10:00 12:30. Do not open this problem booklet until the start of the examination is announced.

Size: px
Start display at page:

Download "10:00 12:30. Do not open this problem booklet until the start of the examination is announced."

Transcription

1 0 I :00 1:30 (1),. Do not open this problem booklet until the start of the examination is announced. () 4.. Answer the following 4 problems. Use the designated answer sheet for each problem. (3). Do not take the answer sheets and the problem booklet out of the examination room.. Fill the following blank with your examinee s number. No.

2 1 3 3 z 3 O z (0, 0,z 0 ) z 0 3 P 1, P, P 3 (x 1,y 1,z 1 ), (x,y,z ), (x 3,y 3,z 3 ) P1 0, P 0, P 3 0 (x0,y 0,z 0 ) (x 0,y 0 ) (1) P 0 1, P 0, P 0 3 (x0 1,y0 1 ), (x0,y0 ), (x0 3,y0 3 ) () P 0 (x 0,y 0 ) 4P1 0P 0P 3 0 P 0 (3) 3 4P 1 P P 3 4P 1 P P 3 (4) P 0 4P1 0P 0P 3 0 P 0 3 4P 1 P P 3 P P 0 P (5) P P 1 P P P 0 P1 0 P 0 P 4P 1 P P 3 P P 0 4P1 0P 0P 3 0 4P 1 P P 3 O

3 Problem 1 Answer the following questions on the projection of objects in a three dimensional space onto a two dimensional screen. For all triangles in the following, assume that each has three vertices that are not on a line, and that each vertex has a positive z coordinate. Suppose that the projection center (viewpoint) is at the origin O of the three dimensional coordinate system, and the projection plane (screen) is perpendicular to the z-axis and intersects with the z-axis at the coordinates (0, 0,z 0 ), where z 0 is a positive constant. Let P 1, P,andP 3 be the three vertices of a triangle and have the coordinates (x 1,y 1,z 1 ), (x,y,z ), and (x 3,y 3,z 3 ), respectively. The points P 0 1, P 0,andP 0 3 are de ned to be the projections of P 1, P,andP 3, respectively, onto the projection plane. To a projected point (x 0,y 0,z 0 ), coordinates (x 0,y 0 )of the two dimensional projection plane coordinate system are associated. (See the gure.) (1) Calculate the projection plane coordinates P 0 1 (x0 1,y0 1 ), P 0 (x0,y0 ), and P 0 3 (x0 3,y0 3 ). () Assume that a point P 0 (x 0,y 0 ) on the projection plane is given. Find a method to determine whetherornotthepointp 0 lies inside the triangle 4P 0 1 P 0 P 0 3. Assume that if P 0 coincides with one of the vertices or on an edge of the triangle, then it is not regarded as inside the triangle. (3) Calculate a normal vector of the triangle 4P 1 P P 3 in the three dimensional coordinate system, and give an equation of the plane that contains the triangle 4P 1 P P 3. (4) Suppose that the point P 0 on 4P 0 1 P 0 P 0 3 is obtained by projecting a point P on 4P 1P P 3 onto the screen. Write the coordinates of P using the coordinates of P 0. (5) Next assume that P isthemiddlepointofp 1 and P. Derive the condition for P 0,which is the projection of P, being the middle point of P1 0 and P 0, and explain its geometric interpretation. Also derive the condition for P 0 being the center of mass of 4P1 0P 0P 3 0 when P is the center of mass of 4P 1 P P 3. Assume that 4P 1 P P 3 and O are not on a plane. 3

4 N 1 L N L N = {a 1 a n {0, 1} n N, a n N+1 =1} (1) L 3 4 () L 3 8 (3) L N N 4

5 Problem For an integer N 1, consider the following language L N L N = {a 1 a n {0, 1} n N, a n N+1 =1}. Answer the following questions. (1) Construct a nondeterministic nite automaton with 4 states which accepts L 3. () Construct a deterministic nite automaton with 8 states which accepts L 3. (3) Prove that any deterministic nite automaton which accepts L N has at least N states. 5

6 3 n X = {x 1,x,...,x n } k X X N 1: Select(k, X) { : if ( X <N) { 3: return X k ; 4: } 5: X 5 m = d X 5 e X 1,X,...,X m ; 6: /* i<m X i =5 X m 5 */ 7: for (i =1tom) { 8: y i Select(d X i e, X i); 9: } 10: a Select(d m e, {y 1,y,...,y m }); 11: X small X a ; 1: X large X a ; 13: if ( X small = k 1) { 14: return a; 15: } 16: if ( X small k) { 17: return Select(k, X small ); 18: } 19: else { 0: return Select(k X small 1, X large ); 1: } : } (1) 3 () N X X small 3 4 X (3) T (n) T (n) n = X (4) T (n) O(n) 6

7 Problem 3 For a sequence of n di erent integers X = {x 1,x,...,x n }, consider the following algorithm that computes the k-th smallest integer in the sequence. X denotes the number of elements in X. N is a positive constant. 1: Select(k, X) { : if ( X <N) { 3: return the k-th smallest integer in X computed by using a heap; 4: } 5: Divide X into m = d X 5 e sequences of 5 or less integers, and let them be X 1,X,...,X m ; 6: /* We let X i =5fori<m. X m can be smaller than 5. */ 7: for (i =1tom) { 8: y i Select(d X i e, X i); 9: } 10: a Select(d m e, {y 1,y,...,y m }); 11: X small the sequence of the integers in X that are smaller than a; 1: X large the sequence of the integers in X that are larger than a; 13: if ( X small = k 1) { 14: return a; 15: } 16: if ( X small k) { 17: return Select(k, X small ); 18: } 19: else { 0: return Select(k X small 1, X large ); 1: } : } Answer the following questions on the above pseudo code. (1) Describe what a heap mentioned in line 3 is. () Prove that 1 4 X X small 3 4 X after line 11 when the constant N is large enough. (3) Let the worst case computational complexity of the above algorithm be T (n). Show a recurrence equation of T (n). (Note that n = X.) (4) Show that T (n) is O(n). 7

8 4 10 Mbps (1) D- AND OR NOT () 10 Mbps 3 (3) () 8

9 Problem 4 Manchester code is used as an encoding method of data in 10 Mbps Ethernet. As shown in the gure below, data 1 is expressed by a 0 1 transition, and data 0 is expressed by a 1 0 transition. Transitions that signify data are generated with regular time intervals as shown in the arrow marks of the gure. (1) Design a Manchester encoder, using D ip- ops, AND, OR, and NOT gates, whose input data is synchronized with a clock. () Explain at least two reasons to use Manchester code in 10 Mbps Ethernet. The answer should be within three lines. (3) Manchester code requires the network bandwidth twice as wide as the data transfer bandwidth. Discuss a coding method that utilizes the network bandwidth better, without much degrading the advantages of Manchester code answered in question (). 9

10 0 II :30 16:00 (1),. Do not open this problem booklet until the start of the examination is announced. () 4.. Answer the following 4 problems. Use the designated answer sheet for each problem. (3). Do not take the answer sheets and the problem booklet out of the examination room.. Fill the following blank with your examinee s number. No.

11 1 N 4 =exp μ i N 1 N i (z 0,z 1,...,z N 1 ) N (Z 0,Z 1,...,Z N 1 ) Z k = N 1 X j=0 z j jk (k =0, 1,..., N 1) (1) z j 0 Z 0 Z N k =1,,..., N 1 Z k = Z N k z z () z j g j = z j + iz j+1 ³j =0, 1,..., N 1 (g 0,g 1,...,gN 1) N (G 0,G 1,...,GN 1) N X 1 G k = g j ³k jk N =0, 1,..., 1 Z 0 Z N j=0 G 0 ( ) (3) () k = 1,,..., N 4 1 Z k Z N k G k G N k

12 Problem 1 Let N be a positive integer that is a multiple of 4, and μ i =exp N be the primitive Nth root of 1 (i is the imaginary unit). For a sequence of complex numbers (z 0,z 1,...,z N 1 ), its N-point discrete Fourier transform (Z 0,Z 1,...,Z N 1 )isde nedas Z k = N 1 X j=0 Answer the following questions. z j jk (k =0, 1,..., N 1). (1) Assume that all z j are real (that is, their imaginary parts are zeros). Show that Z 0 and Z N are real numbers. Also show that Z k = Z N k for k = 1,,..., N 1. ( z is the complex conjugate of z.) () Assume that all z j are real numbers. Let g j = z j + iz j+1 ³j =0, 1,..., N 1 and (G 0,G 1,...,GN 1) bethe N -point discrete Fourier transform of (g 0,g 1,...,gN 1), that is, Express Z 0 and Z N be used.) G k = N 1 X g j ³k jk =0, 1,..., j=0 N 1. in terms of G 0. (Complex conjugates or the real/imaginary parts may (3) Express Z k and Z N k in terms of G k and G N k for k =1,,..., N 4 assumptions as question (). 1, under the same 3

13 c + E w E w c c E 1 w 1 E w E 1 + E w 1 w + E 1 w 1 E w E 1 E w 1 w E eval(e) w s (w, s) (w 1,s 1 ) (w,s ) (w 1,s 1 ) (w,s ) c v c (cw, s) (w, v c s) v = eval(v 1 + v ) (+w, v v 1 s) (w, vs) v = eval(v 1 v ) ( w, v v 1 s) (w, vs) eval(e) =v E w (w, ²) (², v) ² (1) () (3) 4

14 Problem Consider translating an expression made of integer constants (denoted by c below) and binary operators + and to a string in post x notation as follows, where E w means that expression E is translated to string w. c c E 1 w 1 and E w imply E 1 + E w 1 w + E 1 w 1 and E w imply E 1 E w 1 w Let us write eval(e) for the value resulting from evaluating an expression E by usual integer arithmetics. We then introduce the following rules for rewriting a pair (w, s) ofastringw in post x notation and a sequence (stack) s of values, where (w 1,s 1 ) (w,s ) means that pair (w 1,s 1 ) is rewritten into pair (w,s ). if the value of c is v c then (cw, s) (w, v c s) v = eval(v 1 + v )implies(+w, v v 1 s) (w, vs) v = eval(v 1 v )implies( w, v v 1 s) (w, vs) The transitive closure of is denoted by. We now want to prove a proposition that if eval(e) =v and E w hold, then (w, ²) (², v) holds, where ² denotes an empty sequence or an empty string. Answer the following questions. (1) To prove the proposition, should we use induction on what? () In order for induction to go through, we should generalize the proposition. How should the proposition be generalized? (3) Prove the generalized proposition by induction. 5

15 3 U (0 ) U U =(v 1,v,v 3,v 4,v 5 ) (v 1,v 3,v 4 ) U U i U[i] U U f(u, V ) U = V U, V U X f(u, V )= {dist(u[i],v[i]) c} i=1 dist(v,w) v w c U, V U 0 = V 0 U U 0 V V 0 f(u 0,V 0 ) min(u, V ) Umin 0, V min 0 min(u, V ) = min{f(u 0,V 0 ) U 0 U, V 0 V, U 0 = V 0 } = f(umin,v 0 min) 0 U 0 U U 0 U k = Umin 0 = V min 0 1 ` k U 0 min[`] =U[i`], V 0 min[`] =V [j`] i`, j` min(u, V ) = f (U 0 min[1],u 0 min[],...,u 0 min[k]), (V 0 min[1],v 0 min[],...,v 0 min[k]) = f((u[i 1 ],U[i ],...,U[i k ]), (V [j 1 ],V[j ],...,V[j k ])) i 1 <i < <i k j 1 <j < <j k (1) U, V, c min(u, V ) (i 1,i,...,i k ) (j 1,j,...,j k ) U = ((0, ), (1, ), (, ), (3, ), (3, 3), (4, 3), (4, )) V = ((1, 1), (, 1), (, 0), (3, 0), (3, 1), (4, 1), (5, 1)) c = 1. 1 ` k dist(umin 0 [`],V0 min [`]) c () U i j U[i..j] 1 ` k ` min(u[1..i`],v[1..j`]) = f ((U[i 1 ],U[i ],...,U[i`]), (V [j 1 ],V[j ],...,V[j`])) (3) min(u, V ) 6

16 Problem 3 Let U be a sequence of points in two dimensional space, and let us call subsequence of U a sequence of points that can be constructed from U by removing some (more than or equal to 0) points. For example, (v 1,v 3,v 4 ) is a subsequence of U, whereu =(v 1,v,v 3,v 4,v 5 ). Let U[i] denote the i-th point of the sequence U, andlet U denote the number of points in U. For two point sequences U and V such that U = V, we consider the following function. U X f(u, V )= {dist(u[i],v[i]) c}, i=1 where dist(v, w) denotes the Euclidean distance between v and w, and c is a real positive constant. For given U and V (possibly U 6= V ), let min(u, V ) be the minimum of f(u 0,V 0 )whereu 0 and V 0 are subsequences of U and V, respectively, such that U 0 = V 0.LetU 0 min and V 0 min be the subsequences that give the minimum. That is, min(u, V ) = min{f(u 0,V 0 ) U 0 U, V 0 V, U 0 = V 0 } = f(umin,v 0 min), 0 where U 0 U means that U 0 is a subsequence of U. Let k = U 0 min = V 0 min and determine i` and j` for 1 ` k as U 0 min[`] =U[i`], V 0 min[`] =V [j`]. Thus we have min(u, V ) = f (U 0 min[1],u 0 min[],...,u 0 min[k]), (V 0 min[1],v 0 min[],...,v 0 min[k]) = f((u[i 1 ],U[i ],...,U[i k ]), (V [j 1 ],V[j ],...,V[j k ])). Here assume that i 1 <i < <i k and j 1 <j < <j k. Answer the following questions. (1) Compute min(u, V ), (i 1,i,...,i k ), and (j 1,j,...,j k )when U = ((0, ), (1, ), (, ), (3, ), (3, 3), (4, 3), (4, )), V = ((1, 1), (, 1), (, 0), (3, 0), (3, 1), (4, 1), (5, 1)), c = 1.. Note that dist(umin 0 [`],V0 min [`]) c holds for 1 ` k. () Let U[i..j] denote the subsequence from the i-th point to the j-th point of U. Show that the following equation holds for an arbitrary integer ` such that 1 ` k: min(u[1..i`],v[1..j`]) = f ((U[i 1 ],U[i ],...,U[i`]), (V [j 1 ],V[j ],...,V[j`])). (3) Describe an algorithm for computing min(u, V ) and its computational complexity. 7

17 byte/sec 10 msec Sequence Number Packet Type Data Size data (3 Bytes) (1 Byte) ( Bytes) Packet Type: 1 DATA 0 ACK DATA ACK ACK Sequence Number Sequence Number Sequence Number DATA ACK DATA Sequence Number (modulo 4 )1 (1) () (3) (4) (a) (b) 8

18 Problem 4 We assume that two computers are connected by a network of data-link layer whose packet size is xed as 1000 bytes. We also assume that the bandwidth and the latency of this data-link layer network are 10 6 byte/sec and 10 msec, respectively. No packet ow controlling mechanism is supported, and packet arrival is not guaranteed. The following is an un nished design of a network protocol on top of this data-link layer. Packet Format Sequence Number Packet Type Data Size data (3 Bytes) (1 Byte) ( Bytes) Packet Type: 1 DATA 0 ACK Processing in the receiver When a DATA packet is received, an ACK packet, whose Sequence Number is the same as the received DATA packet, is sent back to the sender. Processing in the sender The initial Sequence Number is randomly chosen. After sending a DATA packet, the sender waits for the ACK packet of the DATA packet, and the sender sends the next DATA packet after the receipt of the ACK packet. The Sequence Number is incremented by 1 (modulo 4 )ateachpacketsending. Answer the following questions. (1) Calculate the maximum throughput when no packet is lost. () Modify the protocol so as to consider packet loss. The protocol may be written in a pseudo code. (3) Modify the protocol so as to utilize the data-link network bandwidth better. (4) Assume that 64 computers are connected with a network of 8 8 mesh topology using the same data-link layer as above. Design a new network protocol based on the above protocol so that all the computers may communicate each other. Explain the new protocol from the following points of view. (a) Packet format. (b) Sending, receiving, and routing on each computer. 9

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each

More information

Automata Theory for Presburger Arithmetic Logic

Automata Theory for Presburger Arithmetic Logic Automata Theory for Presburger Arithmetic Logic References from Introduction to Automata Theory, Languages & Computation and Constraints in Computational Logic Theory & Application Presented by Masood

More information

Solutions. 9. Ans. C. Memory size. 11. Ans. D. a b c d e f a d e b c f a b d c e f a d b c e f a b d e c f a d b e c f. 13. Ans. D. Merge sort n log n

Solutions. 9. Ans. C. Memory size. 11. Ans. D. a b c d e f a d e b c f a b d c e f a d b c e f a b d e c f a d b e c f. 13. Ans. D. Merge sort n log n Solutions. Ans. B. ~ p q ~ r ~ s ~ p q r s ~ ~ p q r s p ~ q r s ~ p q ~ r v ~ s For x only the above compound preposition is true.. Ans. B. Case I First bit is 0 Case II First bit is 6. Ans. A. # has

More information

Computer Networks ( Classroom Practice Booklet Solutions)

Computer Networks ( Classroom Practice Booklet Solutions) Computer Networks ( Classroom Practice Booklet Solutions). Concept Of Layering 0. Ans: (b) Sol: Data Link Layer is responsible for decoding bit stream into frames. 0. Ans: (c) Sol: Network Layer has the

More information

10:00 12:30. Do not open this problem booklet until the start of the examination is announced.

10:00 12:30. Do not open this problem booklet until the start of the examination is announced. 21 I 20 8 26 10:00 12:30 (1),. Do not open this problem booklet until the start of the examination is announced. (2) 4.. Answer the following 4 problems. Use the designated answer sheet for each problem.

More information

CSCE 551 Final Exam, Spring 2004 Answer Key

CSCE 551 Final Exam, Spring 2004 Answer Key CSCE 551 Final Exam, Spring 2004 Answer Key 1. (10 points) Using any method you like (including intuition), give the unique minimal DFA equivalent to the following NFA: 0 1 2 0 5 1 3 4 If your answer is

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer

More information

EECS Components and Design Techniques for Digital Systems. Lec 26 CRCs, LFSRs (and a little power)

EECS Components and Design Techniques for Digital Systems. Lec 26 CRCs, LFSRs (and a little power) EECS 150 - Components and esign Techniques for igital Systems Lec 26 CRCs, LFSRs (and a little power) avid Culler Electrical Engineering and Computer Sciences University of California, Berkeley http://www.eecs.berkeley.edu/~culler

More information

The Design Procedure. Output Equation Determination - Derive output equations from the state table

The Design Procedure. Output Equation Determination - Derive output equations from the state table The Design Procedure Specification Formulation - Obtain a state diagram or state table State Assignment - Assign binary codes to the states Flip-Flop Input Equation Determination - Select flipflop types

More information

University of New Mexico Department of Computer Science. Final Examination. CS 561 Data Structures and Algorithms Fall, 2006

University of New Mexico Department of Computer Science. Final Examination. CS 561 Data Structures and Algorithms Fall, 2006 University of New Mexico Department of Computer Science Final Examination CS 561 Data Structures and Algorithms Fall, 2006 Name: Email: Print your name and email, neatly in the space provided above; print

More information

DO NOT ROUND YOUR ANSWERS

DO NOT ROUND YOUR ANSWERS Directions: Write your answers on the answer sheet. DO NOT detach the answer sheet from your exam. Answers can be given as integers, fractions or in decimal form. The answers which are given in decimal

More information

REVIEW QUESTIONS. Chapter 1: Foundations: Sets, Logic, and Algorithms

REVIEW QUESTIONS. Chapter 1: Foundations: Sets, Logic, and Algorithms REVIEW QUESTIONS Chapter 1: Foundations: Sets, Logic, and Algorithms 1. Why can t a Venn diagram be used to prove a statement about sets? 2. Suppose S is a set with n elements. Explain why the power set

More information

Lecturecise 22 Weak monadic second-order theory of one successor (WS1S)

Lecturecise 22 Weak monadic second-order theory of one successor (WS1S) Lecturecise 22 Weak monadic second-order theory of one successor (WS1S) 2013 Reachability in the Heap Many programs manipulate linked data structures (lists, trees). To express many important properties

More information

2015 School Year. Graduate School Entrance Examination Problem Booklet. Mathematics

2015 School Year. Graduate School Entrance Examination Problem Booklet. Mathematics 2015 School Year Graduate School Entrance Examination Problem Booklet Mathematics Examination Time: 10:00 to 12:30 Instructions 1. Do not open this problem booklet until the start of the examination is

More information

Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra

Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra Course 311: Michaelmas Term 2005 Part III: Topics in Commutative Algebra D. R. Wilkins Contents 3 Topics in Commutative Algebra 2 3.1 Rings and Fields......................... 2 3.2 Ideals...............................

More information

Introduction to Kleene Algebras

Introduction to Kleene Algebras Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)

More information

3.3 Accumulation Sequences

3.3 Accumulation Sequences 3.3. ACCUMULATION SEQUENCES 25 3.3 Accumulation Sequences Overview. One of the most important mathematical ideas in calculus is that of an accumulation of change for physical quantities. As we have been

More information

Proving languages to be nonregular

Proving languages to be nonregular Proving languages to be nonregular We already know that there exist languages A Σ that are nonregular, for any choice of an alphabet Σ. This is because there are uncountably many languages in total and

More information

Discrete Structures Lecture Solving Congruences. mathematician of the eighteenth century). Also, the equation gggggg(aa, bb) =

Discrete Structures Lecture Solving Congruences. mathematician of the eighteenth century). Also, the equation gggggg(aa, bb) = First Introduction Our goal is to solve equations having the form aaaa bb (mmmmmm mm). However, first we must discuss the last part of the previous section titled gcds as Linear Combinations THEOREM 6

More information

Codingrotations on intervals

Codingrotations on intervals Theoretical Computer Science 28 (22) 99 7 www.elsevier.com/locate/tcs Codingrotations on intervals Jean Berstel a, Laurent Vuillon b; a Institut Gaspard Monge (IGM), Universite de Marne-la-Vallee, 5, boulevard

More information

Department of Systems Innovation, School of Engineering, The University of Tokyo 2011 Entrance Examination and Answer Sheets.

Department of Systems Innovation, School of Engineering, The University of Tokyo 2011 Entrance Examination and Answer Sheets. Examinee s No. Department of Systems Innovation, School of Engineering, The University of Tokyo 2011 Entrance Examination and Answer Sheets Mathematics Monday, August 30, 2010 13:00-15:30 Notice 1. Do

More information

Computability and Complexity

Computability and Complexity Computability and Complexity Non-determinism, Regular Expressions CAS 705 Ryszard Janicki Department of Computing and Software McMaster University Hamilton, Ontario, Canada janicki@mcmaster.ca Ryszard

More information

3130CIT Theory of Computation

3130CIT Theory of Computation GRIFFITH UNIVERSITY School of Computing and Information Technology 3130CIT Theory of Computation Final Examination, Semester 2, 2006 Details Total marks: 120 (40% of the total marks for this subject) Perusal:

More information

International Mathematics TOURNAMENT OF THE TOWNS

International Mathematics TOURNAMENT OF THE TOWNS International Mathematics TOURNAMENT OF THE TOWNS Senior A-Level Paper Fall 2010 1 1 There are 100 points on the plane All 4950 pairwise distances between two points have been recorded (a) A single record

More information

Review Sheet for the Final Exam of MATH Fall 2009

Review Sheet for the Final Exam of MATH Fall 2009 Review Sheet for the Final Exam of MATH 1600 - Fall 2009 All of Chapter 1. 1. Sets and Proofs Elements and subsets of a set. The notion of implication and the way you can use it to build a proof. Logical

More information

Three-Dimensional Coordinate Systems. Three-Dimensional Coordinate Systems. Three-Dimensional Coordinate Systems. Three-Dimensional Coordinate Systems

Three-Dimensional Coordinate Systems. Three-Dimensional Coordinate Systems. Three-Dimensional Coordinate Systems. Three-Dimensional Coordinate Systems To locate a point in a plane, two numbers are necessary. We know that any point in the plane can be represented as an ordered pair (a, b) of real numbers, where a is the x-coordinate and b is the y-coordinate.

More information

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 06: Synchronization Version: November 16, 2009 2 / 39 Contents Chapter

More information

2.1 Sets. Definition 1 A set is an unordered collection of objects. Important sets: N, Z, Z +, Q, R.

2.1 Sets. Definition 1 A set is an unordered collection of objects. Important sets: N, Z, Z +, Q, R. 2. Basic Structures 2.1 Sets Definition 1 A set is an unordered collection of objects. Important sets: N, Z, Z +, Q, R. Definition 2 Objects in a set are called elements or members of the set. A set is

More information

Outline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world.

Outline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world. Outline EECS 150 - Components and esign Techniques for igital Systems Lec 18 Error Coding Errors and error models Parity and Hamming Codes (SECE) Errors in Communications LFSRs Cyclic Redundancy Check

More information

Recursion and Induction

Recursion and Induction Recursion and Induction Themes Recursion Recurrence Definitions Recursive Relations Induction (prove properties of recursive programs and objects defined recursively) Examples Tower of Hanoi Gray Codes

More information

Analysis on Graphs. Alexander Grigoryan Lecture Notes. University of Bielefeld, WS 2011/12

Analysis on Graphs. Alexander Grigoryan Lecture Notes. University of Bielefeld, WS 2011/12 Analysis on Graphs Alexander Grigoryan Lecture Notes University of Bielefeld, WS 0/ Contents The Laplace operator on graphs 5. The notion of a graph............................. 5. Cayley graphs..................................

More information

B Elements of Complex Analysis

B Elements of Complex Analysis Fourier Transform Methods in Finance By Umberto Cherubini Giovanni Della Lunga Sabrina Mulinacci Pietro Rossi Copyright 21 John Wiley & Sons Ltd B Elements of Complex Analysis B.1 COMPLEX NUMBERS The purpose

More information

Propositional Logic. What is discrete math? Tautology, equivalence, and inference. Applications

Propositional Logic. What is discrete math? Tautology, equivalence, and inference. Applications What is discrete math? Propositional Logic The real numbers are continuous in the senses that: between any two real numbers there is a real number The integers do not share this property. In this sense

More information

UNIT-II. NONDETERMINISTIC FINITE AUTOMATA WITH ε TRANSITIONS: SIGNIFICANCE. Use of ε-transitions. s t a r t. ε r. e g u l a r

UNIT-II. NONDETERMINISTIC FINITE AUTOMATA WITH ε TRANSITIONS: SIGNIFICANCE. Use of ε-transitions. s t a r t. ε r. e g u l a r Syllabus R9 Regulation UNIT-II NONDETERMINISTIC FINITE AUTOMATA WITH ε TRANSITIONS: In the automata theory, a nondeterministic finite automaton (NFA) or nondeterministic finite state machine is a finite

More information

Final exam study sheet for CS3719 Turing machines and decidability.

Final exam study sheet for CS3719 Turing machines and decidability. Final exam study sheet for CS3719 Turing machines and decidability. A Turing machine is a finite automaton with an infinite memory (tape). Formally, a Turing machine is a 6-tuple M = (Q, Σ, Γ, δ, q 0,

More information

Real Analysis - Notes and After Notes Fall 2008

Real Analysis - Notes and After Notes Fall 2008 Real Analysis - Notes and After Notes Fall 2008 October 29, 2008 1 Introduction into proof August 20, 2008 First we will go through some simple proofs to learn how one writes a rigorous proof. Let start

More information

MATH 215 Sets (S) Definition 1 A set is a collection of objects. The objects in a set X are called elements of X.

MATH 215 Sets (S) Definition 1 A set is a collection of objects. The objects in a set X are called elements of X. MATH 215 Sets (S) Definition 1 A set is a collection of objects. The objects in a set X are called elements of X. Notation 2 A set can be described using set-builder notation. That is, a set can be described

More information

Decidability of Existence and Construction of a Complement of a given function

Decidability of Existence and Construction of a Complement of a given function Decidability of Existence and Construction of a Complement of a given function Ka.Shrinivaasan, Chennai Mathematical Institute (CMI) (shrinivas@cmi.ac.in) April 28, 2011 Abstract This article denes a complement

More information

Putnam Solutions, 2007

Putnam Solutions, 2007 Putnam Solutions, 7 These solutions are based on discussions among our contestants (and our friends from Carlton College) Saturday afternoon and evening, with revisions as various errors were caught by

More information

Computability Theory. CS215, Lecture 6,

Computability Theory. CS215, Lecture 6, Computability Theory CS215, Lecture 6, 2000 1 The Birth of Turing Machines At the end of the 19th century, Gottlob Frege conjectured that mathematics could be built from fundamental logic In 1900 David

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Cyclic Historical Redundancy Development Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify

More information

Johns Hopkins Math Tournament Proof Round: Automata

Johns Hopkins Math Tournament Proof Round: Automata Johns Hopkins Math Tournament 2018 Proof Round: Automata February 9, 2019 Problem Points Score 1 10 2 5 3 10 4 20 5 20 6 15 7 20 Total 100 Instructions The exam is worth 100 points; each part s point value

More information

arxiv: v1 [cs.dc] 22 Oct 2018

arxiv: v1 [cs.dc] 22 Oct 2018 FANTOM: A SCALABLE FRAMEWORK FOR ASYNCHRONOUS DISTRIBUTED SYSTEMS A PREPRINT Sang-Min Choi, Jiho Park, Quan Nguyen, and Andre Cronje arxiv:1810.10360v1 [cs.dc] 22 Oct 2018 FANTOM Lab FANTOM Foundation

More information

On the static assignment to parallel servers

On the static assignment to parallel servers On the static assignment to parallel servers Ger Koole Vrije Universiteit Faculty of Mathematics and Computer Science De Boelelaan 1081a, 1081 HV Amsterdam The Netherlands Email: koole@cs.vu.nl, Url: www.cs.vu.nl/

More information

1 Reed Solomon Decoder Final Project. Group 3 Abhinav Agarwal S Branavan Grant Elliott. 14 th May 2007

1 Reed Solomon Decoder Final Project. Group 3 Abhinav Agarwal S Branavan Grant Elliott. 14 th May 2007 1 Reed Solomon Decoder 6.375 Final Project Group 3 Abhinav Agarwal S Branavan Grant Elliott 14 th May 2007 2 Outline Error Correcting Codes Mathematical Foundation of Reed Solomon Codes Decoder Architecture

More information

CS Pushdown Automata

CS Pushdown Automata Chap. 6 Pushdown Automata 6.1 Definition of Pushdown Automata Example 6.2 L ww R = {ww R w (0+1) * } Palindromes over {0, 1}. A cfg P 0 1 0P0 1P1. Consider a FA with a stack(= a Pushdown automaton; PDA).

More information

CERNY CONJECTURE FOR DFA ACCEPTING STAR-FREE LANGUAGES

CERNY CONJECTURE FOR DFA ACCEPTING STAR-FREE LANGUAGES CERNY CONJECTURE FOR DFA ACCEPTING STAR-FREE LANGUAGES A.N. Trahtman? Bar-Ilan University, Dep. of Math. and St., 52900, Ramat Gan, Israel ICALP, Workshop synchr. autom., Turku, Finland, 2004 Abstract.

More information

Math Day at the Beach 2016

Math Day at the Beach 2016 Multiple Choice Write your name and school and mark your answers on the answer sheet. You have 30 minutes to work on these problems. No calculator is allowed. 1. What is the median of the following five

More information

Christmas Calculated Colouring - C1

Christmas Calculated Colouring - C1 Christmas Calculated Colouring - C Tom Bennison December 20, 205 Introduction Each question identifies a region or regions on the picture Work out the answer and use the key to work out which colour to

More information

T (s, xa) = T (T (s, x), a). The language recognized by M, denoted L(M), is the set of strings accepted by M. That is,

T (s, xa) = T (T (s, x), a). The language recognized by M, denoted L(M), is the set of strings accepted by M. That is, Recall A deterministic finite automaton is a five-tuple where S is a finite set of states, M = (S, Σ, T, s 0, F ) Σ is an alphabet the input alphabet, T : S Σ S is the transition function, s 0 S is the

More information

Algebra. Formal fallacies (recap). Example of base rate fallacy: Monty Hall Problem.

Algebra. Formal fallacies (recap). Example of base rate fallacy: Monty Hall Problem. October 15, 2017 Algebra. Formal fallacies (recap). Example of base rate fallacy: Monty Hall Problem. A formal fallacy is an error in logic that can be seen in the argument's form. All formal fallacies

More information

On the answer-booklet, write your Registration Number, Test Code and Number of this booklet in appropriate places. ATTENTION!

On the answer-booklet, write your Registration Number, Test Code and Number of this booklet in appropriate places. ATTENTION! 2017 BOOKLET NO. Afternoon Test Code: CSB Time: 2 hours On the answer-booklet, write your Registration Number, Test Code and Number of this booklet in appropriate places. ATTENTION! Read the following

More information

AMTH140 Trimester Question 1. [8 marks] Answer

AMTH140 Trimester Question 1. [8 marks] Answer Question 1 Let A B = {(1, 1), (2, 2), (3, 1), (3, 2), (1, 2), (1, 4), (2, 1), (2, 4), (3, 4)}. Find the power set of B, P(B). The set B = {1, 2, 4}. Then P(B) = {, {1}, {2}, {4}, {1, 2}, {1, 4}, {2, 4},

More information

Pseudo-Random Number Generators

Pseudo-Random Number Generators Unit 41 April 18, 2011 1 Pseudo-Random Number Generators Recall the one-time pad: k = k 1, k 2, k 3... a random bit-string p = p 1, p 2, p 3,... plaintext bits E(p) = p k. We desire long sequences of numbers

More information

MATH 433 Applied Algebra Lecture 22: Semigroups. Rings.

MATH 433 Applied Algebra Lecture 22: Semigroups. Rings. MATH 433 Applied Algebra Lecture 22: Semigroups. Rings. Groups Definition. A group is a set G, together with a binary operation, that satisfies the following axioms: (G1: closure) for all elements g and

More information

DO NOT OPEN THIS TEST BOOKLET UNTIL YOU ARE ASKED TO DO SO

DO NOT OPEN THIS TEST BOOKLET UNTIL YOU ARE ASKED TO DO SO DO NOT OPEN THIS TEST BOOKLET UNTIL YOU ARE ASKED TO DO SO T.B.C. : P-AQNA-L-ZNGU Serial No.- TEST BOOKLET MATHEMATICS Test Booklet Series Time Allowed : Two Hours and Thirty Minutes Maximum Marks : 00

More information

Group Homomorphisms and Isomorphisms

Group Homomorphisms and Isomorphisms CHAPTER 4 Group Homomorphisms and Isomorphisms c WWLChen199119932013. This chapter is available free to all individuals on the understanding that it is not to be used for financial gain and may be downloaded

More information

CS 455/555: Finite automata

CS 455/555: Finite automata CS 455/555: Finite automata Stefan D. Bruda Winter 2019 AUTOMATA (FINITE OR NOT) Generally any automaton Has a finite-state control Scans the input one symbol at a time Takes an action based on the currently

More information

Program Analysis. Lecture 5. Rayna Dimitrova WS 2016/2017

Program Analysis. Lecture 5. Rayna Dimitrova WS 2016/2017 Program Analysis Lecture 5 Rayna Dimitrova WS 2016/2017 2/21 Recap: Constant propagation analysis Goal: For each program point, determine whether a variale has a constant value whenever an execution reaches

More information

3.1 Basic properties of real numbers - continuation Inmum and supremum of a set of real numbers

3.1 Basic properties of real numbers - continuation Inmum and supremum of a set of real numbers Chapter 3 Real numbers The notion of real number was introduced in section 1.3 where the axiomatic denition of the set of all real numbers was done and some basic properties of the set of all real numbers

More information

Reference Material /Formulas for Pre-Calculus CP/ H Summer Packet

Reference Material /Formulas for Pre-Calculus CP/ H Summer Packet Reference Material /Formulas for Pre-Calculus CP/ H Summer Packet Week # 1 Order of Operations Step 1 Evaluate expressions inside grouping symbols. Order of Step 2 Evaluate all powers. Operations Step

More information

Theory Bridge Exam Example Questions

Theory Bridge Exam Example Questions Theory Bridge Exam Example Questions Annotated version with some (sometimes rather sketchy) answers and notes. This is a collection of sample theory bridge exam questions. This is just to get some idea

More information

Closure Properties of Regular Languages. Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism

Closure Properties of Regular Languages. Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism Closure Properties of Regular Languages Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism Closure Properties Recall a closure property is a statement

More information

Some hierarchies for the communication complexity measures of cooperating grammar systems

Some hierarchies for the communication complexity measures of cooperating grammar systems Some hierarchies for the communication complexity measures of cooperating grammar systems Juraj Hromkovic 1, Jarkko Kari 2, Lila Kari 2 June 14, 2010 Abstract We investigate here the descriptional and

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 6 (version April 7, 28) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.2. Tel: (2)

More information

CS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs

CS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs CS 42 Lecture 3 Automating lexical analysis 29 August 2 Lecturer: Andrew Myers A lexer generator converts a lexical specification consisting of a list of regular expressions and corresponding actions into

More information

Pushdown timed automata:a binary reachability characterization and safety verication

Pushdown timed automata:a binary reachability characterization and safety verication Theoretical Computer Science 302 (2003) 93 121 www.elsevier.com/locate/tcs Pushdown timed automata:a binary reachability characterization and safety verication Zhe Dang School of Electrical Engineering

More information

CHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science

CHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science CHENNAI MATHEMATICAL INSTITUTE M.Sc. / Ph.D. Programme in Computer Science Entrance Examination, 8 May 0 Instructions Enter your Admit Card Number: C This examination has two parts Part A and Part B. The

More information

A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties:

A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: Byte multiplication 1 Field arithmetic A field F is a set of numbers that includes the two numbers 0 and 1 and satisfies the properties: F is an abelian group under addition, meaning - F is closed under

More information

Study Guide for Math 095

Study Guide for Math 095 Study Guide for Math 095 David G. Radcliffe November 7, 1994 1 The Real Number System Writing a fraction in lowest terms. 1. Find the largest number that will divide into both the numerator and the denominator.

More information

Recursion and Induction

Recursion and Induction Recursion and Induction Themes Recursion Recursive Definitions Recurrence Relations Induction (prove properties of recursive programs and objects defined recursively) Examples Tower of Hanoi Gray Codes

More information

WiFi MAC Models David Malone

WiFi MAC Models David Malone WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,

More information

Uses of finite automata

Uses of finite automata Chapter 2 :Finite Automata 2.1 Finite Automata Automata are computational devices to solve language recognition problems. Language recognition problem is to determine whether a word belongs to a language.

More information

Decision, Computation and Language

Decision, Computation and Language Decision, Computation and Language Non-Deterministic Finite Automata (NFA) Dr. Muhammad S Khan (mskhan@liv.ac.uk) Ashton Building, Room G22 http://www.csc.liv.ac.uk/~khan/comp218 Finite State Automata

More information

NORTHERN INDIA ENGINEERING COLLEGE, LKO D E P A R T M E N T O F M A T H E M A T I C S. B.TECH IIIrd SEMESTER QUESTION BANK ACADEMIC SESSION

NORTHERN INDIA ENGINEERING COLLEGE, LKO D E P A R T M E N T O F M A T H E M A T I C S. B.TECH IIIrd SEMESTER QUESTION BANK ACADEMIC SESSION NORTHERN INDIA ENGINEERING COLLEGE, LKO D E P A R T M E N T O F M A T H E M A T I C S B.TECH IIIrd SEMESTER QUESTION BANK ACADEMIC SESSION 011-1 DISCRETE MATHEMATICS (EOE 038) 1. UNIT I (SET, RELATION,

More information

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography

Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography Course 2BA1: Trinity 2006 Section 9: Introduction to Number Theory and Cryptography David R. Wilkins Copyright c David R. Wilkins 2006 Contents 9 Introduction to Number Theory and Cryptography 1 9.1 Subgroups

More information

A Uniformization Theorem for Nested Word to Word Transductions

A Uniformization Theorem for Nested Word to Word Transductions A Uniformization Theorem for Nested Word to Word Transductions Dmitry Chistikov and Rupak Majumdar Max Planck Institute for Software Systems (MPI-SWS) Kaiserslautern and Saarbrücken, Germany {dch,rupak}@mpi-sws.org

More information

CPSC 421: Tutorial #1

CPSC 421: Tutorial #1 CPSC 421: Tutorial #1 October 14, 2016 Set Theory. 1. Let A be an arbitrary set, and let B = {x A : x / x}. That is, B contains all sets in A that do not contain themselves: For all y, ( ) y B if and only

More information

Recursion and Induction

Recursion and Induction Recursion and Induction Themes Recursion Recursive Definitions Recurrence Relations Induction (prove properties of recursive programs and objects defined recursively) Examples Tower of Hanoi Gray Codes

More information

Communicating and Mobile Systems

Communicating and Mobile Systems Communicating and Mobile Systems Overview:! Programming Model! Interactive Behavior! Labeled Transition System! Bisimulation! The π-calculus! Data Structures and λ-calculus encoding in the π-calculus References:!

More information

NOTES ON AUTOMATA. Date: April 29,

NOTES ON AUTOMATA. Date: April 29, NOTES ON AUTOMATA 1. Monoids acting on sets We say that a monoid S with identity element ɛ acts on a set Q if q(st) = (qs)t and qɛ = q. As with groups, if we set s = t whenever qs = qt for all q Q, then

More information

3 Scalar Product. 3.0 The Dot Product. ~v ~w := v 1 w 1 + v 2 w v n w n.

3 Scalar Product. 3.0 The Dot Product. ~v ~w := v 1 w 1 + v 2 w v n w n. 3 Scalar Product Copyright 2017, Gregory G. Smith 28 September 2017 Although vector products on R n are rare, every coordinate space R n is equipped with a binary operation that sends two vectors to a

More information

On Stateless Multicounter Machines

On Stateless Multicounter Machines On Stateless Multicounter Machines Ömer Eğecioğlu and Oscar H. Ibarra Department of Computer Science University of California, Santa Barbara, CA 93106, USA Email: {omer, ibarra}@cs.ucsb.edu Abstract. We

More information

Group, Rings, and Fields Rahul Pandharipande. I. Sets Let S be a set. The Cartesian product S S is the set of ordered pairs of elements of S,

Group, Rings, and Fields Rahul Pandharipande. I. Sets Let S be a set. The Cartesian product S S is the set of ordered pairs of elements of S, Group, Rings, and Fields Rahul Pandharipande I. Sets Let S be a set. The Cartesian product S S is the set of ordered pairs of elements of S, A binary operation φ is a function, S S = {(x, y) x, y S}. φ

More information

Part I: Definitions and Properties

Part I: Definitions and Properties Turing Machines Part I: Definitions and Properties Finite State Automata Deterministic Automata (DFSA) M = {Q, Σ, δ, q 0, F} -- Σ = Symbols -- Q = States -- q 0 = Initial State -- F = Accepting States

More information

Finite Universes. L is a fixed-length language if it has length n for some

Finite Universes. L is a fixed-length language if it has length n for some Finite Universes Finite Universes When the universe is finite (e.g., the interval 0, 2 1 ), all objects can be encoded by words of the same length. A language L has length n 0 if L =, or every word of

More information

Complex numbers. Learning objectives

Complex numbers. Learning objectives CHAPTER Complex numbers Learning objectives After studying this chapter, you should be able to: understand what is meant by a complex number find complex roots of quadratic equations understand the term

More information

13 th Annual Harvard-MIT Mathematics Tournament Saturday 20 February 2010

13 th Annual Harvard-MIT Mathematics Tournament Saturday 20 February 2010 13 th Annual Harvard-MIT Mathematics Tournament Saturday 0 February 010 1. [3] Suppose that x and y are positive reals such that Find x. x y = 3, x + y = 13. 3+ Answer: 17 Squaring both sides of x y =

More information

THEORY OF COMPUTATION

THEORY OF COMPUTATION THEORY OF COMPUTATION There are four sorts of men: He who knows not and knows not he knows not: he is a fool - shun him; He who knows not and knows he knows not: he is simple teach him; He who knows and

More information

DISCRETE MATHEMATICS W W L CHEN

DISCRETE MATHEMATICS W W L CHEN DISCRETE MATHEMATICS W W L CHEN c W W L Chen, 1991, 2008. This chapter is available free to all individuals, on the understanding that it is not to be used for financial gain, and may be downloaded and/or

More information

Course 311: Abstract Algebra Academic year

Course 311: Abstract Algebra Academic year Course 311: Abstract Algebra Academic year 2007-08 D. R. Wilkins Copyright c David R. Wilkins 1997 2007 Contents 1 Topics in Group Theory 1 1.1 Groups............................... 1 1.2 Examples of Groups.......................

More information

Final Exam (Version B) December 16, 2014 Name: NetID: Section: 1 2 3

Final Exam (Version B) December 16, 2014 Name: NetID: Section: 1 2 3 CS 374 : Algorithms and Models of Computation, Fall 2014 Final Exam (Version B) December 16, 2014 Name: NetID: Section: 1 2 3 # 1 2 3 4 5 6 Total Score Max 20 10 10 10 10 10 70 Grader Don t panic! Please

More information

Theory of Computation

Theory of Computation Fall 2002 (YEN) Theory of Computation Midterm Exam. Name:... I.D.#:... 1. (30 pts) True or false (mark O for true ; X for false ). (Score=Max{0, Right- 1 2 Wrong}.) (1) X... If L 1 is regular and L 2 L

More information

0 Sets and Induction. Sets

0 Sets and Induction. Sets 0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set

More information

Büchi Automata and their closure properties. - Ajith S and Ankit Kumar

Büchi Automata and their closure properties. - Ajith S and Ankit Kumar Büchi Automata and their closure properties - Ajith S and Ankit Kumar Motivation Conventional programs accept input, compute, output result, then terminate Reactive program : not expected to terminate

More information

Bounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol.

Bounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol. Bounding the End-to-End Response imes of asks in a Distributed Real-ime System Using the Direct Synchronization Protocol Jun Sun Jane Liu Abstract In a distributed real-time system, a task may consist

More information

CSE 105 THEORY OF COMPUTATION

CSE 105 THEORY OF COMPUTATION CSE 105 THEORY OF COMPUTATION Spring 2016 http://cseweb.ucsd.edu/classes/sp16/cse105-ab/ Today's learning goals Sipser Ch 3.3, 4.1 State and use the Church-Turing thesis. Give examples of decidable problems.

More information

MATH 665: TROPICAL BRILL-NOETHER THEORY

MATH 665: TROPICAL BRILL-NOETHER THEORY MATH 665: TROPICAL BRILL-NOETHER THEORY 2. Reduced divisors The main topic for today is the theory of v-reduced divisors, which are canonical representatives of divisor classes on graphs, depending only

More information

IS 709/809: Computational Methods in IS Research Fall Exam Review

IS 709/809: Computational Methods in IS Research Fall Exam Review IS 709/809: Computational Methods in IS Research Fall 2017 Exam Review Nirmalya Roy Department of Information Systems University of Maryland Baltimore County www.umbc.edu Exam When: Tuesday (11/28) 7:10pm

More information

MTH 362: Advanced Engineering Mathematics

MTH 362: Advanced Engineering Mathematics MTH 362: Advanced Engineering Mathematics Lecture 1 Jonathan A. Chávez Casillas 1 1 University of Rhode Island Department of Mathematics September 7, 2017 Course Name and number: MTH 362: Advanced Engineering

More information