On Type-holding and type-repelling lambda-term skeletons, with applications to all-term and random-term generation of simply-typed closed lambda terms

Size: px
Start display at page:

Download "On Type-holding and type-repelling lambda-term skeletons, with applications to all-term and random-term generation of simply-typed closed lambda terms"

Transcription

1 On Type-hoding and type-repeing ambda-term skeetons, with appications to a-term and random-term generation of simpy-typed cosed ambda terms Pau Tarau Department of Computer Science and Engineering Uniersity of North Texas CLA 2017 Research supported by NSF grant Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

2 Motiation simpy-typed cosed ambda terms enjoy a number of nice properties, but the study of their combinatoria properties is notoriousy hard the two most striking things when inferring types: non-monotonicity: crossing a ambda increases the size of the type, whie crossings an appication node trims it down agreement ia unification (with occurs check) between the types of each ariabe under a ambda as a methodica work-around: can we unwrap some of new obserabes that highight interesting statistica properties? going deeper in the structure of the term than what their CF-syntax reeas we need abstraction mechanisms that forget properties of the difficut cass (simpy-typed cosed ambda terms) to reea equiaence casses that might be easier to grasp k-coored Motzkin skeetons bijections with simper things: from binary trees to 2-coored Motzkin trees Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

3 Outine 1 A bijection between 2-coored Motzkin trees and non-empty binary trees 2 Motzkin skeetons for cosed, affine and inear terms 3 K-coored ambda terms and type inference 4 Type-hoding and type-repeing skeetons 5 An appication to random ambda term generators 6 Reated work 7 Concusions Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

4 Making ambda terms (somewhat) more coorfu 2-coored Motzkin trees: the free agebra generated by the constructors /0, /1, r/1 and a/2 we spit ambda constructors into 2 casses: binding ambdas, /1 that are reached by at east one de Bruijn index free ambdas, r/1, that cannot be reached by any de Bruijn index a side note: free ambda terms wi hae no say on terms being cosed, but they wi impact on which cosed terms are simpy typed ambda terms in de Bruijn form: as the free agebra generated by the constructors /1, r/1 and a/2 with eaes abeed with natura numbers (and seen as wrapped with the constructor /1 when conenient) 2-coored Motzkin skeeton of a ambda term: the tree obtained by erasing the de Bruijn indices abeing their eaes Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

5 A bijection between 2-coored Motzkin trees and non-empty binary trees Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

6 A bijection between 2-coored Motzkin trees and non-empty binary trees binary trees: the free agebra generated by e/0 and c/2 bijections between the Cataan famiy of combinatoria objects and 2-coored Motzkin trees : they exist but they inoe artificia constructs (e.g., depth first search on rose-trees, indirect definition of the mapping) a reason to find a new one! In Proog we need one reation for f and f 1 : cat_mot(c(e,e),). cat_mot(c(x,e),(a)):-x=c(_,_),cat_mot(x,a). cat_mot(c(e,y),r(b)):-y=c(_,_),cat_mot(y,b). cat_mot(c(x,y),a(a,b)):-x=c(_,_),y=c(_,_), cat_mot(x,a), cat_mot(y,b). one can incude the empty tree e by an arithmetization mechanism that defines successor and predecessor (e.g., our PPDP 15 paper) Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

7 The 2-Motzkin to non-empty binary trees bijection at work two twinned trees of size 4 c c c e e e c e c e e a r two twinned trees size 10 c c c c c e c e e e c c c e e e c c e e e e e r r a r a r r Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

8 Motzkin skeetons for cosed, affine and inear terms Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

9 Generating 2-Motzkin trees size of constructors is their arity a=2, =1, r=1, =0 in fact, this size definition matches the size of their heap representation generate a the spits of the size N into 2*A+L+R where A=size of a/2 etc. define predicates to consume size units as needed: Dec(c(SL,R,A),c(L,R,A)):-succ(L,SL). rdec(c(l,sr,a),c(l,r,a)):-succ(r,sr). adec(c(l,r,sa),c(l,r,a)):-succ(a,sa). Proposition If a Motzkin tree is a skeeton of a cosed ambda term then it exists at east one ambda binder on each path from the eaf to the root. Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

10 Cosabe and uncosabe Motzkin trees there are sighty more uncosabe Motzkin trees than cosabe ones as size grows: cosabe: 0,1,1,2,5,11,26,65,163,417,1086,2858,7599,20391,55127,150028,410719,... uncosabe: 1,0,1,2,4,10,25,62,160,418,1102,2940,7912,21444,58507,160544,442748,... Possiby easy open probem: what happens to them asymptoticay? Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

11 Generating cosed affine terms aflam(n,t):-sum_to(n,hi,lo),has_enough_ambdas(hi),aflinlam(t,[],hi,lo) has_enough_ambdas(c(l,_,a)):-succ(a,l). aflinlam((x),[x])-->[]. aflinlam((x,a),vs)-->dec,aflinlam(a,[x Vs]). aflinlam(r(a),vs)-->rdec,aflinlam(a,vs). aflinlam(a(a,b),vs)-->adec,{subset_and_compement_of(vs,as,bs)}, aflinlam(a,as), % a ambda cannot go aflinlam(b,bs). % to both branches!!! subset_and_compement_of([],[],[]). subset_and_compement_of([x Xs],NewYs,NewZs):- subset_and_compement_of(xs,ys,zs), pace_eement(x,ys,zs,newys,newzs). pace_eement(x,ys,zs,[x Ys],Zs). pace_eement(x,ys,zs,ys,[x Zs]). Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

12 Linear terms, skeetons of affine and inear terms inlam(n,t):-n mod 3=:=1, sum_to(n,hi,lo),has_no_unused(hi), aflinlam(t,[],hi,lo). has_no_unused(c(l,0,a)):-succ(a,l). Proposition If a Motzkin tree with n binary nodes is a skeeton of a inear ambda term, then it has exacty n + 1 unary nodes, with one on each path from the root to its n + 1 eaes. affine: 0,1,2,3,9,30,81,242,838,2799,9365,33616,122937, inear: 0,1,0,0,5,0,0,60,0,0,1105,0,0,27120,0,0, Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

13 K-coored ambda terms and type inference Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

14 K-coored cosed ambda terms kcooredcosed(n,x):-kcooredcosed(x,[],n,0). kcooredcosed((i),vs)-->{nth0(i,vs,v),inc_ar(v)}. kcooredcosed((k,a),vs)-->, % <= the K-coored ambda binder kcooredcosed(a,[v Vs]), {cose_ar(v,k)}. kcooredcosed(a(a,b),vs)-->a, kcooredcosed(a,vs), kcooredcosed(b,vs). (SX,X):-succ(X,SX). % <= the size-consuming /2 and a/2 predicates a-->,. inc_ar(x):-ar(x),!,x=s(_). % count new ariabe under the binder inc_ar(s(x)):-inc_ar(x). cose_ar(x,k):-ar(x),!,k=0. % cose and conert to ordinary numbers cose_ar(s(x),sk):-cose_ar(x,k),succ(k,sk). Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

15 Exampes of k-coored cosed ambda terms 3-coored ambda terms of size 3, exhibiting coors 0,1,2.?- kcooredcosed(3,x). X = (0, (0, (1, (0)))) ; X = (0, (1, (0, (1)))) ; X = (1, (0, (0, (2)))) ; X = (2, a((0), (0))). in a tree with n appication nodes, the counts of k-coored ambdas must sum up to n + 1 we can generate a binary tree and then decorate it with ambdas satisfying this constraint the constraint hods for subtrees, recursiey open experiment : can this mechanism reduce the amount of backtracking and acceerate term generation? Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

16 Two 3-coored ambda trees and their types : Z U Z a Y X Y X : Z V U Z a Y X Y X Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

17 Type inference for k-coored terms simpytypedcoored(n,x,t):-simpytypedcoored(x,t,[],n,0). simpytypedcoored((x),t,vss)-->{ member(vs:t0,vss), unify_with_occurs_check(t,t0), addtobinder(vs,x) }. simpytypedcoored((vs,a),s->t,vss)-->, simpytypedcoored(a,t,[vs:s Vss]), {cosebinder(vs)}. simpytypedcoored(a(a,b),t,vss)-->a, simpytypedcoored(a,(s->t),vss), simpytypedcoored(b,s,vss). addtobinder(ps,p):-ar(ps),!,ps=[p _]. addtobinder([_ Ps],P):-addToBinder(Ps,P). cosebinder(xs):-append(xs,[],_),!. Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

18 Counts for cosed 2-coored simpy-typed terms (i.e., affine) simpy typed cosed terms s. affine cosed terms (og. scae) simpy typed cosed terms affine cosed terms size Figure: Simpy typed cosed terms and affine cosed terms by increasing sizes Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

19 Type-hoding and type-repeing skeetons Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

20 Skeetons of cosed simpy-typed terms toskes((_),,). toskes((vs,a),(k,cs),(s)):-ength(vs,k),toskes(a,cs,s). toskes(a(a,b),a(ca,cb),a(sa,sb)):-toskes(a,ca,sa),toskes(b,cb,sb). generators for skeetons and k-coored skeetons by combining the generator simpytypedcoored with toskeeton gentypedskes(n,cs,s):-gentypedskes(n,_,_,cs,s). gentypedskes(n,x,t,cs,s):-simpytypedcoored(n,x,t),toskes(x,cs,s). typabecoskes(n,cs):-gentypedskes(n,cs,_). typabeskes(n,s):-gentypedskes(n,_,s). Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

21 Are coors growing proportiona to the og of their type-sizes? 8 ag. coors and type sizes 6 4 ag. coors ag. type sizes term size Figure: Growth of coors and type sizes Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

22 a most coorfu term: reaches the maximum number of coors max coors max type size term size Figure: Coors of a most coorfu term s. its maximum type size Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

23 Does a most coorfu term reach max type size? type size 40 max coorfu type max type term size Figure: Largest type size of a most coorfu term s. argest type size Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

24 Type-hoding and type-repeing Motzkin trees a type-hoding Motzkin tree is one for which it exists a simpy-typed cosed term haing it as its skeeton a type-repeing Motzkin tree is one for which no simpy-typed cosed term exists haing it as its skeeton to efficienty generate these skeetons we wi spit the generation of ambda terms in two stages the first stage wi generate the unification equations that need to be soed for type inference as we as the ready to be fied out ambda trees it is conenient to actuay generate on the fy the code to be executed in the second stage the second stage wi just use Proog s metaca to actiate this code Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

25 Generating the executabe equation set we generate a ready to run conjunction of unification constraints geneqs(n,x,t,eqs):-geneqs(x,t,[],eqs,true,n,0). geneqs((i),v,[v0 Vs],Es1,Es2)-->{add_eq(Vs,V0,V,I,Es1,Es2)}. geneqs((a),(s->t),vs,es1,es2)-->,geneqs(a,t,[s Vs],Es1,Es2). geneqs(a(a,b),t,vs,es1,es3)-->a, geneqs(a,(s->t),vs,es1,es2), geneqs(b,s,vs,es2,es3). % soe this equation as it can either succeed once, or fai add_eq([],v0,v,0,es,es):-unify_with_occurs_check(v0,v). % <== add_eq([v1 Vs],V0,V,I,(e([V0,V1 Vs],V,0,I),Es),Es). e(i,vs,v):-e(vs,v,0,i). e([v0 _],V,N,N):-unify_with_occurs_check(V0,V). e([_ Vs],V,N1,N3):-succ(N1,N2),e(Vs,V,N2,N3). Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

26 Efficient generation of type-hoding and type-repeing skeetons we soe the equations for 2-coored terms to aoid backtracking Motzkin trees: 1,1,2,4,9,21,51,127,323,835,2188 Type equation trees: 0,1,1,1,5, 9,17, 55,122,289, 828 we can generate efficienty type-hoding and type-repeing skeetons type repeing: Eqs hae no soution (their negation succeeds) type hoding: Eqs hae at east one soution (no need to compute a) untypabeske(n,ske):-geneqs(n,x,_,eqs),not(eqs),tomotske(x,ske). typabeske(n,ske):-geneqs(n,x,_,eqs),once(eqs),tomotske(x,ske). Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

27 Are there uniquey typabe skeetons? we compute efficienty such skeetons by generating the decoration code Eqs that we constrain to hae exacty one soution when actiated uniqueytypabeske(n,ske):- geneqs(n,x,_,eqs),succeeds_once(eqs),eqs, tomotske(x,ske). succeeds_once(g):-findnsos(2,_,g,sos),!,sos=[_]. not ery many: 0,1,0,0,2,0,1,7,1,13,34,20,100,226,234 open probem: proe that they exist for a sizes Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

28 Growth of uniquey typabe skeetons 800 number of uniquey typabe skeetons Figure: 3 Growth of the number of uniquey typabe skeetons size Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

29 3 type-hoding and 3 type-repeing Motzkin trees a a a a a a a a a a a a a a a Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

30 Growth of the number of skeetons is simiar on a og-scae 10 6 skeeton counts (og. scae) type-hoding skeetons type-repeing skeetons skeeton size Figure: type-hoding s. type-repeing skeetons up to size 20 Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

31 Counts of type repeing and type hoding Motzkin skeetons term size type hoding skeetons type repeing skeetons Figure: Number of type-hoding and type repeing skeetons Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

32 Growth rates of type-hoding and type-repeing skeetons 5 4 skeeton growth rates 3 2 type-hoding skeetons type-repeing skeetons skeeton size Figure: The simiar growth rates of type-hoding and type-repeing skeetons Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

33 Motzkin trees s. their subset of type-hoding skeetons 10 6 Motzkin trees and type-hoding skeetons (og. scae) Motzkin trees type-hoding skeetons size Figure: Counts for Motzkin trees and type-hoding skeetons for increasing term sizes Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

34 Counts of simpy typed cosed terms s. their skeetons simpy typed cosed terms and their skeetons (og. scae) simpy typed cosed terms type-hoding skeetons size Figure: Counts of simpy typed cosed terms and their skeetons by increasing sizes Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

35 An appication to random ambda term generators Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

36 An appication to random ambda term generators Rémy s agorithm: exact size uniformy random binary trees binary trees - bijection to 2-coored Motzkin trees decorating 2-coored Motzkin trees to ambda terms Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

37 Reisiting Rémy s agorithm, decaratiey émy s origina agorithm [7] grows binary trees by grafting new eaes with equa probabiity for each node in a gien tree an eegant procedura impementation is gien in [?] as agorithm R, by using destructie assignments in an array representing the tree we wi work with edges instead of nodes and graft new edges at each step a two stage agorithm: first sets of edges, then trees represented as Proog terms some magic with ogic ariabes whie the agorithm handes terms with thousands of nodes its aerage performance is sighty aboe inear as it takes time proportiona to the size of the set of edges to pick the one to be expanded Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

38 Same code for a-terms and random term generation initia set of two edges remy_init([e(eft,a,_),e(right,a,_)]). same code for a-term or random-term generation except for defining a random choice of the edges or a backtracking one, by repacing choice_of/2 with its commented out aternatie eft_or_right(i,j):-choice_of(2,dice),eft_or_right(dice,i,j). choice_of(n,k):-k is random(n). % choice_of(n,k):-n>0,n1 is N-1,between(0,N1,K). eft_or_right(0,eft,right). eft_or_right(1,right,eft). Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

39 The grafting step we can grow a new edge by spitting an existing edge in two grow(e(lr,a,b), e(lr,a,c),e(i,c,_),e(j,c,b)):-eft_or_right(i,j). we add three new edges corresponding to arguments 2, 3 and 4 we remoe one, represented as the first argument contrary to Rémy s origina agorithm, our tree grows downward as new edges are inserted at the target of existing ones Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

40 Finding the spot where we graft chose the grafting point s position remy_step(es,newes,l,newl):-newl is L+2, choice_of(l,dice), remy_step1(dice,es,newes). perform the graft remy_step1(0,[u Xs],[X,Y,Z Xs]):-grow(U, X,Y,Z). remy_step1(d,[a Xs],[A Ys]):-D>0, D1 is D-1, remy_step1(d1,xs,ys). Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

41 The iteration to desired size The predicate remy_oop iterates oer remy_step unti the desired 2K size is reached, in K steps we grow by 2 edges at each step, 2K edges tota remy_oop(0,[],n,n). remy_oop(1,es,n1,n2):-n2 is N1+2,remy_init(Es). remy_oop(k,newes,n1,n3):-k>1,k1 is K-1, remy_oop(k1,es,n1,n2), remy_step(es,newes,n2,n3). an exampe of output?- remy_oop(2,edges,0,n). Edges = [e(eft, A, B), e(right, A,C), e(right,c,d), e(eft,c,e)], N = 4. Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

42 From sets of edges to trees as Proog terms the predicate bind_nodes/2 iterates oer edges, and for each interna node it binds it with terms proided by the constructor c/2, eft or right, depending on the type of the edge bind_nodes([],e). bind_nodes([x Xs],Root):-X=e(_,Root,_), mapist(bind_interna,[x Xs]), mapist(bind_eaf,[x Xs]). bind an interna node with constructor c/2 bind_interna(e(eft,c(a,_),a)). bind_interna(e(right,c(_,b),b)). bind a eaf node with the constant /0 bind_eaf(e(_,_,leaf)):-leaf=e->true;true. Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

43 Running the agorithm the predicate remy_term/2 puts the two main steps together remy_term(k,b):-remy_oop(k,es,0,_),bind_nodes(es,b). uniformy random generation of a random term with 4 interna nodes and timings for a arge tree:?- remy_term(4,t). T = c(c(e, e), c(c(e, e), e)).?- time(remy_term(1000,_)). 526,895 inferences, CPU in 0.078s (7,995,978 Lips) we obtain a 2-Motzkin tree generator from the binary tree generator ia the bijection gien by the (bi-directiona) predicate cat_mot/2 mot_gen(n,m):-n>0,remy_term(n,c),cat_mot(c,m). this is unikey to be a uniformy random generator as /1 nodes coer a coors except coor 0 coered by r/1, and, ia the bijection, the tota count is a Cataan number rather than a Motzkin number Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

44 Decorating Motzkin trees to ambda terms if one wants uniformy random Motzkin trees a Botzmann samper or one based on ia hoonomic equations can be used we can mimic (actuay in a stronger way) the ideas behind the natura size that faors ariabes coser to their binders one can buid for each ist of binders from a eaf to the root, a distribution that decays exponentiay with each step nat2probs(0,[]). nat2probs(n,ps):-n>0,sum is 1-1/2^N,Last is 1-Sum,Inc is Last/N, make_probs(n,inc,1,ps). at each step, the probabiity to continue further is reduced to haf make_probs(0,_,_,[]). make_probs(k,inc,p0,[p Ps]):-K>0,K1 is K-1,P1 is P0/2, P is P1+Inc, make_probs(k1,inc,p1,ps). Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

45 The decoration agorithm gien a Motzkin tree, we decorate each eaf /0 by turning it into a natura number representing a de Bruijn index the aue of the de Bruijn index is determined for each eaf independenty by waking up on the chain of ambda binders with decaying probabiities decorate(,0,(x))-->[x]. % free ariabe decorate(,n,k)-->{n>0,nat2probs(n,ps),wak_probs(ps,0,k)},[]. decorate((x),n,(y))-->{n1 is N+1},decorate(X,N1,Y). decorate(r(x),n,r(y))-->decorate(x,n,y). decorate(a(x,y),n,a(a,b))-->decorate(x,n,a),decorate(y,n,b). Pain ambda terms are generated as foows: pain_gen(n,t,freevars):-mot_gen(n,b),decorate(b,0,t,freevars,[]). Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

46 Retrying for cosed terms to ensure that a term is cosed, we restarts unti the ist of free ariabes is empty we aso returning the number of retries cosed_gen(n,t,i):- Lim is 100+2^min(N,24),try_cosed_gen(Lim,0,I,N restarts are managed by the predicate try_cosed_gen/5, which, when the decorated term is not cosed, tries generating a new term try_cosed_gen(lim,i,j,n,t):- I<Lim, ( mot_gen(n,b),decorate(b,0,t,[],[])*->j=i ; I1 is I+1, try_cosed_gen(lim,i1,j,n,t) ). Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

47 Exampe of generation of a random cosed term random cosed ambda terms obtained by decorating motzkin trees.?- cosed_gen(10,t,i). T = (((r(r(r(a((2), 2))))))),?- cosed_gen(2000,_,i). I = 3. with a size definition that counts ariabes as being of size 0 or 1, these ambda terms are actuay of exacty the same size as their Motzkin tree skeetons Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

48 Generating random simpy typed terms as before, we decorate the 2-Motzkin trees with de Bruijn indices we intereae the decoration process with eary rejection of types that do not unify or de Bruijn indices that ead to terms that are not cosed interesting size definitions depend mosty on the weight we attach to the de Bruijn indices we customize the code to pug-in a size definition of our choice in fact, one can use statistics from rea programs to mimic any distribution of the de Bruijn indices inchoice(k,ts,i,t0):-k>0,i is random(k),nth0(i,ts,t0). expchoice(k,ts,i,t):-k>0,n is 2^(K-1), R is random(n),n1 is N>>1, expchoice1(n1,r,ts,t,0,i). expchoice1(n,r,[x _],Y,I,I):-R>=N,!,Y=X. expchoice1(n,r,[_ Xs],Y,I1,I3):-N1 is N>>1,succ(I1,I2), expchoice1(n1,r,xs,y,i2,i3). Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

49 The random simpy-typed cosed ambda term generator decoratetyped(m,x,t):-decoratetyped(m,x,t,0,[]). decoratetyped(,(i),t,k,ts):- inchoice(k,ts,i,t0), % <= pug-in here the size definition! unify_with_occurs_check(t,t0). decoratetyped((x),(a),(s->t),n,ts):-succ(n,sn), decoratetyped(x,a,t,sn,[s Ts]). decoratetyped(r(x),r(a),(_->t),n,ts):- decoratetyped(x,a,t,n,ts). decoratetyped(a(x,y),a(a,b),t,n,ts):- decoratetyped(x,a,(s->t),n,ts), decoratetyped(y,b,s,n,ts). rantyped(n,maxi,maxj,x,t,i,j):- between(1,maxi,i), mot_gen(n,mot),%ppp(i=mot), between(1,maxj,j), decoratetyped(mot,x,t),!. Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

50 Exampe of random simpy typed term of natura size 8 r a r r 1 0 U V U X Z Y X steps(1*2) natsize(8)+heapsize(7)+tsize(6) Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

51 Running the random simpy-typed term generator Can we generate terms of natura size 1000??- rantyped(400). % 11,982,837 inferences, CPU in seconds (99% CPU, big boring term here... steps(64*43) natsize(486)+heapsize(399)+tsize(146)?- rantyped(400). % 122,666,661 inferences, CPU in seconds (99% CPU, big boring term here... steps(644*10) natsize(1162)+heapsize(399)+tsize(21) Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

52 Reated work Bacher, A., Bodini, O., Jacquot, A.: Exact-size Samping for Motzkin Trees in Linear Time ia Botzmann Sampers and Hoonomic Specification. In Nebe, M.E., Szpankowski, W., eds.: 2013 Proceedings of the Tenth Workshop on Anaytic Agorithmics and Combinatorics (ANALCO), SIAM (2013) Tarau, P.: A hiking trip through the orders of magnitude: Deriing efficient generators for cosed simpy-typed ambda terms and norma forms. CoRR abs/ (2016) Bendkowski, M., Grygie, K., Tarau, P.: Botzmann sampers for cosed simpy-typed ambda terms. In Lierer, Y., Taha, W., eds.: Practica Aspects of Decaratie Languages - 19th Internationa Symposium, PADL 2017, Paris, France, January 16-17, 2017, Proceedings. Voume of Lecture Notes in Computer Science., Springer (2017) Deutsch, E., Shapiro, L.W.: A bijection between ordered trees and 2-motzkin paths and its many consequences. Discrete Mathematics 256(3) (2002) Lescanne, P.: Quantitatie aspects of inear and affine cosed ambda terms. CoRR abs/ (2017) Tarau, P.: On Logic Programming Representations of Lambda Terms: de Bruijn Indices, Compression, Type Inference, Combinatoria Generation, Normaization. In Pontei, E., Son, T.C., eds.: Proceedings of the Seenteenth Internationa Symposium on Practica Aspects of Decaratie Languages PADL 15, Portand, Oregon, USA, Springer, LNCS 8131 (June 2015) Rémy, J.L.: Un procédé itératif de dénombrement d arbres binaires et son appication à eur génération aéatoire. RAIRO - Theoretica Informatics and Appications - Informatique Théorique et Appications 19(2) (1985) Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

53 Concusions we hae introduced abstraction mechanisms that forget properties of the difficut cass of simpy-typed ambda terms, to reea interesting structura properties k-coored terms subsume inear and affine terms and are ikey to be usabe to fine-tune random generators to more cosey match coor-distributions in ambda terms representing rea programs type-repeing skeetons might be usefu for efficient agorithms buit on aoiding a sma type-repeing skeetons stored in a database the new bijection between binary terms and 2-coored Motzkin terms and the generation agorithms centered on the distinction between free and binding ambda constructors has been usefu to acceerate generation of affine and inear terms and random terms ia Rémy s agorithm the toos used: a anguage as simpe as (mosty) Horn Cause Proog can hande eeganty combinatoria generation probems when the synergy between sound unification, backtracking and DCGs is put at work Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

54 Questions? sides: draft paper: code: Picasso: Questions tempt you to te ies, particuary when there is no answer. Pau Tarau (Uniersity of North Texas) Lambda-term skeetons and simpy-typed terms CLA / 54

On k-colored Lambda Terms and their Skeletons

On k-colored Lambda Terms and their Skeletons On k-coored Lmbd Terms nd their Skeetons Pu Tru Uniersity of North Texs PADL 2018 Reserch supported by NSF grnt 1423324 Pu Tru ( Uniersity of North Texs ) On k-coored Lmbd Terms nd their Skeetons PADL

More information

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES VO. 10, NO. 18, OCTOBER 2015 ISSN 1819-6608 GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCES Henny Widowati 1, Suistyo Puspitodjati 2 and Djati Kerami 1 Department of System Information, Facuty

More information

Wireless Communications

Wireless Communications Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve

More information

Alignment of Defense Contractors Innovation Strategies With US DOD RDT&E Plans: The Winners and Losers.

Alignment of Defense Contractors Innovation Strategies With US DOD RDT&E Plans: The Winners and Losers. Aignment of Defense Contractors Innovation Strategies With US DOD RDT&E Pans: The Winners and Losers. A new anaysis by Vector Anaytics based on the FY19 budget request. www.vector-anaytics.com 2 This new

More information

Rateless Codes for the Gaussian Multiple Access Channel

Rateless Codes for the Gaussian Multiple Access Channel Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W

More information

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp. 702 712, June 1998 008 AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR

More information

OpenStax-CNX module: m Inductance. OpenStax College. Abstract

OpenStax-CNX module: m Inductance. OpenStax College. Abstract OpenStax-CNX modue: m42420 1 Inductance OpenStax Coege This work is produced by OpenStax-CNX and icensed under the Creative Commons Attribution License 3.0 Cacuate the inductance of an inductor. Cacuate

More information

CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL

CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL XIV Internationa PhD Worshop OWD 00 3 October 0 CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL G. Tymchi I. Diorditsa S. Murahovsyy R. Tymchi Nationa Technica University of Uraine "Kiev Poytechnic

More information

Effect of Carrier Frequency Offset on Channel Capacity in Multi User OFDM-FDMA Systems

Effect of Carrier Frequency Offset on Channel Capacity in Multi User OFDM-FDMA Systems Effect of Carrier Frequency Offset on Channe Capacity in Muti User OFDM-FDMA Systems Martin Stemick and Hermann Rohing Abstract Orthogona Frequency Diision Mutipexing (OFDM is a ery robust transmission

More information

Improving the Active Power Filter Performance with a Prediction Based Reference Generation

Improving the Active Power Filter Performance with a Prediction Based Reference Generation Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source

More information

DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION

DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Undergraduate Research Opportunity Project (UROP ) DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Student: Nguyen, Tran Thanh Binh Schoo of Eectrica & Eectronic Engineering Nayang Technoogica University

More information

Fuzzy Model Predictive Control Applied to Piecewise Linear Systems

Fuzzy Model Predictive Control Applied to Piecewise Linear Systems 10th Internationa Symposium on Process Systems Engineering - PSE2009 Rita Maria de Brito Aves, Caudio Augusto Oer do Nascimento and Evaristo Chabaud Biscaia Jr. (Editors) 2009 Esevier B.V. A rights reserved.

More information

For 2-5 players Ages 8 and above Minutes

For 2-5 players Ages 8 and above Minutes For 2-5 payers Ages and above 30-90 Minutes CN Rues V2 EN DEF 2015_Mise en page 1 19/05/15 15:39 Page2 COmpOnents Setting up t Macao and Ports where trading occurs Macao with its Back Market A port and

More information

PERFORMANCE-DRIVEN computer development has lasted

PERFORMANCE-DRIVEN computer development has lasted 668 I ANSACIONS ON COMPUS, VOL. 6, NO., DCMB 0 Scheduing Precedence Constrained asks with educed Processor nergy on Mutiprocessor Computers Keqin Li, Senior Member, I Abstract nergy-efficient scheduing

More information

On optimizing low SNR wireless networks using network coding

On optimizing low SNR wireless networks using network coding On optimizing ow SNR wireess networks using network coding Mohit Thakur Institute for communications engineering, Technische Universität München, 80290, München, Germany. Emai: mohit.thakur@tum.de Murie

More information

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu

More information

Lesson Objective Identify the value of a group of coins that includes pennies and/ or dimes.

Lesson Objective Identify the value of a group of coins that includes pennies and/ or dimes. LESSON 9.9B Count Coections LESSON AT A GLANCE Daiy Routines Mathematics Forida Standard Te and write time. MAFS.1.MD.2.a.b Identify and combine vaues of money in cents up to one doar working with a singe

More information

Lesson Objective Identify the value of a quarter and count groups of coins that include quarters.

Lesson Objective Identify the value of a quarter and count groups of coins that include quarters. LESSON 9.9C Hands On Quarters PROFESSIONAL PROFESSIONAL DEVELOPMENT DEVELOPMENT LESSON AT A GLANCE Mathematics Forida Standard Te and write time. MAFS.MD.a.a Identify and combine vaues of money in cents

More information

On Available Bandwidth in FDDI-Based Recongurable Networks. Sanjay Kamat, Gopal Agrawal, and Wei Zhao. Texas A&M University.

On Available Bandwidth in FDDI-Based Recongurable Networks. Sanjay Kamat, Gopal Agrawal, and Wei Zhao. Texas A&M University. On Avaiabe Bandwidth in FDDI-Based Recongurabe Networks Sanjay Kamat, Gopa Agrawa, and Wei Zhao Department of Computer Science Teas A&M University Coege Station, Teas 77843-3112 Abstract The increasing

More information

Balanced Trees. Balanced Trees Tree. 2-3 Tree. 2 Node. Binary search trees are not guaranteed to be balanced given random inserts and deletes

Balanced Trees. Balanced Trees Tree. 2-3 Tree. 2 Node. Binary search trees are not guaranteed to be balanced given random inserts and deletes Balanced Trees Balanced Trees 23 Tree Binary search trees are not guaranteed to be balanced given random inserts and deletes! Tree could degrade to O(n) operations Balanced search trees! Operations maintain

More information

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,

More information

Software Process & Agile Software Development

Software Process & Agile Software Development CSE516 Science for Society Software Process & Agie Software Deveopment Apri 25, 2014 Ichu Yoon (icyoon@sunykorea.ac.kr) Software A textbook description Instructions (computer programs) that when executed

More information

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang

More information

Configuring RolandVersaWorks to print on your HEXIS media

Configuring RolandVersaWorks to print on your HEXIS media PRINTING DIVISION Product Buetin N 4 Configuring RoandVersaWorks to print on your HEXIS media 1. Instaing a media profie suitabe for your HEXIS printing media 1.1. Downoading the media profie 2 1.2. Importing

More information

3-D BSS Geometric Indicator for WLAN Planning

3-D BSS Geometric Indicator for WLAN Planning 3-D BSS Geometric Indicator for WLAN Panning Aexandre Gondran, Oumaya Baaa, Aexandre Caminada and Haim Mabed University of Technoogy Befort-Montbéiard, SET Lab, 90010 Befort, France E-mai: {aexandre.gondran,

More information

Optimum Fault Current Limiter Placement

Optimum Fault Current Limiter Placement Optimum aut urrent Limiter acement Jen-Hao Teng han-an Lu Abstract: Due to the difficuty in power network reinforcement and the interconnection of more distributed generations, faut current eve has become

More information

Outline. Introduce yourself!! Class information and logistics. What is planning? Motivational Examples

Outline. Introduce yourself!! Class information and logistics. What is planning? Motivational Examples Outine Introduce yoursef!! Cass information and ogistics What is panning? Motivationa Exampes What is CIS 6930 Introduction to Panning Agorithms about? About the instructor: Name: Leonardo Bobadia, Ph.D

More information

Automation of the Solution of Kakuro Puzzles

Automation of the Solution of Kakuro Puzzles Automation of the Soution of Kakuro Puzzes R. P. Davies, P. A. Roach, S. Perkins Department of Computing and Mathematica Sciences, University of Gamorgan, Pontypridd, CF37 1DL, United Kingdom, rpdavies@gam.ac.uk

More information

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection Distribution of ath Durations in Mobie Ad-Hoc Networks and ath Seection Richard J. La and Yijie Han Abstract We investigate the issue of path seection in mutihop wireess networks with the goa of identifying

More information

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE The 14 th Word Conference on Earthquake Engineering NEW RISK ANALYSIS ETHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE Satoru Nishikawa 1, Sei ichiro Fukushima 2 and Harumi Yashiro 3 ABSTRACT

More information

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network Mode of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobie Ad Hoc Network Igor Konstantinov, Kostiantyn Poshchykov, Sergej Lazarev, and Oha Poshchykova Begorod State University, Pobeda Street 85,

More information

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER SYSTEMS Junsung Lim, Hyung G. Myung, Kyungjin Oh and David J. Goodman Dept. of Eectrica and Computer Engineering, Poytechnic University 5 Metrotech

More information

10/5/2015. Constraint Satisfaction Problems. Example: Cryptarithmetic. Example: Map-coloring. Example: Map-coloring. Constraint Satisfaction Problems

10/5/2015. Constraint Satisfaction Problems. Example: Cryptarithmetic. Example: Map-coloring. Example: Map-coloring. Constraint Satisfaction Problems 0/5/05 Constraint Satisfaction Problems Constraint Satisfaction Problems AIMA: Chapter 6 A CSP consists of: Finite set of X, X,, X n Nonempty domain of possible values for each variable D, D, D n where

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication Under Channe Uncertainties: A Stabe Matching Approach Monowar Hasan, Student Member, IEEE, and Ekram Hossain, Feow, IEEE Abstract

More information

Theoretical Profile of Ring-Spun Slub Yarn and its Experimental Validation

Theoretical Profile of Ring-Spun Slub Yarn and its Experimental Validation Chong-Qi Ma, Bao-Ming Zhou, Yong Liu, Chuan-Sheng Hu Schoo of Texties, Tianjin Poytechnic University, 399 West Binshui Road, Xiqing District, Tianjin, 300387, China E-mai: iuyong@tjpu.edu.cn Theoretica

More information

Configuring Onyx to print on your HEXIS media

Configuring Onyx to print on your HEXIS media Configuring Onyx to print on your HEXIS media 1. Instaing a media profie suitabe for your HEXIS printing media 1.1. Downoading the media profie 2 1.2. Importing the media profie into Onyx 3 2. Defaut setting

More information

FOR energy limited data networks, e.g., sensor networks,

FOR energy limited data networks, e.g., sensor networks, 578 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., DECEMBER 009 An Optima Power Aocation Scheme for the STC Hybrid ARQ over Energy Limited Networks Hongbo Liu, Member, IEEE, Leonid Razoumov,

More information

Network Control by Bayesian Broadcast

Network Control by Bayesian Broadcast IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-33, NO. 3, MAY 1987 323 Network Contro by Bayesian Broadcast RONALD L. RIVEST Abstract-A transmission contro strategy is described for sotted- ALOHA-type

More information

ACTA TECHNICA NAPOCENSIS

ACTA TECHNICA NAPOCENSIS 69 TECHNICAL UNIVERSITY OF CLUJ-NAPOCA ACTA TECHNICA NAPOCENSIS Series: Appied Mathematics, Mechanics, and Engineering Vo. 60, Issue I, March, 07 CAD MODEL OF THE RTTRR MODULAR SMALL-SIZED SERIAL ROBOT

More information

Understanding The HA2500 Horizontal Output Load Test

Understanding The HA2500 Horizontal Output Load Test Understanding The HA2500 Horizonta Output Load Test Horizonta output stages are part of every CRT video dispay incuding cosed circuit monitors, computer monitors, video games, medica monitors, TVs. HDTVs,

More information

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director

More information

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks An Evauation of Connectivity in Mobie Wireess Ad Hoc Networks Paoo Santi Istituto di Informatica e Teematica Area dea Ricerca de CNR Via G.Moruzzi, 5624 Pisa Itay santi@iit.cnr.it Dougas M. Bough Schoo

More information

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,

More information

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 0.09/ACCESS.07.70008,

More information

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,

More information

Large Scale Real-time Ridesharing with Service Guarantee on Road Networks

Large Scale Real-time Ridesharing with Service Guarantee on Road Networks Large Scae Rea-time Ridesharing with Service Guarantee on Road Networks ABSTRACT Yan Huang University of North Texas huangyan@unt.edu Ruoming Jin Computer Science Kent State University jin@cs.kent.edu

More information

Airborne Ultrasonic Position and Velocity Measurement Using Two Cycles of Linear-Period-Modulated Signal

Airborne Ultrasonic Position and Velocity Measurement Using Two Cycles of Linear-Period-Modulated Signal Airborne Utrasonic Position and Veocity Measurement Using Two Cyces of Linear-Period-Moduated Signa Shinya Saito 1, Minoru Kuribayashi Kurosawa 1, Yuichiro Orino 1, and Shinnosuke Hirata 2 1 Department

More information

arxiv: v4 [physics.soc-ph] 31 Dec 2013

arxiv: v4 [physics.soc-ph] 31 Dec 2013 A Cascading Faiure Mode by Quantifying Interactions Junjian Qi and Shengwei Mei Department of Eectrica Engineering, Tsinghua University, Beijing, China 100084 arxiv:1301.2055v4 [physics.soc-ph] 31 Dec

More information

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of

More information

SCHEDULING the wireless links and controlling their

SCHEDULING the wireless links and controlling their 3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,

More information

Provides exact fault location to one span

Provides exact fault location to one span TWS Mark VI Traveing wave faut ocator Provides exact faut ocation to one span Reduce down time by getting to the faut site faster Track intermittent sef cearing fauts and focus maintenance at the right

More information

Multicast Routing Algorithms for Sparse Splitting Optical Networks 1

Multicast Routing Algorithms for Sparse Splitting Optical Networks 1 Muticast Routing Agorithms for Sparse Spitting Optica Networks 1 Presenter: Aniang Cai PhD candidate, Department of Eectronic Engineering, City University of Hong Kong, Hong Kong SAR Emai: caianiang@outook.com

More information

Yongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS

Yongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS BNL CAP CCII, 65685 225-MUON-98C A NEW STRUCTURE OF LINEAR COLLIDER * Yongxiang Zhao Brookhaven Nationa Laboratory Upton, NY, 11973 RECEIVED AIK 1 7 1998 OSTI *This work was supported by the US Department

More information

An Optimization Framework for XOR-Assisted Cooperative Relaying in Cellular Networks

An Optimization Framework for XOR-Assisted Cooperative Relaying in Cellular Networks n Optimization Framework for XOR-ssisted Cooperative Reaying in Ceuar Networks Hong Xu, Student Member, IEEE, Baochun Li, Senior Member, IEEE bstract This work seeks to address two questions in cooperative

More information

Adverserial Search Chapter 5 minmax algorithm alpha-beta pruning TDDC17. Problems. Why Board Games?

Adverserial Search Chapter 5 minmax algorithm alpha-beta pruning TDDC17. Problems. Why Board Games? TDDC17 Seminar 4 Adversarial Search Constraint Satisfaction Problems Adverserial Search Chapter 5 minmax algorithm alpha-beta pruning 1 Why Board Games? 2 Problems Board games are one of the oldest branches

More information

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic Joint Spectrum Access and Pricing in Cognitive Radio Networks with Eastic Traffic Joceyne Eias University of Bergamo E-mai: joceyne.eias@unibg.it Fabio Martignon University of Bergamo E-mai: fabio.martignon@unibg.it

More information

Theory of a Class of Planar Frequency-Independent Omnidirectional Traveling-Wave Antennas

Theory of a Class of Planar Frequency-Independent Omnidirectional Traveling-Wave Antennas Copyright Notice: 25 Wang Eectro-Opto Corporation. Persona use of this materia is permitted. However, reprinting/repubishing of this materia or reuse of any copyrighted component of this work in other

More information

BVRIT HYDERABAD College of Engineering for Women Department of Electronics and Communication Engineering

BVRIT HYDERABAD College of Engineering for Women Department of Electronics and Communication Engineering Subject Name: BVRIT HYDERABAD Coege of Engineering for Women Department of Eectronics and Communication Engineering Prepared by (Facuty Name): Hand Out Eectronic Circuit Anaysis Mr. G. Siva SankarVarma,

More information

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Energy-Aware Scheduing with Quaity of Surveiance Guarantee in Wireess Sensor Networks Jaehoon Jeong, Sarah Sharafkandi, and David H.C. Du Dept. of Computer Science and Engineering, University of Minnesota

More information

Information Theoretic Radar Waveform Design for Multiple Targets

Information Theoretic Radar Waveform Design for Multiple Targets 1 Information Theoretic Radar Waveform Design for Mutipe Targets Amir Leshem and Arye Nehorai Abstract In this paper we use information theoretic approach to design radar waveforms suitabe for simutaneousy

More information

LTC kHz Continuous Time, Linear Phase Lowpass Filter FEATURES DESCRIPTION APPLICATIONS TYPICAL APPLICATION

LTC kHz Continuous Time, Linear Phase Lowpass Filter FEATURES DESCRIPTION APPLICATIONS TYPICAL APPLICATION FEATURES DESCRIPTION n th Order, 0kHz Linear Phase Fiter in an SO- n Differentia Inputs and Outputs n Operates on a Singe or a ± Suppy n Low Offset: m Typica n db THD and SNR n db SNR n Shutdown Mode n

More information

PILGRIM: A Location Broker and Mobility-Aware Recommendation System

PILGRIM: A Location Broker and Mobility-Aware Recommendation System 1 Technica report DIT-2-92, Università di Trento, October 22 PILGRIM: A Location Broker and Mobiity-Aware Recommendation System Mauro Brunato Roberto Battiti DIT - Università di Trento via Sommarive 14

More information

R is in the unit of ma/mw or A/W. For semiconductor detectors, the value is approximately, 0.5 ma/mw.

R is in the unit of ma/mw or A/W. For semiconductor detectors, the value is approximately, 0.5 ma/mw. Light Detection Conventiona methods for the detection of ight can be categorized into photo-synthesis, photographic pate, and photoeectric effect. Photo-synthesis and photographic pate are based on ight-induced

More information

0.5 Class Transducer for Power Application

0.5 Class Transducer for Power Application ompact Size & Superior ost Performance Transducers. ass Transducer for ppication Mounting aaiabe for pane or DIN rai Screw mounting mm width (D-D Isoator, otage / urrent / Frequency) mm width ( / Reactie

More information

New Image Restoration Method Based on Multiple Aperture Defocus Images for Microscopic Images

New Image Restoration Method Based on Multiple Aperture Defocus Images for Microscopic Images Sensors & Transducers, Vo. 79, Issue 9, September 204, pp. 62-67 Sensors & Transducers 204 by IFSA Pubishing, S. L. http://www.sensorsporta.com New Image Restoration Method Based on Mutipe Aperture Defocus

More information

Chapter 15 Other Modifications

Chapter 15 Other Modifications Chapter 15 Other Modifications We have aready seen ways to modify a sound through either edition (see Chap. 6) or fitering (see Chap. 14). Some other changes in ampitude, time, and/or frequency might be

More information

LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION

LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION Jinyu Li, Abderahman Mohamed, Geoffrey Zweig, and Yifan Gong Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 { jinyi, asamir,

More information

Operation Guide

Operation Guide MO0907-EB Operation Guide 709 713 Getting Acquainted Congratuations upon your seection of this CASO watch. To get the most out of your purchase, be sure to read this manua carefuy. Expose the watch to

More information

Relays that Cooperate to Compute

Relays that Cooperate to Compute Reays that Cooperate to Compute Matthew Nokeby Rice University nokeby@rice.edu Bobak Nazer Boston University bobak@bu.edu Behnaam Aazhang Rice University aaz@rice.edu Natasha evroye University of Iinois

More information

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Sateite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Jing Zhu and Sumit Roy Department of Eectrica Engineering, University of Washington Box 352500, Seatte, WA 98195, USA

More information

Getting More Out Of Programming-By-Demonstration

Getting More Out Of Programming-By-Demonstration Papers CHI 99 15-20 MAY 1999 Getting More Out Of Programming-By-Demonstration Richard G. McDanie and Brad A. Myers HCI Institute, Schoo of Computer Science Carnegie Meon University 5000 Forbes Avenue Pittsburgh,

More information

Pulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis

Pulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis Pused RF Signas & Frequency Hoppers Using Rea Time Spectrum Anaysis 1 James Berry Rohde & Schwarz Pused Rea Time and Anaysis Frequency Seminar Hopper Agenda Pused Signas & Frequency Hoppers Characteristics

More information

Georgia Institute of Technology. simulating the performance of a 32-bit interconnect bus. referenced to non-ideal planes. A transient simulation

Georgia Institute of Technology. simulating the performance of a 32-bit interconnect bus. referenced to non-ideal planes. A transient simulation Power ntegrity/signa ntegrity Co-Simuation for Fast Design Cosure Krishna Srinivasan1, Rohan Mandrekar2, Ege Engin3 and Madhavan Swaminathan4 Georgia nstitute of Technoogy 85 5th St NW, Atanta GA 30308

More information

The Cognitive Coprocessor Architecture for Interactive User Interfaces

The Cognitive Coprocessor Architecture for Interactive User Interfaces The Cognitive Coprocessor Architecture for Interactive User Interfaces George G. Robertson, Stuart I

More information

Predicting Eye Fixations using Convolutional Neural Networks

Predicting Eye Fixations using Convolutional Neural Networks Predicting Eye Fixations using Convoutiona Neura Networks Nian Liu 1, Junwei Han 1*, Dingwen Zhang 1, Shifeng Wen 1 and Tianming Liu 2 1 Northwestern Poytechnica University, P.R. China 2 University of

More information

A Historical Example One of the most famous problems in graph theory is the bridges of Konigsberg. The Real Koningsberg

A Historical Example One of the most famous problems in graph theory is the bridges of Konigsberg. The Real Koningsberg A Historical Example One of the most famous problems in graph theory is the bridges of Konigsberg The Real Koningsberg Can you cross every bridge exactly once and come back to the start? Here is an abstraction

More information

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual Mobie Communications EDACS TM Jessica PBX Gateway Operator s Manua TABLE OF CONTENTS 1. SCOPE... 3 2. QUICK USAGE GUIDE... 4 2.1. Making Phone Cas From An EDACS Radio... 4 2.2. Caing EDACS Radios From

More information

In this chapter, I explain the essentials that you need to start drawings. After a

In this chapter, I explain the essentials that you need to start drawings. After a CHAPTER Starting to Draw In this chapter, I expain the essentias that you need to start drawings. After a itte background, I discuss the basics of the screen that you see when you open AutoCAD or AutoCAD

More information

Optimal and Suboptimal Finger Selection Algorithms for MMSE Rake Receivers in Impulse Radio Ultra-Wideband Systems 1

Optimal and Suboptimal Finger Selection Algorithms for MMSE Rake Receivers in Impulse Radio Ultra-Wideband Systems 1 Optima and Suboptima Finger Seection Agorithms for MMSE Rake Receivers in Impuse Radio Utra-Wideband Systems Sinan Gezici, Mung Chiang, H. Vincent Poor and Hisashi Kobayashi Department of Eectrica Engineering

More information

One Dollar LESSON AT A GLANCE. Daily Routines. Problem of the Day. Vocabulary Builder. Digital Path. About the Math. Dollar. Teaching for Depth

One Dollar LESSON AT A GLANCE. Daily Routines. Problem of the Day. Vocabulary Builder. Digital Path. About the Math. Dollar. Teaching for Depth LESSON 9.9D One Doar PROFESSIONAL DEVELOPMENT PROFESSIONAL DEVELOPMENT LESSON AT A GLANCE Mathematics Forida Standard Te and write time. MAFS.1.MD.2.a.c Identify and combine vaues of money in cents up

More information

Discrete Mathematics: Logic. Discrete Mathematics: Lecture 15: Counting

Discrete Mathematics: Logic. Discrete Mathematics: Lecture 15: Counting Discrete Mathematics: Logic Discrete Mathematics: Lecture 15: Counting counting combinatorics: the study of the number of ways to put things together into various combinations basic counting principles

More information

Games and Adversarial Search II

Games and Adversarial Search II Games and Adversarial Search II Alpha-Beta Pruning (AIMA 5.3) Some slides adapted from Richard Lathrop, USC/ISI, CS 271 Review: The Minimax Rule Idea: Make the best move for MAX assuming that MIN always

More information

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2 ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,

More information

Path Delay Estimation using Power Supply Transient Signals: A Comparative Study using Fourier and Wavelet Analysis

Path Delay Estimation using Power Supply Transient Signals: A Comparative Study using Fourier and Wavelet Analysis Path Deay Estimation using Power Suppy Transient Signas: A Comparative Study using Fourier and Waveet Anaysis Abhishek Singh, Jitin Tharian and Jim Pusqueic VLSI Research Laboratory Department of Computer

More information

P H O T O CD I N F O R M A T I O N B U L L E T I N

P H O T O CD I N F O R M A T I O N B U L L E T I N PCD 077 Juy, 1994 Copyright, Eastman Kodak Company, 1994 P H O T O CD I N F O R M A T I O N B U L L E T I N Fuy Utiizing Photo CD Images Maintaining Coor Consistency When Creating KODAK Photo CD Portfoio

More information

Knowledge Representation and Reasoning in the Design of Composite Systems

Knowledge Representation and Reasoning in the Design of Composite Systems 470 IEEE TRANSACTIONS ON, SOFTWARE ENGINEERING, VOL. 18, NO. h, JUNE 1992 Knowedge Representation and Reasoning in the Design of Composite Systems Stephen Fickas and B. Robert Hem Abstract- Our interest

More information

Impedance Transformation Techniques

Impedance Transformation Techniques ecture Outine Impeance Transformation Techniques Impeance-Amittance Conversion Matching with umpe Eements Stub Amittances an Shunt Matching Stub Impeances an Series Matching Doube Stub Matching Dr. W.J.R.

More information

A Closer Look at ASML. September 26-27, 2002

A Closer Look at ASML. September 26-27, 2002 A Coser Look at ASML September 26-27, 2002 TWINSCAN Outine Introduction TWINSCAN roadmap Dua stage technoogy Productivity TWINSCAN dua stage performance Concusion Outine Introduction TWINSCAN roadmap Dua

More information

DESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES

DESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES DESIGN OF SHIP CONROLLER AND SHIP MODEL BASED ON NEURAL NEWORK IDENIFICAION SRUCURES JASMIN VELAGIC, FACULY OF ELECRICAL ENGINEERING SARAJEVO, BOSNIA AND HERZEGOVINA, asmin.veagic@etf.unsa.ba ABSRAC his

More information

U. of Toronto Dept. of Comp. Science Dept. of Comp. Science

U. of Toronto Dept. of Comp. Science Dept. of Comp. Science On Power-Law Reationships of the Internet Topoogy Michais Faoutsos Petros Faoutsos U.C. Riverside U. of Toronto Dept. of Comp. Science Dept. of Comp. Science michais@cs.ucr.edu pfa@cs.toronto.edu Christos

More information

Run to Potential: Sweep Coverage in Wireless Sensor Networks

Run to Potential: Sweep Coverage in Wireless Sensor Networks Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,

More information

Capacity of Data Collection in Arbitrary Wireless Sensor Networks

Capacity of Data Collection in Arbitrary Wireless Sensor Networks This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess

More information

An Approach to use Cooperative Car Data in Dynamic OD Matrix

An Approach to use Cooperative Car Data in Dynamic OD Matrix An Approach to use Cooperative Car Data in Dynamic OD Matrix Estimation L. Montero and J. Barceó Department of Statistics and Operations Research Universitat Poitècnica de Cataunya UPC-Barceona Tech Abstract.

More information

Debugging EMI Using a Digital Oscilloscope

Debugging EMI Using a Digital Oscilloscope Debugging EMI Using a Digita Oscioscope 06/2009 Nov 2010 Fundamentas Scope Seminar of DSOs Signa Fideity 1 1 1 Debugging EMI Using a Digita Oscioscope Background radiated emissions Basics of near fied

More information

Efficient Multi-resolution Sinusoidal Modeling

Efficient Multi-resolution Sinusoidal Modeling ANDERSON AND CLEMENTS 1 Efficient Muti-resoution Sinusoida Modeing David V. Anderson and Mark A. Cements Abstract Muti-resoution sinusoida modeing is a method of representing audio signas as a sum of discrete

More information

CHAPTER 3 Studio Setup

CHAPTER 3 Studio Setup CHAPTER 3 Studio Setup The best recordings come from propery designed spaces. Before anything is oaded into the room, before any equipment setup begins, you must determine the best ways to take advantage

More information

Resource Allocation via Linear Programming for Fractional Cooperation

Resource Allocation via Linear Programming for Fractional Cooperation 1 Resource Aocation via Linear Programming for Fractiona Cooperation Nariman Farsad and Andrew W Ecford Abstract In this etter, resource aocation is considered for arge muti-source, muti-reay networs empoying

More information

Analysis, Analysis Practices, and Implications for Modeling and Simulation

Analysis, Analysis Practices, and Implications for Modeling and Simulation , Practices, and Impications for Modeing and imuation Amy Henninger The Probem The act of identifying, enumerating, evauating, and mapping known technoogies to inferred program requirements is an important

More information

Coordination Improvement of Directional Overcurrent Relays in a Microgrid Using Modified Particle Swarm Optimization Algorithm

Coordination Improvement of Directional Overcurrent Relays in a Microgrid Using Modified Particle Swarm Optimization Algorithm Internationa Journa of Eectrica Components and Energy Conversion 2018; 4(1): 21-32 http://www.sciencepubishinggroup.com/j/ijecec doi: 10.11648/j.ijecec.20180401.13 ISSN: 2469-8040 (Print); ISSN: 2469-8059

More information