CS738: Advanced Compiler Optimizations. Flow Graph Theory. Amey Karkare

Size: px
Start display at page:

Download "CS738: Advanced Compiler Optimizations. Flow Graph Theory. Amey Karkare"

Transcription

1 CS738: Avance Compiler Optimizations Flow Graph Theory Amey Karkare Department of CSE, IIT Kanpur

2 Agena Speeing up DFA Depth of a flow graph Natural Loops

3 Acknowlegement Rest of the slies base on the material at w06.html

4 Speeing up DFA Proper orering of noes of a flow graph spees up the iterative algorithms: epth-first orering.

5 Speeing up DFA Proper orering of noes of a flow graph spees up the iterative algorithms: epth-first orering. Normal flow graphs have a surprising property reucibility that simplifies several matters.

6 Speeing up DFA Proper orering of noes of a flow graph spees up the iterative algorithms: epth-first orering. Normal flow graphs have a surprising property reucibility that simplifies several matters. Outcome: few iterations normally neee.

7 Depth-First Search Start at entry.

8 Depth-First Search Start at entry. If you can follow an ege to an unvisite noe, o so.

9 Depth-First Search Start at entry. If you can follow an ege to an unvisite noe, o so. If not, backtrack to your parent (noe from which you were visite).

10 Depth-First Spanning Tree (DFST) Root = Entry.

11 Depth-First Spanning Tree (DFST) Root = Entry. Tree eges are the eges along which we first visit the noe at the hea.

12 DFST Example

13 DFST Example

14 DFST Example

15 DFST Example

16 DFST Example

17 Depth-First Noe Orer The reverse of the orer in which a DFS retreats from the noes.

18 Depth-First Noe Orer The reverse of the orer in which a DFS retreats from the noes. Alternatively, reverse of postorer traversal of the tree.

19 DF Orer Example

20 Four Kin of Eges 1. Tree eges.

21 Four Kin of Eges 1. Tree eges. 2. Forwar eges: noe to proper escenant.

22 Four Kin of Eges 1. Tree eges. 2. Forwar eges: noe to proper escenant. 3. Retreating eges: noe to ancestor.

23 Four Kin of Eges 1. Tree eges. 2. Forwar eges: noe to proper escenant. 3. Retreating eges: noe to ancestor. 4. Cross eges: between two noe, niether of which is an ancestor of the other.

24 A Little Magic Of these eges, only retreating eges go from high to low in DF orer.

25 A Little Magic Of these eges, only retreating eges go from high to low in DF orer. Most surprising: all cross eges go right to left in the DFST.

26 A Little Magic Of these eges, only retreating eges go from high to low in DF orer. Most surprising: all cross eges go right to left in the DFST. Assuming we a chilren of any noe from the left.

27 Example: Non-Tree Eges

28 Example: Non-Tree Eges Retreating

29 Example: Non-Tree Eges Retreating 1 Forwar

30 Example: Non-Tree Eges Retreating 1 Forwar Cross

31 Roamap Normal flow graphs are reucible.

32 Roamap Normal flow graphs are reucible. Dominators neee to explain reucibility.

33 Roamap Normal flow graphs are reucible. Dominators neee to explain reucibility. In reucible flow graphs, loops are well efine, retreating eges are unique (an calle back eges).

34 Roamap Normal flow graphs are reucible. Dominators neee to explain reucibility. In reucible flow graphs, loops are well efine, retreating eges are unique (an calle back eges). Leas to relationship between DF orer an efficient iterative algorithm.

35 Dominators Noe ominates noe n if every path from the Entry to n goes through.

36 Dominators Noe ominates noe n if every path from the Entry to n goes through. [Exercise] A forwar-intersection iterative algorithm for fining ominators.

37 Dominators Noe ominates noe n if every path from the Entry to n goes through. [Exercise] A forwar-intersection iterative algorithm for fining ominators. Quick observations:

38 Dominators Noe ominates noe n if every path from the Entry to n goes through. [Exercise] A forwar-intersection iterative algorithm for fining ominators. Quick observations: Every noe ominates itself.

39 Dominators Noe ominates noe n if every path from the Entry to n goes through. [Exercise] A forwar-intersection iterative algorithm for fining ominators. Quick observations: Every noe ominates itself. The entry ominates every noe.

40 Example: Dominators Noe Dominators

41 Example: Dominators Noe Dominators

42 Example: Dominators Noe Dominators ,

43 Example: Dominators Noe Dominators , 2 3 1, 2,

44 Example: Dominators Noe Dominators , 2 3 1, 2, 3 4 1,

45 Example: Dominators Noe Dominators , 2 3 1, 2, 3 4 1, 4 5 1, 5 5 3

46 Common Dominator Cases The test of a while loop ominates all blocks in the loop boy.

47 Common Dominator Cases The test of a while loop ominates all blocks in the loop boy. The test of an if-then-else ominates all blocks in either branch.

48 Back Eges An ege is a back ege if its hea ominates its tail.

49 Back Eges An ege is a back ege if its hea ominates its tail. Theorem: Every back ege is a retreating ege in every DFST of every flow graph.

50 Back Eges An ege is a back ege if its hea ominates its tail. Theorem: Every back ege is a retreating ege in every DFST of every flow graph. Proof? Discuss/Exercise

51 Back Eges An ege is a back ege if its hea ominates its tail. Theorem: Every back ege is a retreating ege in every DFST of every flow graph. Proof? Discuss/Exercise Converse almost always true, but not always.

52 Example: Back Eges Noe Dominators , 2 3 1, 2, 3 4 1, 4 5 1, 5 5 3

53 Example: Back Eges Noe Dominators , 2 3 1, 2, 3 4 1, 4 5 1, 5 5 3

54 Reucible Flow Graphs A flow graph is reucible if every retreating ege in any DFST for that flow graph is a back ege.

55 Reucible Flow Graphs A flow graph is reucible if every retreating ege in any DFST for that flow graph is a back ege. Testing reucibility: Take any DFST for the flow graph, remove the back eges, an check that the result is acyclic.

56 Example: Remove Back Eges Noe Dominators , 2 3 1, 2, 3 4 1, 4 5 1, 5 5 3

57 Example: Remove Back Eges Noe Dominators , 2 3 1, 2, 3 4 1, 4 5 1, Remaining graph is acyclic.

58 Why Reucibility? Folk theorem: All flow graphs in practice are reucible. Fact: If you use only while-loops, for-loops, repeat-loops, if-then(-else), break, an continue, then your flow graph is reucible.

59 Example: Nonreucible Graph A B C

60 Example: Nonreucible Graph A B C In any DFST, one of these eges will be a retreating ege.

61 Example: Nonreucible Graph A A B C B C In any DFST, one of these eges will be a retreating ege.

62 Example: Nonreucible Graph A A A B C C B C B In any DFST, one of these eges will be a retreating ege.

63 Why Care About Back/Retreating Eges? Proper orering of noes uring iterative algorithm assures number of passes limite by the number of neste back eges.

64 Why Care About Back/Retreating Eges? Proper orering of noes uring iterative algorithm assures number of passes limite by the number of neste back eges. Depth of neste loops upper-bouns the number of neste back eges.

65 DF Orer an Retreating Eges Suppose that for a RD analysis, we visit noes uring each iteration in DF orer.

66 DF Orer an Retreating Eges Suppose that for a RD analysis, we visit noes uring each iteration in DF orer. The fact that a efinition reaches a block will propagate in one pass along any increasing sequence of blocks.

67 DF Orer an Retreating Eges Suppose that for a RD analysis, we visit noes uring each iteration in DF orer. The fact that a efinition reaches a block will propagate in one pass along any increasing sequence of blocks. When arrives along a retreating ege, it is too late to propagate from OUT to IN.

68 Example: DF Orer Noe 2 generates efinition

69 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t

70 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?

71 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?

72 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?

73 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?

74 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?

75 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?

76 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?

77 Example: DF Orer 1 Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4?

78 Example: DF Orer Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4? 2 3

79 Example: DF Orer Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4? 2 3

80 Example: DF Orer Noe 2 generates efinition. Other noes empty w.r.t.. Does reach noe 4? 2 3

81 Depth of a Flow Graph The epth of a flow graph is the greatest number of retreating eges along any acyclic path.

82 Depth of a Flow Graph The epth of a flow graph is the greatest number of retreating eges along any acyclic path. For RD, if we use DF orer to visit noes, we converge in epth+2 passes.

83 Depth of a Flow Graph The epth of a flow graph is the greatest number of retreating eges along any acyclic path. For RD, if we use DF orer to visit noes, we converge in epth+2 passes. Depth+1 passes to follow that number of increasing segments.

84 Depth of a Flow Graph The epth of a flow graph is the greatest number of retreating eges along any acyclic path. For RD, if we use DF orer to visit noes, we converge in epth+2 passes. Depth+1 passes to follow that number of increasing segments. 1 more pass to realize we converge.

85 Example: Depth = 2

86 Example: Depth = 2 increasing

87 Example: Depth = 2 increasing retreating

88 Example: Depth = 2 retreating increasing increasing

89 Example: Depth = 2 retreating retreating increasing increasing

90 Example: Depth = 2 retreating retreating increasing increasing increasing

91 Similarly... AE also works in epth+2 passes.

92 Similarly... AE also works in epth+2 passes. Unavailability propagates along retreat-free noe sequences in one pass.

93 Similarly... AE also works in epth+2 passes. Unavailability propagates along retreat-free noe sequences in one pass. So oes LV if we use reverse of DF orer.

94 Similarly... AE also works in epth+2 passes. Unavailability propagates along retreat-free noe sequences in one pass. So oes LV if we use reverse of DF orer. A use propagates backwar along paths that o not use a retreating ege in one pass.

95 In General... The epth+2 boun works for any monotone bit-vector framework, as long as information only nees to propagate along acyclic paths. Example: if a efinition reaches a point, it oes so along an acyclic path.

96 Why Depth+2 is Goo? Normal control-flow constructs prouce reucible flow graphs with the number of back eges at most the nesting epth of loops. Nesting epth tens to be small.

97 Example: Neste Loops 3 neste while loops.

98 Example: Neste Loops 3 neste while loops. epth = 3.

99 Example: Neste Loops 3 neste while loops. 3 neste o-while loops. epth = 3.

100 Example: Neste Loops 3 neste while loops. epth = 3. 3 neste o-while loops. epth = 1.

101 Natural Loops The natural loop of a back ege a b is {b} plus the set of noes that can reach a without going through b.

102 Natural Loops The natural loop of a back ege a b is {b} plus the set of noes that can reach a without going through b. Theorem: two natural loops are either isjoint, ientical, or neste.

103 Natural Loops The natural loop of a back ege a b is {b} plus the set of noes that can reach a without going through b. Theorem: two natural loops are either isjoint, ientical, or neste. Proof: Discuss/Exercise

104 Example: Natural Loops

105 Example: Natural Loops Natural loop 3 2

106 Example: Natural Loops Natural loop 5 1 Natural loop 3 2

107 Reaing Assignment New Dragon Book (Aho, Lam, Sethi, Ullman) Chapter 9

Audiological Bulletin no. 31

Audiological Bulletin no. 31 Auiological Bulletin no. 31 The effect - an introuction News from Auiological Research an Communication 9 502 1043 001 / 05-07 Introuction Venting in earmouls has been use for many years to control the

More information

PERFORMANCE EVALUATION OF HIGHWAY MOBILE INFOSTATION NETWORKS

PERFORMANCE EVALUATION OF HIGHWAY MOBILE INFOSTATION NETWORKS PERFORMANCE EVALUATION OF HIGHWAY MOBILE INFOSTATION NETWORKS Wing Ho Yuen WINLAB Rutgers University Piscataway, NJ 8854 anyyuen@winlab.rutgers.eu Roy D. Yates WINLAB Rutgers University Piscataway, NJ

More information

GRAPHS, ALGORITHMS, AND OPTIMIZATION

GRAPHS, ALGORITHMS, AND OPTIMIZATION DISCRETE MATHEMATICS AND ITS APPLICATIONS Series Editor KENNETH H. ROSEN GRAPHS, ALGORITHMS, AND OPTIMIZATION WILLIAM KOCAY DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF MANITOBA DONALD L KREHER DEPARTMENT

More information

Solving problems by searching

Solving problems by searching Solving problems by searching Chapter 3 14 Jan 2004 CS 3243 - Blind Search 1 Outline Problem-solving agents Problem types Problem formulation Example problems Basic search algorithms 14 Jan 2004 CS 3243

More information

More Examples and Applications on AVL Tree

More Examples and Applications on AVL Tree CSCI2100 Tutorial 11 Jianwen Zhao Department of Computer Science and Engineering The Chinese University of Hong Kong Adapted from the slides of the previous offerings of the course Recall in lectures we

More information

Chapter 2. Knowledge Representation: Reasoning, Issues, and Acquisition. Teaching Notes

Chapter 2. Knowledge Representation: Reasoning, Issues, and Acquisition. Teaching Notes Chapter 2 Knowledge Representation: Reasoning, Issues, and Acquisition Teaching Notes This chapter explains how knowledge is represented in artificial intelligence. The topic may be launched by introducing

More information

Some Connectivity Concepts in Bipolar Fuzzy Graphs

Some Connectivity Concepts in Bipolar Fuzzy Graphs Annals of Pure and Applied Mathematics Vol. 7, No. 2, 2014, 98-108 ISSN: 2279-087X (P), 2279-0888(online) Published on 30 September 2014 www.researchmathsci.org Annals of Some Connectivity Concepts in

More information

Symbolic CTL Model Checking

Symbolic CTL Model Checking Symbolic CTL Model Checking Crystal Chang Din Precise Modeling and Analysis group (PMA), University of Oslo INF9140 - Specification and Verification of Parallel Systems Crystal Chang Din @ UiO Symbolic

More information

Hospital Process of Care Measures Graphs

Hospital Process of Care Measures Graphs Meicare Hospital Surgical Care Improvement Project Process of Care Measures Graph Page 1 of 9 http://www.hospitalcompare.hhs.gov/graphs/hospital Graph.aspx?hi=160064&stype=G... 04/27/2012 Return to previous

More information

VLSI Design, Fall Design of Adders Design of Adders. Jacob Abraham

VLSI Design, Fall Design of Adders Design of Adders. Jacob Abraham 8. Design of Adders 1 8. Design of Adders Jacob Abraham Department of Electrical and Computer Engineering The University of Texas at Austin VLSI Design Fall 2017 September 27, 2017 ECE Department, University

More information

Test-Driven Development

Test-Driven Development On the Influence of Test-Driven Development on Software Design by SzeChernTan School of Informatics University of Edinburgh 12 February 2009 Agenda Introduction Overview of paper Experimental design Results

More information

Review Questions in Introductory Knowledge... 37

Review Questions in Introductory Knowledge... 37 Table of Contents Preface..... 17 About the Authors... 19 How This Book is Organized... 20 Who Should Buy This Book?... 20 Where to Find Answers to Review Questions and Exercises... 20 How to Report Errata...

More information

A PRELIMINARY STUDY OF MODELING AND SIMULATION IN INDIVIDUALIZED DRUG DOSAGE AZATHIOPRINE ON INFLAMMATORY BOWEL DISEASE

A PRELIMINARY STUDY OF MODELING AND SIMULATION IN INDIVIDUALIZED DRUG DOSAGE AZATHIOPRINE ON INFLAMMATORY BOWEL DISEASE This is a correcte version of the corresponing paper publishe in SIMS 26: Proceeings of the 47th Conference on Simulation an Moelling. Errata: equations.3 an.4 have been change to timecontinuous form an

More information

Decisions and Dependence in Influence Diagrams

Decisions and Dependence in Influence Diagrams JMLR: Workshop and Conference Proceedings vol 52, 462-473, 2016 PGM 2016 Decisions and Dependence in Influence Diagrams Ross D. hachter Department of Management cience and Engineering tanford University

More information

Chapter 7: Descriptive Statistics

Chapter 7: Descriptive Statistics Chapter Overview Chapter 7 provides an introduction to basic strategies for describing groups statistically. Statistical concepts around normal distributions are discussed. The statistical procedures of

More information

An application of topological relations of fuzzy regions with holes

An application of topological relations of fuzzy regions with holes Chapter 5 An application of topological relations of fuzzy regions with holes 5.1 Introduction In the last two chapters, we have provided theoretical frameworks for fuzzy regions with holes in terms of

More information

Connectivity in a Bipolar Fuzzy Graph and its Complement

Connectivity in a Bipolar Fuzzy Graph and its Complement Annals of Pure and Applied Mathematics Vol. 15, No. 1, 2017, 89-95 ISSN: 2279-087X (P), 2279-0888(online) Published on 11 December 2017 www.researchmathsci.org DOI: http://dx.doi.org/10.22457/apam.v15n1a8

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeare in a journal publishe by Elsevier. The attache copy is furnishe to the author for internal non-commercial research an eucation use, incluing for instruction at the authors institution

More information

Audiological Bulletin no. 32

Audiological Bulletin no. 32 Auiological Bulletin no. 32 Estimating real-ear acoustics News from Auiological Research an Communication 9 502 1040 001 / 05-07 Introuction When eveloping an testing hearing ais, the hearing professional

More information

Chapter 3 Software Packages to Install How to Set Up Python Eclipse How to Set Up Eclipse... 42

Chapter 3 Software Packages to Install How to Set Up Python Eclipse How to Set Up Eclipse... 42 Table of Contents Preface..... 21 About the Authors... 23 Acknowledgments... 24 How This Book is Organized... 24 Who Should Buy This Book?... 24 Where to Find Answers to Review Questions and Exercises...

More information

Localization-based secret key agreement for wireless network

Localization-based secret key agreement for wireless network The University of Toleo The University of Toleo Digital Repository Theses an Dissertations 2015 Localization-base secret key agreement for wireless network Qiang Wu University of Toleo Follow this an aitional

More information

Computer-based 3d Puzzle Solving For Pre-operative Planning Of Articular Fracture Reductions In The Ankle, Knee, And Hip

Computer-based 3d Puzzle Solving For Pre-operative Planning Of Articular Fracture Reductions In The Ankle, Knee, And Hip Computer-based 3d Puzzle Solving For Pre-operative Planning Of Articular Fracture Reductions In The Ankle, Knee, And Hip Andrew M. Kern, MS, Donald Anderson. University of Iowa, Iowa City, IA, USA. Disclosures:

More information

Solve algebraically. 1) 7 - a -4 1) Solve algebraically. Write answer in set builder or interval notation. 2) 4m m - 7 2)

Solve algebraically. 1) 7 - a -4 1) Solve algebraically. Write answer in set builder or interval notation. 2) 4m m - 7 2) Chapter 9 & 10 Practice. The following is an aid to study for the Chapter 9 & 10 eam. Disclaimer: The actual eam is different. You do need to show work on the actual eam and will not be given credit for

More information

Applied Statistical Analysis EDUC 6050 Week 4

Applied Statistical Analysis EDUC 6050 Week 4 Applied Statistical Analysis EDUC 6050 Week 4 Finding clarity using data Today 1. Hypothesis Testing with Z Scores (continued) 2. Chapters 6 and 7 in Book 2 Review! = $ & '! = $ & ' * ) 1. Which formula

More information

Loop Dependence and Parallelism

Loop Dependence and Parallelism Loop Dependence and Parallelism Announcements Reading assignments for next week due Midterm is Monday March 6th, example midterms posted Assignment 2 is due the week after that. Start now! Today Data dependencies

More information

Including Quantification in Defeasible Reasoning for the Description Logic EL

Including Quantification in Defeasible Reasoning for the Description Logic EL Including Quantification in Defeasible Reasoning for the Description Logic EL Maximilian Pensel and Anni-Yasmin Turhan Institute for Theoretical Computer Science, Technische Universität Dresden first-name.last-name

More information

Leman Akoglu Hanghang Tong Jilles Vreeken. Polo Chau Nikolaj Tatti Christos Faloutsos SIAM International Conference on Data Mining (SDM 2013)

Leman Akoglu Hanghang Tong Jilles Vreeken. Polo Chau Nikolaj Tatti Christos Faloutsos SIAM International Conference on Data Mining (SDM 2013) Leman Akoglu Hanghang Tong Jilles Vreeken Polo Chau Nikolaj Tatti Christos Faloutsos 2013 SIAM International Conference on Data Mining (SDM 2013) What can we say about this list of authors? Use relational

More information

IEEE SIGNAL PROCESSING LETTERS, VOL. 13, NO. 3, MARCH A Self-Structured Adaptive Decision Feedback Equalizer

IEEE SIGNAL PROCESSING LETTERS, VOL. 13, NO. 3, MARCH A Self-Structured Adaptive Decision Feedback Equalizer SIGNAL PROCESSING LETTERS, VOL 13, NO 3, MARCH 2006 1 A Self-Structured Adaptive Decision Feedback Equalizer Yu Gong and Colin F N Cowan, Senior Member, Abstract In a decision feedback equalizer (DFE),

More information

P(HYP)=h. P(CON HYP)=p REL. P(CON HYP)=q REP

P(HYP)=h. P(CON HYP)=p REL. P(CON HYP)=q REP BAYESIAN NETWORKS IN PHILOSOPHY STEPHAN HARTMANN, LUC BOVENS 1. Introduction There is a long philosophical tradition of addressing questions in philosophy of science and epistemology by means of the tools

More information

Gene expression analysis. Roadmap. Microarray technology: how it work Applications: what can we do with it Preprocessing: Classification Clustering

Gene expression analysis. Roadmap. Microarray technology: how it work Applications: what can we do with it Preprocessing: Classification Clustering Gene expression analysis Roadmap Microarray technology: how it work Applications: what can we do with it Preprocessing: Image processing Data normalization Classification Clustering Biclustering 1 Gene

More information

Chapter 23. Inference About Means. Copyright 2010 Pearson Education, Inc.

Chapter 23. Inference About Means. Copyright 2010 Pearson Education, Inc. Chapter 23 Inference About Means Copyright 2010 Pearson Education, Inc. Getting Started Now that we know how to create confidence intervals and test hypotheses about proportions, it d be nice to be able

More information

WANTED Species Survival Plan Coordinator

WANTED Species Survival Plan Coordinator WANTED Species Survival Plan Coorinator Knowlegeable zoo or aquarium professional to manage propagation of hunres of animals locate in several states an countries. Must be verse in genetics, sophisticate

More information

Evolutionary Programming

Evolutionary Programming Evolutionary Programming Searching Problem Spaces William Power April 24, 2016 1 Evolutionary Programming Can we solve problems by mi:micing the evolutionary process? Evolutionary programming is a methodology

More information

MITOCW ocw f99-lec20_300k

MITOCW ocw f99-lec20_300k MITOCW ocw-18.06-f99-lec20_300k OK, this is lecture twenty. And this is the final lecture on determinants. And it's about the applications. So we worked hard in the last two lectures to get a formula for

More information

Seminar Thesis: Efficient Planning under Uncertainty with Macro-actions

Seminar Thesis: Efficient Planning under Uncertainty with Macro-actions Seminar Thesis: Efficient Planning under Uncertainty with Macro-actions Ragnar Mogk Department of Computer Science Technische Universität Darmstadt ragnar.mogk@stud.tu-darmstadt.de 1 Introduction This

More information

TIMELY: RTT-based Congestion Control for the Datacenter

TIMELY: RTT-based Congestion Control for the Datacenter TIMELY: RTT-based Congestion Control for the Datacenter Authors: Radhika Mittal(UC Berkeley), Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi(Microsoft), Amin Vahdat, Yaogong

More information

An Empirical and Formal Analysis of Decision Trees for Ranking

An Empirical and Formal Analysis of Decision Trees for Ranking An Empirical and Formal Analysis of Decision Trees for Ranking Eyke Hüllermeier Department of Mathematics and Computer Science Marburg University 35032 Marburg, Germany eyke@mathematik.uni-marburg.de Stijn

More information

Choose the correct option and write your answer on a separate sheet of paper

Choose the correct option and write your answer on a separate sheet of paper Cuestionario e estuio e Inglés V Alumno (a: N. L.: Profesor: Lorena Núñez Ramos Fecha: Grao: 5o Grupo: A Choose the correct option an write your answer on a separate sheet of paper Who? to get through

More information

Problem Solving Agents

Problem Solving Agents Problem Solving Agents CSL 302 ARTIFICIAL INTELLIGENCE SPRING 2014 Goal Based Agents Representation Mechanisms (propositional/first order/probabilistic logic) Learning Models Search (blind and informed)

More information

Audiological Bulletin no. 35

Audiological Bulletin no. 35 Auiological Bulletin no. 35 Ensuring the correct in-situ gain News from Auiological Research an Communication 9 502 1041 001 / 05-07 Introuction Hearing ais are commonly fitte accoring to ata base on a

More information

Using WRT and control charts to evaluate analytical precision

Using WRT and control charts to evaluate analytical precision ICPF - Working Group on QA/QC in Laboratories Meeting of the Heads of the Laboratories 7-8 September 2017 in Verbania Pallanza Using WRT and control charts to evaluate analytical precision Alessandra Mazzoli,

More information

Correlation vs. Causation - and What Are the Implications for Our Project? By Michael Reames and Gabriel Kemeny

Correlation vs. Causation - and What Are the Implications for Our Project? By Michael Reames and Gabriel Kemeny Correlation vs. Causation - and What Are the Implications for Our Project? By Michael Reames and Gabriel Kemeny In problem solving, accurately establishing and validating root causes are vital to improving

More information

Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence

Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence Cognitive Neuroscience History of Neural Networks in Artificial Intelligence The concept of neural network in artificial intelligence To understand the network paradigm also requires examining the history

More information

Episode 7. Modeling Network Traffic using Game Theory. Baochun Li Department of Electrical and Computer Engineering University of Toronto

Episode 7. Modeling Network Traffic using Game Theory. Baochun Li Department of Electrical and Computer Engineering University of Toronto Episode 7. Modeling Network Traffic using Game Theory aochun Li epartment of Electrical and Computer Engineering University of Toronto Networks, Crowds, and Markets, Chapter 8 Objective in this episode

More information

Lessons for Successful Subintimal Angioplasty in SFA CTO

Lessons for Successful Subintimal Angioplasty in SFA CTO Lessons for Successful Subintimal Angioplasty in SFA CTO John R. Laird Professor of Medicine Medical Director of the Vascular Center UC Davis Medical Center CTOs in the Periphery Presence of Total Occlusion

More information

1Number and Algebra. Surds

1Number and Algebra. Surds Numer an Algera ffi ffi ( ), cue root ( ecimal or fraction value cannot e foun. When alying Pythagoras theorem, we have foun lengths that cannot e exresse as an exact rational numer. Pythagoras encountere

More information

Central Algorithmic Techniques. Iterative Algorithms

Central Algorithmic Techniques. Iterative Algorithms Central Algorithmic Techniques Iterative Algorithms Code Representation of an Algorithm class InsertionSortAlgorithm extends SortAlgorithm { void sort(int a[]) throws Exception { for (int i = 1; i < a.length;

More information

Probabilistically Estimating Backbones and Variable Bias: Experimental Overview

Probabilistically Estimating Backbones and Variable Bias: Experimental Overview Probabilistically Estimating Backbones and Variable Bias: Experimental Overview Eric I. Hsu, Christian J. Muise, J. Christopher Beck, and Sheila A. McIlraith Department of Computer Science, University

More information

Modeling Sentiment with Ridge Regression

Modeling Sentiment with Ridge Regression Modeling Sentiment with Ridge Regression Luke Segars 2/20/2012 The goal of this project was to generate a linear sentiment model for classifying Amazon book reviews according to their star rank. More generally,

More information

Additional analysis on the assessment report: The Effectiveness and Cost Effectiveness of Pimecrolimus and Tacrolimus for the Atopic Eczema.

Additional analysis on the assessment report: The Effectiveness and Cost Effectiveness of Pimecrolimus and Tacrolimus for the Atopic Eczema. Additional analysis on the assessment report: The Effectiveness and Cost Effectiveness of Pimecrolimus and Tacrolimus for the Atopic Eczema. Conducted by PenTAG. Page 1 of 6 Further Analysis of the Eczema

More information

Binary Increase Congestion Control (BIC) for Fast Long-Distance Networks

Binary Increase Congestion Control (BIC) for Fast Long-Distance Networks Binary Increase Congestion Control () for Fast Long-Distance Networks Lisong Xu, Khale Harfoush, an Injong Rhee Department of Computer Science North Carolina State University Raleigh, NC 27695-7534 lxu2,

More information

NODE CONNECTIVITY AND CONDITIONAL DENSITY D. White and F. Harary. Definitions of Cohesive Sets in Social Networks

NODE CONNECTIVITY AND CONDITIONAL DENSITY D. White and F. Harary. Definitions of Cohesive Sets in Social Networks NODE CONNECTIVITY AND CONDITIONAL DENSITY D. White and F. Harary Definitions of Cohesive Sets in Social Networks The connectivity K (G) kappa of a connected graph G is the minimum number of nodes needed

More information

Policy Gradients. CS : Deep Reinforcement Learning Sergey Levine

Policy Gradients. CS : Deep Reinforcement Learning Sergey Levine Policy Gradients CS 294-112: Deep Reinforcement Learning Sergey Levine Class Notes 1. Homework 1 due today (11:59 pm)! Don t be late! 2. Remember to start forming final project groups Today s Lecture 1.

More information

Automatically Assembling the Building Blocks of Cellular Circuitry

Automatically Assembling the Building Blocks of Cellular Circuitry Motivation Automatically Assembling the Building Blocks of Cellular Circuitry T. M. Murali April 20, 2006 Motivation Features of the Wiring iagram iagram is multi-modal. iagram is incomplete. Changes from

More information

TG100 Implementation Guide - FTA

TG100 Implementation Guide - FTA FTA In this section, we will talk about Fault Tree Analysis (FTA). What is a fault tree? It is a tool used to trace failure pathways back to the causes and contributing factors. A fault tree analysis starts

More information

PART - A 1. Define Artificial Intelligence formulated by Haugeland. The exciting new effort to make computers think machines with minds in the full and literal sense. 2. Define Artificial Intelligence

More information

Rumor Detection on Twitter with Tree-structured Recursive Neural Networks

Rumor Detection on Twitter with Tree-structured Recursive Neural Networks 1 Rumor Detection on Twitter with Tree-structured Recursive Neural Networks Jing Ma 1, Wei Gao 2, Kam-Fai Wong 1,3 1 The Chinese University of Hong Kong 2 Victoria University of Wellington, New Zealand

More information

Bayes Linear Statistics. Theory and Methods

Bayes Linear Statistics. Theory and Methods Bayes Linear Statistics Theory and Methods Michael Goldstein and David Wooff Durham University, UK BICENTENNI AL BICENTENNIAL Contents r Preface xvii 1 The Bayes linear approach 1 1.1 Combining beliefs

More information

Graph modeling. Northern Territory. Queensland. Western Australia. South Australia. New South Wales. Victoria. Tasmania

Graph modeling. Northern Territory. Queensland. Western Australia. South Australia. New South Wales. Victoria. Tasmania Graph modeling Western Australia Northern Territory South Australia Queensland New South Wales Victoria Tasmania 1 / 40 Graph modeling Western Australia Northern Territory Queensland WA NT Q South Australia

More information

Chapter 20: Test Administration and Interpretation

Chapter 20: Test Administration and Interpretation Chapter 20: Test Administration and Interpretation Thought Questions Why should a needs analysis consider both the individual and the demands of the sport? Should test scores be shared with a team, or

More information

International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17, ISSN

International Journal of Computer Engineering and Applications, Volume XI, Issue IX, September 17,  ISSN CRIME ASSOCIATION ALGORITHM USING AGGLOMERATIVE CLUSTERING Saritha Quinn 1, Vishnu Prasad 2 1 Student, 2 Student Department of MCA, Kristu Jayanti College, Bengaluru, India ABSTRACT The commission of a

More information

The Structure of Social Contact Graphs and their impact on Epidemics

The Structure of Social Contact Graphs and their impact on Epidemics The Structure of Social Contact Graphs and their impact on Epidemics Anil Vullikanti Virginia Bioinformatics Institute, and Dept. of Computer Science, Virginia Tech Joint work with: Chris Barrett, Madhav

More information

15-110: Principles of Computing, Spring Problem Set 9 (PS9) Due: Friday, April 6 by 2:30PM via Gradescope Hand-in

15-110: Principles of Computing, Spring Problem Set 9 (PS9) Due: Friday, April 6 by 2:30PM via Gradescope Hand-in 15-110: Principles of Computing, Spring 2018 Problem Set 9 (PS9) Due: Friday, April 6 by 2:30PM via Gradescope Hand-in HANDIN INSTRUCTIONS Download a copy of this PDF file. You have two ways to fill in

More information

CSE 258 Lecture 2. Web Mining and Recommender Systems. Supervised learning Regression

CSE 258 Lecture 2. Web Mining and Recommender Systems. Supervised learning Regression CSE 258 Lecture 2 Web Mining and Recommender Systems Supervised learning Regression Supervised versus unsupervised learning Learning approaches attempt to model data in order to solve a problem Unsupervised

More information

Chapter 6 subtitles postsynaptic integration

Chapter 6 subtitles postsynaptic integration CELLULAR NEUROPHYSIOLOGY CONSTANCE HAMMOND Chapter 6 subtitles postsynaptic integration INTRODUCTION (1:56) This sixth and final chapter deals with the summation of presynaptic currents. Glutamate and

More information

An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks

An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks An Information Moel for Geographic Greey Forwaring in Wireless A-Hoc Sensor Networks Zhen Jiang Compter Science Department West Chester University West Chester, PA 19383, USA zjiang@wcpa.e Jnchao Ma, Wei

More information

TIMELY: RTT-based Congestion Control for the Datacenter

TIMELY: RTT-based Congestion Control for the Datacenter TIMELY: RTT-based Congestion Control for the Datacenter Radhika Mittal*(UC Berkeley), Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi*(Microsoft), Amin Vahdat, Yaogong Wang, David

More information

Transformation CS 148: Summer 2016 Introduction of Graphics and Imaging Zahid Hossain

Transformation CS 148: Summer 2016 Introduction of Graphics and Imaging Zahid Hossain Transformation CS 148: Summer 2016 Introduction of Graphics and Imaging Zahid Hossain http://www.pling.org.uk/cs/cgv.html Placement of Objects Fisher et al. (2012) CS 148: Introduction to Computer Graphics

More information

Fsm exercise: solution

Fsm exercise: solution Fsm exercise: solution accept(,final,q,[]) :- member(q,final). member(x,[x ]). member(x,[ L]):- member(x,l). 1 / 65 Fsm exercise: solution accept(,final,q,[]) :- member(q,final). accept(trans,final,q,[h

More information

Learning and Adaptive Behavior, Part II

Learning and Adaptive Behavior, Part II Learning and Adaptive Behavior, Part II April 12, 2007 The man who sets out to carry a cat by its tail learns something that will always be useful and which will never grow dim or doubtful. -- Mark Twain

More information

Workshop Information IAEA Workshop

Workshop Information IAEA Workshop IAEA Training Course on Safety Assessment of NPPs to Assist Decision Making Incident Evaluation and Ranking of Operational Events Lecturer Lesson Lesson IV IV3_II.13 Workshop Information IAEA Workshop

More information

Using Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s

Using Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s Using Bayesian Networks to Analyze Expression Data Xu Siwei, s0789023 Muhammad Ali Faisal, s0677834 Tejal Joshi, s0677858 Outline Introduction Bayesian Networks Equivalence Classes Applying to Expression

More information

Simultaneous Equation and Instrumental Variable Models for Sexiness and Power/Status

Simultaneous Equation and Instrumental Variable Models for Sexiness and Power/Status Simultaneous Equation and Instrumental Variable Models for Seiness and Power/Status We would like ideally to determine whether power is indeed sey, or whether seiness is powerful. We here describe the

More information

CAN Tree Routing for Content-Addressable Network

CAN Tree Routing for Content-Addressable Network Sensors & Transucers 2014 by IFSA Publishing, S. L. htt://www.sensorsortal.com CAN Tree Routing for Content-Aressable Network Zhongtao LI, Torben WEIS University Duisburg-Essen, Universität Duisburg-Essen

More information

CPSC 121 Some Sample Questions for the Final Exam

CPSC 121 Some Sample Questions for the Final Exam CPSC 121 Some Sample Questions for the Final Exam [0] 1. Tautologies and Contradictions: Determine whether the following statements are tautologies (definitely true), contradictions (definitely false),

More information

Final Exam - section 2. Thursday, December hours, 30 minutes

Final Exam - section 2. Thursday, December hours, 30 minutes Econometrics, ECON312 San Francisco State University Michael Bar Fall 2011 Final Exam - section 2 Thursday, December 15 2 hours, 30 minutes Name: Instructions 1. This is closed book, closed notes exam.

More information

The Chosen Chapters 8-18 Study Guide. 1. Why might Reuven be frightened to see Homer s eyes now that he s really looked at it?

The Chosen Chapters 8-18 Study Guide. 1. Why might Reuven be frightened to see Homer s eyes now that he s really looked at it? Chapter 8: The Chosen Chapters 8-18 Study Guide 1. Why might Reuven be frightened to see Homer s eyes now that he s really looked at it? 2. The author spends an entire page describing what Danny looks

More information

Concepts and Connections: What Do You Expect? Concept Example Connected to or Foreshadowing

Concepts and Connections: What Do You Expect? Concept Example Connected to or Foreshadowing Meaning of Probability: The term probability is applied to situations that have uncertain outcomes on individual trials but a predictable pattern of outcomes over many trials. Students find experimental

More information

3 CONCEPTUAL FOUNDATIONS OF STATISTICS

3 CONCEPTUAL FOUNDATIONS OF STATISTICS 3 CONCEPTUAL FOUNDATIONS OF STATISTICS In this chapter, we examine the conceptual foundations of statistics. The goal is to give you an appreciation and conceptual understanding of some basic statistical

More information

MOCKTIME.COM ONLINE TEST SERIES CORRESPONDENCE COURSE

MOCKTIME.COM ONLINE TEST SERIES CORRESPONDENCE COURSE Simplification 1. Simplify : 1 + (a) 28/17 (b) 15/7 (c) 23/17 (d) 38/17 2. Evaluate: [ ] (a) 9/10 (b) -(8/17 ) (c) - (16/19 ) (d) 4/7 3. 45 [4- {3 - (3 3 6)}] is equal to : (a) 10 (b) 6 (c) 4 (d) 0 4.

More information

Title: Analyzing the Impact of Social Factors on Homelessness: A Fuzzy Cognitive Map Approach

Title: Analyzing the Impact of Social Factors on Homelessness: A Fuzzy Cognitive Map Approach Author's response to reviews Title: Analyzing the Impact of Social Factors on Homelessness: A Fuzzy Cognitive Map Approach Authors: Vijay K Mago Dr. (vmago@sfu.ca) Hilary K Morden (hmorden@sfu.ca) Charles

More information

Hoare Logic and Model Checking. LTL and CTL: a perspective. Learning outcomes. Model Checking Lecture 12: Loose ends

Hoare Logic and Model Checking. LTL and CTL: a perspective. Learning outcomes. Model Checking Lecture 12: Loose ends Learning outcomes Hoare Logic and Model Checking Model Checking Lecture 12: Loose ends Dominic Mulligan Based on previous slides by Alan Mycroft and Mike Gordon Programming, Logic, and Semantics Group

More information

A DISCRETE MODEL OF GLUCOSE-INSULIN INTERACTION AND STABILITY ANALYSIS A. & B.

A DISCRETE MODEL OF GLUCOSE-INSULIN INTERACTION AND STABILITY ANALYSIS A. & B. A DISCRETE MODEL OF GLUCOSE-INSULIN INTERACTION AND STABILITY ANALYSIS A. George Maria Selvam* & B. Bavya** Sacre Heart College, Tirupattur, Vellore, Tamilnau Abstract: The stability of a iscrete-time

More information

Response to reviewer comment (Rev. 2):

Response to reviewer comment (Rev. 2): Response to reviewer comment (Rev. 2): The revised paper contains changes according to comments of all of the three reviewers. The abstract was revised according to the remarks of the three reviewers.

More information

CS 4365: Artificial Intelligence Recap. Vibhav Gogate

CS 4365: Artificial Intelligence Recap. Vibhav Gogate CS 4365: Artificial Intelligence Recap Vibhav Gogate Exam Topics Search BFS, DFS, UCS, A* (tree and graph) Completeness and Optimality Heuristics: admissibility and consistency CSPs Constraint graphs,

More information

Grade 6 Math Circles Winter February 6/7 Number Theory - Solutions Warm-up! What is special about the following groups of numbers?

Grade 6 Math Circles Winter February 6/7 Number Theory - Solutions Warm-up! What is special about the following groups of numbers? Faculty of Mathematics Waterloo, Ontario N2L 3G1 Grade 6 Math Circles Winter 2018 - February 6/7 Number Theory - Solutions Warm-up! What is special about the following groups of numbers? Centre for Education

More information

Math HL Chapter 12 Probability

Math HL Chapter 12 Probability Math HL Chapter 12 Probability Name: Read the notes and fill in any blanks. Work through the ALL of the examples. Self-Check your own progress by rating where you are. # Learning Targets Lesson I have

More information

Contact Tracing in Healthcare Digital Ecosystems for Infectious Disease Control and Quarantine Management

Contact Tracing in Healthcare Digital Ecosystems for Infectious Disease Control and Quarantine Management Contact Tracing in Healthcare Digital Ecosystems for Infectious Disease Control and Quarantine Management Kan-Ion Leong, Yain-Whar Si, Robert P. iuk-ghai and Simon Fong Department of Computer and Information

More information

Indian Institute of Technology Kanpur National Programme on Technology Enhanced Learning (NPTEL) Course Title A Brief Introduction to Psychology

Indian Institute of Technology Kanpur National Programme on Technology Enhanced Learning (NPTEL) Course Title A Brief Introduction to Psychology Indian Institute of Technology Kanpur National Programme on Technology Enhanced Learning (NPTEL) Course Title A Brief Introduction to Psychology Lecture 9 Learning by Prof. Braj Bhushan Humanities & Social

More information

MCOM 203: Media & Peace Building

MCOM 203: Media & Peace Building Conflict Analysis Conflict analysis is the process of examining and understanding the reality of a con- flict from various perspectives. It describes the systematic study of the profile, causes, actors,

More information

An ECG Beat Classification Using Adaptive Neuro- Fuzzy Inference System

An ECG Beat Classification Using Adaptive Neuro- Fuzzy Inference System An ECG Beat Classification Using Adaptive Neuro- Fuzzy Inference System Pramod R. Bokde Department of Electronics Engineering, Priyadarshini Bhagwati College of Engineering, Nagpur, India Abstract Electrocardiography

More information

CS709a: Algorithms and Complexity

CS709a: Algorithms and Complexity CS709a: Algorithms and Complexity Focus: Spatial Data Structures and Algorithms Instructor: Dan Coming dan.coming@dri.edu Thursdays 4:00-6:45pm Office hours after class (or by appointment) Today Presentation

More information

Genetics. 128 A CHAPTER 5 Heredity Stewart Cohen/Stone/Getty Images. Figure 1 Note the strong family resemblance among these four generations.

Genetics. 128 A CHAPTER 5 Heredity Stewart Cohen/Stone/Getty Images. Figure 1 Note the strong family resemblance among these four generations. Genetics Explain how traits are inherite. Ientify Menel s role in the history of genetics. Use a Punnett square to preict the results of crosses. Compare an contrast the ifference between an iniviual s

More information

Objectives. Quantifying the quality of hypothesis tests. Type I and II errors. Power of a test. Cautions about significance tests

Objectives. Quantifying the quality of hypothesis tests. Type I and II errors. Power of a test. Cautions about significance tests Objectives Quantifying the quality of hypothesis tests Type I and II errors Power of a test Cautions about significance tests Designing Experiments based on power Evaluating a testing procedure The testing

More information

Detecting Multiple Mean Breaks At Unknown Points With Atheoretical Regression Trees

Detecting Multiple Mean Breaks At Unknown Points With Atheoretical Regression Trees Detecting Multiple Mean Breaks At Unknown Points With Atheoretical Regression Trees 1 Cappelli, C., 2 R.N. Penny and 3 M. Reale 1 University of Naples Federico II, 2 Statistics New Zealand, 3 University

More information

Gene Ontology and Functional Enrichment. Genome 559: Introduction to Statistical and Computational Genomics Elhanan Borenstein

Gene Ontology and Functional Enrichment. Genome 559: Introduction to Statistical and Computational Genomics Elhanan Borenstein Gene Ontology and Functional Enrichment Genome 559: Introduction to Statistical and Computational Genomics Elhanan Borenstein The parsimony principle: A quick review Find the tree that requires the fewest

More information

DEVELOPMENT OF A CURRICULUM USING THE DELPHI METHOD SEUD 09/05/2015

DEVELOPMENT OF A CURRICULUM USING THE DELPHI METHOD SEUD 09/05/2015 DEVELOPMENT OF A CURRICULUM USING THE DELPHI METHOD SEUD 09/05/2015! Dr Pierre PANEL! Marie-Emmanuelle NEVEU 26/10/15 1 SUMMARY Introuction! Hysteroscopy! Curriculum Methos! Delphi course! Choice of the

More information

Representation and Analysis of Medical Decision Problems with Influence. Diagrams

Representation and Analysis of Medical Decision Problems with Influence. Diagrams Representation and Analysis of Medical Decision Problems with Influence Diagrams Douglas K. Owens, M.D., M.Sc., VA Palo Alto Health Care System, Palo Alto, California, Section on Medical Informatics, Department

More information

Keppel, G. & Wickens, T. D. Design and Analysis Chapter 10: Introduction to Factorial Designs

Keppel, G. & Wickens, T. D. Design and Analysis Chapter 10: Introduction to Factorial Designs Keppel, G. & Wickens, T. D. Design and nalysis Chapter : Introduction to Factorial Designs. asic Information from a Factorial Design a factorial design contains within it a set of separate single-factor

More information