CS738: Advanced Compiler Optimizations. Flow Graph Theory. Amey Karkare
|
|
- Naomi Stanley
- 5 years ago
- Views:
Transcription
1 CS738: Avance Compiler Optimizations Flow Graph Theory Amey Karkare Department of CSE, IIT Kanpur
2 Agena Speeing up DFA Depth of a flow graph Natural Loops
3 Acknowlegement Rest of the slies base on the material at w06.html
4 Speeing up DFA Proper orering of noes of a flow graph spees up the iterative algorithms: epth-first orering.
5 Speeing up DFA Proper orering of noes of a flow graph spees up the iterative algorithms: epth-first orering. Normal flow graphs have a surprising property reucibility that simplifies several matters.
6 Speeing up DFA Proper orering of noes of a flow graph spees up the iterative algorithms: epth-first orering. Normal flow graphs have a surprising property reucibility that simplifies several matters. Outcome: few iterations normally neee.
7 Depth-First Search Start at entry.
8 Depth-First Search Start at entry. If you can follow an ege to an unvisite noe, o so.
9 Depth-First Search Start at entry. If you can follow an ege to an unvisite noe, o so. If not, backtrack to your parent (noe from which you were visite).
10 Depth-First Spanning Tree (DFST) Root = Entry.
11 Depth-First Spanning Tree (DFST) Root = Entry. Tree eges are the eges along which we first visit the noe at the hea.
12 DFST Example
13 DFST Example
14 DFST Example
15 DFST Example
16 DFST Example
17 Depth-First Noe Orer The reverse of the orer in which a DFS retreats from the noes.
18 Depth-First Noe Orer The reverse of the orer in which a DFS retreats from the noes. Alternatively, reverse of postorer traversal of the tree.
19 DF Orer Example
20 Four Kin of Eges 1. Tree eges.
21 Four Kin of Eges 1. Tree eges. 2. Forwar eges: noe to proper escenant.
22 Four Kin of Eges 1. Tree eges. 2. Forwar eges: noe to proper escenant. 3. Retreating eges: noe to ancestor.
23 Four Kin of Eges 1. Tree eges. 2. Forwar eges: noe to proper escenant. 3. Retreating eges: noe to ancestor. 4. Cross eges: between two noe, niether of which is an ancestor of the other.
24 A Little Magic Of these eges, only retreating eges go from high to low in DF orer.
25 A Little Magic Of these eges, only retreating eges go from high to low in DF orer. Most surprising: all cross eges go right to left in the DFST.
26 A Little Magic Of these eges, only retreating eges go from high to low in DF orer. Most surprising: all cross eges go right to left in the DFST. Assuming we a chilren of any noe from the left.
27 Example: Non-Tree Eges
28 Example: Non-Tree Eges Retreating
29 Example: Non-Tree Eges Retreating 1 Forwar
30 Example: Non-Tree Eges Retreating 1 Forwar Cross
31 Roamap Normal flow graphs are reucible.
32 Roamap Normal flow graphs are reucible. Dominators neee to explain reucibility.
33 Roamap Normal flow graphs are reucible. Dominators neee to explain reucibility. In reucible flow graphs, loops are well efine, retreating eges are unique (an calle back eges).
34 Roamap Normal flow graphs are reucible. Dominators neee to explain reucibility. In reucible flow graphs, loops are well efine, retreating eges are unique (an calle back eges). Leas to relationship between DF orer an efficient iterative algorithm.
35 Dominators Noe ominates noe n if every path from the Entry to n goes through.
36 Dominators Noe ominates noe n if every path from the Entry to n goes through. [Exercise] A forwar-intersection iterative algorithm for fining ominators.
37 Dominators Noe ominates noe n if every path from the Entry to n goes through. [Exercise] A forwar-intersection iterative algorithm for fining ominators. Quick observations:
38 Dominators Noe ominates noe n if every path from the Entry to n goes through. [Exercise] A forwar-intersection iterative algorithm for fining ominators. Quick observations: Every noe ominates itself.
39 Dominators Noe ominates noe n if every path from the Entry to n goes through. [Exercise] A forwar-intersection iterative algorithm for fining ominators. Quick observations: Every noe ominates itself. The entry ominates every noe.
40 Example: Dominators Noe Dominators
41 Example: Dominators Noe Dominators
42 Example: Dominators Noe Dominators ,
43 Example: Dominators Noe Dominators , 2 3 1, 2,
44 Example: Dominators Noe Dominators , 2 3 1, 2, 3 4 1,
45 Example: Dominators Noe Dominators , 2 3 1, 2, 3 4 1, 4 5 1, 5 5 3
46 Common Dominator Cases The test of a while loop ominates all blocks in the loop boy.
47 Common Dominator Cases The test of a while loop ominates all blocks in the loop boy. The test of an if-then-else ominates all blocks in either branch.
48 Back Eges An ege is a back ege if its hea ominates its tail.
49 Back Eges An ege is a back ege if its hea ominates its tail. Theorem: Every back ege is a retreating ege in every DFST of every flow graph.
50 Back Eges An ege is a back ege if its hea ominates its tail. Theorem: Every back ege is a retreating ege in every DFST of every flow graph. Proof? Discuss/Exercise
51 Back Eges An ege is a back ege if its hea ominates its tail. Theorem: Every back ege is a retreating ege in every DFST of every flow graph. Proof? Discuss/Exercise Converse almost always true, but not always.
52 Example: Back Eges Noe Dominators , 2 3 1, 2, 3 4 1, 4 5 1, 5 5 3
53 Example: Back Eges Noe Dominators , 2 3 1, 2, 3 4 1, 4 5 1, 5 5 3
54 Reucible Flow Graphs A flow graph is reucible if every retreating ege in any DFST for that flow graph is a back ege.
55 Reucible Flow Graphs A flow graph is reucible if every retreating ege in any DFST for that flow graph is a back ege. Testing reucibility: Take any DFST for the flow graph, remove the back eges, an check that the result is acyclic.
56 Example: Remove Back Eges Noe Dominators , 2 3 1, 2, 3 4 1, 4 5 1, 5 5 3
57 Example: Remove Back Eges Noe Dominators , 2 3 1, 2, 3 4 1, 4 5 1, Remaining graph is acyclic.
58 Why Reucibility? Folk theorem: All flow graphs in practice are reucible. Fact: If you use only while-loops, for-loops, repeat-loops, if-then(-else), break, an continue, then your flow graph is reucible.
59 Example: Nonreucible Graph A B C
60 Example: Nonreucible Graph A B C In any DFST, one of these eges will be a retreating ege.
61 Example: Nonreucible Graph A A B C B C In any DFST, one of these eges will be a retreating ege.
62 Example: Nonreucible Graph A A A B C C B C B In any DFST, one of these eges will be a retreating ege.
63 Why Care About Back/Retreating Eges? Proper orering of noes uring iterative algorithm assures number of passes limite by the number of neste back eges.
64 Why Care About Back/Retreating Eges? Proper orering of noes uring iterative algorithm assures number of passes limite by the number of neste back eges. Depth of neste loops upper-bouns the number of neste back eges.
65 DF Orer an Retreating Eges Suppose that for a RD analysis, we visit noes uring each iteration in DF orer.
66 DF Orer an Retreating Eges Suppose that for a RD analysis, we visit noes uring each iteration in DF orer. The fact that a efinition reaches a block will propagate in one pass along any increasing sequence of blocks.
67 DF Orer an Retreating Eges Suppose that for a RD analysis, we visit noes uring each iteration in DF orer. The fact that a efinition reaches a block will propagate in one pass along any increasing sequence of blocks. When arrives along a retreating ege, it is too late to propagate from OUT to IN.
68 Example: DF Orer Noe 2 generates efinition
69 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t
70 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?
71 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?
72 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?
73 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?
74 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?
75 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?
76 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?
77 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?
78 Example: DF Orer Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4? 2 3
79 Example: DF Orer Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4? 2 3
80 Example: DF Orer Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4? 2 3
81 Depth of a Flow Graph The epth of a flow graph is the greatest number of retreating eges along any acyclic path.
82 Depth of a Flow Graph The epth of a flow graph is the greatest number of retreating eges along any acyclic path. For RD, if we use DF orer to visit noes, we converge in epth+2 passes.
83 Depth of a Flow Graph The epth of a flow graph is the greatest number of retreating eges along any acyclic path. For RD, if we use DF orer to visit noes, we converge in epth+2 passes. Depth+1 passes to follow that number of increasing segments.
84 Depth of a Flow Graph The epth of a flow graph is the greatest number of retreating eges along any acyclic path. For RD, if we use DF orer to visit noes, we converge in epth+2 passes. Depth+1 passes to follow that number of increasing segments. 1 more pass to realize we converge.
85 Example: Depth = 2
86 Example: Depth = 2 increasing
87 Example: Depth = 2 increasing retreating
88 Example: Depth = 2 retreating increasing increasing
89 Example: Depth = 2 retreating retreating increasing increasing
90 Example: Depth = 2 retreating retreating increasing increasing increasing
91 Similarly... AE also works in epth+2 passes.
92 Similarly... AE also works in epth+2 passes. Unavailability propagates along retreat-free noe sequences in one pass.
93 Similarly... AE also works in epth+2 passes. Unavailability propagates along retreat-free noe sequences in one pass. So oes LV if we use reverse of DF orer.
94 Similarly... AE also works in epth+2 passes. Unavailability propagates along retreat-free noe sequences in one pass. So oes LV if we use reverse of DF orer. A use propagates backwar along paths that o not use a retreating ege in one pass.
95 In General... The epth+2 boun works for any monotone bit-vector framework, as long as information only nees to propagate along acyclic paths. Example: if a efinition reaches a point, it oes so along an acyclic path.
96 Why Depth+2 is Goo? Normal control-flow constructs prouce reucible flow graphs with the number of back eges at most the nesting epth of loops. Nesting epth tens to be small.
97 Example: Neste Loops 3 neste while loops.
98 Example: Neste Loops 3 neste while loops. epth = 3.
99 Example: Neste Loops 3 neste while loops. 3 neste o-while loops. epth = 3.
100 Example: Neste Loops 3 neste while loops. epth = 3. 3 neste o-while loops. epth = 1.
101 Natural Loops The natural loop of a back ege a b is {b} plus the set of noes that can reach a without going through b.
102 Natural Loops The natural loop of a back ege a b is {b} plus the set of noes that can reach a without going through b. Theorem: two natural loops are either isjoint, ientical, or neste.
103 Natural Loops The natural loop of a back ege a b is {b} plus the set of noes that can reach a without going through b. Theorem: two natural loops are either isjoint, ientical, or neste. Proof: Discuss/Exercise
104 Example: Natural Loops
105 Example: Natural Loops Natural loop 3 2
106 Example: Natural Loops Natural loop 5 1 Natural loop 3 2
107 Reaing Assignment New Dragon Book (Aho, Lam, Sethi, Ullman) Chapter 9
Audiological Bulletin no. 31
Auiological Bulletin no. 31 The effect - an introuction News from Auiological Research an Communication 9 502 1043 001 / 05-07 Introuction Venting in earmouls has been use for many years to control the
More informationPERFORMANCE EVALUATION OF HIGHWAY MOBILE INFOSTATION NETWORKS
PERFORMANCE EVALUATION OF HIGHWAY MOBILE INFOSTATION NETWORKS Wing Ho Yuen WINLAB Rutgers University Piscataway, NJ 8854 anyyuen@winlab.rutgers.eu Roy D. Yates WINLAB Rutgers University Piscataway, NJ
More informationGRAPHS, ALGORITHMS, AND OPTIMIZATION
DISCRETE MATHEMATICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN GRAPHS, ALGORITHMS, AND OPTIMIZATION WILLIAM KOCAY DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF MANITOBA DONALD L KREHER DEPARTMENT
More informationSolving problems by searching
Solving problems by searching Chapter 3 14 Jan 2004 CS 3243 - Blind Search 1 Outline Problem-solving agents Problem types Problem formulation Example problems Basic search algorithms 14 Jan 2004 CS 3243
More informationMore Examples and Applications on AVL Tree
CSCI2100 Tutorial 11 Jianwen Zhao Department of Computer Science and Engineering The Chinese University of Hong Kong Adapted from the slides of the previous offerings of the course Recall in lectures we
More informationChapter 2. Knowledge Representation: Reasoning, Issues, and Acquisition. Teaching Notes
Chapter 2 Knowledge Representation: Reasoning, Issues, and Acquisition Teaching Notes This chapter explains how knowledge is represented in artificial intelligence. The topic may be launched by introducing
More informationSome Connectivity Concepts in Bipolar Fuzzy Graphs
Annals of Pure and Applied Mathematics Vol. 7, No. 2, 2014, 98-108 ISSN: 2279-087X (P), 2279-0888(online) Published on 30 September 2014 www.researchmathsci.org Annals of Some Connectivity Concepts in
More informationSymbolic CTL Model Checking
Symbolic CTL Model Checking Crystal Chang Din Precise Modeling and Analysis group (PMA), University of Oslo INF9140 - Specification and Verification of Parallel Systems Crystal Chang Din @ UiO Symbolic
More informationHospital Process of Care Measures Graphs
Meicare Hospital Surgical Care Improvement Project Process of Care Measures Graph Page 1 of 9 http://www.hospitalcompare.hhs.gov/graphs/hospital Graph.aspx?hi=160064&stype=G... 04/27/2012 Return to previous
More informationVLSI Design, Fall Design of Adders Design of Adders. Jacob Abraham
8. Design of Adders 1 8. Design of Adders Jacob Abraham Department of Electrical and Computer Engineering The University of Texas at Austin VLSI Design Fall 2017 September 27, 2017 ECE Department, University
More informationTest-Driven Development
On the Influence of Test-Driven Development on Software Design by SzeChernTan School of Informatics University of Edinburgh 12 February 2009 Agenda Introduction Overview of paper Experimental design Results
More informationReview Questions in Introductory Knowledge... 37
Table of Contents Preface..... 17 About the Authors... 19 How This Book is Organized... 20 Who Should Buy This Book?... 20 Where to Find Answers to Review Questions and Exercises... 20 How to Report Errata...
More informationA PRELIMINARY STUDY OF MODELING AND SIMULATION IN INDIVIDUALIZED DRUG DOSAGE AZATHIOPRINE ON INFLAMMATORY BOWEL DISEASE
This is a correcte version of the corresponing paper publishe in SIMS 26: Proceeings of the 47th Conference on Simulation an Moelling. Errata: equations.3 an.4 have been change to timecontinuous form an
More informationDecisions and Dependence in Influence Diagrams
JMLR: Workshop and Conference Proceedings vol 52, 462-473, 2016 PGM 2016 Decisions and Dependence in Influence Diagrams Ross D. hachter Department of Management cience and Engineering tanford University
More informationChapter 7: Descriptive Statistics
Chapter Overview Chapter 7 provides an introduction to basic strategies for describing groups statistically. Statistical concepts around normal distributions are discussed. The statistical procedures of
More informationAn application of topological relations of fuzzy regions with holes
Chapter 5 An application of topological relations of fuzzy regions with holes 5.1 Introduction In the last two chapters, we have provided theoretical frameworks for fuzzy regions with holes in terms of
More informationConnectivity in a Bipolar Fuzzy Graph and its Complement
Annals of Pure and Applied Mathematics Vol. 15, No. 1, 2017, 89-95 ISSN: 2279-087X (P), 2279-0888(online) Published on 11 December 2017 www.researchmathsci.org DOI: http://dx.doi.org/10.22457/apam.v15n1a8
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeare in a journal publishe by Elsevier. The attache copy is furnishe to the author for internal non-commercial research an eucation use, incluing for instruction at the authors institution
More informationAudiological Bulletin no. 32
Auiological Bulletin no. 32 Estimating real-ear acoustics News from Auiological Research an Communication 9 502 1040 001 / 05-07 Introuction When eveloping an testing hearing ais, the hearing professional
More informationChapter 3 Software Packages to Install How to Set Up Python Eclipse How to Set Up Eclipse... 42
Table of Contents Preface..... 21 About the Authors... 23 Acknowledgments... 24 How This Book is Organized... 24 Who Should Buy This Book?... 24 Where to Find Answers to Review Questions and Exercises...
More informationLocalization-based secret key agreement for wireless network
The University of Toleo The University of Toleo Digital Repository Theses an Dissertations 2015 Localization-base secret key agreement for wireless network Qiang Wu University of Toleo Follow this an aitional
More informationComputer-based 3d Puzzle Solving For Pre-operative Planning Of Articular Fracture Reductions In The Ankle, Knee, And Hip
Computer-based 3d Puzzle Solving For Pre-operative Planning Of Articular Fracture Reductions In The Ankle, Knee, And Hip Andrew M. Kern, MS, Donald Anderson. University of Iowa, Iowa City, IA, USA. Disclosures:
More informationSolve algebraically. 1) 7 - a -4 1) Solve algebraically. Write answer in set builder or interval notation. 2) 4m m - 7 2)
Chapter 9 & 10 Practice. The following is an aid to study for the Chapter 9 & 10 eam. Disclaimer: The actual eam is different. You do need to show work on the actual eam and will not be given credit for
More informationApplied Statistical Analysis EDUC 6050 Week 4
Applied Statistical Analysis EDUC 6050 Week 4 Finding clarity using data Today 1. Hypothesis Testing with Z Scores (continued) 2. Chapters 6 and 7 in Book 2 Review! = $ & '! = $ & ' * ) 1. Which formula
More informationLoop Dependence and Parallelism
Loop Dependence and Parallelism Announcements Reading assignments for next week due Midterm is Monday March 6th, example midterms posted Assignment 2 is due the week after that. Start now! Today Data dependencies
More informationIncluding Quantification in Defeasible Reasoning for the Description Logic EL
Including Quantification in Defeasible Reasoning for the Description Logic EL Maximilian Pensel and Anni-Yasmin Turhan Institute for Theoretical Computer Science, Technische Universität Dresden first-name.last-name
More informationLeman Akoglu Hanghang Tong Jilles Vreeken. Polo Chau Nikolaj Tatti Christos Faloutsos SIAM International Conference on Data Mining (SDM 2013)
Leman Akoglu Hanghang Tong Jilles Vreeken Polo Chau Nikolaj Tatti Christos Faloutsos 2013 SIAM International Conference on Data Mining (SDM 2013) What can we say about this list of authors? Use relational
More informationIEEE SIGNAL PROCESSING LETTERS, VOL. 13, NO. 3, MARCH A Self-Structured Adaptive Decision Feedback Equalizer
SIGNAL PROCESSING LETTERS, VOL 13, NO 3, MARCH 2006 1 A Self-Structured Adaptive Decision Feedback Equalizer Yu Gong and Colin F N Cowan, Senior Member, Abstract In a decision feedback equalizer (DFE),
More informationP(HYP)=h. P(CON HYP)=p REL. P(CON HYP)=q REP
BAYESIAN NETWORKS IN PHILOSOPHY STEPHAN HARTMANN, LUC BOVENS 1. Introduction There is a long philosophical tradition of addressing questions in philosophy of science and epistemology by means of the tools
More informationGene expression analysis. Roadmap. Microarray technology: how it work Applications: what can we do with it Preprocessing: Classification Clustering
Gene expression analysis Roadmap Microarray technology: how it work Applications: what can we do with it Preprocessing: Image processing Data normalization Classification Clustering Biclustering 1 Gene
More informationChapter 23. Inference About Means. Copyright 2010 Pearson Education, Inc.
Chapter 23 Inference About Means Copyright 2010 Pearson Education, Inc. Getting Started Now that we know how to create confidence intervals and test hypotheses about proportions, it d be nice to be able
More informationWANTED Species Survival Plan Coordinator
WANTED Species Survival Plan Coorinator Knowlegeable zoo or aquarium professional to manage propagation of hunres of animals locate in several states an countries. Must be verse in genetics, sophisticate
More informationEvolutionary Programming
Evolutionary Programming Searching Problem Spaces William Power April 24, 2016 1 Evolutionary Programming Can we solve problems by mi:micing the evolutionary process? Evolutionary programming is a methodology
More informationMITOCW ocw f99-lec20_300k
MITOCW ocw-18.06-f99-lec20_300k OK, this is lecture twenty. And this is the final lecture on determinants. And it's about the applications. So we worked hard in the last two lectures to get a formula for
More informationSeminar Thesis: Efficient Planning under Uncertainty with Macro-actions
Seminar Thesis: Efficient Planning under Uncertainty with Macro-actions Ragnar Mogk Department of Computer Science Technische Universität Darmstadt ragnar.mogk@stud.tu-darmstadt.de 1 Introduction This
More informationTIMELY: RTT-based Congestion Control for the Datacenter
TIMELY: RTT-based Congestion Control for the Datacenter Authors: Radhika Mittal(UC Berkeley), Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi(Microsoft), Amin Vahdat, Yaogong
More informationAn Empirical and Formal Analysis of Decision Trees for Ranking
An Empirical and Formal Analysis of Decision Trees for Ranking Eyke Hüllermeier Department of Mathematics and Computer Science Marburg University 35032 Marburg, Germany eyke@mathematik.uni-marburg.de Stijn
More informationChoose the correct option and write your answer on a separate sheet of paper
Cuestionario e estuio e Inglés V Alumno (a: N. L.: Profesor: Lorena Núñez Ramos Fecha: Grao: 5o Grupo: A Choose the correct option an write your answer on a separate sheet of paper Who? to get through
More informationProblem Solving Agents
Problem Solving Agents CSL 302 ARTIFICIAL INTELLIGENCE SPRING 2014 Goal Based Agents Representation Mechanisms (propositional/first order/probabilistic logic) Learning Models Search (blind and informed)
More informationAudiological Bulletin no. 35
Auiological Bulletin no. 35 Ensuring the correct in-situ gain News from Auiological Research an Communication 9 502 1041 001 / 05-07 Introuction Hearing ais are commonly fitte accoring to ata base on a
More informationUsing WRT and control charts to evaluate analytical precision
ICPF - Working Group on QA/QC in Laboratories Meeting of the Heads of the Laboratories 7-8 September 2017 in Verbania Pallanza Using WRT and control charts to evaluate analytical precision Alessandra Mazzoli,
More informationCorrelation vs. Causation - and What Are the Implications for Our Project? By Michael Reames and Gabriel Kemeny
Correlation vs. Causation - and What Are the Implications for Our Project? By Michael Reames and Gabriel Kemeny In problem solving, accurately establishing and validating root causes are vital to improving
More informationCognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence
Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence To understand the network paradigm also requires examining the history
More informationEpisode 7. Modeling Network Traffic using Game Theory. Baochun Li Department of Electrical and Computer Engineering University of Toronto
Episode 7. Modeling Network Traffic using Game Theory aochun Li epartment of Electrical and Computer Engineering University of Toronto Networks, Crowds, and Markets, Chapter 8 Objective in this episode
More informationLessons for Successful Subintimal Angioplasty in SFA CTO
Lessons for Successful Subintimal Angioplasty in SFA CTO John R. Laird Professor of Medicine Medical Director of the Vascular Center UC Davis Medical Center CTOs in the Periphery Presence of Total Occlusion
More information1Number and Algebra. Surds
Numer an Algera ffi ffi ( ), cue root ( ecimal or fraction value cannot e foun. When alying Pythagoras theorem, we have foun lengths that cannot e exresse as an exact rational numer. Pythagoras encountere
More informationCentral Algorithmic Techniques. Iterative Algorithms
Central Algorithmic Techniques Iterative Algorithms Code Representation of an Algorithm class InsertionSortAlgorithm extends SortAlgorithm { void sort(int a[]) throws Exception { for (int i = 1; i < a.length;
More informationProbabilistically Estimating Backbones and Variable Bias: Experimental Overview
Probabilistically Estimating Backbones and Variable Bias: Experimental Overview Eric I. Hsu, Christian J. Muise, J. Christopher Beck, and Sheila A. McIlraith Department of Computer Science, University
More informationModeling Sentiment with Ridge Regression
Modeling Sentiment with Ridge Regression Luke Segars 2/20/2012 The goal of this project was to generate a linear sentiment model for classifying Amazon book reviews according to their star rank. More generally,
More informationAdditional analysis on the assessment report: The Effectiveness and Cost Effectiveness of Pimecrolimus and Tacrolimus for the Atopic Eczema.
Additional analysis on the assessment report: The Effectiveness and Cost Effectiveness of Pimecrolimus and Tacrolimus for the Atopic Eczema. Conducted by PenTAG. Page 1 of 6 Further Analysis of the Eczema
More informationBinary Increase Congestion Control (BIC) for Fast Long-Distance Networks
Binary Increase Congestion Control () for Fast Long-Distance Networks Lisong Xu, Khale Harfoush, an Injong Rhee Department of Computer Science North Carolina State University Raleigh, NC 27695-7534 lxu2,
More informationNODE CONNECTIVITY AND CONDITIONAL DENSITY D. White and F. Harary. Definitions of Cohesive Sets in Social Networks
NODE CONNECTIVITY AND CONDITIONAL DENSITY D. White and F. Harary Definitions of Cohesive Sets in Social Networks The connectivity K (G) kappa of a connected graph G is the minimum number of nodes needed
More informationPolicy Gradients. CS : Deep Reinforcement Learning Sergey Levine
Policy Gradients CS 294-112: Deep Reinforcement Learning Sergey Levine Class Notes 1. Homework 1 due today (11:59 pm)! Don t be late! 2. Remember to start forming final project groups Today s Lecture 1.
More informationAutomatically Assembling the Building Blocks of Cellular Circuitry
Motivation Automatically Assembling the Building Blocks of Cellular Circuitry T. M. Murali April 20, 2006 Motivation Features of the Wiring iagram iagram is multi-modal. iagram is incomplete. Changes from
More informationTG100 Implementation Guide - FTA
FTA In this section, we will talk about Fault Tree Analysis (FTA). What is a fault tree? It is a tool used to trace failure pathways back to the causes and contributing factors. A fault tree analysis starts
More informationPART - A 1. Define Artificial Intelligence formulated by Haugeland. The exciting new effort to make computers think machines with minds in the full and literal sense. 2. Define Artificial Intelligence
More informationRumor Detection on Twitter with Tree-structured Recursive Neural Networks
1 Rumor Detection on Twitter with Tree-structured Recursive Neural Networks Jing Ma 1, Wei Gao 2, Kam-Fai Wong 1,3 1 The Chinese University of Hong Kong 2 Victoria University of Wellington, New Zealand
More informationBayes Linear Statistics. Theory and Methods
Bayes Linear Statistics Theory and Methods Michael Goldstein and David Wooff Durham University, UK BICENTENNI AL BICENTENNIAL Contents r Preface xvii 1 The Bayes linear approach 1 1.1 Combining beliefs
More informationGraph modeling. Northern Territory. Queensland. Western Australia. South Australia. New South Wales. Victoria. Tasmania
Graph modeling Western Australia Northern Territory South Australia Queensland New South Wales Victoria Tasmania 1 / 40 Graph modeling Western Australia Northern Territory Queensland WA NT Q South Australia
More informationChapter 20: Test Administration and Interpretation
Chapter 20: Test Administration and Interpretation Thought Questions Why should a needs analysis consider both the individual and the demands of the sport? Should test scores be shared with a team, or
More informationInternational Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN
CRIME ASSOCIATION ALGORITHM USING AGGLOMERATIVE CLUSTERING Saritha Quinn 1, Vishnu Prasad 2 1 Student, 2 Student Department of MCA, Kristu Jayanti College, Bengaluru, India ABSTRACT The commission of a
More informationThe Structure of Social Contact Graphs and their impact on Epidemics
The Structure of Social Contact Graphs and their impact on Epidemics Anil Vullikanti Virginia Bioinformatics Institute, and Dept. of Computer Science, Virginia Tech Joint work with: Chris Barrett, Madhav
More information15-110: Principles of Computing, Spring Problem Set 9 (PS9) Due: Friday, April 6 by 2:30PM via Gradescope Hand-in
15-110: Principles of Computing, Spring 2018 Problem Set 9 (PS9) Due: Friday, April 6 by 2:30PM via Gradescope Hand-in HANDIN INSTRUCTIONS Download a copy of this PDF file. You have two ways to fill in
More informationCSE 258 Lecture 2. Web Mining and Recommender Systems. Supervised learning Regression
CSE 258 Lecture 2 Web Mining and Recommender Systems Supervised learning Regression Supervised versus unsupervised learning Learning approaches attempt to model data in order to solve a problem Unsupervised
More informationChapter 6 subtitles postsynaptic integration
CELLULAR NEUROPHYSIOLOGY CONSTANCE HAMMOND Chapter 6 subtitles postsynaptic integration INTRODUCTION (1:56) This sixth and final chapter deals with the summation of presynaptic currents. Glutamate and
More informationAn Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks
An Information Moel for Geographic Greey Forwaring in Wireless A-Hoc Sensor Networks Zhen Jiang Compter Science Department West Chester University West Chester, PA 19383, USA zjiang@wcpa.e Jnchao Ma, Wei
More informationTIMELY: RTT-based Congestion Control for the Datacenter
TIMELY: RTT-based Congestion Control for the Datacenter Radhika Mittal*(UC Berkeley), Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi*(Microsoft), Amin Vahdat, Yaogong Wang, David
More informationTransformation CS 148: Summer 2016 Introduction of Graphics and Imaging Zahid Hossain
Transformation CS 148: Summer 2016 Introduction of Graphics and Imaging Zahid Hossain http://www.pling.org.uk/cs/cgv.html Placement of Objects Fisher et al. (2012) CS 148: Introduction to Computer Graphics
More informationFsm exercise: solution
Fsm exercise: solution accept(,final,q,[]) :- member(q,final). member(x,[x ]). member(x,[ L]):- member(x,l). 1 / 65 Fsm exercise: solution accept(,final,q,[]) :- member(q,final). accept(trans,final,q,[h
More informationLearning and Adaptive Behavior, Part II
Learning and Adaptive Behavior, Part II April 12, 2007 The man who sets out to carry a cat by its tail learns something that will always be useful and which will never grow dim or doubtful. -- Mark Twain
More informationWorkshop Information IAEA Workshop
IAEA Training Course on Safety Assessment of NPPs to Assist Decision Making Incident Evaluation and Ranking of Operational Events Lecturer Lesson Lesson IV IV3_II.13 Workshop Information IAEA Workshop
More informationUsing Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s
Using Bayesian Networks to Analyze Expression Data Xu Siwei, s0789023 Muhammad Ali Faisal, s0677834 Tejal Joshi, s0677858 Outline Introduction Bayesian Networks Equivalence Classes Applying to Expression
More informationSimultaneous Equation and Instrumental Variable Models for Sexiness and Power/Status
Simultaneous Equation and Instrumental Variable Models for Seiness and Power/Status We would like ideally to determine whether power is indeed sey, or whether seiness is powerful. We here describe the
More informationCAN Tree Routing for Content-Addressable Network
Sensors & Transucers 2014 by IFSA Publishing, S. L. htt://www.sensorsortal.com CAN Tree Routing for Content-Aressable Network Zhongtao LI, Torben WEIS University Duisburg-Essen, Universität Duisburg-Essen
More informationCPSC 121 Some Sample Questions for the Final Exam
CPSC 121 Some Sample Questions for the Final Exam [0] 1. Tautologies and Contradictions: Determine whether the following statements are tautologies (definitely true), contradictions (definitely false),
More informationFinal Exam - section 2. Thursday, December hours, 30 minutes
Econometrics, ECON312 San Francisco State University Michael Bar Fall 2011 Final Exam - section 2 Thursday, December 15 2 hours, 30 minutes Name: Instructions 1. This is closed book, closed notes exam.
More informationThe Chosen Chapters 8-18 Study Guide. 1. Why might Reuven be frightened to see Homer s eyes now that he s really looked at it?
Chapter 8: The Chosen Chapters 8-18 Study Guide 1. Why might Reuven be frightened to see Homer s eyes now that he s really looked at it? 2. The author spends an entire page describing what Danny looks
More informationConcepts and Connections: What Do You Expect? Concept Example Connected to or Foreshadowing
Meaning of Probability: The term probability is applied to situations that have uncertain outcomes on individual trials but a predictable pattern of outcomes over many trials. Students find experimental
More information3 CONCEPTUAL FOUNDATIONS OF STATISTICS
3 CONCEPTUAL FOUNDATIONS OF STATISTICS In this chapter, we examine the conceptual foundations of statistics. The goal is to give you an appreciation and conceptual understanding of some basic statistical
More informationMOCKTIME.COM ONLINE TEST SERIES CORRESPONDENCE COURSE
Simplification 1. Simplify : 1 + (a) 28/17 (b) 15/7 (c) 23/17 (d) 38/17 2. Evaluate: [ ] (a) 9/10 (b) -(8/17 ) (c) - (16/19 ) (d) 4/7 3. 45 [4- {3 - (3 3 6)}] is equal to : (a) 10 (b) 6 (c) 4 (d) 0 4.
More informationTitle: Analyzing the Impact of Social Factors on Homelessness: A Fuzzy Cognitive Map Approach
Author's response to reviews Title: Analyzing the Impact of Social Factors on Homelessness: A Fuzzy Cognitive Map Approach Authors: Vijay K Mago Dr. (vmago@sfu.ca) Hilary K Morden (hmorden@sfu.ca) Charles
More informationHoare Logic and Model Checking. LTL and CTL: a perspective. Learning outcomes. Model Checking Lecture 12: Loose ends
Learning outcomes Hoare Logic and Model Checking Model Checking Lecture 12: Loose ends Dominic Mulligan Based on previous slides by Alan Mycroft and Mike Gordon Programming, Logic, and Semantics Group
More informationA DISCRETE MODEL OF GLUCOSE-INSULIN INTERACTION AND STABILITY ANALYSIS A. & B.
A DISCRETE MODEL OF GLUCOSE-INSULIN INTERACTION AND STABILITY ANALYSIS A. George Maria Selvam* & B. Bavya** Sacre Heart College, Tirupattur, Vellore, Tamilnau Abstract: The stability of a iscrete-time
More informationResponse to reviewer comment (Rev. 2):
Response to reviewer comment (Rev. 2): The revised paper contains changes according to comments of all of the three reviewers. The abstract was revised according to the remarks of the three reviewers.
More informationCS 4365: Artificial Intelligence Recap. Vibhav Gogate
CS 4365: Artificial Intelligence Recap Vibhav Gogate Exam Topics Search BFS, DFS, UCS, A* (tree and graph) Completeness and Optimality Heuristics: admissibility and consistency CSPs Constraint graphs,
More informationGrade 6 Math Circles Winter February 6/7 Number Theory - Solutions Warm-up! What is special about the following groups of numbers?
Faculty of Mathematics Waterloo, Ontario N2L 3G1 Grade 6 Math Circles Winter 2018 - February 6/7 Number Theory - Solutions Warm-up! What is special about the following groups of numbers? Centre for Education
More informationMath HL Chapter 12 Probability
Math HL Chapter 12 Probability Name: Read the notes and fill in any blanks. Work through the ALL of the examples. Self-Check your own progress by rating where you are. # Learning Targets Lesson I have
More informationContact Tracing in Healthcare Digital Ecosystems for Infectious Disease Control and Quarantine Management
Contact Tracing in Healthcare Digital Ecosystems for Infectious Disease Control and Quarantine Management Kan-Ion Leong, Yain-Whar Si, Robert P. iuk-ghai and Simon Fong Department of Computer and Information
More informationIndian Institute of Technology Kanpur National Programme on Technology Enhanced Learning (NPTEL) Course Title A Brief Introduction to Psychology
Indian Institute of Technology Kanpur National Programme on Technology Enhanced Learning (NPTEL) Course Title A Brief Introduction to Psychology Lecture 9 Learning by Prof. Braj Bhushan Humanities & Social
More informationMCOM 203: Media & Peace Building
Conflict Analysis Conflict analysis is the process of examining and understanding the reality of a con- flict from various perspectives. It describes the systematic study of the profile, causes, actors,
More informationAn ECG Beat Classification Using Adaptive Neuro- Fuzzy Inference System
An ECG Beat Classification Using Adaptive Neuro- Fuzzy Inference System Pramod R. Bokde Department of Electronics Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, India Abstract Electrocardiography
More informationCS709a: Algorithms and Complexity
CS709a: Algorithms and Complexity Focus: Spatial Data Structures and Algorithms Instructor: Dan Coming dan.coming@dri.edu Thursdays 4:00-6:45pm Office hours after class (or by appointment) Today Presentation
More informationGenetics. 128 A CHAPTER 5 Heredity Stewart Cohen/Stone/Getty Images. Figure 1 Note the strong family resemblance among these four generations.
Genetics Explain how traits are inherite. Ientify Menel s role in the history of genetics. Use a Punnett square to preict the results of crosses. Compare an contrast the ifference between an iniviual s
More informationObjectives. Quantifying the quality of hypothesis tests. Type I and II errors. Power of a test. Cautions about significance tests
Objectives Quantifying the quality of hypothesis tests Type I and II errors Power of a test Cautions about significance tests Designing Experiments based on power Evaluating a testing procedure The testing
More informationDetecting Multiple Mean Breaks At Unknown Points With Atheoretical Regression Trees
Detecting Multiple Mean Breaks At Unknown Points With Atheoretical Regression Trees 1 Cappelli, C., 2 R.N. Penny and 3 M. Reale 1 University of Naples Federico II, 2 Statistics New Zealand, 3 University
More informationGene Ontology and Functional Enrichment. Genome 559: Introduction to Statistical and Computational Genomics Elhanan Borenstein
Gene Ontology and Functional Enrichment Genome 559: Introduction to Statistical and Computational Genomics Elhanan Borenstein The parsimony principle: A quick review Find the tree that requires the fewest
More informationDEVELOPMENT OF A CURRICULUM USING THE DELPHI METHOD SEUD 09/05/2015
DEVELOPMENT OF A CURRICULUM USING THE DELPHI METHOD SEUD 09/05/2015! Dr Pierre PANEL! Marie-Emmanuelle NEVEU 26/10/15 1 SUMMARY Introuction! Hysteroscopy! Curriculum Methos! Delphi course! Choice of the
More informationRepresentation and Analysis of Medical Decision Problems with Influence. Diagrams
Representation and Analysis of Medical Decision Problems with Influence Diagrams Douglas K. Owens, M.D., M.Sc., VA Palo Alto Health Care System, Palo Alto, California, Section on Medical Informatics, Department
More informationKeppel, G. & Wickens, T. D. Design and Analysis Chapter 10: Introduction to Factorial Designs
Keppel, G. & Wickens, T. D. Design and nalysis Chapter : Introduction to Factorial Designs. asic Information from a Factorial Design a factorial design contains within it a set of separate single-factor
More information