77 k3 k2 k3 k2 k2 k3

78 k3

79 k3 k2 k3

80 k3 k2 k3 k2 k3 k3

81 k3

82 k2 k1 k3

83 k2 k1 k2 k1 k3 k3

84 Booking Conventions 68 open closed PAST bookings PRESENT booking FUTUR bookings

85 The Main Transitions 69 - check in: performed by hotel management and guest

86 The Main Transitions 70 - check in: performed by hotel management and guest - check out: performed by hotel management (and guest)

87 The Main Transitions 71 - check in: performed by hotel management and guest - check out: performed by hotel management (and guest) - use: performed by guest (this is the first entrance in the room)

88 Initial Situation 72 Booking b1 is a dummy b1

89 Check in 73 Booking b2 checks in b1 b2

90 Use 74 Booking b2 uses the room. b1 b2 Booking b1 becomes a past booking

91 Check out 75 Booking b2 checks out b1 b2

92 Check in 76 Booking b3 checks in b1 b2 b3

93 Use 77 Booking b3 uses the room. b1 b2 b3 Booking b2 becomes a past booking

94 Check in 78 Booking b4 checks in b1 b2 b3 b4 NOT ALLOWED At most one open booking

95 Use 79 Booking b2 uses the room. b1 b2 b3 Booking b3 becomes a past booking NOT ALLOWED A past booking cannot "use" the room for the first time

96 Check out 80 Booking b3 checks out b1 b2 b3

97 Check in 81 Booking b4 checks in b1 b2 b3 b4

98 Check out 82 Booking b4 checks out without using the room b1 b2 b3 b4

99 Check in 83 Booking b5 checks in b1 b2 b3 b4 b5

100 Check out 84 Booking b5 checks out without using the room b1 b2 b3 b4 b5

101 Check in 85 Booking b6 checks in b1 b2 b3 b4 b5 b6

102 Use 86 Booking b6 uses the room. b1 b2 b3 b4 b5 b6 Booking b3 becomes a past booking

103 Use 87 - Booking b5 uses the room. b1 b2 b3 b4 b5 b6 Open booking b6 becomes a past booking. NOT ALLOWED. Before using a room, one must be sure that its user has checked out. This point will be solved "naturally" in the next refinement

104 DEMO 88

105 1st Data-refinement 89 b1 b2 b3 b4 b4 b6 Abstract (set) b1 b2 b3 b4 b4 b Concrete (sequence)

106 b1 1

107 b1 b2 1 2

108 b1 b2 1 2

109 b1 b2 1 2

110 b1 b2 b

111 b1 b2 b

112 b1 b2 b

113 b1 b2 b3 b

114 b1 b2 b3 b

115 b1 b2 b3 b4 b

116 b1 b2 b3 b4 b

117 b1 b2 b3 b4 b5 b

118 b1 b2 b3 b4 b5 b

119 b1 b2 b3 b4 b5 b

120 b1 b2 b3 b4 b5 b

121 DEMO 90

122 2nd Data-refinement 91 b1 b2 b3 b4 b4 b Abstract (sequence) b1 b2 b3 b4 b4 b6 Concrete (chain)

123 b1

124 b1 b2

125 b1 b2

126 b1 b2

127 b1 b2 b3

128 b1 b2 b3

129 b1 b2 b3

130 b1 b2 b3 b4

131 b1 b2 b3 b4

132 b1 b2 b3 b4 b5

133 b1 b2 b3 b4 b5

134 b1 b2 b3 b4 b5 b6

135 b1 b2 b3 b4 b5 b6

136 b1 b2 b3 b4 b5 b6

137 b1 b2 b3 b4 b5 b6

138 DEMO 92

139 3rd Data-refinement 93 b1 b2 b3 b4 b5 b6 Abstract (chain) b1 b2 b3 b4 b5 b6 Concrete (card)

140 b1

141 b1 b2

142 b1 b2

143 b1 b2

144 b1 b2 b3

145 b1 b2 b3

146 b1 b2 b3

147 b1 b2 b3 b4

148 b1 b2 b3 b4

149 b1 b2 b3 b4 b5

150 b1 b2 b3 b4 b5

151 b1 b2 b3 b4 b5 b6

152 b1 b2 b3 b4 b5 b6

153 b1 b2 b3 b4 b5 b6

154 b1 b2 b3 b4 b5 b6

155 DEMO 94

156 4th Data-refinement 95 b1 b2 b3 b4 b5 b6 Abstract (card) b1 b2 b3 b4 b5 b6 Concrete (card and guest) g1 g2 g3 g4 g5

157 b1

158 b1 b2 g1

159 b1 b2 g1

160 b1 b2 b3 g1 g2

161 b1 b2 b3 g1 g2

162 b1 b2 b3 g1 g2

163 b1 b2 b3 b4 g1 g2 g3

164 b1 b2 b3 b4 g1 g2 g3

165 b1 b2 b3 b4 b5 g1 g2 g3 g4

166 b1 b2 b3 b4 b5 g1 g2 g3 g4

167 b1 b2 b3 b4 b5 b6 g1 g2 g3 g4

168 b1 b2 b3 b4 b5 b6 g1 g2 g3 g4 Here, we have a serious problem Guest g3 has got two cards (he never used the old one) He figures out that the new one does not open the room So, he tries the old one, which allows him to enter into the room he booked But he is not safe: guest g4 can enter the room

169 Solution 96 - Never use an old card, event if it opens the room - Go back to the lobby - Ask someone to open the door with a master-card

170 DEMO 97

171 Summary of Data-refinements 98 b1 b2 b3 b4 b5 b6 set b1 b2 b3 b4 b5 b sequence b1 b2 b3 b4 b5 b6 chain b1 b2 b3 b4 b5 b6 card b1 b2 b3 b4 b5 b6 card and guest g1 g2 g3 g4 g5

172 Conclusion 99 - We ve done our best to build a professional tool - Use it, it s fun - We are in the process of constructing a Rodin Platform web-site - Give us any feedback

173 Thanks for listening

Formal Methods: Theory Becoming Practice

Formal Methods: Theory Becoming Practice Journal of Universal Computer Science, vol. 13, no. 5 (2007), 619-628 submitted: 7/5/07, accepted: 25/5/07, appeared: 28/5/07 J.UCS Formal Methods: Theory Becoming Practice Jean-Raymond Abrial (ETHZ, Zurich,

More information

Formal Composition for. Time-Triggered Systems

Formal Composition for. Time-Triggered Systems Formal Composition for Time-Triggered Systems John Rushby and Ashish Tiwari Rushby,Tiwari@csl.sri.com Computer Science Laboratory SRI International Menlo Park CA 94025 Rushby, Tiwari, SR I Formal Composition

More information

CITS2211 Discrete Structures Turing Machines

CITS2211 Discrete Structures Turing Machines CITS2211 Discrete Structures Turing Machines October 23, 2017 Highlights We have seen that FSMs and PDAs are surprisingly powerful But there are some languages they can not recognise We will study a new

More information

Pervasive Services Engineering for SOAs

Pervasive Services Engineering for SOAs Pervasive Services Engineering for SOAs Dhaminda Abeywickrama (supervised by Sita Ramakrishnan) Clayton School of Information Technology, Monash University, Australia dhaminda.abeywickrama@infotech.monash.edu.au

More information

A Healthcare Case Study (Extended abstract)

A Healthcare Case Study (Extended abstract) A Healthcare Case Study (Extended abstract) The MATISSE-project 1 L. Petre, E. Troubitsyna and M. Waldén 2 Åbo Akademi University / TUCS Finland 1. Motivation for using formal methods Within our healthcare

More information

Notes for Recitation 3

Notes for Recitation 3 6.042/18.062J Mathematics for Computer Science September 17, 2010 Tom Leighton, Marten van Dijk Notes for Recitation 3 1 State Machines Recall from Lecture 3 (9/16) that an invariant is a property of a

More information

Requirements Gathering using Object- Oriented Models

Requirements Gathering using Object- Oriented Models Requirements Gathering using Object- Oriented Models Cycle de vie d un logiciel Software Life Cycle The "software lifecycle" refers to all stages of software development from design to disappearance. The

More information

Day 1: June 6, 2011 (Kristin, Shirley, Sheryle, Amber) 8:30 Norms, parking lot (Shirley) 8:40 Class builder (Sheryle) 8:50 PS 1 Materials: Rulers,

Day 1: June 6, 2011 (Kristin, Shirley, Sheryle, Amber) 8:30 Norms, parking lot (Shirley) 8:40 Class builder (Sheryle) 8:50 PS 1 Materials: Rulers, Day 1: June 6, 2011 (Kristin, Shirley, Sheryle, Amber) 8:30 Norms, parking lot (Shirley) 8:40 Class builder (Sheryle) 8:50 PS 1 Materials: Rulers, protractors, colored pencils, shapes printed on colored

More information

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator.

Lecture 32. Handout or Document Camera or Class Exercise. Which of the following is equal to [53] [5] 1 in Z 7? (Do not use a calculator. Lecture 32 Instructor s Comments: This is a make up lecture. You can choose to cover many extra problems if you wish or head towards cryptography. I will probably include the square and multiply algorithm

More information

Policy for Control Procedures for Examination and Assessment Marking and Recording of Marks

Policy for Control Procedures for Examination and Assessment Marking and Recording of Marks Policy for Control Procedures for Examination and Assessment Marking and Recording of Marks Version: May 2015 Date last amended: 27/05/2015 File name: Marking Review Refer to: GAR Policy- May 2015 Note:

More information

The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems

The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems AMADEOS Architecture for Multi-criticality Agile Dependable Evolutionary Open System-of-Systems FP7-ICT-2013.3.4 - Grant Agreement n 610535 The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems

More information

Sign Up Script (This would be used after the Prospect has received their Decision Pack)

Sign Up Script (This would be used after the Prospect has received their Decision Pack) Updated 12/24/2003 Sign Up Script (This would be used after the Prospect has received their Decision Pack) If you do not have pre -set appointment with the Prospect when they call you, and they want to

More information

CSSE220 BomberMan programming assignment Team Project

CSSE220 BomberMan programming assignment Team Project CSSE220 BomberMan programming assignment Team Project You will write a game that is patterned off the 1980 s BomberMan game. You can find a description of the game, and much more information here: http://strategywiki.org/wiki/bomberman

More information

How to Present a 4 H Computer Assisted Demonstra on

How to Present a 4 H Computer Assisted Demonstra on How to Present a 4 H Computer Assisted Demonstra on Copyright Rules If you look under the insert menu of many applications, you may find the option to insert pictures or clip art. If you are going to use

More information

BuildER s Guide. Overlap technique

BuildER s Guide. Overlap technique full color U N O F F I C I A L THE LEGO BuildER s Guide 2 n d e d i t i o n Allan Bedford Overlap Technique Stagger technique Hybrid Column 6 Microscale Building: More Than Meets the Eye In Chapter 5,

More information

An introduction to software development. Dr. C. Constantinides, P.Eng. Computer Science and Software Engineering Concordia University

An introduction to software development. Dr. C. Constantinides, P.Eng. Computer Science and Software Engineering Concordia University An introduction to software development Dr. C. Constantinides, P.Eng. Computer Science and Software Engineering Concordia University What type of projects? Small-scale projects Can be built (normally)

More information

Here s what we re going to do:

Here s what we re going to do: Here s what we re going to do: *Get to know each other a little *WE LL DISCUSS Mary Kay'S business PLan & I LL answer any QUESTIOnS *at THE EnD, I LL ask If HavIng your own Mary Kay business is something

More information

Coaching Welcome Pack. One-on-one Coaching Welcome Pack

Coaching Welcome Pack. One-on-one Coaching Welcome Pack One-on-one Coaching Welcome Pack 1 V1.4 January 2019 Copyright 2019 The Song Foundry, Inc. 2 Welcome! Congratulations on signing up for a coaching package! I m excited to work with you and hope you get

More information

COMMUNICATOR GUIDE. Best Seller / Week 3 PRELUDE SOCIAL WORSHIP STORY GROUPS HOME SCRIPTURE TEACHING OUTLINE TENSION

COMMUNICATOR GUIDE. Best Seller / Week 3 PRELUDE SOCIAL WORSHIP STORY GROUPS HOME SCRIPTURE TEACHING OUTLINE TENSION COMMUNICATOR GUIDE Best Seller / Week 3 PRELUDE SOCIAL WORSHIP STORY GROUPS HOME BOTTOM LINE GOAL OF SMALL GROUP Memorizing Scripture makes you stronger. To encourage students to memorize one or two Bible

More information

Object-oriented Analysis and Design

Object-oriented Analysis and Design Object-oriented Analysis and Design Stages in a Software Project Requirements Writing Understanding the Client s environment and needs. Analysis Identifying the concepts (classes) in the problem domain

More information

8.2 Slippery Slopes. A Solidify Understanding Task

8.2 Slippery Slopes. A Solidify Understanding Task 7 8.2 Slippery Slopes A Solidify Understanding Task CC BY https://flic.kr/p/kfus4x While working on Is It Right? in the previous module you looked at several examples that lead to the conclusion that the

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,

More information

18.204: CHIP FIRING GAMES

18.204: CHIP FIRING GAMES 18.204: CHIP FIRING GAMES ANNE KELLEY Abstract. Chip firing is a one-player game where piles start with an initial number of chips and any pile with at least two chips can send one chip to the piles on

More information

Introduction to ACL2. Matt Kaufmann The University of Texas at Austin Dept. of Computer Science, GDC April 21-23, 2015

Introduction to ACL2. Matt Kaufmann The University of Texas at Austin Dept. of Computer Science, GDC April 21-23, 2015 Introduction to ACL2 Matt Kaufmann The University of Texas at Austin Dept. of Computer Science, GDC 7.804 April 21-23, 2015 2/39 OUTLINE Introduction Context Prover Automation and Control ACL2 Variants

More information

Review paper on formal methods

Review paper on formal methods Review paper on formal methods Pooja Sharma Pranveer Singh Institute of Technology Kanpur, U.P. (208020) U.P.T.U., Lucknow Raghuraj singh suryavanshi Pranveer Singh Institute of Technology Kanpur, U.P.

More information

Software verification

Software verification Software verification Will it ever work? Ofer Strichman, Technion 1 Testing: does the program behave as expected for a given set of inputs? Formal Verification: does the program behave as specified for

More information

Skylands Learning is your trusted learning advisor. That is our promise your trusted learning advisor. Four simple words.

Skylands Learning is your trusted learning advisor. That is our promise your trusted learning advisor. Four simple words. Page 1 of 12 METHODOLOGY Who we are Skylands Learning is your trusted learning advisor. That is our promise your trusted learning advisor. Four simple words. Not enough information? At Skylands, we have

More information

the gamedesigninitiative at cornell university Lecture 4 Game Grammars

the gamedesigninitiative at cornell university Lecture 4 Game Grammars Lecture 4 Sources for Today s Talk Raph Koster (one of original proponents) Theory of Fun, 10 Years Later (GDCOnline 2012) http://raphkoster.com Ernest Adams and Joris Dormans Game Mechanics: Advanced

More information

Begin with Content Conference

Begin with Content Conference WRITING EXCERPT p. 226 229 Begin with Content Conference My experience has been that it takes some convincing to get teachers to focus first on content and initially ignore editing concerns. Editing is

More information

Tiling Problems. This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane

Tiling Problems. This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane Tiling Problems This document supersedes the earlier notes posted about the tiling problem. 1 An Undecidable Problem about Tilings of the Plane The undecidable problems we saw at the start of our unit

More information

Block Markov Encoding & Decoding

Block Markov Encoding & Decoding 1 Block Markov Encoding & Decoding Deqiang Chen I. INTRODUCTION Various Markov encoding and decoding techniques are often proposed for specific channels, e.g., the multi-access channel (MAC) with feedback,

More information

Distributed System Security via Logical Frameworks

Distributed System Security via Logical Frameworks Distributed System Security via Logical Frameworks Frank Pfenning Carnegie Mellon University Invited Talk Workshop on Issues in the Theory of Security (WITS 05) Long Beach, California, January 10-11, 2005

More information

From Proposal to Presentation. 10 ways to help ensure that your proposal makes it to the top of the pile

From Proposal to Presentation. 10 ways to help ensure that your proposal makes it to the top of the pile From Proposal to Presentation 10 ways to help ensure that your proposal makes it to the top of the pile 43RD ANNUAL CONFERENCE NATIONAL WELLNESS National Wellness CONFERENCE NAVIGATING WELLNESS MAPPING

More information

Theorem Proving and Model Checking

Theorem Proving and Model Checking Theorem Proving and Model Checking (or: how to have your cake and eat it too) Joe Hurd joe.hurd@comlab.ox.ac.uk Cakes Talk Computing Laboratory Oxford University Theorem Proving and Model Checking Joe

More information

What do you see? Are there things about yourself that you don t like? Is there something you re thankful for about yourself?

What do you see? Are there things about yourself that you don t like? Is there something you re thankful for about yourself? Identity Look in the mirror, take your time. What do you see? Are there things about yourself that you don t like? Is there something you re thankful for about yourself? Christians believe that God made

More information

National Association of Rocketry Training Rocketeers for Experience and Knowledge NARTREK. Bronze Achievement Level HOW TO USE THIS PACKET

National Association of Rocketry Training Rocketeers for Experience and Knowledge NARTREK. Bronze Achievement Level HOW TO USE THIS PACKET HOW TO USE THIS PACKET This online copy of the packet is part of a special promotion. With this packet, any NAR member can try out the program with no advance payment! Here s how it works: Print out this

More information

EECS 203 Spring 2016 Lecture 15 Page 1 of 6

EECS 203 Spring 2016 Lecture 15 Page 1 of 6 EECS 203 Spring 2016 Lecture 15 Page 1 of 6 Counting We ve been working on counting for the last two lectures. We re going to continue on counting and probability for about 1.5 more lectures (including

More information

FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS

FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS Meriem Taibi 1 and Malika Ioualalen 1 1 LSI - USTHB - BP 32, El-Alia, Bab-Ezzouar, 16111 - Alger, Algerie taibi,ioualalen@lsi-usthb.dz

More information

UNIT-III LIFE-CYCLE PHASES

UNIT-III LIFE-CYCLE PHASES INTRODUCTION: UNIT-III LIFE-CYCLE PHASES - If there is a well defined separation between research and development activities and production activities then the software is said to be in successful development

More information

Bellerophon: Tactical Theorem Proving for Hybrid Systems. Nathan Fulton, Stefan Mitsch, Brandon Bohrer, André Platzer Carnegie Mellon University

Bellerophon: Tactical Theorem Proving for Hybrid Systems. Nathan Fulton, Stefan Mitsch, Brandon Bohrer, André Platzer Carnegie Mellon University Bellerophon: Tactical Theorem Proving for Hybrid Systems Nathan Fulton, Stefan Mitsch, Brandon Bohrer, André Platzer Carnegie Mellon University Cyber-Physical Systems Cyber-Physical Systems combine computation

More information

ECE 1778: Creative Applications for Mobile Devices

ECE 1778: Creative Applications for Mobile Devices ECE 1778: Creative Applications for Mobile Devices Lecture 7 October 28, 2016 (1) Today 1. Guest Lecture from Jason Hyde 2. Logistics 3. Presentations (2) Jason Hyde n VP Creative & User Experience at

More information

Towards an MDA-based development methodology 1

Towards an MDA-based development methodology 1 Towards an MDA-based development methodology 1 Anastasius Gavras 1, Mariano Belaunde 2, Luís Ferreira Pires 3, João Paulo A. Almeida 3 1 Eurescom GmbH, 2 France Télécom R&D, 3 University of Twente 1 gavras@eurescom.de,

More information

Countability. Jason Filippou UMCP. Jason Filippou UMCP) Countability / 12

Countability. Jason Filippou UMCP. Jason Filippou UMCP) Countability / 12 Countability Jason Filippou CMSC250 @ UMCP 06-23-2016 Jason Filippou (CMSC250 @ UMCP) Countability 06-23-2016 1 / 12 Outline 1 Infinity 2 Countability of integers and rationals 3 Uncountability of R Jason

More information

The mathematics of the flip and horseshoe shuffles

The mathematics of the flip and horseshoe shuffles The mathematics of the flip and horseshoe shuffles Steve Butler Persi Diaconis Ron Graham Abstract We consider new types of perfect shuffles wherein a deck is split in half, one half of the deck is reversed,

More information

3.6 Implementation. Dr. Tarek A. Tutunji Philadelphia University, Jordan. Engineering Skills, Philadelphia University

3.6 Implementation. Dr. Tarek A. Tutunji Philadelphia University, Jordan. Engineering Skills, Philadelphia University 3.6 Implementation Philadelphia University, Jordan Preview In the previous sequence, Analysis and Design was discussed. In this sequence, Implementation will be presented. Seven Design Steps 1. Define

More information

Use Your Business to Grow Your Income

Use Your Business to Grow Your Income Leigh Kirk & Megan Proctor Good morning to the future of PartyLite! YOU! You are going to take our company and your business to the next level when you leave LITE14! You will be the one to inspire and

More information

Conversion Masters in IT (MIT) AI as Representation and Search. (Representation and Search Strategies) Lecture 002. Sandro Spina

Conversion Masters in IT (MIT) AI as Representation and Search. (Representation and Search Strategies) Lecture 002. Sandro Spina Conversion Masters in IT (MIT) AI as Representation and Search (Representation and Search Strategies) Lecture 002 Sandro Spina Physical Symbol System Hypothesis Intelligent Activity is achieved through

More information

37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game

37 Game Theory. Bebe b1 b2 b3. a Abe a a A Two-Person Zero-Sum Game 37 Game Theory Game theory is one of the most interesting topics of discrete mathematics. The principal theorem of game theory is sublime and wonderful. We will merely assume this theorem and use it to

More information

September G Community Resource Day. When: Sept. 27th, 11am-3pm. Where: Silverton Community Center, 421 S. Water St

September G Community Resource Day. When: Sept. 27th, 11am-3pm. Where: Silverton Community Center, 421 S. Water St Silverton Area Community Aid SACA Services UPCOMING EVENTS Figaro s Pizza Night When: Tues., Sept 23rd, 4-8pm Where: 402 McClaine St. Join us at Figaro s for great pizza and a fun way to support SACA!

More information

Subway simulator Case study

Subway simulator Case study Subway simulator Case study Marco Scotto 2004/2005 Outline Requirements Use cases Class Identification Class Diagrams Sequence & Activity Diagrams 2 Vision of the subway control system Terminal station

More information

CS277 - Experimental Haptics Lecture 2. Haptic Rendering

CS277 - Experimental Haptics Lecture 2. Haptic Rendering CS277 - Experimental Haptics Lecture 2 Haptic Rendering Outline Announcements Human haptic perception Anatomy of a visual-haptic simulation Virtual wall and potential field rendering A note on timing...

More information

Instruction Manual for Concept Simulators. Signals and Systems. M. J. Roberts

Instruction Manual for Concept Simulators. Signals and Systems. M. J. Roberts Instruction Manual for Concept Simulators that accompany the book Signals and Systems by M. J. Roberts March 2004 - All Rights Reserved Table of Contents I. Loading and Running the Simulators II. Continuous-Time

More information

Improved Model Generation of AMS Circuits for Formal Verification

Improved Model Generation of AMS Circuits for Formal Verification Improved Generation of AMS Circuits for Formal Verification Dhanashree Kulkarni, Satish Batchu, Chris Myers University of Utah Abstract Recently, formal verification has had success in rigorously checking

More information

Formally Verified Endgame Tables

Formally Verified Endgame Tables Formally Verified Endgame Tables Joe Leslie-Hurd Intel Corp. joe@gilith.com Guest Lecture, Combinatorial Games Portland State University Thursday 25 April 2013 Joe Leslie-Hurd Formally Verified Endgame

More information

Help With Pepper On It

Help With Pepper On It http://www.phantasmechanics.com/pepper.html Help With Pepper On It We get a lot of questions about the Pepper's Ghost illusion as shown in the Haunted Hotel (Hotel Lugosi) and Tom Marchak's Grim Organist.

More information

Today. Sketching and Toolkits. Questions? Announcements 10/02/2017. February 9, Finishing coding activity. Sketching.

Today. Sketching and Toolkits. Questions? Announcements 10/02/2017. February 9, Finishing coding activity. Sketching. Today Finishing coding activity Sketching and Toolkits February 9, 2017 Sketching Toolkits Winter 2017 COMP 4020 2 Announcements Questions? A1/MSI marks are available on UM Learn Feedback is in an attached

More information

Publish & Flourish: Become a Prolific Scholar. Tara Gray*

Publish & Flourish: Become a Prolific Scholar. Tara Gray* Publish & Flourish: Become a Prolific Scholar Tara Gray* The myth persists that prolific scholars are born, not made, but research suggests otherwise. Much is known about how to become more prolific and

More information

50 + WAYS TO GET MORE ENGAGEMENT ON YOUR FACEBOOK PAGE DR. JEN BENNETT

50 + WAYS TO GET MORE ENGAGEMENT ON YOUR FACEBOOK PAGE DR. JEN BENNETT 1. It s all about the visual right now! Share pictures, lots of pictures! Create some great ain free graphics with apps like: InstaQuote, PicMonkey, Canva and Word Swag that contain a quote or an inspirational

More information

Introduction to Neuro-Dynamic Programming (Or, how to count cards in blackjack and do other fun things too.)

Introduction to Neuro-Dynamic Programming (Or, how to count cards in blackjack and do other fun things too.) Introduction to Neuro-Dynamic Programming (Or, how to count cards in blackjack and do other fun things too.) Eric B. Laber February 12, 2008 Eric B. Laber () Introduction to Neuro-Dynamic Programming (Or,

More information

Federation of Genealogical Societies. by Carmen J. Finley, Ph.D., CG. Supplemental Page

Federation of Genealogical Societies. by Carmen J. Finley, Ph.D., CG. Supplemental Page Society Strategies Federation of Genealogical Societies P.O. Box 200940 Austin TX 78720-0940 Series Set VI Number 7 2002 Set VI Strategies for Program Chairpersons by Carmen J. Finley, Ph.D., CG Supplemental

More information

DC Motor and Servo motor Control with ARM and Arduino. Created by:

DC Motor and Servo motor Control with ARM and Arduino. Created by: DC Motor and Servo motor Control with ARM and Arduino Created by: Andrew Kaler (39345) Tucker Boyd (46434) Mohammed Chowdhury (860822) Tazwar Muttaqi (901700) Mark Murdock (98071) May 4th, 2017 Objective

More information

Pass-Words Help Doc. Note: PowerPoint macros must be enabled before playing for more see help information below

Pass-Words Help Doc. Note: PowerPoint macros must be enabled before playing for more see help information below Pass-Words Help Doc Note: PowerPoint macros must be enabled before playing for more see help information below Setting Macros in PowerPoint The Pass-Words Game uses macros to automate many different game

More information

NORTHSIDE COIN CLUB C IN CHATTER

NORTHSIDE COIN CLUB C IN CHATTER NORTHSIDE COIN CLUB C IN CHATTER P.O. Box 1837 Broomfield, CO 80038-1837 June 2012 Founded in 2001, Member: ANA, CWNA Upcoming Meeting Announcement The monthly Northside Coin Club meeting will be held

More information

BIM 360 with AutoCAD Civil 3D, Autodesk Vault Collaboration AEC, and Autodesk Buzzsaw

BIM 360 with AutoCAD Civil 3D, Autodesk Vault Collaboration AEC, and Autodesk Buzzsaw BIM 360 with AutoCAD Civil 3D, Autodesk Vault Collaboration AEC, and Autodesk Buzzsaw James Wedding, P.E. Autodesk, Inc. CI4500 The modern design team does not end at the meeting room door, and by leveraging

More information

8.2 Slippery Slopes. A Solidify Understanding Task

8.2 Slippery Slopes. A Solidify Understanding Task SECONDARY MATH I // MODULE 8 7 8.2 Slippery Slopes A Solidify Understanding Task CC BY https://flic.kr/p/kfus4x While working on Is It Right? in the previous module you looked at several examples that

More information

Storytelling Toolkit. Use this resource to help you craft stronger and more compelling stories. The Early Childhood Innovation Prize

Storytelling Toolkit. Use this resource to help you craft stronger and more compelling stories. The Early Childhood Innovation Prize Storytelling Toolkit Use this resource to help you craft stronger and more compelling stories. The Early Childhood Innovation Prize 1 Why Storytelling? We want to help you craft better stories so that

More information

Tian, H. (HaiYun); Brooke, P. J. (Phillip); Bosser, A-G. (Anne-Gwenn)

Tian, H. (HaiYun); Brooke, P. J. (Phillip); Bosser, A-G. (Anne-Gwenn) TeesRep - Teesside's Research Repository Behaviour-based cheat detection in multiplayer games with Event-B Item type Authors Citation DOI Publisher Rights Meetings and Proceedings Tian, H. (HaiYun); Brooke,

More information

Formalising Concurrent UML State Machines Using Coloured Petri Nets

Formalising Concurrent UML State Machines Using Coloured Petri Nets KSE 2014 October 10th, 2014 Hanoi Formalising Concurrent UML State Machines Using Coloured Petri Nets Étienne André, Mohamed Mahdi Benmoussa, Christine Choppy Université Paris 13, Sorbonne Paris Cité,

More information

Step by step success

Step by step success Step by step success Guaranteed SUCCESS IF FOLLOWED EXACTLY! Completed: Listen to the Welcome/Orientation Tape. Choose your initial inventory level. Call Agnes to assist with placing order. Attend New

More information

We're excited to announce that the next JAFX Trading Competition will soon be live!

We're excited to announce that the next JAFX Trading Competition will soon be live! COMPETITION Competition Swipe - Version #1 Title: Know Your Way Around a Forex Platform? Here s Your Chance to Prove It! We're excited to announce that the next JAFX Trading Competition will soon be live!

More information

Ma/CS 6a Class 16: Permutations

Ma/CS 6a Class 16: Permutations Ma/CS 6a Class 6: Permutations By Adam Sheffer The 5 Puzzle Problem. Start with the configuration on the left and move the tiles to obtain the configuration on the right. The 5 Puzzle (cont.) The game

More information

Capability Through Collaboration

Capability Through Collaboration Capability Through Collaboration Success Factors in creating a capable ADF Capability Capability through collaboration through collaboration Mark Hodge CEO October 2017 DMTC Operational Context Vision:

More information

With successful coaching you should be holding at least 1 out of every 3 appointments you book. WE WILL TAKE YOU THROUGH THE FOLLOWING 3 STEPS...

With successful coaching you should be holding at least 1 out of every 3 appointments you book. WE WILL TAKE YOU THROUGH THE FOLLOWING 3 STEPS... P OWER DO YOU NEED A great plan COACHING PROGRAM? A party worth booking is a party worth coaching! You ve booked them... now what? With successful coaching you should be holding at least 1 out of every

More information

DEMYSTIFYING DESIGN-BUILD. How to Make the Design-Build Process Simple and Fun

DEMYSTIFYING DESIGN-BUILD. How to Make the Design-Build Process Simple and Fun DEMYSTIFYING DESIGN-BUILD How to Make the Design-Build Process Simple and Fun What would your dream home look like? What would it feel like? What do you need, want, and wish for in the perfect house? It

More information

Salesforce Communities Recognition Badges Implementation Guide

Salesforce Communities Recognition Badges Implementation Guide Salesforce Communities Recognition Badges Implementation Guide Salesforce, Winter 19 @salesforcedocs Last updated: December 4, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce

More information

Party Date. Party Type

Party Date. Party Type 1 We are going to keep things simple and help you get results. This is a combination of different scripts, coaching systems and hostess programs. The idea is to connect with each potential guest through

More information

VARIATIONS ON NARROW DOTS-AND-BOXES AND DOTS-AND-TRIANGLES

VARIATIONS ON NARROW DOTS-AND-BOXES AND DOTS-AND-TRIANGLES #G2 INTEGERS 17 (2017) VARIATIONS ON NARROW DOTS-AND-BOXES AND DOTS-AND-TRIANGLES Adam Jobson Department of Mathematics, University of Louisville, Louisville, Kentucky asjobs01@louisville.edu Levi Sledd

More information

SOFTWARE ARCHITECTURE

SOFTWARE ARCHITECTURE SOFTWARE ARCHITECTURE Foundations, Theory, and Practice Richard N. Taylor University of California, Irvine Nenad Medvidovic University of Southern California Eric M. Dashofy The Aerospace Corporation WILEY

More information

My Earnings from PeoplePerHour:

My Earnings from PeoplePerHour: Hey students and everyone reading this post, since most of the readers of this blog are students, that s why I may call students throughout this post. Hope you re doing well with your educational activities,

More information

Section Summary. Finite Probability Probabilities of Complements and Unions of Events Probabilistic Reasoning

Section Summary. Finite Probability Probabilities of Complements and Unions of Events Probabilistic Reasoning Section 7.1 Section Summary Finite Probability Probabilities of Complements and Unions of Events Probabilistic Reasoning Probability of an Event Pierre-Simon Laplace (1749-1827) We first study Pierre-Simon

More information

Investigating Model-Based Autonomy for Solar Probe Plus.

Investigating Model-Based Autonomy for Solar Probe Plus. Investigating Model-Based Autonomy for Solar Probe Plus. Workshop on Spacecraft Flight Software. December, 2013. Bill Van Besien Flight Software Engineer (Notice: This presentation does not contain export

More information

Lesson 3: Arduino. Goals

Lesson 3: Arduino. Goals Introduction: This project introduces you to the wonderful world of Arduino and how to program physical devices. In this lesson you will learn how to write code and make an LED flash. Goals 1 - Get to

More information

Graduate Programs in Advanced Systems Engineering

Graduate Programs in Advanced Systems Engineering Graduate Programs in Advanced Systems Engineering UTC Institute for Advanced Systems Engineering, University of Connecticut Mission To train the engineer of the next decade: the one who is not constrained

More information

The 30-Day Journaling Challenge

The 30-Day Journaling Challenge The 30-Day Journaling Challenge Welcome to The Sweet Setup s 30-Day Journaling Challenge! While you don t have to use Day One for the 30-Day Journaling Challenge, we have designed it with Day One in mind.

More information

The On-Line Encyclopedia of Integer Sequences (OEIS)

The On-Line Encyclopedia of Integer Sequences (OEIS) The On-Line Encyclopedia of Integer Sequences (OEIS) Thotsaporn Aek Thanatipanonda Mahidol University, International College September 26, 2018 of Integer Sequences (OEIS) September 26, 2018 1 / 14 Introduction

More information

Phase 1: Ideation Getting Started with Concept Testing

Phase 1: Ideation Getting Started with Concept Testing Phase 1: Ideation Getting Started with Concept Testing The Social Venture Academy follows a lean-startup model. This means we guide you through figuring out as much as you can about your venture before

More information

iphoto Getting Started Get to know iphoto and learn how to import and organize your photos, and create a photo slideshow and book.

iphoto Getting Started Get to know iphoto and learn how to import and organize your photos, and create a photo slideshow and book. iphoto Getting Started Get to know iphoto and learn how to import and organize your photos, and create a photo slideshow and book. 1 Contents Chapter 1 3 Welcome to iphoto 3 What You ll Learn 4 Before

More information

STUDY ON FIREWALL APPROACH FOR THE REGRESSION TESTING OF OBJECT-ORIENTED SOFTWARE

STUDY ON FIREWALL APPROACH FOR THE REGRESSION TESTING OF OBJECT-ORIENTED SOFTWARE STUDY ON FIREWALL APPROACH FOR THE REGRESSION TESTING OF OBJECT-ORIENTED SOFTWARE TAWDE SANTOSH SAHEBRAO DEPT. OF COMPUTER SCIENCE CMJ UNIVERSITY, SHILLONG, MEGHALAYA ABSTRACT Adherence to a defined process

More information

G51PGP: Software Paradigms. Object Oriented Coursework 4

G51PGP: Software Paradigms. Object Oriented Coursework 4 G51PGP: Software Paradigms Object Oriented Coursework 4 You must complete this coursework on your own, rather than working with anybody else. To complete the coursework you must create a working two-player

More information

How we Got Here and Where to Take it. Scott Hudson HCI Institute Carnegie Mellon

How we Got Here and Where to Take it. Scott Hudson HCI Institute Carnegie Mellon How we Got Here and Where to Take it Scott Hudson HCI Institute Carnegie Mellon Instagram: Two guys, two years 30 million users (now 300 million) What made that possible? Enablers Making it easy to make

More information

Senior Math Circles February 10, 2010 Game Theory II

Senior Math Circles February 10, 2010 Game Theory II 1 University of Waterloo Faculty of Mathematics Centre for Education in Mathematics and Computing Senior Math Circles February 10, 2010 Game Theory II Take-Away Games Last Wednesday, you looked at take-away

More information

The EIS Planning Tool User's Guide

The EIS Planning Tool User's Guide 1 of 26 01/11/06 11:49 The EIS Planning Tool User's Guide The EIS Planning Tool User's Guide Introduction About This Guide Software Requirements Structure of a Study Line Lists Rasters Studies A Quick

More information

How to Harness Your Hypercreativity for Success: The 2 Steps You Must Take Today

How to Harness Your Hypercreativity for Success: The 2 Steps You Must Take Today Page1 How to Harness Your Hypercreativity for Success: The 2 Steps You Must Take Today What s the secret to harnessing your creativity your hypercreativity to build the success you crave and know you deserve?

More information

Lesson Activity Toolkit

Lesson Activity Toolkit Lesson Activity Toolkit Tool name Tool definition Ideas for tool use Screen shot of tool Activities Anagram Unscramble given letters to solve problems. Unscramble for word games Category sort - Category

More information

NSF. Hybrid Systems: From Models to Code. Tom Henzinger. UC Berkeley. French Guyana, June 4, 1996 $800 million embedded software failure

NSF. Hybrid Systems: From Models to Code. Tom Henzinger. UC Berkeley. French Guyana, June 4, 1996 $800 million embedded software failure Hybrid Systems: From Models to Code Tom Henzinger UC Berkeley NSF UC Berkeley: Chess Vanderbilt University: ISIS University of Memphis: MSI Foundations of Hybrid and Embedded Software Systems French Guyana,

More information

How to divide things fairly

How to divide things fairly MPRA Munich Personal RePEc Archive How to divide things fairly Steven Brams and D. Marc Kilgour and Christian Klamler New York University, Wilfrid Laurier University, University of Graz 6. September 2014

More information

A review of Reasoning About Rational Agents by Michael Wooldridge, MIT Press Gordon Beavers and Henry Hexmoor

A review of Reasoning About Rational Agents by Michael Wooldridge, MIT Press Gordon Beavers and Henry Hexmoor A review of Reasoning About Rational Agents by Michael Wooldridge, MIT Press 2000 Gordon Beavers and Henry Hexmoor Reasoning About Rational Agents is concerned with developing practical reasoning (as contrasted

More information

Welcome to SENG 480B / CSC 485A / CSC 586A Self-Adaptive and Self-Managing Systems

Welcome to SENG 480B / CSC 485A / CSC 586A Self-Adaptive and Self-Managing Systems Welcome to SENG 480B / CSC 485A / CSC 586A Self-Adaptive and Self-Managing Systems Dr. Hausi A. Müller Department of Computer Science University of Victoria http://courses.seng.uvic.ca/courses/2015/summer/seng/480a

More information

On the Economics of Synthetic Biology: Is Openness Feasible?

On the Economics of Synthetic Biology: Is Openness Feasible? On the Economics of Synthetic Biology: Is Openness Feasible? Joachim Henkel, Steve Maurer Technische Universität München, UC Berkeley SB 3.0, Zürich June 25, 2007 Sharing vs. Patenting what characterizes

More information

Buying and Holding Houses: Creating Long Term Wealth

Buying and Holding Houses: Creating Long Term Wealth Buying and Holding Houses: Creating Long Term Wealth The topic: buying and holding a house for monthly rental income and how to structure the deal. Here's how you buy a house and you rent it out and you

More information