Testing Oz Facilities in Distributed Problem Solving. Werner Dilger, Rainer Staudte, Kay Anke. groups, teachers, and rooms. lessons.

Size: px
Start display at page:

Download "Testing Oz Facilities in Distributed Problem Solving. Werner Dilger, Rainer Staudte, Kay Anke. groups, teachers, and rooms. lessons."

Transcription

1 Testing Oz Facilities in Distributed Problem Solving Werner Dilger, Rainer Staudte, Kay Anke Abstract The Oz programming language incorporates several features that have become important for developing solutions for complex problems. Among these features are constraint programming, object orientation, and concurrent programming. This paper describes a special solution to a standard problem, the time table problem. The solution proceeds in two phases: the construction of a time table that generally is not optimal, and a subsequent improvement of that time table. The rst phase was realized using constraint programming, the second phase is being realized as a multi-agent system based on the idea of the contract net protocol. The implementation done so far is sketched. Keywords Multi-agent systems, contract net model, constraints, time table problem, Oz 1. Introduction For a few years the AI research group at Chemnitz University has been dealing with multi-agent systems. For this reason, the Oz language became interesting for us and we began to study this language. Our contribution aims to gain a deeper insight into basic Oz facilities. We selected the well-known time table problem as an example. The main purpose of this choice is not to develop a special solution for this problem, but to check several Oz features in a real situation. In section 2 the time table problem is introduced and illustrated with an example. Section 3 gives a formalization of the problem which is the basis of the implementation. The principles of the implementation are described in section 4. It consists of a constraint system and a multi-agent system. The latter simulates the behavior of teachers in those times when time table programs did not yet exist, but includes the student groups as agents too. Section 5 sketches the implementation done so far and section 6 summarizes the results. 2. The Problem The model of a time table introduced in this section differs somewhat from the problem in [1]. For given sets of subjects (that consist of several lessons, student groups, teachers, rooms, and times) assignments are to be found such that a well dened set of constraints holds and several quality criteria of the time table are obeyed as far as possible. Typical constraints are for instance: For each subject there is given a set of student groups, teachers, rooms, and times to chose from. Werner Dilger, Fakultat fur Informatik, TU Chemnitz-Zwickau. dilgerinformatik.tu-chemnitz.de Rainer Staudte, Fakultat fur Informatik, TU Chemnitz-Zwickau. staudteinformatik.tu-chemnitz.de Kay Anke, Fakultat fur Informatik, TU Chemnitz-Zwickau. k.ankeinformatik.tu-chemnitz.de There are times when subjects, student groups, teachers, and rooms are unavailable. Not more than one lesson at any time for student groups, teachers, and rooms. Rooms of sucient size have to be assigned to the lessons. Quality criteria for a time table can be: As few as possible time gaps for teachers and students between lessons. Minimal moves between rooms in remote parts of the building. The length of a working day for teachers and students should not exceed a given limit. The following example will be used in the next section to illustrate the denition of the time table problem. Example 1: A time table for ve days per week (Monday till Friday) and six time slots per day is to be found. The last slot on Wednesday and the last two slots on Friday are closed for planning. There are 12 subjects as follows: Trainer Sparwasser gives two swimming courses in the pool. The group 7901 has three exercises, the groups 7902 and 7903 have to train together four exercises. Dr Bitner gives a computer science lesson for all three groups once a week. Beside this he gives programming courses, twice a week for the group 7901, and three times for each of the other groups. Miss Hurtig gives Spanish courses ve times a week for each group separately. Prof Fuchs has an algebra seminar four times a week for each group separately. The swimming pool is open only on Monday and Wednesday. The last two times of each day are excluded for group Dr Bitner is accessable only on Wednesday and Thursday. The time table in this example should have the following features: All subjects should be planned as demanded. Groups and teachers should not have gaps in their time tables. The times should be distributed over the week as good as possible. The number of room changes for groups should be minimal.

2 3. A Time Table Model In the time table model of [2], a time table is viewed as a state in a search process. Such a time table may be complete or incomplete, i. e. not all possible assignments have been made yet. Denition 1: The quadruple T T P = (C; M; Q; S 0 ) is called a time table problem if the following holds: 1. C = (L; G; T; R; U) collects the sets of subjects L = fl 1 ; l 2 ; ; l n Lg, student groups G = fg 1 ; g 2 ; ; g n Gg, teachers T = ft 1 ; t 2 ; ; t n T g, rooms R = fr 1 ; r 2 ; ; r n Rg, and times U = fu 1 ; u 2 ; ; u n Ug. 2. M denotes a set of mappings fm G ; m T ; m R ; m U g, where m G : L! N G species the number of student groups to be selected and the set of student groups to select from, m T : L! N T species the number of teachers to be selected and the set of teachers to select from, m R : L! N R species the number of rooms to be selected and the set of rooms to select from, m U : L! N U species the number of times to be selected and the set of times to select from for each subject, respectively. 3. The set Q = fq 1 ; q 2 ; ; q n g includes several quality criteria q k of a time table usually formulated as functions q k : fs i ji = 0(1)pg! N from the set of all (complete or incomplete) time tables into the set of natural numbers N. The value 0 for a certain q k expresses the ideal (possibly utopic) value. Especially q 1 denotes the number of student groups, teachers, rooms, and times that are not yet assigned to any subjects. 4. S 0 is an initial time table, where the values q k (S 0 ) do not t certain objective or subjective demands. Example 2: Let's transform example 1 of the previous chapter: T T P = (C; M; Q; S 0 ) C = (L; G; T; R; U) L = fswimming 1 ; swimming 2 ; computer science; programming 1 ; programming 2 ; programming 3 ; spanish 1 ; spanish 2 ; spanish 3 ; algebra 1 ; algebra 2 ; algebra 3 g G = f7901; 7902; 7903g T = fbitner; F uchs; Hurtig; Sparwasserg m G : L! N G R = f216; 301; swimming poolg U = f1; ; 17; 19; ; 28g swimming 1! (2; f7902; 7903g) swimming 2! (1; f7901g) computer science! (3; f7901; 7902; 7903g) programming! (1; f7901g) m T : L! N T algebra! (1; f7903g) swimming 1! (1; fsparwasserg) swimming 2! (1; fsparwasserg) computer science! (1; fbitnerg) programming! (1; fbitnerg) m R : L! N R algebra! (1; ff uchsg) swimming 1! (1; fswimming poolg) swimming 2! (1; fswimming poolg) computer science! (1; f216; 301g) programming! (1; f216; 301g) m U : L! N U algebra! (1; f216; 301g) swimming 1! (4; f1 6; 13 17g) swimming 1! (3; f1 4; 13 16g) computer science! (1; f13 16; 19 22g) programming! (2; f13 16; 19 22g) algebra! (4; f1 17; 19 28g) q 1 : S i! N denotes the number of unassigned objects. q 2 : S i! N denotes the number of gaps in teacher plans. q 3 : S i! N denotes the number of gaps in group plans. As a rule, the numerous quality criteria of a time table cannot be satised simultaneously. Instead one has to nd a compromise between the criteria. There are dierent ways to cope with this problem. For instance modeling the problem by means of soft constraints has gained much attraction in the last few years. Unlike in this approach we model Q from the standpoint of multiple objective decision making. The special criterion q 1 (S ) = 0 must be satised, but for all other q k with k > 1 the complete time table should have values that are in the Pareto set or at least close to it.

3 q 1 q 3 6 S 3 (2) S 2 S 4 (2) (2) / S 5 BB (3) (3) (1) BN S 6 Q Qs S - S XXXXXXXXXz 0 (1) S 1 Fig. 1. Multiple objective decision making in the time table model On the basis of this model, the planning process divides into three parts which are illustrated in gure In the rst, the monotone phase (S 0! S 1! S 2 ) the value of q 1 (S i ) is to be decreased to zero. 2. In the second, the cooperative phase (S 2! S 3! S 4! S 5 ) at least one value q j (S i ) with j > 1 decreases in each step, while all other values q k (S i ) with j 6= k do not increase. 3. The third, the contradictory phase (S 5! S 6! S 7 S ) is a search in the Pareto set, i. e. decreasing one value q j (S i ) causes increasing of at least one other value q k (S i ), j > 1, k > 1, j 6= k, and still q 1 (S i ) = Solution Strategy We want to implement a time table problem solver (T T P S) in Oz, thereby testing dierent facilities of this language. For the rst, i. e. the monotone phase of the planning process, the use of constraints seems to be the adequate means of implementation. For the other two phases, the cooperative and the contradictory one, we prefer a multi-agent system designed according to the principles of Reid Smith's contract net model [3], [4]. The rst part of the T T P S, the constraint system, generates a plan for each object occuring in the time table domain (teachers, student groups, rooms) taking into account the hard constraints of the objects. There may also be soft constraints, but these are not regarded, therefore the plan produced by the constraint system is generally not optimal. When the plan generation has been nished, the second part of the T T P S, the multi-agent system starts to improve the plan. According to the contract net model, an agent can take on two roles in the problem solving process: As a manager it subdivides a task into subtasks and announces them to other agents. If there are agents that are ready to execute q 2 the subtasks (so-called "contractors") it supervises the execution of the subtasks. As a contractor it is responsible for the actual execution of a task, either by doing it itself or by playing the role of a manager with respect to that task. Obviously, an agent can take on both roles simultaneously. In the time table domain there are three kinds of objects: teachers, student groups, and rooms. The rooms are regarded as mere objects, the teachers and student groups are taken as agents. They are able to improve their respective time tables by negotiating with each other. We distinguish between the two groups of agents, the teachers and the student groups, as dierent agent groups. If during the planning process an agent of one group has some contacts with an agent of the other group, the latter is called the complementary agent. If A is an agent, each entry in its time table consists of a pair (K; R), with K a complementary agent of A and R a room. There are four basic operations that an agent can apply to improve its plan: 1. Moving the assignments of a certain time (agent, complementary agent, room) to time gap. 2. Replacing a time gap with the assignments to another time. 3. Exchanging two lessons. 4. Exchanging three or more lessons. For reasons of eciency, the rst three operations should be preferred. The negotiation process starts when one agent, say A, becomes active and proceeds in two phases: (1) Identication of potential partners, (2) Realization of the exchange. For the rst phase there are three possible alternatives. Identication of a partner A determines a time gap t 1 with a high valuation. 2. A determines all complementary agents K 1 ; ; K n and rooms R 1 ; ; R m which have a time gap at t 1. To reduce the amount of communication, only complementary agents are taken into regard that occur in A's plan. 3. For each K i A determines the times at which it occurs in its time table. These times are provided with priorities; times with low priorities are not taken into regard. 4. As soon as a time has been found that is suited for an exchange, A sends a lock command to all objects involved. If all receivers accept the command, A enters the time in a list, called active list. If at least one receiver rejects the command (because the time has already been locked), the time will be unlocked by all receivers and A enters it in the alternative list. Identication of a partner A determines a pair (K; R) that it wants to move to some other time slot.

4 2. A determines all free time slots that can be occupied according to the priority values, say t 1 ; ; t k. 3. A asks K, which of the t 1 ; ; t k are free for it. 4. For those times that are free for K A sends a lock command to K. If K accepts the command, A looks for non occupied rooms and enters the time in a list, called active list. If K rejects the command (because the time has already been locked), the time will be unlocked and A enters it in the alternative list. Identication of a partner A selects a time t 1 with respect to a valuation function q i which it wants to change and determines the entry (K; R) at t 1 in its time table. 2. A determines all times t 2 ; :::; t k that are suited for an exchange with respect to q i and for which the following condition holds: 9K 0 9R 0 : (K; R 0 ) is the entry at t i or (K 0 ; R 0 ) is the entry at t i and K 0 is free at t 1 and K is free at t i where K 6= K 0 and i = 2; ; k 3. As soon as a time has been found that is suited for an exchange, A sends a lock command to all objects involved. If all receivers accept the command, A enters the time in a list, called active list. If at least one receiver rejects the command (because the time has already been locked), the time will be unlocked by all receivers and A enters it in the alternative list. Realization of the exchange 1. If A's active list is not empty, it chooses the entry with the highest valuation, say (K; R), removes it from the list, and negotiates with K about a possible move of the entry. If the active list is empty, it continues with step If the negotiation is successful, A updates its plan and informs the other objects about the result such that they can update their respective plans. It also sends an unlock command to all objects involved in the identication process. The realization procedure stops with success. 3. If the negotiation does not succeed, A sends an unlock command to all objects involved in the identication process and continues with step If the alternative list is not empty, A selects the now unlocked entries in this list, puts them into the active list, and continues with step If the alternative list is empty, the realization procedure stops with failure. When A selects the entry with the highest valuation from its active list, it assumes that the complementary agent K is willing to negotiate, according to the identication procedure. The negotiation can proceed in four dierent forms: Negotiating!!!!!!!! (Reject) (Report) (Report) Request a aaaaaaa Commanding Oering (Reject) Fig. 2. The negotiating protocol Negotiating (Reject) 1. K rejects negotiation because time t 1 has been locked in the meantime. 2. K agrees with an exchange at time t 1 because this is advantageous for it, too. 3. K suggests an additional exchange with A at time t K tries to nd another partner, say B, for an exchange. In this case B is a complementary agent for K, i. e. it belongs to the same agent group as A. In case 3 the negotiation process becomes recursive. For reasons of eciency it should be avoided that too many agents are involved in the process, therefore the depth of the recursion is restricted. Instead of negotiating with too many partners, a sequence of negotiations between restricted numbers of partners will take place. Using the generic congurable cooperation protocols of [5] the negotiation process can be illustrated by gure 2. The change between the agent groups in the recursive negotiation is similar to the negotiation according to the contract net protocol, where each agent can take on the role of a manager or a contractor. However, our approach diers from the contract net protocol insofar as no bids are delivered, rather an agent selects a complementary agent according to its own valuation function. 5. Implementation The mappings m G ; m T ; m R ; m U as the most important input dates for a time table are almost all given explicitly. For the sake of simplicity several sets to select from can be collected in extra variables. For instance, in our example the rooms 216 and 301 are arbitrarily available for all subjects except for swimming, and it is more convenient to group together both rooms into one set. The time constraints of student groups, teachers and

5 rooms are used to calculate the availability of times for subjects. This is managed by means of the FD.get-constraint. Up to now only the time lists of such student groups, teachers, and rooms are included, where no alternatives are possible. The time constraints of the other objects are considered only at the moment of their actual selection. A second way can be an exact formulation of these times by means of FD.OR-connected constraints. The exclusive use of a time for subjects with common student groups, teachers or rooms can be enforced by the FD.allDierent-constraint. The question, whether this will be a good idea for large time tables is open. Obviously this constraint doesn't reduce the problem solving space considerably. For the implementation of the multi-agent approach we cannot yet make a statement about Oz properties, but the object oriented paradigm promises to be a solid basis. 6. Results The work introduced here is still under development. The constraint solver in Oz is well suited to implement the monotone phase of the time table problem in a smart way. It works well for small examples (cf. the example in this article). But up to now it is not clear whether the inexperienced users did use all Oz facilities eciently. A more realistic time table problem is very complex, and we have to gure out whether the Oz constraint facilities and our techniques are sucient to solve problems of the above formulated classes. The multi-agent approach combines the cooperative and the contradictory phases. At the moment the implementation is not yet completed. Therefore we can not give nal results about our experiences with Oz in this area. References [1] Martin Henz and Jorg Wurtz, Using Oz for College Time Tabling, Extended Abstract, DFKI [2] Klaus Philipp und Rainer Staudte, Das n-dimensionale Zuweisungsproblem bei mehrfacher Zielsetzung, Wissenschaftliche Zeitschrift der Technischen Hochschule Karl-Marx-Stadt, 24(1982), pp [3] Reid G. Smith, The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver, in: Alan H. Bond and Less Gasser (Eds.), Readings in Distributed Articial Intelligence Morgan Kaufmann, 1988, pp [4] Randall Davis and Reid G. Smith, Negotiation as a Metaphor for Distributed Problem Solving, Articial Intelligence, 20(1983), pp [5] B. Burmeister, A. Haddadi, K. Sundermeyer, Generic congurable cooperation protocols for multi-agent systems, Technical report, Research and Technology, Daimler-Benz AG, Berlin 1992

Computing the acceptability semantics. London SW7 2BZ, UK, Nicosia P.O. Box 537, Cyprus,

Computing the acceptability semantics. London SW7 2BZ, UK, Nicosia P.O. Box 537, Cyprus, Computing the acceptability semantics Francesca Toni 1 and Antonios C. Kakas 2 1 Department of Computing, Imperial College, 180 Queen's Gate, London SW7 2BZ, UK, ft@doc.ic.ac.uk 2 Department of Computer

More information

Bounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol.

Bounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol. Bounding the End-to-End Response imes of asks in a Distributed Real-ime System Using the Direct Synchronization Protocol Jun Sun Jane Liu Abstract In a distributed real-time system, a task may consist

More information

INSTITUT FÜR INFORMATIK

INSTITUT FÜR INFORMATIK INSTITUT FÜR INFORMATIK DER LUDWIGMAXIMILIANSUNIVERSITÄT MÜNCHEN Bachelorarbeit Propagation of ESCL Cardinality Constraints with Respect to CEP Queries Thanh Son Dang Aufgabensteller: Prof. Dr. Francois

More information

Virtual Robust Implementation and Strategic Revealed Preference

Virtual Robust Implementation and Strategic Revealed Preference and Strategic Revealed Preference Workshop of Mathematical Economics Celebrating the 60th birthday of Aloisio Araujo IMPA Rio de Janeiro December 2006 Denitions "implementation": requires ALL equilibria

More information

A Preference Semantics. for Ground Nonmonotonic Modal Logics. logics, a family of nonmonotonic modal logics obtained by means of a

A Preference Semantics. for Ground Nonmonotonic Modal Logics. logics, a family of nonmonotonic modal logics obtained by means of a A Preference Semantics for Ground Nonmonotonic Modal Logics Daniele Nardi and Riccardo Rosati Dipartimento di Informatica e Sistemistica, Universita di Roma \La Sapienza", Via Salaria 113, I-00198 Roma,

More information

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report #

Degradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report # Degradable Agreement in the Presence of Byzantine Faults Nitin H. Vaidya Technical Report # 92-020 Abstract Consider a system consisting of a sender that wants to send a value to certain receivers. Byzantine

More information

Optimal Rejuvenation for. Tolerating Soft Failures. Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi.

Optimal Rejuvenation for. Tolerating Soft Failures. Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi. Optimal Rejuvenation for Tolerating Soft Failures Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi Abstract In the paper we address the problem of determining the optimal time

More information

Kirsten Lackner Solberg. Dept. of Math. and Computer Science. Odense University, Denmark

Kirsten Lackner Solberg. Dept. of Math. and Computer Science. Odense University, Denmark Inference Systems for Binding Time Analysis Kirsten Lackner Solberg Dept. of Math. and Computer Science Odense University, Denmark e-mail: kls@imada.ou.dk June 21, 1993 Contents 1 Introduction 4 2 Review

More information

Maximum Likelihood Estimation

Maximum Likelihood Estimation Connexions module: m11446 1 Maximum Likelihood Estimation Clayton Scott Robert Nowak This work is produced by The Connexions Project and licensed under the Creative Commons Attribution License Abstract

More information

Feng Lin. Abstract. Inspired by thewell-known motto of Henry David Thoreau [1], that government

Feng Lin. Abstract. Inspired by thewell-known motto of Henry David Thoreau [1], that government That Supervisor Is Best Which Supervises Least Feng Lin Department of Electrical and Computer Engineering Wayne State University, Detroit, MI 48202 Abstract Inspired by thewell-known motto of Henry David

More information

Integrating External and Internal Clock Synchronization. Christof Fetzer and Flaviu Cristian. Department of Computer Science & Engineering

Integrating External and Internal Clock Synchronization. Christof Fetzer and Flaviu Cristian. Department of Computer Science & Engineering Integrating External and Internal Clock Synchronization Christof Fetzer and Flaviu Cristian Department of Computer Science & Engineering University of California, San Diego La Jolla, CA 9093?0114 e-mail:

More information

Spurious Chaotic Solutions of Dierential. Equations. Sigitas Keras. September Department of Applied Mathematics and Theoretical Physics

Spurious Chaotic Solutions of Dierential. Equations. Sigitas Keras. September Department of Applied Mathematics and Theoretical Physics UNIVERSITY OF CAMBRIDGE Numerical Analysis Reports Spurious Chaotic Solutions of Dierential Equations Sigitas Keras DAMTP 994/NA6 September 994 Department of Applied Mathematics and Theoretical Physics

More information

SEQUENTIAL EQUILIBRIA IN BAYESIAN GAMES WITH COMMUNICATION. Dino Gerardi and Roger B. Myerson. December 2005

SEQUENTIAL EQUILIBRIA IN BAYESIAN GAMES WITH COMMUNICATION. Dino Gerardi and Roger B. Myerson. December 2005 SEQUENTIAL EQUILIBRIA IN BAYESIAN GAMES WITH COMMUNICATION By Dino Gerardi and Roger B. Myerson December 2005 COWLES FOUNDATION DISCUSSION AER NO. 1542 COWLES FOUNDATION FOR RESEARCH IN ECONOMICS YALE

More information

To make a grammar probabilistic, we need to assign a probability to each context-free rewrite

To make a grammar probabilistic, we need to assign a probability to each context-free rewrite Notes on the Inside-Outside Algorithm To make a grammar probabilistic, we need to assign a probability to each context-free rewrite rule. But how should these probabilities be chosen? It is natural to

More information

and combine the results of the searches. We consider parallel search with subdivision, although most notions can be generalized to using dierent searc

and combine the results of the searches. We consider parallel search with subdivision, although most notions can be generalized to using dierent searc On the representation of parallel search in theorem proving Maria Paola Bonacina Department of Computer Science { The University of Iowa Abstract This extended abstract summarizes two contributions from

More information

CTL Model Checking. Prof. P.H. Schmitt. Formal Systems II. Institut für Theoretische Informatik Fakultät für Informatik Universität Karlsruhe (TH)

CTL Model Checking. Prof. P.H. Schmitt. Formal Systems II. Institut für Theoretische Informatik Fakultät für Informatik Universität Karlsruhe (TH) CTL Model Checking Prof. P.H. Schmitt Institut für Theoretische Informatik Fakultät für Informatik Universität Karlsruhe (TH) Formal Systems II Prof. P.H. Schmitt CTLMC Summer 2009 1 / 26 Fixed Point Theory

More information

Convergence Complexity of Optimistic Rate Based Flow. Control Algorithms. Computer Science Department, Tel-Aviv University, Israel

Convergence Complexity of Optimistic Rate Based Flow. Control Algorithms. Computer Science Department, Tel-Aviv University, Israel Convergence Complexity of Optimistic Rate Based Flow Control Algorithms Yehuda Afek y Yishay Mansour z Zvi Ostfeld x Computer Science Department, Tel-Aviv University, Israel 69978. December 12, 1997 Abstract

More information

A Structural Model of Sponsored Search Advertising Auctions

A Structural Model of Sponsored Search Advertising Auctions A Structural Model of Sponsored Search Advertising Auctions S. Athey and D. Nekipelov presented by Marcelo A. Fernández February 26, 2014 Remarks The search engine does not sell specic positions on the

More information

AGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications:

AGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications: AGREEMENT PROBLEMS (1) AGREEMENT PROBLEMS Agreement problems arise in many practical applications: agreement on whether to commit or abort the results of a distributed atomic action (e.g. database transaction)

More information

Dartmouth Computer Science Technical Report TR Constant-RMR Abortable Reader-Priority Reader-Writer. Algorithm

Dartmouth Computer Science Technical Report TR Constant-RMR Abortable Reader-Priority Reader-Writer. Algorithm Dartmouth Computer Science Technical Report TR2011-685 Constant-RMR Abortable Reader-Priority Reader-Writer Algorithm Nan Zheng Thesis Advisor: Prasad Jayanti June 2, 2011 Abstract The concurrent reader-writer

More information

Aijun An and Nick Cercone. Department of Computer Science, University of Waterloo. methods in a context of learning classication rules.

Aijun An and Nick Cercone. Department of Computer Science, University of Waterloo. methods in a context of learning classication rules. Discretization of Continuous Attributes for Learning Classication Rules Aijun An and Nick Cercone Department of Computer Science, University of Waterloo Waterloo, Ontario N2L 3G1 Canada Abstract. We present

More information

Novel determination of dierential-equation solutions: universal approximation method

Novel determination of dierential-equation solutions: universal approximation method Journal of Computational and Applied Mathematics 146 (2002) 443 457 www.elsevier.com/locate/cam Novel determination of dierential-equation solutions: universal approximation method Thananchai Leephakpreeda

More information

below, kernel PCA Eigenvectors, and linear combinations thereof. For the cases where the pre-image does exist, we can provide a means of constructing

below, kernel PCA Eigenvectors, and linear combinations thereof. For the cases where the pre-image does exist, we can provide a means of constructing Kernel PCA Pattern Reconstruction via Approximate Pre-Images Bernhard Scholkopf, Sebastian Mika, Alex Smola, Gunnar Ratsch, & Klaus-Robert Muller GMD FIRST, Rudower Chaussee 5, 12489 Berlin, Germany fbs,

More information

Extracted from a working draft of Goldreich s FOUNDATIONS OF CRYPTOGRAPHY. See copyright notice.

Extracted from a working draft of Goldreich s FOUNDATIONS OF CRYPTOGRAPHY. See copyright notice. 106 CHAPTER 3. PSEUDORANDOM GENERATORS Using the ideas presented in the proofs of Propositions 3.5.3 and 3.5.9, one can show that if the n 3 -bit to l(n 3 ) + 1-bit function used in Construction 3.5.2

More information

Volume 31, Issue 1. A solution concept for housing market problems with externalities. Alfredo Salgado-Torres Universidad Carlos III de Madrid

Volume 31, Issue 1. A solution concept for housing market problems with externalities. Alfredo Salgado-Torres Universidad Carlos III de Madrid Volume 31, Issue 1 A solution concept for housing market problems with externalities Alfredo Salgado-Torres Universidad Carlos III de Madrid Abstract Since the core of a housing market with externalities

More information

Potential Cases, Methodologies, and Strategies of Synthesis of. Solutions in Distributed Expert Systems. Minjie Zhang

Potential Cases, Methodologies, and Strategies of Synthesis of. Solutions in Distributed Expert Systems. Minjie Zhang Potential Cases, Methodologies, and Strategies of Synthesis of Solutions in Distributed Expert Systems Minjie Zhang School of Computer, and Information Sciences Edith Cowan University, WA 6027, Australia

More information

Probabilistic Dialogue Models for Dynamic Ontology Mapping

Probabilistic Dialogue Models for Dynamic Ontology Mapping Centre for Intelligent Systems and their Applications University of Edinburgh Uncertainty Reasoning for the Semantic Web Workshop 2006 Athens (GA), 5 th November 2006 Introduction Problem description Ontology

More information

Finite-Delay Strategies In Infinite Games

Finite-Delay Strategies In Infinite Games Finite-Delay Strategies In Infinite Games von Wenyun Quan Matrikelnummer: 25389 Diplomarbeit im Studiengang Informatik Betreuer: Prof. Dr. Dr.h.c. Wolfgang Thomas Lehrstuhl für Informatik 7 Logik und Theorie

More information

Post-Algebra II, Pre-Precalculus Summer Packet

Post-Algebra II, Pre-Precalculus Summer Packet Post-Algebra II, Pre-Precalculus Summer Packet (Concepts epected to be understood upon entering Precalculus course) Name Grade Level School Teacher In order to be successful in a Precalculus course at

More information

Rate-Monotonic Scheduling with variable. execution time and period. October 31, Abstract

Rate-Monotonic Scheduling with variable. execution time and period. October 31, Abstract Rate-Monotonic Scheduling with variable execution time and period Oldeld Peter October 31, 1997 Abstract Abstract is something cannot be understood. 1 Rate Monotonic Model Let Ti be a task. Let Pi be the

More information

An Implementation of the Contract Net Protocol Based on Marginal Cost Calculations

An Implementation of the Contract Net Protocol Based on Marginal Cost Calculations An Implementation of the Contract Net Protocol Based on Marginal Cost Calculations By Tuomas Sandholm 1993 Introduction Formalization of the idding and awarding decision process Formalization ased on marginal

More information

Environment (E) IBP IBP IBP 2 N 2 N. server. System (S) Adapter (A) ACV

Environment (E) IBP IBP IBP 2 N 2 N. server. System (S) Adapter (A) ACV The Adaptive Cross Validation Method - applied to polling schemes Anders Svensson and Johan M Karlsson Department of Communication Systems Lund Institute of Technology P. O. Box 118, 22100 Lund, Sweden

More information

Abstract. In this paper we present a query answering system for solving non-standard

Abstract. In this paper we present a query answering system for solving non-standard Answering Non-Standard Queries in Distributed Knowledge-Based Systems Zbigniew W. Ras University of North Carolina Department of Comp. Science Charlotte, N.C. 28223, USA ras@uncc.edu Abstract In this paper

More information

In Advances in Neural Information Processing Systems 6. J. D. Cowan, G. Tesauro and. Convergence of Indirect Adaptive. Andrew G.

In Advances in Neural Information Processing Systems 6. J. D. Cowan, G. Tesauro and. Convergence of Indirect Adaptive. Andrew G. In Advances in Neural Information Processing Systems 6. J. D. Cowan, G. Tesauro and J. Alspector, (Eds.). Morgan Kaufmann Publishers, San Fancisco, CA. 1994. Convergence of Indirect Adaptive Asynchronous

More information

Discrete Probability and State Estimation

Discrete Probability and State Estimation 6.01, Spring Semester, 2008 Week 12 Course Notes 1 MASSACHVSETTS INSTITVTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.01 Introduction to EECS I Spring Semester, 2008 Week

More information

Computability and Complexity

Computability and Complexity Computability and Complexity Push-Down Automata CAS 705 Ryszard Janicki Department of Computing and Software McMaster University Hamilton, Ontario, Canada janicki@mcmaster.ca Ryszard Janicki Computability

More information

A Graph Based Parsing Algorithm for Context-free Languages

A Graph Based Parsing Algorithm for Context-free Languages A Graph Based Parsing Algorithm for Context-free Languages Giinter Hot> Technical Report A 01/99 June 1999 e-mail: hotzocs.uni-sb.de VVVVVV: http://vwv-hotz.cs.uni-sb. de Abstract We present a simple algorithm

More information

Section 6.2: Measures of Variation

Section 6.2: Measures of Variation Section 6.2: Measures of Variation Measures of variation (or spread) refers to a set of numerical summaries that describe the degree to which the data are spread out. Why do we need them? Why is using

More information

Real Time Operating Systems

Real Time Operating Systems Real Time Operating ystems Luca Abeni luca.abeni@unitn.it Interacting Tasks Until now, only independent tasks... A job never blocks or suspends A task only blocks on job termination In real world, jobs

More information

An Alternative To The Iteration Operator Of. Propositional Dynamic Logic. Marcos Alexandre Castilho 1. IRIT - Universite Paul Sabatier and

An Alternative To The Iteration Operator Of. Propositional Dynamic Logic. Marcos Alexandre Castilho 1. IRIT - Universite Paul Sabatier and An Alternative To The Iteration Operator Of Propositional Dynamic Logic Marcos Alexandre Castilho 1 IRIT - Universite Paul abatier and UFPR - Universidade Federal do Parana (Brazil) Andreas Herzig IRIT

More information

Revenue Maximization in a Cloud Federation

Revenue Maximization in a Cloud Federation Revenue Maximization in a Cloud Federation Makhlouf Hadji and Djamal Zeghlache September 14th, 2015 IRT SystemX/ Telecom SudParis Makhlouf Hadji Outline of the presentation 01 Introduction 02 03 04 05

More information

PHENOMENOLOGICAL LAWS AND THEIR APPLICATION TO SCIENTIFIC EPISTEMIC EXPLANATION PROBLEMS. Erik WEBER(*)

PHENOMENOLOGICAL LAWS AND THEIR APPLICATION TO SCIENTIFIC EPISTEMIC EXPLANATION PROBLEMS. Erik WEBER(*) Logique & Analyse 129-130 (1990), 175-189 PHENOMENOLOGICAL LAWS AND THEIR APPLICATION TO SCIENTIFIC EPISTEMIC EXPLANATION PROBLEMS Erik WEBER(*) 1. Introduction Scientific knowledge has both a practical

More information

Flexible Top Trading Cycles and Chains Mechanism: Maintaining Diversity in Erasmus Student Exchange

Flexible Top Trading Cycles and Chains Mechanism: Maintaining Diversity in Erasmus Student Exchange 1/52 Flexible Top Trading Cycles and Chains Mechanism: Maintaining Diversity in Erasmus Student Exchange Umut Dur Onur Kesten Utku Ünver Econometric Society World Congress'15 New Market-Old Mechanism 2/52

More information

Dierence Quotients, Derivatives, and Data through Modeling with Slime 1 1 Introduction The importance of the connection between the dierence quotient

Dierence Quotients, Derivatives, and Data through Modeling with Slime 1 1 Introduction The importance of the connection between the dierence quotient Dierence Quotients, Derivatives, and Data through Modeling with Slime Richard M. Single, Department of Mathematics, St. Olaf College, Northeld, Minnesota Contact Information: Richard M. Single 1600 East

More information

Projektpartner. Sonderforschungsbereich 386, Paper 163 (1999) Online unter:

Projektpartner. Sonderforschungsbereich 386, Paper 163 (1999) Online unter: Toutenburg, Shalabh: Estimation of Regression Coefficients Subject to Exact Linear Restrictions when some Observations are Missing and Balanced Loss Function is Used Sonderforschungsbereich 386, Paper

More information

A version of for which ZFC can not predict a single bit Robert M. Solovay May 16, Introduction In [2], Chaitin introd

A version of for which ZFC can not predict a single bit Robert M. Solovay May 16, Introduction In [2], Chaitin introd CDMTCS Research Report Series A Version of for which ZFC can not Predict a Single Bit Robert M. Solovay University of California at Berkeley CDMTCS-104 May 1999 Centre for Discrete Mathematics and Theoretical

More information

Name: Teacher: Per: Unit 1 Unit 2 Unit 3 Unit 4 Unit 5 Unit 6 Unit 7 Unit 8 Unit 9 Unit 10. Unit 4. [Writing Linear Equations]

Name: Teacher: Per: Unit 1 Unit 2 Unit 3 Unit 4 Unit 5 Unit 6 Unit 7 Unit 8 Unit 9 Unit 10. Unit 4. [Writing Linear Equations] Name: Teacher: Per: Unit 1 Unit 2 Unit 3 Unit 4 Unit 5 Unit 6 Unit 7 Unit 8 Unit 9 Unit 10 Unit 4 [Writing Linear Equations] Find the equation of a line that has slope m = 4 and passes through the point

More information

Dynamic farsighted networks with endogenous opportunities of link formation

Dynamic farsighted networks with endogenous opportunities of link formation Dynamic farsighted networks with endogenous opportunities of link formation James Lake Southern Methodist University July 2014 Abstract I present a three player dynamic network theoretic model where players

More information

Part 1: You are given the following system of two equations: x + 2y = 16 3x 4y = 2

Part 1: You are given the following system of two equations: x + 2y = 16 3x 4y = 2 Solving Systems of Equations Algebraically Teacher Notes Comment: As students solve equations throughout this task, have them continue to explain each step using properties of operations or properties

More information

CC283 Intelligent Problem Solving 28/10/2013

CC283 Intelligent Problem Solving 28/10/2013 Machine Learning What is the research agenda? How to measure success? How to learn? Machine Learning Overview Unsupervised Learning Supervised Learning Training Testing Unseen data Data Observed x 1 x

More information

4-8 Quadratic Inequalities. Graph each inequality. ANSWER: ANSWER: ANSWER: CCSS SENSE-MAKING Solve each inequality by graphing.

4-8 Quadratic Inequalities. Graph each inequality. ANSWER: ANSWER: ANSWER: CCSS SENSE-MAKING Solve each inequality by graphing. 1. Graph each inequality. 4. CCSS SENSE-MAKING Solve each inequality by graphing. {x x < 1 or x > 4} 5. {x 5 < x < 3} 2. 6. {x 3 x 2} 7. {x 0.29 x 1.71} 3. 8. SOCCER A midfielder kicks a ball toward the

More information

The Proof of IP = P SP ACE

The Proof of IP = P SP ACE The Proof of IP = P SP ACE Larisse D. Voufo March 29th, 2007 For a long time, the question of how a verier can be convinced with high probability that a given theorem is provable without showing the whole

More information

A Global Constraint for Parallelizing the Execution of Task Sets in Non-Preemptive Scheduling

A Global Constraint for Parallelizing the Execution of Task Sets in Non-Preemptive Scheduling A Global Constraint for Parallelizing the Execution of Task Sets in Non-Preemptive Scheduling 1 Introduction Michael Marte 1 Institut für Informatik, Universität München Oettingenstr. 67, 80538 München,

More information

Lesson 8: Why Stay with Whole Numbers?

Lesson 8: Why Stay with Whole Numbers? Student Outcomes Students use function notation, evaluate functions for inputs in their domains, and interpret statements that use function notation in terms of a context. Students create functions that

More information

It is well-known (cf. [2,4,5,9]) that the generating function P w() summed over all tableaux of shape = where the parts in row i are at most a i and a

It is well-known (cf. [2,4,5,9]) that the generating function P w() summed over all tableaux of shape = where the parts in row i are at most a i and a Counting tableaux with row and column bounds C. Krattenthalery S. G. Mohantyz Abstract. It is well-known that the generating function for tableaux of a given skew shape with r rows where the parts in the

More information

Linear Regression and Its Applications

Linear Regression and Its Applications Linear Regression and Its Applications Predrag Radivojac October 13, 2014 Given a data set D = {(x i, y i )} n the objective is to learn the relationship between features and the target. We usually start

More information

{},{a},{a,c} {},{c} {c,d}

{},{a},{a,c} {},{c} {c,d} Modular verication of Argos Programs Agathe Merceron 1 and G. Michele Pinna 2 1 Basser Department of Computer Science, University of Sydney Madsen Building F09, NSW 2006, Australia agathe@staff.cs.su.oz.au

More information

Calculus and linear algebra for biomedical engineering Week 3: Matrices, linear systems of equations, and the Gauss algorithm

Calculus and linear algebra for biomedical engineering Week 3: Matrices, linear systems of equations, and the Gauss algorithm Calculus and linear algebra for biomedical engineering Week 3: Matrices, linear systems of equations, and the Gauss algorithm Hartmut Führ fuehr@matha.rwth-aachen.de Lehrstuhl A für Mathematik, RWTH Aachen

More information

New concepts: Span of a vector set, matrix column space (range) Linearly dependent set of vectors Matrix null space

New concepts: Span of a vector set, matrix column space (range) Linearly dependent set of vectors Matrix null space Lesson 6: Linear independence, matrix column space and null space New concepts: Span of a vector set, matrix column space (range) Linearly dependent set of vectors Matrix null space Two linear systems:

More information

Bounding in Multi-Stage. Stochastic Programming. Problems. Olga Fiedler a Andras Prekopa b

Bounding in Multi-Stage. Stochastic Programming. Problems. Olga Fiedler a Andras Prekopa b R utcor Research R eport Bounding in Multi-Stage Stochastic Programming Problems Olga Fiedler a Andras Prekopa b RRR 24-95, June 1995 RUTCOR Rutgers Center for Operations Research Rutgers University P.O.

More information

Massachusetts Institute of Technology

Massachusetts Institute of Technology Massachusetts Institute of Technology 6.034 Articial Intelligence Solutions # Final96 6034 Item # 33 Problem 1 Rules Step Ready to fire Selected Rule Assertion Added 1 R1 R3 R7 R1 Fuzzy is a mammal 2 R5

More information

The Inclusion Exclusion Principle and Its More General Version

The Inclusion Exclusion Principle and Its More General Version The Inclusion Exclusion Principle and Its More General Version Stewart Weiss June 28, 2009 1 Introduction The Inclusion-Exclusion Principle is typically seen in the context of combinatorics or probability

More information

Moving Average Rules to Find. Confusion Matrix. CC283 Intelligent Problem Solving 05/11/2010. Edward Tsang (all rights reserved) 1

Moving Average Rules to Find. Confusion Matrix. CC283 Intelligent Problem Solving 05/11/2010. Edward Tsang (all rights reserved) 1 Machine Learning Overview Supervised Learning Training esting Te Unseen data Data Observed x 1 x 2... x n 1.6 7.1... 2.7 1.4 6.8... 3.1 2.1 5.4... 2.8... Machine Learning Patterns y = f(x) Target y Buy

More information

2 RODNEY G. DOWNEY STEFFEN LEMPP Theorem. For any incomplete r.e. degree w, there is an incomplete r.e. degree a > w such that there is no r.e. degree

2 RODNEY G. DOWNEY STEFFEN LEMPP Theorem. For any incomplete r.e. degree w, there is an incomplete r.e. degree a > w such that there is no r.e. degree THERE IS NO PLUS-CAPPING DEGREE Rodney G. Downey Steffen Lempp Department of Mathematics, Victoria University of Wellington, Wellington, New Zealand downey@math.vuw.ac.nz Department of Mathematics, University

More information

Tippecanoe County ARES Net Formats NET 1-4. Net Formats

Tippecanoe County ARES Net Formats NET 1-4. Net Formats 1. Introduction Net Formats To provide a basis for carrying out the mission of the Tippecanoe County, Indiana, Amateur Radio Emergency Service (ARES ), guidelines must be in place to meet the communications

More information

Substitution and change of variables Integration by parts

Substitution and change of variables Integration by parts Substitution and change of variables Integration by parts Math 1A October 11, 216 Announcements I have been back since Friday night but will be leaving for another short trip on Thursday. James will preside

More information

Applied Cooperative Game Theory

Applied Cooperative Game Theory Applied Cooperative Game Theory André Casajus and Martin Kohl University of Leipzig December 2013 1 / 20 : An example consider a gloves game with two left-glove holders and four right-glove holders N =

More information

Economics 472. Lecture 10. where we will refer to y t as a m-vector of endogenous variables, x t as a q-vector of exogenous variables,

Economics 472. Lecture 10. where we will refer to y t as a m-vector of endogenous variables, x t as a q-vector of exogenous variables, University of Illinois Fall 998 Department of Economics Roger Koenker Economics 472 Lecture Introduction to Dynamic Simultaneous Equation Models In this lecture we will introduce some simple dynamic simultaneous

More information

CPSC 320 Sample Solution, Reductions and Resident Matching: A Residentectomy

CPSC 320 Sample Solution, Reductions and Resident Matching: A Residentectomy CPSC 320 Sample Solution, Reductions and Resident Matching: A Residentectomy August 25, 2017 A group of residents each needs a residency in some hospital. A group of hospitals each need some number (one

More information

Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department Universi

Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department Universi Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department University of Kentucky Lexington, KY 40506-0046 fpaweljmirekg@cs.engr.uky.edu

More information

Mechanism Design for Resource Bounded Agents

Mechanism Design for Resource Bounded Agents Mechanism Design for Resource Bounded Agents International Conference on Multi-Agent Systems, ICMAS 2000 Noa E. Kfir-Dahav Dov Monderer Moshe Tennenholtz Faculty of Industrial Engineering and Management

More information

Baltzer Journals July 1,1996. Autonomous Agents. Sarit Kraus Department of Mathematics and Computer Science. Bar Ilan University

Baltzer Journals July 1,1996. Autonomous Agents. Sarit Kraus Department of Mathematics and Computer Science. Bar Ilan University Baltzer Journals July 1,1996 Beliefs, Time and Incomplete Information in Multiple Encounter Negotiations Among Autonomous Agents Sarit Kraus 1 2 1 Department of Mathematics and Computer Science Bar Ilan

More information

Response Time in Data Broadcast Systems: Mean, Variance and Trade-O. Shu Jiang Nitin H. Vaidya. Department of Computer Science

Response Time in Data Broadcast Systems: Mean, Variance and Trade-O. Shu Jiang Nitin H. Vaidya. Department of Computer Science Response Time in Data Broadcast Systems: Mean, Variance and Trade-O Shu Jiang Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 7784-11, USA Email: fjiangs,vaidyag@cs.tamu.edu

More information

1. CONFIGURATIONS We assume familiarity with [1]. The purpose of this manuscript is to provide more details about the proof of [1, theorem (3.2)]. As

1. CONFIGURATIONS We assume familiarity with [1]. The purpose of this manuscript is to provide more details about the proof of [1, theorem (3.2)]. As REDUCIBILITY IN THE FOUR-COLOR THEOREM Neil Robertson 1 Department of Mathematics Ohio State University 231 W. 18th Ave. Columbus, Ohio 43210, USA Daniel P. Sanders 2 School of Mathematics Georgia Institute

More information

Example Bases and Basic Feasible Solutions 63 Let q = >: ; > and M = >: ;2 > and consider the LCP (q M). The class of ; ;2 complementary cones

Example Bases and Basic Feasible Solutions 63 Let q = >: ; > and M = >: ;2 > and consider the LCP (q M). The class of ; ;2 complementary cones Chapter 2 THE COMPLEMENTARY PIVOT ALGORITHM AND ITS EXTENSION TO FIXED POINT COMPUTING LCPs of order 2 can be solved by drawing all the complementary cones in the q q 2 - plane as discussed in Chapter.

More information

Knowledge Discovery. Zbigniew W. Ras. Polish Academy of Sciences, Dept. of Comp. Science, Warsaw, Poland

Knowledge Discovery. Zbigniew W. Ras. Polish Academy of Sciences, Dept. of Comp. Science, Warsaw, Poland Handling Queries in Incomplete CKBS through Knowledge Discovery Zbigniew W. Ras University of orth Carolina, Dept. of Comp. Science, Charlotte,.C. 28223, USA Polish Academy of Sciences, Dept. of Comp.

More information

Lab 3. Newton s Second Law

Lab 3. Newton s Second Law Lab 3. Newton s Second Law Goals To determine the acceleration of a mass when acted on by a net force using data acquired using a pulley and a photogate. Two cases are of interest: (a) the mass of the

More information

Time-Space Trade-Os. For Undirected ST -Connectivity. on a JAG

Time-Space Trade-Os. For Undirected ST -Connectivity. on a JAG Time-Space Trade-Os For Undirected ST -Connectivity on a JAG Abstract Undirected st-connectivity is an important problem in computing. There are algorithms for this problem that use O (n) time and ones

More information

Online Appendixes for \A Theory of Military Dictatorships"

Online Appendixes for \A Theory of Military Dictatorships May 2009 Online Appendixes for \A Theory of Military Dictatorships" By Daron Acemoglu, Davide Ticchi and Andrea Vindigni Appendix B: Key Notation for Section I 2 (0; 1): discount factor. j;t 2 f0; 1g:

More information

Fair allocation of indivisible goods

Fair allocation of indivisible goods Fair allocation of indivisible goods Gabriel Sebastian von Conta Technische Universitt Mnchen mrgabral@gmail.com November 17, 2015 Gabriel Sebastian von Conta (TUM) Chapter 12 November 17, 2015 1 / 44

More information

2 Situation A (Two-valued Model) Describing the Situation Reaching the rst goal

2 Situation A (Two-valued Model) Describing the Situation Reaching the rst goal A Probabilistic Stopping Criterion for the Evaluation of Benchmarks (Extended Version) Michael Greiner, Manfred Schramm z Keywords Evaluation of benchmarks, heuristic comparison of algorithms, general

More information

about them. D3FIKITI0N THEORY AS BASIS FOR A CREATIVE PROBLEM SOLVER

about them. D3FIKITI0N THEORY AS BASIS FOR A CREATIVE PROBLEM SOLVER D3FIKITI0N THEORY AS BASIS FOR A CREATIVE PROBLEM SOLVER H.Andreka, T.Gergely, I.Nemeti ftungarian Academy of sciences Budapest, ungary Abstract In this paper the application of some deep theorems of mathematical

More information

Behavioral Economics

Behavioral Economics Behavioral Economics 1 Behavioral Economics Midterm, 13th - Suggested Solutions 1 Question 1 (40 points) Consider the following (completely standard) decision maker: They have a utility function u on a

More information

Improving the trade-o between storage and communication in broadcast encryption schemes

Improving the trade-o between storage and communication in broadcast encryption schemes Discrete Applied Mathematics 143 (2004) 213 220 www.elsevier.com/locate/dam Improving the trade-o between storage and communication in broadcast encryption schemes Carles Padro, Ignacio Gracia, Sebastia

More information

Semantic Importance Dual-Priority Server: Properties

Semantic Importance Dual-Priority Server: Properties Semantic Importance Dual-Priority Server: Properties David R. Donari Universidad Nacional del Sur - CONICET, Dpto. de Ing. Eléctrica y Computadoras, Bahía Blanca, Argentina, 8000 ddonari@uns.edu.ar Martin

More information

Synchronous Sequential Circuit Design

Synchronous Sequential Circuit Design Synchronous Sequential Circuit Design 1 Sequential circuit design In sequential circuit design, we turn some description into a working circuit We first make a state table or diagram to express the computation

More information

Experiment 2 Random Error and Basic Statistics

Experiment 2 Random Error and Basic Statistics PHY191 Experiment 2: Random Error and Basic Statistics 7/12/2011 Page 1 Experiment 2 Random Error and Basic Statistics Homework 2: turn in the second week of the experiment. This is a difficult homework

More information

Exhaustive Classication of Finite Classical Probability Spaces with Regard to the Notion of Causal Up-to-n-closedness

Exhaustive Classication of Finite Classical Probability Spaces with Regard to the Notion of Causal Up-to-n-closedness Exhaustive Classication of Finite Classical Probability Spaces with Regard to the Notion of Causal Up-to-n-closedness Michaª Marczyk, Leszek Wro«ski Jagiellonian University, Kraków 16 June 2009 Abstract

More information

Parking Slot Assignment Problem

Parking Slot Assignment Problem Department of Economics Boston College October 11, 2016 Motivation Research Question Literature Review What is the concern? Cruising for parking is drivers behavior that circle around an area for a parking

More information

Contingency Selection in Plan Generation

Contingency Selection in Plan Generation Contingency Selection in Plan Generation Nilufer Onder Department of Computer Science University of Pittsburgh Pittsburgh, PA 15260 nilufer@cs.pitt.edu Martha E. Pollack Department of Computer Science

More information

Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989)

Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) September 13th, 1995 Donald Ferguson*,** Christos Nikolaou* Yechiam Yemini** *IBM T.J. Watson Research Center

More information

Normal Probability Plot Probability Probability

Normal Probability Plot Probability Probability Modelling multivariate returns Stefano Herzel Department ofeconomics, University of Perugia 1 Catalin Starica Department of Mathematical Statistics, Chalmers University of Technology Reha Tutuncu Department

More information

Turing Machines Part One

Turing Machines Part One Turing Machines Part One What problems can we solve with a computer? Regular Languages CFLs Languages recognizable by any feasible computing machine All Languages That same drawing, to scale. All Languages

More information

Activity Graphs. The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters.

Activity Graphs. The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation Accessed Citable Link Terms of Use Karr, Michael. Activity Graphs.

More information

One box per group ( star group of 6)

One box per group ( star group of 6) 4 markers 2 erasers One box per group ( star group of 6) 1 pencil (just in case) Some small post-it notes 1 glue stick One person from each group collect all items and place them back into the box. Concept

More information

Using ranking functions in multiobjective fuzzy linear programming 1

Using ranking functions in multiobjective fuzzy linear programming 1 Fuzzy Sets and Systems 111 (2000) 47 53 www.elsevier.com/locate/fss Using ranking functions in multiobective fuzzy linear programming 1 J.M. Cadenas a;, J.L. Verdegay b a Departamento de Informatica, Inteligencia

More information

2 C. A. Gunter ackground asic Domain Theory. A poset is a set D together with a binary relation v which is reexive, transitive and anti-symmetric. A s

2 C. A. Gunter ackground asic Domain Theory. A poset is a set D together with a binary relation v which is reexive, transitive and anti-symmetric. A s 1 THE LARGEST FIRST-ORDER-AXIOMATIZALE CARTESIAN CLOSED CATEGORY OF DOMAINS 1 June 1986 Carl A. Gunter Cambridge University Computer Laboratory, Cambridge C2 3QG, England Introduction The inspiration for

More information

Electional Astrology by Mary Fortier Shea, M.A. Counseling Psychology

Electional Astrology by Mary Fortier Shea, M.A. Counseling Psychology INTRODUCTION TO ELECTIONAL ASTROLOGY An electional chart tells you the most propitious time to initiate your project with the greatest "finality". Finality is when you do the last possible thing to initiate

More information

Introduction to Metalogic 1

Introduction to Metalogic 1 Philosophy 135 Spring 2012 Tony Martin Introduction to Metalogic 1 1 The semantics of sentential logic. The language L of sentential logic. Symbols of L: (i) sentence letters p 0, p 1, p 2,... (ii) connectives,

More information

CONSTRUCTING ARM MEMORY OFFSPRING M MEMORY PARENT. Fig. 1: Von Neumann's self-reproducing automaton

CONSTRUCTING ARM MEMORY OFFSPRING M MEMORY PARENT. Fig. 1: Von Neumann's self-reproducing automaton Published in: Advances in Articial Life, Proc. 3rd European Conf. on Articial Life, Grenada, Spain, June 4-6, 995, Lecture Notes in Articial Intelligence 929, Springer, Berlin, 995. A New Self-Reproducing

More information