81 |
Randomized distributed computing on ringsHigham, Lisa January 1988 (has links)
The communication complexity of fundamental problems in distributed computing on an asynchronous ring are examined from both the algorithmic and lower bound perspective.
A detailed study is made of the effect on complexity of a number of assumptions about the algorithms. Randomization is shown to influence both the computability and complexity of several problems. Communication complexity is also shown to exhibit varying degrees of sensitivity to additional parameters including admissibility of error, kind of error, knowledge of ring size, termination requirements, and the existence of identifiers.
A unified collection of formal models of distributed computation on asynchronous rings is developed which captures the essential characteristics of a spectrum of distributed algorithms those that are error free (deterministic, Las Vegas, and nondeterministic), and those that err with small probability (Monte Carlo and nondeterministic/probabilistic). The nondeterministic and nondeterministic/probabilistic models are introduced as natural generalizations of the Las Vegas and Monte Carlo models respectively, and prove useful in deriving lower bounds. The unification helps to clarify the essential differences between the progressively more general notions of a distributed algorithm. In addition, the models reveal the sensitivity of various problems to the parameters listed above.
Complexity bounds derived using these models typically vary depending on the type of algorithm being investigated. The lower bounds are complemented by algorithms with matching complexity while frequently the lower bounds hold on even more powerful models than those required by the algorithms.
Among the algorithms and lower bounds presented are two specific results which stand out because of their relative significance.
1. If g is any nonconstant cyclic function of n variables, then any nondeterministic algorithm for computing g on an anonymous ring of size n has complexity [Formula Omitted] bits of communication; and, there is a is nonconstant cyclic boolean function [Formula Omitted], such that [Formula Omitted] can be computed by a Las Vegas algorithm in [Formula Omitted] expected bits of communication on a ring of size n.
2. The expected complexity of computing AND (and a number of other natural functions)
on a ring of fixed size n in the Monte Carlo model is [Formula Omitted] messages and bits where [Formula Omitted] is the allowable probability of error. / Science, Faculty of / Computer Science, Department of / Graduate
|
82 |
BINTEST: Binary Search-based Test Case GenerationBeydeda, Sami, Gruhn, Volker 08 November 2018 (has links)
One of the important tasks during software testing is the generation of test cases. Various approaches have been proposed to automate this task. The approaches available, however, often have problems limiting their use. A problem of dynamic test case generation approaches, for instance, is that a large number of iterations can be necessary to obtain test cases. This article proposes a novel algorithm for
path-oriented test case generation based on binary search and describes a possible implementation.
|
83 |
A graphics-oriented operating system for a small computer /Campbell, Kenneth Craig January 1974 (has links)
No description available.
|
84 |
Bandwidth minimization, reducibility decomposition, and triangularization of sparse matrices /Wang, Paul Tiing January 1973 (has links)
No description available.
|
85 |
Program inference from example computations represented by memory snapshot traces /Petry, Fredrick Eugene January 1974 (has links)
No description available.
|
86 |
Descriptive static statistics of COBOL programs and comparison to COBOL textbooks /Franz, Melvin Alfred January 1977 (has links)
No description available.
|
87 |
An algorithm development program using Warnier-style bracesCampbell, Joseph Kent January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
|
88 |
Defensive ProgrammingBailey, L. Mark 05 1900 (has links)
This research explores the concepts of defensive programming as currently defined in the literature. Then these concepts are extended and more explicitly defined. The relationship between defensive programming, as presented in this research, and current programming practices is discussed and several benefits are observed. Defensive programming appears to benefit the entire software life cycle. Four identifiable phases of the software development process are defined, and the relationship between these four phases and defensive programming is shown. In this research, defensive programming is defined as writing programs in such a way that during execution the program itself produces communication allowing the programmer and the user to observe its dynamic states accurately and critically. To accomplish this end, the use of defensive programming snap shots is presented as a software development tool.
|
89 |
Predicting programming aptitude using intellectual development measuresBarker, Ricky Joe January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
|
90 |
A requirements specification software cost estimation toolSchneider, Gary David January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries / Department: Computer Science.
|
Page generated in 0.0276 seconds