close this section of the libraryftp://ftp.cs.ust.hk (1390)
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp101/outline.ps, 19940302
COMP 101 Computing Fundamentals Spring, 1994 Instructors: Dr.Scott Deerwester Section: L1 Room: 3559 Telephone: 6985 Email: scott@cs.ust.hk Of ce hours: Monday,14:30 15:30 and by email appointment Research area: Information retrievaland analysis Personal interests: Weight lifting, music Dr.AlexKean
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/93/tr93-9.ps.gz, 19940306
Aligning Parallel English-Chinese Texts Statistically with Lexical Criteria Dekai Wu Technical Report HKUST-CS93-9 August 1993 Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong dekai@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/93/tr93-11.ps.gz, 19940306
Complex, Complex Enough, Too Complex A Comparison of Dynamical Neural Models Michael Stiber , Jos e P. Segundo , Eric Altshuler , and Nikola Jurisic Technical Report HKUST-CS93-11 October 1993 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon,
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/93/tr93-12.ps.gz, 19940306
Theoretical Analysis of Constructive Neural Networks Tin-Yau Kwok & Dit-Yan Yeung Technical Report HKUST-CS93-12 November 1993 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-1.ps.gz, 19940306
Visual Language for Behavioral Specifications of Reactive Systems Lewis H. Chau Gary K. Chan lewis@cs.ust.hk csckk@cs.ust.hk Department of Computer Science Hong Kong University of Science & Technology Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/93/tr93-7.ps.gz, 19940306
Learning In Neural Models With Complex Dynamicsz Michael Stiber and Jos e P. Segundoy Technical Report HKUST-CS93-7 April 1993 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yDepartment of Anatomy and Cell Biology and Brain Research
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-3.ps.gz, 19940306
A Computational Theory of Decision Networks Nevin Lianwen Zhang Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong February 17, 1994
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/93/tr93-5.ps.gz, 19940306
Arnol d Map Synthesis for Periodically Forced Oscillators z Michael Stiber and W. J. Karplusy Technical Report HKUST-CS93-5 March 1993 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yComputer Science Department University of
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/93/tr93-4.ps.gz, 19940306
A Formal Characterization of A Domain Independent Abductive Reasoning Systemy Alex Kean Technical Report HKUST-CS93-4 November 17, 1993 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yThis report is a revised version of the author's
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/93/tr93-2.ps.gz, 19940306
Asynchronous Consistency Restoration under Epsilon Serializability Pamela Drew1 Dept. of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong email: pam@cs.ust.hk Calton Pu Dept. of Computer Science and Engineering Oregon Graduate Institute 19600 N.W. von
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/93/tr93-15.ps.gz, 19940306
Developing a Dynamic Mechanism for Conceptual Clustering in an OODBMS Qing Li and Man Sheung Yuen, Michelle Technical Report HKUST-CS93-15 December 1993 Department of Computer Science Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/93/tr93-8.ps.gz, 19940306
Biological Computation: Neurons, Networks, and Nonlinear Dynamics Michael Stiber , Jos e P. Segundo, Taishin Nomura, Shunsuke Sato, Shinji Doi, and Jean-Fran cois Vibert Technical Report HKUST-CS93-X August 1993 Department of Computer Science The Hong Kong University of Science and Technology Clear
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-5.ps.gz, 19940309
Han Character Font Sharing Across Incompatible Bitmap File Formats Man-Chi Pong 1 & Fung Fung Lee 2 & Ricky Yeung 3 & Yongguang Zhang 4 Technical Report HKUST-CS94-5 March 1994 1 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-4.ps.gz, 19940309
The Management of Interdependent Asynchronous Transactions in Heterogeneous Database Environments Lyman Do and Pamela Drew1 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong email: flyman, pamg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-6.ps.gz, 19940310
Transient Responses in Dynamical Neural Models Michael Stiber and Jos e P. Segundo Technical Report HKUST-CS94-6 March 1994 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Department of Anatomy and Cell Biology and Brain Research
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-7.ps.gz, 19940311
A Corrigendum for the Optimized-IPIA by ALEX KEAN and GEORGE TSIKNIS Technical Report TR94-7 A Corrigendum for the Optimized-IPIA ALEX KEAN KEAN@CS.UST.HK Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong GEORGE TSIKNIS
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/canai94.ps.gz, 19940315
A simple approach to Bayesian network computations Nevin Lianwen Zhang Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong David Poole Department of Computer Science University of British Columbia Vancouver, B.C., V6T 1Z2, Canada
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-8.ps.gz, 19940317
A Probabilistic Query Language Beat W uthrich The Hong Kong University of Science and Technology Clear Water Bay Kowloon, Hong Kong e-mail: beat@cs.ust.hk phone: (852) 358 7013 fax: (852) 358 1477 March 16, 1994 Abstract1 We define a new query language for data and knowledge bases. This language is able
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-2.ps.gz, 19940511
Knowledge Discovery in Databases Beat W uthrich The Hong Kong University of Science and Technology Clear Water Bay Kowloon, Hong Kong e-mail: beat@cs.ust.hk phone: (852) 358 7013 fax: (852) 358 1477 May 11, 1994
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-2A.ps.gz, 19940511
Knowledge Discovery in Databases Beat W uthrich The Hong Kong University of Science and Technology Clear Water Bay Kowloon, Hong Kong e-mail: beat@cs.ust.hk phone: (852) 358 7013 fax: (852) 358 1477 May 11, 1994
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-2B.ps.gz, 19940511
31 Company Turnover Profitability(%) A 800 8 B 860 14 C 620 18 D 1460 6 E 450 12 F 1600 5 Figure 11: An example of a (relational) table. 2.1 FQL We start introducing FQL . Consider a manager who is posed the problem of a cash surplus and who thus considers the acquisition of another company. Suppose the
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-9.ps.gz, 19940526
Widest Empty Corridor with Multiple Links and Right-angle Turns Siu-Wing Cheng Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-10B.ps.gz, 19940701
Synaptic Coding of Time-Varying Spike Trains Michael Stiber , Li Yan , and Jos e P. Segundo Technical Report HKUST-CS94-10 June 1994 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Department of Anatomy and Cell Biology and Brain
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-10A.ps.gz, 19940701
Time-Varying Neural Inputs Michael Stiber , Li Yan , Jos e P. Segundo , and Jean-Franc ois Vibert Technical Report HKUST-CS94-10 June 1994 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Department of Anatomy and Cell Biology and
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-10C.ps.gz, 19940701
Frequency-Modulated Neural Inputs and an Alphabet for Synaptic Coding Michael Stiber , Li Yan , Jos e P. Segundo , and Jean-Franc ois Vibert Technical Report HKUST-CS94-10 June 1994 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-11.ps.gz, 19940701
Managing Time and Uncertainty Beat W uthrich The Hong Kong University of Science and Technology Clear Water Bay Kowloon, Hong Kong e-mail: beat@cs.ust.hk phone: (852) 358 7013 fax: (852) 358 1477 June 29, 1994
open this document and view contentsftp://ftp.cs.ust.hk/pub/scc/icse94.ps.gz, 19940713
(To be published in the 16th IEEE International Conference on Software Engineering, Sorrento, Italy, May 1994) An Integrated Method for Effective Behaviour Analysis of Distributed Systems (Research Paper) S.C. Cheung J. Kramer Department of Computing, Imperial College 180 Queen s Gate, London SW7 2BZ,
open this document and view contentsftp://ftp.cs.ust.hk/pub/scc/sigsoft93.ps.gz, 19940713
( To Appear in the Proc. ACM SIGSOFT'93: Symposium on the Foundations of Software Engineering, Los Angeles, California, December 1993) 1 Enhancing Compositional Reachability Analysis with Context Constraints S.C. Cheung J. Kramer Department of Computing Imperial College of Science, Technology and
open this document and view contentsftp://ftp.cs.ust.hk/pub/scc/tse94.ps.gz, 19940713
Tractable Dataflow Analysis for Distributed Systems1 Shing Chi CHEUNG Jeff KRAMER Department of Computing Imperial College of Science, Technology and Medicine 180 Queen's Gate, London, SW7 2BZ, UK Email: {scc, jk}@doc.ic.ac.uk Technical Report: DoC 94/8 20th April 1994
open this document and view contentsftp://ftp.cs.ust.hk/pub/scc/esec93.ps.gz, 19940713
(To be published in the Proc. of the 4th European Software Engineering Conference ESEC'93.) Tractable Flow Analysis for Anomaly Detection in Distributed Programs S.C. Cheung J. Kramer Department of Computing, Imperial College of Science, Technology and Medicine 180 Queen's Gate, London SW7 2BZ, UK.
open this document and view contentsftp://ftp.cs.ust.hk/pub/scc/ase95.ps.gz, 19940720
1 Contextual Local Analysis for Design of Distributed Systems Shing Chi Cheung Jeff Kramer Department of Computer Science Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong Department of Computing Imperial College of Science, Technology and Medicine, London SW7 2BZ, UK
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/pacling93.Wu.ps.Z, 19940924
In PACLING-93, 1st Conf. of the Pacific Association for Computational Linguistics, Vancouver: Apr. 93, 323{332. An Image-Schematic System of Thematic Roles Dekai Wu Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Hong Kong dekai@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/ijcai93.Wu.ps.Z, 19940924
In IJCAI-93, 13th International Joint Conference on Artificial Intelligence, Chamberry, France: Aug. 93, 1290 1296. Approximating Maximum-Entropy Ratings for Evidential Parsing and Semantic Interpretation Dekai Wu Department of Computer Science The Hong Kong University of Science & Technology Clear
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/aaai93.Wu.ps.Z, 19940924
In AAAI-93, 11th National Conference on Artificial Intelligence, Washington, D.C.: Jul. 93, 790 795. Estimating Probability Distributions over Hypotheses with Variable Unification Dekai Wu Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/tr93.Wu.ps.Z, 19940924
Aligning Parallel English-Chinese Texts Statistically with Lexical Criteria Dekai Wu Technical Report HKUST-CS93-9 August 1993 Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong dekai@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/CPE/review-form.ps, 19941028
Concurrency: Practice and Experience Review Form (Please return by December 25, 1994) Reviewer s name and affiliation: (will be withheld from authors) _______________________________________________________________________________ Paper#: Referee #: Title: Author(s):
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-13.ps.gz, 19941114
1 An Architecture for Homogenizing Federated Databases Kamalakar Karlapalem Qing Li Chung-Dak Shum Technical Report HKUST-CS94-13 July 1994 2 An Architecture for Homogenizing Federated Databases Kamalakar Karlapalem Qing Li Chung-Dak Shum Department of Computer Science Hong Kong University of Science
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-18.ps.gz, 19941114
Countermeasures and Tradeoffs for a Class of Covert Timing Channels James W. Gray, III 1 Hong Kong University of Science and Technology
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-39.ps.gz, 19941216
Document Ranking on Weight-Partitioned Signature Files Dik Lun Lee and Liming Reny Technical Report HKUST-CS94-39 December 16, 1994 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yDepartment of Computer and Information Science The
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-38.ps.gz, 19941219
Auto-associative Learning of On-line Handwriting using Recurrent Neural Networks Dit-Yan Yeung, Kei-Wai Yeung Technical Report HKUST-CS94-38 November 1994 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong Tel: +852-2-358-6977 Fax:
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-37.ps.gz, 19941219
ASCOC: A Recurrent Neural Network Model for Grammatical Inference Dit-Yan Yeung, Kei-Wai Yeung Technical Report HKUST-CS94-37 September 1994 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong Tel: +852-2-358-6977 Fax: +852-2-358-1477
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-4.revised.ps.gz, 19950124
The Management of Interdependent Asynchronous Transactions in Heterogeneous Database Environments1 Lyman Do and Pamela Drew2 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong email: flyman, pamg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-36.ps.gz, 19950124
Information Filtering for Planning in Partially Observable Stochastic Domains Nevin Lianwen Zhang and Brent Boerlagey Technical Report HKUST-CS94-36 January 24, 1995 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yGeneral Reasoning #
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/formalism.ps.gz, 19950130
Formal Description of Local Asynchronous Updates in Multidatabase Environmentsy Lyman Do and Pamela Drew Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong email: flyman, pamg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-04.ps.gz, 19950208
Knowledge Discovery in Databases Beat W uthrich The Hong Kong University of Science and Technology Clear Water Bay Kowloon, Hong Kong e-mail: beat@cs.ust.hk phone: (852) 2358 7013 fax: (852) 2358 1477 February 3, 1995 1
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-03.ps.gz, 19950213
1 Compositional Reachability Analysis of Finite-State Distributed Systems with User-Specified Constraints Shing-chi Cheung* and Jeff Kramer Technical Report HKUST-CS95-3 January 1995 *Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/92/tr92-5.ps.gz, 19950213
Dynamics of Synaptic Transfer in Living and Simulated Neuronsz Michael Stiber and Jos e P. Segundoy Technical Report HKUST-CS92-5 October 1992 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yDepartment of Anatomy and Cell Biology and
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-02.ps.gz, 19950213
Integrated Behaviour Analysis of Distributed Systems Shing-chi Cheung* and Jeff Kramer Technical Report HKUST-CS95-2 January 1995 *Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong (email: scc@cs.ust.hk) Department of Computing The
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-01.ps.gz, 19950213
Active Database Management of Global Data Integrity Constraints in Heterogeneous Database Environments1 Lyman Do and Pamela Drew2 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong email: flyman, pamg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-32.ps.gz, 19950214
In AMTA-94, Association for Machine Translation in the Americas, Columbia, MD: Oct. 94, 206{213. LEARNING AN ENGLISH-CHINESE LEXICON FROM A PARALLEL CORPUS Dekai Wu Xuanyin Xia
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-30.ps.gz, 19950214
In ACL-94, 32nd Annual Meeting of the Assoc. for Computational Linguistics, Las Cruces, NM: Jun. 94, 88{87. ALIGNING A PARALLEL ENGLISH-CHINESE CORPUS STATISTICALLY WITH LEXICAL CRITERIA Dekai Wu HKUST Department of Computer Science University of Science & Technology Clear Water Bay, Hong Kong Internet:
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-31.ps.gz, 19950214
In WVLC-2, Second Annual Workshop on Very Large Corpora (COLING-94), Kyoto: Aug. 94. Statistical Augmentation of a Chinese Machine-Readable Dictionary Pascale Fung Dekai Wu Columbia University HKUST Computer Science Department Department of Computer Science New York, NY 10027 University of Science &
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-33.ps.gz, 19950214
In ANLP-94, Fourth Conference on Applied Natural Language Processing, Stuttgart: Oct. 94, 180 181. IMPROVING CHINESE TOKENIZATION WITH LINGUISTIC FILTERS ON STATISTICAL LEXICAL ACQUISITION Dekai Wu Department of Computer Science University of Science & Technology (HKUST) Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-06.ps.gz, 19950222
Inference with causal independence in the CPSC networky Nevin Lianwen Zhang Technical Report HKUST-CS95-06 February 22, 1995 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yUAI'95 submission.
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-05.ps.gz, 19950222
Policy Filtering for Planning in Partially Observable Stochastic Domainsy Nevin Lianwen Zhang Technical Report HKUST-CS95-05 February 21, 1995 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yUAI'95 submission.
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-08.ps.gz, 19950302
Context Constraint for Automated Compositional Reachability Analysis Shing-chi Cheung* and Jeff Kramer Technical Report HKUST-CS95-8 March 1995 *Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong (email: scc@cs.ust.hk) Department of
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/amta94.Wu_Xia.ps.Z, 19950302
In AMTA-94, Association for Machine Translation in the Americas, Columbia, MD: Oct. 94, 206{213. LEARNING AN ENGLISH-CHINESE LEXICON FROM A PARALLEL CORPUS Dekai Wu Xuanyin Xia HKUST Department of Computer Science University of Science & Technology Clear Water Bay, Hong Kong fdekai,samxiag@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-09.ps.gz, 19950302
1 Checking Subsystem Safety Properties in Compositional Reachability Analysis Shing-chi Cheung* and Jeff Kramer Technical Report HKUST-CS95-9 March 1995 *Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong (email: scc@cs.ust.hk)
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.npl95.ps.gz, 19950314
Improving the Approximation and Convergence Capabilities of Projection Pursuit Learning March 14, 1995
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-12.ps.gz, 19950421
Net comparison: an adaptive and effective method for scene change detectiony Wei Xiong, John Chung-Mong Lee, Ding-Gang Shen Technical Report HKUST-CS95-12 April 13, 1995 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yThis research
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-14.ps.gz, 19950421
A Robust Approach for Camera Break Detection in Color Video Sequence y John Chung-Mong Lee, Dixon Man-Ching IP Technical Report HKUST-CS95-14 April 21, 1995 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yThis research was supported
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-10.ps.gz, 19950422
A theory of the visual motion coding in the primary visual cortexy Zhaoping Li Technical Report HKUST-CS95-10 April 21, 1995 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yWork supported by the Research Grant Council of Hong Kong.
open this document and view contentsftp://ftp.cs.ust.hk/pub/scc/WAPSE.slide.ps.gz, 19950501
Workshop on Asian Approaches to Software Engineering - scc 1 Workshop on Asian Approaches to Software Engineering - April 1995 Automated Behaviour Analysis in the Design of Distributed Software Systems S.C. Cheung scc@cs.ust.hk Department of Computer Science Hong Kong University of Science and
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-21.ps.gz, 19950510
Advanced Functions for Conceptual Clustering in O-O Databases1 Qing Li Technical Report HKUST-CS95-21 May 1995 Department of Computer Science Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/CASCH/survey-tc.ps.Z, 19950527
- 0 - Analysis, Evaluation, and Comparison of Algorithms for Scheduling Task Graphs on Parallel Processors Ishfaq Ahmad, Yu-Kwong Kwok Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Min-You Wu Department of Computer Science State
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/uai95.ps.gz, 19950529
Inference with Causal Independence in the CPSC Network Nevin Lianwen Zhang Dept. of Computer Science, University of Science & Technology, Hong Kong lzhang@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/uai94.ps.gz, 19950529
Intercausal Independence and Heterogeneous Factorization Nevin Lianwen Zhang Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong lzhang@cs.ust.hk David Poole Department of Computer Science University of British Columbia Vancouver, B.C.,
open this document and view contentsftp://ftp.cs.ust.hk/pub/scc/sigsoft95.ps.gz, 19950603
Compositional Reachability Analysis of Finite-State Distributed Systems with User-Specified Constraints S.C. Cheung Department of Computer Science Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong J. Kramer Department of Computing Imperial College of Science, Technology and
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/acl95.Wu.ps.Z, 19950719
To appear in ACL-95, 33nd Annual Meeting of the Assoc. for Computational Linguistics, Cambridge, MA: Jun. 95. An Algorithm for Simultaneously Bracketing Parallel Texts by Aligning Words Dekai Wu HKUST Department of Computer Science University of Science & Technology Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/wvlc95.Wu.ps.Z, 19950719
To appear in WVLC-3, Third Annual Workshop on Very Large Corpora (at ACL-95), Cambridge, MA: Jun. 95. Trainable Coarse Bilingual Grammars for Parallel Text Bracketing Dekai Wu HKUST Department of Computer Science University of Science & Technology Clear Water Bay, Hong Kong dekai@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/jcse.ps, 19950719
1 A Mixed Fragmentation Methodology For Initial Distributed Database Design Shamkant B. Navathe Georgia Institute of Technology Kamalakar Karlapalem Hong Kong University of Science and Technology Minyoung Ra Korea Military Academy To appear in Journal of Computers and Software Engineering
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/coopis.ps, 19950719
CapBasED-AMS|A Framework for Capability{Based and Event{Driven Activity Management System1 Kamalakar Karlapalem Helen P. Yeung Patrick C. K. Hung Department of Computer Science University of Science and Technology Clear Water Bay, Kowloon, Hong Kong. e-mail: fkamal,heleny,cshckg@cs.ust.hk Research
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/hodfa.ps, 19950719
1 An Architecture for Homogenizing Federated Databases Kamalakar Karlapalem Qing Li Chung-Dak Shum Technical Report HKUST-CS94-13 July 1994 2 An Architecture for Homogenizing Federated Databases Kamalakar Karlapalem Qing Li Chung-Dak Shum Department of Computer Science Hong Kong University of Science
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/mater.ps, 19950719
Materialization of Redesigned Distributed Relational Databases1 Kamalakar Karlapalem Hong Kong University of Science and Technology Department of Computer Science Clearwater Bay, Kowloon, Hong Kong e-mail: kamal@cs.ust.hk Phone: (852) 358 6991 Fax: (852) 358 1477 Shamkant B. Navathe Georgia Institute of
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/tmi95.Fung_Wu.ps.Z, 19950719
To appear in TMI-95, Sixth International Conf. on Theoretical and Methodological Issues in Machine Translation, Leuven, Belgium: Jul. 95. Coerced Markov Models for Cross-Lingual Lexical-Tag Relations Pascale Fung and Dekai Wuy Technical Report HKUST-CS95-24 May 1995 Columbia University Computer Science
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/part.ps, 19950719
Partitioning Schemes for Object Oriented Databases1 Kamalakar Karlapalem Qing Li University of Science and Technology Department of Computer Science Clear Water Bay Kowloon, Hong Kong e-mail: fkamal,qingg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/sigrec.ps, 19950719
1 HODFA: An Architectural Framework for Homogenizing Heterogeneous Legacy Databases1 Kamalakar Karlapalem Qing Li Chung-Dak Shum Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong e-mail: {kamal, qing, shum}@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/main.ps, 19950719
Memory Access and Selectivity Estimation Methods forReal-Time Main-Memory Databases Babak Hamidzadeh Kamalakar Karlapalem Helen Yeung (hamidzad@cs.ust.hk) (kamal@cs.ust.hk) (heleny@cs.ust.hk) Computer Science Department, University of Science and Technology Clear Water Bay,Kowloon, Hong Kong Technical
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/tmi95.Wu.ps.Z, 19950719
To appear in TMI-95, Sixth International Conf. on Theoretical and Methodological Issues in Machine Translation, Leuven, Belgium: Jul. 95. Grammarless Extraction of Phrasal Translation Examples from Parallel Texts Dekai Wu Technical Report HKUST-CS95-23 May 1995 HKUST Department of Computer Science
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/policy.ps, 19950719
Optimal Redesign Policies to Support Dynamic Processing of Applications on a Distributed Relational Database System1 Kamalakar Karlapalem Department of Computer Science University of Science and Technology Clear Water Bay, Kowloon, Hong Kong. Phone: + 852 358 6991 Fax: + 852 358 1477 e-mail:
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/query.ps, 19950719
Query Driven Data Allocation Algorithms for Distributed Database Systems1 Kamalakar Karlaplem Ng Moon Pun University of Science and Technology Department of Computer Science Clear Water Bay, Kowloon, Hong Kong e-mail: kamal@cs.ust.hk Phone: +852 2358 6991 Fax: +852 2358 1477
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/method.ps, 19950719
1 Method Induced Partitioning Schemes in Object-oriented Databases* Kamalakar Karlapalem Qing Li SteFan Vieweg Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Fax: + (852) 2358-1477 email: {kamal,qing,stefan}@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/sens.ps, 19950722
GSPN Models: Sensitivity Analysis and Applications 1 Jogesh K. Muppala and Kishor S. Trivedi2 Department of Computer Science, Duke University, Durham, NC { 27706 (919) - 660 - 6553 jkm@cs.duke.edu, kst@cs.duke.edu Appeared in Proc. of the 28th ACM Southeast Region Conf., Greeneville, SC, Apr. 1990, pp.
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/survey-part95.ps.gz, 19950727
Performance Comparison of Algorithms for Static Scheduling of DAGs to Multiprocessors1 Ishfaq Ahmad, Yu-Kwong Kwok Department of Computer Science The Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong Min-You Wu Department of Computer Science State University of New York at
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/survey-part95-camera.ps.gz, 19950727
Performance Comparison of Algorithms for Static Scheduling of DAGs to Multiprocessors1 Ishfaq Ahmad, Yu-Kwong Kwok Department of Computer Science The Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong Min-You Wu Department of Computer Science State University of New York at
open this document and view contentsftp://ftp.cs.ust.hk/pub/ulrich/pstv95.ps.gz, 19950826
An approach to testing distributed software systems Andreas Ulrich*, Samuel T. Chanson Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong e-mail: {ulrich, chanson}@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.icann95.ps.gz, 19950829
IMPROVING THE APPROXIMATION AND CONVERGENCE CAPABILITIES OF PROJECTION PURSUIT LEARNING Tin-Yau Kwok (jamesk@cs.ust.hk) Dit-Yan Yeung (dyyeung@cs.ust.hk) Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong (852) 2358 6977
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-37.ps.gz, 19950901
This report will appear in Volume 1000 of Springer-Verlag LNCS, 1995. Standard Generalized Markup Language: Mathematical and Philosophical Issues y Derick Wood Technical Report HKUST-CS95-37 July 1995 Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay,
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-39.ps.gz, 19950901
Visibility in Semi-Convex Spacesz Sven Schuierer and Derick Woody Technical Report HKUST-CS95-39 June 1995 Institut f ur Informatik Universit at Freiburg Rheinstr. 10{12 D-79104 Freiburg Germany yDepartment of Computer Science Hong Kong University of Science & Technology Clear Water Bay, Kowloon Hong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-33.ps.gz, 19950901
To appear: Vision Geometry IV Conf., as part of SPIE's Intnl. Symp. on Optical Sc., Eng., and Instrmtn., July, 1995. Three-Dimensional Strong Convexity and Visibilityz Eugene Fink and Derick Woody Technical Report HKUST-CS95-33 June 1995 Department of Computer Science Carnegie{Mellon University
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-40.ps.gz, 19950901
Efficient Planning in Stochastic Domains through Exploiting Problem Characteristics Nevin Lianwen Zhang Department of Computer Science The Hong Kong University of Science and Technolgy Clear Water Bay, Kowloon, Hong Kong lzhang@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-32.ps.gz, 19950901
This report is accepted for publication in the July 1995 issue of Computer Standards and Interfaces. From Data Representation to Data Model: Meta-Semantic Issues in the Evolution of SGMLz Darrell R. Raymond , Frank Tompa , and Derick Woody Technical Report HKUST-CS95-32 June 1995 Department of Computer
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-17.ps.gz, 19950901
The Grail Papers: Version 2.3z Darrell R. Raymond and Derick Woody Technical Report HKUST-CS95-17 May 1995 Department of Computer Science University of Western Ontario London, Ontario N2L 5B7 Canada yDepartment of Computer Science Hong Kong University of Science & Technology Clear Water Bay, Kowloon
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/005-006.ps, 19950906
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/003-004.ps, 19950906
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/001-002.ps, 19950906
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/009-010.ps, 19950908
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/013-014.ps, 19950908
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/015-016.ps, 19950908
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/011-012.ps, 19950908
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/017-018.ps, 19950908
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/007-008.ps, 19950908
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-42.ps.gz, 19950910
BALANCE|A Flexible Parallel Load Balancing System for Heterogeneous Computing Systems and Networksy Chi-Chung Hui , Samuel T. Chanson , Pui-Man Chui , and Ka-Ming Lau Technical Report HKUST-CS95-42 September 8, 1995 Department of Computer Science The Hong Kong University of Science and Technology Clear
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-43.ps.gz, 19950911
Constructive Feedforward Neural Networks for Regression Problems: A Survey Tin-Yau Kwok & Dit-Yan Yeung Technical Report HKUST-CS95-43 September 1995 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong fjamesk,dyyeungg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/laceinv.ps.gz, 19950912
A Heterogeneous Database Management Architecture to Support Tailored User Views over Interdatabase Constraints1 Lyman Do, Pamela Drew, and Wilson Tang Department of Computer Science Hong Kong University of Science and Technology Kowloon, Hong Kong email: flyman,pam,cswstangg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/smartcourier.ps.gz, 19950912
The Smart Courier Approach to Consistency Management across Multiple Information Sources Lyman Do and Pamela Drew Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong email: flyman,pamg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/constraint_trxn.ps.gz, 19950912
Constraint Enforcement Transaction Processing in Multidatabase Architectures Lyman Do and Pamela Drew Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong flyman,pamg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/asynch_in_activedb.ps.gz, 19950912
Active Database Management of Global Data Integrity Constraints in Heterogeneous Database Environments1 Lyman Do and Pamela Drew2 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong email: flyman, pamg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/metadata.ps.gz, 19950912
A Heterogeneous Geographic Information Architecture For Hong Kong Infrastructure Systems 14 P. Milne, S. Milton, and J. Smith, Geographical Object-Oriented Databases: a Case Study , International Journal of Geographic Information Systems, Vol. 7, pp. 39-56, 1993. S. Morehouse, The ARC/INFO
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/laceabs.ps.gz, 19950912
Templeton, M., Brill, D., Chen, A., Dao, S., Lund, E., Macgregor, R., and Ward, P., Mermaid: A front-end to distributed heterogeneous databases, Proc. IEEE 75 (5), 695-708, 1987. M. Templeton and D. Van Buer, Replicated and Fragmented Relation Update in INTERVISO , Data Integration, Inc.
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/migration.ps.gz, 19950912
On Database Technology For Information System Migration and Evolution1 Pamela Drew Department of Computer Science Hong Kong University of Science and Technology Kowloon, Hong Kong pam@cs.ust.hk 1.0 The Problem Information has become the cornerstone of many organizational activities from decision making
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/asynch_in_esr.ps.gz, 19950912
The Management of Interdependent Asynchronous Transactions in Heterogeneous Database Environments1 Lyman Do and Pamela Drew2 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong email: flyman, pamg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/v_arch.ps.gz, 19950912
: An Evolvable System Architecture for Heterogeneous Information Resource Management Lyman Do and Pamela Drew y Department of Computer Science Hong Kong University of Science and Technology Kowloon, Hong Kong email: flyman, pamg@cs.ust.hk 1 Introduction Today's business enterprises can be viewed as a
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/metadataexchange.ps.gz, 19950912
1 Metadata Management for Geographic Information Exchange1 Pamela Drew and Jerry Ying2 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong Internet: {pam, jying} @cs.ust.hk 1.0 Introduction Hong Kong is a major, and rapidly developing, metropolis in
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-44.ps.gz, 19950913
To appear: Theoretical Computer Science, 1996. Structural Equivalence and ET0L Grammarsx Kai Salomaa , Derick Woody, and Sheng Yuz Technical Report HKUST-CS95-44 September 1995 Department of Mathematics University of Turku Turku Finland yDepartment of Computer Science Hong Kong University of Science &
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture03.ps, 19950914
Prepared by: Chan Man Yee, Mandy (csmychan, 94211829) & Fung Wai Kit, Tony (cstony, 94209333) COMP251 Lecture Note for Week 2 Monday (11 Sept 95) Page 1 of 2 Functional Programming In Pure functional programming , everything is accomplished via functions in the mathematical sense. Consider this C
open this document and view contentsftp://ftp.cs.ust.hk/pub/gray/thesis.ps.gz, 19950915
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture04.ps, 19950918
Exceptions in ML Certain functions are undefined on certain inputs. e.g. sqrt: RfiR is undefined on negative values. /: R RfiR is undefined when its second argument is zero. hd: 'a list fi 'a is undefined for the empty list. - hd(); uncaught exception Hd the name of the exception - 3.0 / 0.0; uncaught
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture05.ps, 19950925
Chan Man Yee, Mandy (csmychan, 94211829) Eddy Poon (cshcpoon, 94093423) COMP251 Lecture Note for Week 3 Monday (18 Sept 95) Page 1 of 3 The lie from the last lecture: In ML, an operator or function is either polymorphic and allows any type to be substituted for the type variable or it isn t polymorphic
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture06.ps, 19950925
Chan Man Yee, Mandy (csmychan, 94211829) Eddy Poon (cshcpoon, 94093423) COMP251 Lecture notes for Week 3 Thursday (21 Sept 95) Page 1 of 5 Most General Unifier A unifier s for E1 and E2 is a most general unifier (mgu) if for all other unifier, say s , E1s is an instance of E1s. That is, there exist s
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture07.ps, 19950928
Lecture Section 1 Instructor: James W. Gray, III 25 September 1995 COMP 251 (FALL 1995) Lecture Notes -- the 7th lecture Page 1 Prepared by : Fu Ho Yam Addy (csaddy@cs.ust.hk) Unification (continue of the last 2 lectures) the result of the question which find
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture08.ps, 19951005
Prepared by: Chan Man Yee, Mandy (csmychan, 94211829) & Fung Wai Kit, Tony (cstony, 94209333) COMP251 Lecture Note for Week 4 Thursday (28 Sept 95) Page 1 of 2 Programmer-defined (Recursive) datatypes In ML, we have several built-in datatypes (eg. int) as well as operators (called type constructors) to
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture09.ps, 19951008
COMP251 Lecture Note for Week 5 on Oct. 2, 95(MON) Page 1 of 3 Eddy Poon cshcpoon@cs.ust.hk Type Inference When inferring the type of an ML expression, say e, ML takes into account the environment of e. For example: - val L = ; val L = : int list - fun f(x) = (x,L); val f = fn: a -> (
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/hw1.soln.ps, 19951008
COMP 251, Lecture 1 Instructor: James W. Gray, III Fall 1995 Homework 1 (with Solutions) 1. Write an unambiguous context-free grammer for expressions with a (binary) assignment operator, =, binary operators && and jj, unary operator !, parentheses for grouping subexpressions, and operands given by the
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture10.ps, 19951010
COMP251 Lecture Note on Oct 5, 1995 (THU) Ng Yuet Yeung Enoch (csyyng@ug.cs.ust.hk) Page 1 of 3 Clarification of last lecture: An identifier is generic in two cases: 1) When it is bound by a let expression, e.g., in the expression: let x = e1 in e2 x is generic in e2 only. 2) After an identifier has
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture11.ps, 19951012
Logic Programming (Prolog) Review of functions and relations: For a function f: A fi B, for every element x A, there is at most one element y B such that f(x) = y. For a relation R: A B, there can be many y B that are related to x by R. e.g. (x, y1) R, (x, y2) R and y1 y2. We can think of an n-ary
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/hw2.soln.ps, 19951015
COMP 251, Lecture 1 Instructor: James W. Gray, III Fall 1995 Homework 2 (Unification and Type Inference)|With Solutions 1. Consider a language of expressions where integers are constants, uppercase letters are variables, and lowercase letters are operators. For each of the following pairs of terms,
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture12.ps, 19951016
How does Prolog process Queries Consider the rules from last lecture (1) app( , Y, Y). (2) app( , Y, ) :- app(X,Y,Z). When we asked the query : | - app(X,Y,). One of the responses (but not the first) was : X = Y = . How does Prolog use the above two rules to prove this
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.accv95.ps.gz, 19951017
A Unified Framework for Handwritten Character Recognition using Deformable Models Kwok-Wai Cheung, Dit-Yan Yeung and Roland T. Chin Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong Email: william@cs.ust.hk, dyyeung@cs.ust.hk, roland@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/exam1.soln.ps, 19951021
Principles of Programming Languages|COMP 251 Lecture 1 Instructor: James W. Gray, III 19 Oct 1995 (Fall term) Examination 1 (with solutions) There are a total of 100 points. 1. Write an unambiguous context-free grammer for the subset of ML type expressions containing the following. ffl
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/prolog.ps, 19951021
Using Quintus Prolog|The Basics Notes by James W. Gray, III Last modified: October 22, 1995 This document gives some very basic information on using Quintus Prolog, release 3, at HKUST. 1. Getting Access (Instructions for Faculty): There are a limited number of licenses for Quintus Prolog. Currently, we
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/oo/cikm94.ps.gz, 19951027
Using Path Information for Query Processing in Object-Oriented Database Systems Dik L. Lee and Wang-chien Lee Department of Computer and Information Science The Ohio State University Columbus, Ohio 43210-1277 fdlee, wleeg@cis.ohio-state.edu
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/ir/optimal-sig.ps.gz, 19951027
Optimal Weight Assignment for Signature Generation Chun-wu Roger Leng Dik Lun Lee Department of Computer and Information Science The Ohio State University 2036, Neil Ave Columbus, OHIO 43210-1277 April 24, 1995 Abstract Previous work on superimposed coding are characterized by two aspects. First, it is
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/ir/hytrem-ipm.ps, 19951027
Massive Parallelism on the Hybrid Text Retrieval Machine Dik L. Lee* Department of Computer Science, Hong Kong University of Science and Technology Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/mobile/rutgers-cacm.ps.gz, 19951027
Mobile Wireless Computing: Solutions and Challenges in Data Management1 Tomasz Imielinski B. R. Badrinath Department. of Computer Science Rutgers University New Brunswick, NJ 08903 e-mail:fimielins,badri@cs.rutgers.edug
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/mobile/sig+cache-J.ps.gz, 19951027
Using Signature and Caching Techniques for Information Filtering in Wireless and Mobile Environments Wang-chien Lee Dik Lun Lee Dept of Computer and Information Science Department of Computer Science The Ohio State University University of Science and Technology Columbus, Ohio 43210-1277, USA Clear
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/oo/ride95.ps.gz, 19951027
Proceedings of the Fifth International Workshop on Research Issues in Data Engineering 10 On Processing Nested Queries in Distributed Object-Oriented Database Systems Wang-Chien Lee Department of Computer and Information Science The Ohio State University Columbus, Ohio 43210-1277, USA
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/ir/wt-psf.ps.gz, 19951027
Document Ranking on Weight-Partitioned Signature Files Dik Lun Lee and Liming Ren The Ohio State University November, 1994
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/oo/hk92.ps.gz, 19951027
Proceedings of the 2nd International Computer Science Conference, Hong Kong, Dec. 1992, 616-622. 616 SIGNATURE FILE METHODS FOR INDEXING OBJECT-ORIENTED DATABASE SYSTEMS Wang-chien Lee and Dik L. Lee Department of Computer and Information Science, Ohio State University Columbus, Ohio 43210-1277
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/ir/partial-rank.ps.gz, 19951027
Implementations of Partial Document Ranking Using Inverted Files Wai Yee Peter Wong Dik Lun Lee Department of Computer and Information Science, Ohio State University, 2036 Neil Ave, Columbus, Ohio 43210, U.S.A. May 1992
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/ir/icde96-www.ps, 19951027
Search and Ranking Algorithms for Locating Resources on the World Wide Web Budi Yuwono Dik L. Lee Department of Computer and Department of Computer Science Information Science Hong Kong University of Science The Ohio State University and Technology Columbus, Ohio, U.S.A. Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/ir/part-sig.ps.gz, 19951027
Partitioned Signature File: Design Issues and Performance Evaluation1 Dik Lun Lee Chun-wu Leng Department of Computer and Information Science The Ohio State University 2036, Neil Ave Columbus, OHIO 43210-1277 January 1989
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/ir/multilevel-tkde.ps.gz, 19951027
Efficient Signature File Methods for Text Retrieval Dik Lun Lee Young Man Kim Gaurav Patel Department of Computer and Information Science, Ohio State University Columbus, Ohio 43210-1277 May 14, 1995
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/oo/dasfaa95.ps.gz, 19951027
Proceedings of the 4th International Conference on Database Systems for Advanced Applications 107 Combining Indexing Technique with Path Dictionary for Nested Object Queries Wang-Chien Lee Dept. of Computer & Information Science The Ohio State University Columbus, Ohio 43210-1277, USA
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/oo/ics94.ps.gz, 19951027
Proceedings of International Computer Symposium 1994, Dec. 12-15, NCTU, Hsinchu, Taiwan, R.O.C. 1172 Short Cuts for Traversals in Object-Oriented Database Systems Wang-Chien Lee and Dik Lun Lee Department of Computer and Information Science, Ohio State University Columbus, Ohio 43210-1277, USA fwlee,
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture16.ps, 19951103
COMP 251 - Principles of Programming Languages Lecture 1 30/10/95 ~ 1 ~ Parsing in Prolog (cont.) Consider the rules for fi | . | . discussed in last lecture: Here s another application of cut: We can add a cut into our rule for parsing fi ., viz., n_rule(X, n(T1, dot,
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture17.ps, 19951111
Parsing in Prolog (continued) The major point about d_rule is that querying d_rule(X,Y,T), where X is a string starting from a digit and Y and T are variables, will instantiate Y with the rest of the list after parsing X as far as possible. We translate fi as : ds_rule(X,Y,ds(T1,T2)) :-
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture18.ps, 19951111
Prepared by : Cheung Chun Yu, Cliff (csccy) Comp 251 : Lecture Note for 6th Nov 1995 page 1 of 3 Data Representation (Continued) Design of an array datatypes: For usability : we want the lower and upperbounds on indexes to be determined at runtime and check on each access (at runtime). For efficiency :
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/hwk3.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Assignment 3 (15%): Unsupervised Bayesian Classification Using AutoClass Due date: 14 & 23 November 1995, in class Preamble Unlike the previous two assignments, this assignment is more open-ended. It is also
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/read-ac.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (AutoClass) Required Reading ffl P. Cheeseman, J. Kelly, M. Self, J. Stutz, W. Taylor, D. Freeman (1988). AutoClass: a Bayesian classification system. Proceedings of the Fifth International
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/hwk1.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Assignment 1: Incremental Learning of Decision Trees Due date: 10 October 1995, in class Objective Decision tree learning algorithms such as ID3 and C4.5 have become standard topics even in some undergraduate
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/hwk2.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Assignment 2: Feedforward Neural Networks Due date: 24 October 1995, in class Preamble There are many existing neural network simulators. Proprietary commercial packages are usually not very flexible, making
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/hwk3.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Assignment 3 (15%): Unsupervised Bayesian Classification Using AutoClass Due date: 14 & 23 November 1995, in class Preamble Unlike the previous two assignments, this assignment is more open-ended. It is also
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/hwk4.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Assignment 4 (10%): Hidden Markov Models & Reinforcement Learning Due date: 29 November 1995, 5:00pm, to Brenda 1. The standard form of hidden Markov models (HMM), as studied in class, involves only one
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/read-cluster.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Conceptual Clustering) Required Reading ffl M.N. Murty, A.K. Jain (1995). Knowledge-based clustering scheme for collection management and retrieval of library books. Pattern Recognition,
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/read-mde.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Mixture Density Estimation) Required Reading ffl X.D. Huang, Y. Ariki, M.A. Jack (1990). Hidden Markov Models for Speech Recognition, Section 2.1{2.4. Edinburgh University Press. Further Reading
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/read-ac.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (AutoClass) Required Reading ffl P. Cheeseman, J. Kelly, M. Self, J. Stutz, W. Taylor, D. Freeman (1988). AutoClass: a Bayesian classification system. Proceedings of the Fifth International
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/read-tree.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Tree-based Methods) Required Reading ffl J.R. Quinlan (1986). Induction of decision trees. Machine Learning, 1(1):81{106. ffl T. Mitchell, R. Caruana, D. Freitag, J. McDermott, D. Zabowski
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/hwk2.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Assignment 2: Feedforward Neural Networks Due date: 24 October 1995, in class Preamble There are many existing neural network simulators. Proprietary commercial packages are usually not very flexible, making
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/read-rl.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Reinforcement Learning) Required Reading ffl S.J. Russell, P. Norvig (1995). Artificial Intelligence: A Modern Approach, Chapter 20. Prentice-Hall. Further Reading ffl C.J.C.H. Watkins, P. Dayan
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/read-tree.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Tree-based Methods) Required Reading ffl J.R. Quinlan (1986). Induction of decision trees. Machine Learning, 1(1):81{106. ffl T. Mitchell, R. Caruana, D. Freitag, J. McDermott, D. Zabowski
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/read-pac.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (PAC Learning) Required Reading ffl S.J. Russell, P. Norvig (1995). Artificial Intelligence: A Modern Approach, 552{560. Prentice-Hall. Further Reading ffl L.G. Valiant (1984). A theory of the
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/hwk1.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Assignment 1: Incremental Learning of Decision Trees Due date: 10 October 1995, in class Objective Decision tree learning algorithms such as ID3 and C4.5 have become standard topics even in some undergraduate
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/read-cluster.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Conceptual Clustering) Required Reading ffl M.N. Murty, A.K. Jain (1995). Knowledge-based clustering scheme for collection management and retrieval of library books. Pattern Recognition,
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/courseinfo.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Tue & Thu 9:30-10:50am, Rm 3416 Dr. Dit-Yan Yeung (Rm 3541, dyyeung@cs.ust.hk, x6977) Course Description The ability to learn is central to both natural and artificial intelligence. Some major machine
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/read-rl.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Reinforcement Learning) Required Reading ffl S.J. Russell, P. Norvig (1995). Artificial Intelligence: A Modern Approach, Chapter 20. Prentice-Hall. Further Reading ffl C.J.C.H. Watkins, P. Dayan
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/read-nn.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Neural Networks) Required Reading ffl D.E. Rumelhart, G.E. Hinton, R.J. Williams (1986). Learning internal representations by error propagation. Parallel Distributed Processing, Volume 1,
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/read-mde.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Mixture Density Estimation) Required Reading ffl X.D. Huang, Y. Ariki, M.A. Jack (1990). Hidden Markov Models for Speech Recognition, Section 2.1{2.4. Edinburgh University Press. Further Reading
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/hw3.soln.ps, 19951113
COMP 251, Lecture 1 Instructor: James W. Gray, III Fall 1995 Homework 3 1. Consider the following declaration. VAR A: ARRAY OF DOUBLE; Suppose a data object of type DOUBLE takes two words in a word-addressable machine. Show the descriptor for A, including bounds, strides, and its virtual
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/DCP-ieee.ps.gz, 19951113
- 1 - Dynamic Critical-Path Scheduling: An Effective Technique for Allocating Task Graphs to Multiprocessors Yu-Kwong Kwok and Ishfaq Ahmad1 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Corresponding Author: Ishfaq Ahmad Email:
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/read-nn.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Neural Networks) Required Reading ffl D.E. Rumelhart, G.E. Hinton, R.J. Williams (1986). Learning internal representations by error propagation. Parallel Distributed Processing, Volume 1,
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/read-hmm.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Hidden Markov Models) Required Reading ffl X.D. Huang, Y. Ariki, M.A. Jack (1990). Hidden Markov Models for Speech Recognition, Chapter 5. Edinburgh University Press. Further Reading ffl L.R.
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/courseinfo.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Tue & Thu 9:30-10:50am, Rm 3416 Dr. Dit-Yan Yeung (Rm 3541, dyyeung@cs.ust.hk, x6977) Course Description The ability to learn is central to both natural and artificial intelligence. Some major machine
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/dcp-tpds.ps.gz, 19951113
- 1 - Dynamic Critical-Path Scheduling: An Effective Technique for Allocating Task Graphs to Multiprocessors Yu-Kwong Kwok and Ishfaq Ahmad1 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Corresponding Author: Ishfaq Ahmad Email:
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/read-pac.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (PAC Learning) Required Reading ffl S.J. Russell, P. Norvig (1995). Artificial Intelligence: A Modern Approach, 552{560. Prentice-Hall. Further Reading ffl L.G. Valiant (1984). A theory of the
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/read-hmm.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Hidden Markov Models) Required Reading ffl X.D. Huang, Y. Ariki, M.A. Jack (1990). Hidden Markov Models for Speech Recognition, Chapter 5. Edinburgh University Press. Further Reading ffl L.R.
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/hwk4.ps.gz, 19951113
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Assignment 4 (10%): Hidden Markov Models & Reinforcement Learning Due date: 29 November 1995, 5:00pm, to Brenda 1. The standard form of hidden Markov models (HMM), as studied in class, involves only one
open this document and view contentsftp://ftp.cs.ust.hk/pub/gray/draft.ps.gz, 19951115
DRAFT: November 14, 1995. Not for distribution or citation. 1 A Logical Approach to Multilevel Security of Probabilistic Systems James W. Gray, III Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, HONG KONG Paul F. Syversony Center for High
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp523/s95/hwk3.ps.gz, 19951115
Hong Kong University of Science and Technology COMP523: Artificial Neural Networks Spring Semester, 1994/95 Homework Assignment 3: Learning Algorithm for a Recurrent Neural Network Architecture Due date: 25 April 1995 As discussed in class, the recurrent neural network architecture shown below can
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp523/hwk2.ps.gz, 19951115
Hong Kong University of Science and Technology COMP523: Artificial Neural Networks Spring Semester, 1994/95 Homework Assignment 2: Supervised Learning in Feedforward Neural Networks Due date: 13 April 1995 Introduction In this assignment, you are required to perform some supervised learning experiments
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp523/courseinfo.ps.gz, 19951115
Hong Kong University of Science and Technology COMP523: Artificial Neural Networks Spring Semester, 1994/95 Tue 2:00-3:20pm & Thu 2:30-3:50pm, Rm 3311 Dr. Dit-Yan Yeung (Rm 3541, dyyeung@cs.ust.hk, x6977) Course Description Artificial neural network (ANN) models are computational models inspired by
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp523/s95/hwk1.ps.gz, 19951115
Hong Kong University of Science and Technology COMP523: Artificial Neural Networks Spring Semester, 1994/95 Homework Assignment 1 Due date: 9 March 1995 Perceptron learning can be applied to winner-take-all groups (see Section 4.2 of textbook). 1. State the perceptron convergence theorem for
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp523/s95/hwk2.ps.gz, 19951115
Hong Kong University of Science and Technology COMP523: Artificial Neural Networks Spring Semester, 1994/95 Homework Assignment 2: Supervised Learning in Feedforward Neural Networks Due date: 13 April 1995 Introduction In this assignment, you are required to perform some supervised learning experiments
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp523/hwk4.ps.gz, 19951115
Hong Kong University of Science and Technology COMP523: Artificial Neural Networks Spring Semester, 1994/95 Homework Assignment 4: Self-Organizing Maps Due date: 13 May 1995 Introduction In this assignment, you are asked to perform some unsupervised learning experiments using a self-organizing map (SOM)
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp523/hwk3.ps.gz, 19951115
Hong Kong University of Science and Technology COMP523: Artificial Neural Networks Spring Semester, 1994/95 Homework Assignment 3: Learning Algorithm for a Recurrent Neural Network Architecture Due date: 25 April 1995 As discussed in class, the recurrent neural network architecture shown below can
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp523/hwk1.ps.gz, 19951115
Hong Kong University of Science and Technology COMP523: Artificial Neural Networks Spring Semester, 1994/95 Homework Assignment 1 Due date: 9 March 1995 Perceptron learning can be applied to winner-take-all groups (see Section 4.2 of textbook). 1. State the perceptron convergence theorem for
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp523/s95/courseinfo.ps.gz, 19951115
Hong Kong University of Science and Technology COMP523: Artificial Neural Networks Spring Semester, 1994/95 Tue 2:00-3:20pm & Thu 2:30-3:50pm, Rm 3311 Dr. Dit-Yan Yeung (Rm 3541, dyyeung@cs.ust.hk, x6977) Course Description Artificial neural network (ANN) models are computational models inspired by
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp523/s95/hwk4.ps.gz, 19951115
Hong Kong University of Science and Technology COMP523: Artificial Neural Networks Spring Semester, 1994/95 Homework Assignment 4: Self-Organizing Maps Due date: 13 May 1995 Introduction In this assignment, you are asked to perform some unsupervised learning experiments using a self-organizing map (SOM)
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.iccpol95.ps.gz, 19951116
Chinese glyph generation using character composition and beauty evaluation metrics Pak-Keung Lai ( )1, Man-Chi Pong ( )2, Dit-Yan Yeung ( ) Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong e-mail: pklai@lawhk.hku.hk,
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.iconip94.ps.gz, 19951116
ASCOC: A Locally Recurrent Neural Network Model for Grammatical Inference Dit-Yan Yeung, Kei-Wai Yeung Department of Computer Science Hong Kong University of Science and Technology
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.issipnn94a.ps.gz, 19951116
A Theoretically Sound Learning Algorithm for Constructive Neural Networks Tin-Yau Kwok (jamesk@cs.ust.hk) Dit-Yan Yeung (dyyeung@cs.ust.hk) Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.icnn93.ps.gz, 19951116
EXPERIMENTAL ANALYSIS OF INPUT WEIGHT FREEZING IN CONSTRUCTIVE NEURAL NETWORKS Tin-Yau Kwok Dit-Yan Yeung (jamesk@uxmail.ust.hk) (dyyeung@uxmail.ust.hk) Department of Computer Science Hong Kong University of Science and Technology
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.icsc95.ps.gz, 19951116
On-line Handwritten Alphanumeric Character Recognition Using Feature Sequences Xiaolin Li and Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, HONG KONG Internet: fxiaolin,dyyeungg@cs.ust.hk Fax: +852-2358-1477
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.issipnn94b.ps.gz, 19951116
Gabriel Networks: Self-Organizing Neural Networks for Adaptive Vector Quantization Kwok-Leung Mou (klmou@cs.ust.hk) Dit-Yan Yeung (dyyeung@cs.ust.hk) Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.icnn95.ps.gz, 19951116
Efficient Cross-Validation for Feedforward Neural Networks Tin-Yau Kwok (jamesk@cs.ust.hk) and Dit-Yan Yeung (dyyeung@cs.ust.hk) Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.icnn94.ps.gz, 19951116
Constructive Neural Networks: Some Practical Considerations Tin-Yau Kwok Dit-Yan Yeung
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/read-ebl.ps.gz, 19951118
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Explanation-based Learning) Required Reading ffl T.M. Mitchell, R.M. Keller, S.T. Kedar-Cabelli (1986). Explanation-based generalization: a unifying view. Machine Learning, 1(1):47{80. Further
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/read-ebl.ps.gz, 19951118
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (Explanation-based Learning) Required Reading ffl T.M. Mitchell, R.M. Keller, S.T. Kedar-Cabelli (1986). Explanation-based generalization: a unifying view. Machine Learning, 1(1):47{80. Further
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/exam2.soln.ps, 19951119
Principles of Programming Languages|COMP 251 Lecture 1 Instructor: James W. Gray, III 16 Nov 1995 (Fall term) Examination 2, with solutions 1. Consider the following program skeleton. var X : array of integer; procedure P(var Y : array of integer) /* Y is passed by
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-41.ps.gz, 19951121
Strong Restricted-Orientation Convexityz Eugene Fink and Derick Woody Technical Report HKUST-CS95-41 September 1995 Department of Computer Science Carnegie{Mellon University Pittsburgh, PA 15213 U. S. A. yDepartment of Computer Science Hong Kong University of Science & Technology Clear Water Bay,
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture19.ps, 19951121
COMP251 Lecture note Page 1 of 2 Ng Yuet Yeung Enoch (csyyng@ug.cs.ust.hk) Object-Oriented Programming and C++ Basic idea of Object-Oriented Programming: When solving a problem, identify the objects in the problem domain and design your programs around those objects. An object is an intentionally vague
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-45.ps.gz, 19951121
Generalized Halfspaces in Restricted-Orientation Convexityz Eugene Fink and Derick Woody Technical Report HKUST-CS95-45 September 1995 Department of Computer Science Carnegie{Mellon University Pittsburgh, PA 15213 U. S. A. yDepartment of Computer Science Hong Kong University of Science & Technology
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/darrell/jsc.ps.gz, 19951121
J. Symbolic Computation (1995) 11, 1{000 Grail : A C++ Library for Automata and Expressions Darrell Raymondy Derick Woodz (Received January 1994) Grail is a package for symbolic manipulation of finite-state automata and regular expressions. It provides most standard operations on automata and
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-46.ps.gz, 19951121
Fundamentals of Restricted-Orientation Convexityz Eugene Fink and Derick Woody Technical Report HKUST-CS95-46 September 1995 Department of Computer Science Carnegie{Mellon University Pittsburgh, PA 15213 U. S. A. yDepartment of Computer Science Hong Kong University of Science & Technology Clear Water
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-48.ps.gz, 19951122
Adaptive Heuristics for Binary Search Trees and Constant Linkage Cost1 Tony W. Lai2 Derick Wood3 September 27, 1995
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/read-appl.ps.gz, 19951123
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (More Applications) Further Reading ffl B.A. Kumar, K. Duraiswamy, K. Sarukesi (1992). A new approach to machine learning systems and its application to the development of an ITS. Journal of
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/read-appl.ps.gz, 19951123
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Reading List (More Applications) Further Reading ffl B.A. Kumar, K. Duraiswamy, K. Sarukesi (1992). A new approach to machine learning systems and its application to the development of an ITS. Journal of
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.pr93.ps.gz, 19951124
Constructive Neural Networks as Estimators of Bayesian Discriminant Functions1 Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong 17 February 1992
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.nips95.ps.gz, 19951124
Predictive Q-Routing: A Memory-based Reinforcement Learning Approach to Adaptive Traffic Control Samuel P.M. Choi, Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong fpmchoi,dyyeungg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture21.ps, 19951127
COMP251 - Principles of Programming Languages Lecture 23 : 20 - 11 -95 1 Name : Yeung Yiu Wai Student I.D. : 94211063 Email : csyyw@cs.ug.ust.hk C++ Class Design( Continued ) Overload operators Recall that ML has overloaded operators, C++ not only has overloaded operators, but operators can be
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/Wu_Xia.95.ps.gz, 19951128
Machine Translation, 9:3-4, 285{313 (1995) c 1995 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Large-Scale Automatic Extraction of an English-Chinese Translation Lexicon DEKAI WU dekai@cs.ust.hk XUANYIN XIA samxia@cs.ust.hk Department of Computer Science, HKUST, University of
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture22.ps, 19951128
COMP 251 - Principles of Programming Languages Lecture 1 23/11/95 ~ 1 ~ C++ Templates Recall that in ML, functions and data structures can have types that contain type variables such as a. i.e. they can be polymorphic. In C++, we can use templates to do the same kind of thing. One important difference
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/geochg.ps.gz, 19951130
1 GeoChange: An Experiment in Wide-Area Database Services for Geographic Information Exchange Pamela Drew and Jerry Ying1 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong Internet: {pam, jying} @cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture23.ps, 19951205
COMP 251 COMP 251 Instructor: James W. Gray, III Lecture 23 (27 Nov) Prepared by: David, Chan Yuk Ming (csymchan) Page 1 Inline functions in C++ We want a mechanism to implement small functions without the overhead of a function call. This is especially true in C++, since we often write short functions
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture24.ps, 19951205
Prepared by : Wong Ming Ho (csmhwong) 1 of 4 Comp251 : Lecture Note for 30th Nov, 1995 Inheritance and Code Reuse The ffiirrsstt major use of inheritance in C++ is to support reuse of code (in the base class). Consider the problem domain of displaying windows on a computer screen. We want to display
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/hwk5.ps.gz, 19951207
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Assignment 5 (5%): PAC Learning Due date: 7 December 1995, in class 1. For any finite hypothesis space H, prove that VCdim(H) <= log2 jHj: (1) 2. Based on (1), can we conclude that the sample complexity bound
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/hw4.soln.ps, 19951207
COMP 251, Lecture 1 Instructor: James W. Gray, III Fall 1995 Homework 4 (Block Structure), with solutions I recommend you do two of the following three questions. If you have lots of spare time and you really want to do more, do all three, but that shouldn't be necessary for you to understand the ideas
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp522/f95/hwk5.ps.gz, 19951207
Hong Kong University of Science and Technology COMP522: Machine Learning Fall Semester, 1995/96 Assignment 5 (5%): PAC Learning Due date: 7 December 1995, in class 1. For any finite hypothesis space H, prove that VCdim(H) <= log2 jHj: (1) 2. Based on (1), can we conclude that the sample complexity bound
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp251.L1/Lecture25.ps, 19951211
Comp 251 principle of programming language Lecture 25 (4 th Dec,1995) Page 1 by Lau Hon Ching (cshclau) Inheritance and Abstract Classes (The 2nd major use of inheritance) Suppose we re designing a system that gets audio (sound) data from several microphones connected to a computer. The microphones can
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.icdar95.ps.gz, 19951218
A Grammatical Inference Approach to On-line Handwriting Modeling and Recognition: A Pilot Study1 Dit-Yan Yeung (dyyeung@cs.ust.hk) Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tr94-34.ps.gz, 19960104
Constrained Independence System and Triangulations of Planar Point Sets1 Siu-Wing Cheng2 Yin-Feng Xu3
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/95/tr95-20.ps.gz, 19960104
A Fast Algorithm for Computing Optimal Rectilinear Steiner Trees for Extremal Point Sets1 Siu-Wing Cheng2 Chi-Keung Tang3 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/anlp94.Wu_Fung.ps.Z, 19960105
In ANLP-94, Fourth Conference on Applied Natural Language Processing, Stuttgart: Oct. 94, 180 181. IMPROVING CHINESE TOKENIZATION WITH LINGUISTIC FILTERS ON STATISTICAL LEXICAL ACQUISITION Dekai Wu Department of Computer Science University of Science & Technology (HKUST) Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/dodrew.ps.gz, 19960109
Interactions of Concurrent Workflow Processes over Shared Informationy Lyman Do and Pamela Drew Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong flyman,pamg@cs.ust.hk 1 Introduction There are two run-time functions particularly important in a
open this document and view contentsftp://ftp.cs.ust.hk/pub/video/papers/accv95.ps.gz, 19960109
Video Segment Indexing Through Classification and Interactive View-based Query John Chung-Mong Leey, Wei Xiongy, Ding-Gang Shenzand Ruihua May yDepartment of Computer Science The Hong Kong University of Science & Technology, Hong Kong zInstitute of Optic-Fibre Technology Shanghai Jiaotong University,
open this document and view contentsftp://ftp.cs.ust.hk/pub/video/papers/NetCMP.ps.gz, 19960111
Net comparison: A Versatile and Efficient method for Scene Change Detection Wei Xiong John Chung-Mong Lee Department of Computer Science Hong Kong University of Science and Technology, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/video/papers/vdb-spie96.ps.gz, 19960111
An Experimental Video Database Management System Based on Advanced Object-Oriented Techniques Liu Sheng HUANG John Chung-Mong LEE Qing LI Wei XIONG Data/Knowledge Base Group Artificial Intelligence Group Dept of Computer Science Dept of Computer Science Hong Kong University of Science and Technology,
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/sc2c-r4rs.ps.gz, 19960118
Scheme->C Index to the 4 Revised Report on the Algorithmic Language Scheme 15 March 1993 bit-and bit-lsh Implementation Notes bit-not bit-or bit-rsh bit-xor Scheme->C is an implementation of the language c-byte-ref c-byte-set! 4 Scheme as described in the Revised Report on the c-double-ref c-double-set!
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/sc2c-r4rs.ps.gz, 19960118
Scheme->C Index to the 4 Revised Report on the Algorithmic Language Scheme 15 March 1993 bit-and bit-lsh Implementation Notes bit-not bit-or bit-rsh bit-xor Scheme->C is an implementation of the language c-byte-ref c-byte-set! 4 Scheme as described in the Revised Report on the c-double-ref c-double-set!
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/r4rs.ps.gz, 19960118
Revised4 Report on the Algorithmic Language Scheme WILLIAM CLINGER AND JONATHAN REES (Editors) H. ABELSON R. K. DYBVIG C. T. HAYNES G. J. ROZAS N. I. ADAMS IV D. P. FRIEDMAN E. KOHLBECKER G. L. STEELE JR. D. H. BARTLEY R. HALSTEAD D. OXLEY G. J. SUSSMAN G. BROOKS C. HANSON K. M. PITMAN M. WAND Dedicated
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/sc2c-embed.ps.gz, 19960118
Embedded Scheme->C -- 1 February 1993 One of the major goals of Scheme->C was to build a Scheme compiler and runtime system that could coexist with other programming languages. While this effort has been quite successful, Scheme->C has not offered everything needed by applications that wish to embed a
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/sc2c-intro.ps.gz, 19960118
An Introduction to Scheme->C in 19 Prompts 12 August 1988 Scheme->C is an implementation of the language Scheme. Besides the usual interpreter, the implementation includes an unusual compiler which compiles Scheme to C. This allows stand-alone programs and programs combining Scheme and other programming
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/sc2c-embed.ps.gz, 19960118
Embedded Scheme->C -- 1 February 1993 One of the major goals of Scheme->C was to build a Scheme compiler and runtime system that could coexist with other programming languages. While this effort has been quite successful, Scheme->C has not offered everything needed by applications that wish to embed a
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/sc2c-intro.ps.gz, 19960118
An Introduction to Scheme->C in 19 Prompts 12 August 1988 Scheme->C is an implementation of the language Scheme. Besides the usual interpreter, the implementation includes an unusual compiler which compiles Scheme to C. This allows stand-alone programs and programs combining Scheme and other programming
open this document and view contentsftp://ftp.cs.ust.hk/pub/gbaciu/papers/afront.ps.gz, 19960119
Advancing Front Meshing for Radiosity Solutions George Baciu and Rico K. W. Tsang The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/video/papers/MVA94.ps.gz, 19960121
A Robust Approach for Camera Break Detection in Color Video Sequence 1 John Chung-Mong LEE and Dixon Man-Ching IP Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/video/papers/vdb1.ps.gz, 19960124
VIMS: A Video Information Manipulation System John Chung-Mong LEE Qing LI Wei XIONG Dept of Computer Science Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04.ps.gz, 19960124
Knowledge Discovery in Databases Beat W uthrich The Hong Kong University of Science and Technology Clear Water Bay Kowloon, Hong Kong e-mail: beat@cs.ust.hk phone: (852) 2358 7013 fax: (852) 2358 1477 January 23, 1996 1
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4Chap4.ps.gz, 19960125
Chapter 4 Time We have seen that uncertainty is a frequently occurring phenomenon of information or data. Another phenomenon is time. In many practical (discovery) applications it is not only crucial to store (predict respectively) information but also to keep track of when the information is valid. If
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4Chap3.ps.gz, 19960125
Chapter 3 Uncertainty In chapter 1 we saw that uncertainty is an important concept for knowledge discovery. Firstly, the discovered rules will very unlikely be able to predict every case one hundred percent accurately. The predictions are therefore uncertain. Secondly, even when discoverying knowledge
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04Chap5.ps.gz, 19960125
Chapter 5 Learning Propositional Rules and Decision Trees In section 2.1 we introduced the syntax and the semantics of propositional rules which are equivalent in expressive power to decision trees. In this section we introduce basic symbolic machine learning techniques. More details on the topics
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4Chap10.ps.gz, 19960125
Chapter 10 Discovering Timely Information Novel techniques to forecast daily currency exchange rates and a system that incorporates these techniques are presented. Forecastings are obtained from automatically generated probabilistic decision rules, threshold values and global optimization techniques for
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4Chap6.ps.gz, 19960125
Chapter 6 Learning Datalog Rules We outline ways and means to learn Datalog rules. Datalog programs are function-free Logic Programs and therefore the research area dealing with the learning of Datalog programs is also known under the name Inductive Logic Programming. As mentioned in chapter 2,
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04Chap2.ps.gz, 19960125
Chapter 2 Rule Languages We have seen that one way - the most popular one - of discovering knowledge is to learn deduction rules from training examples and information kept in a database or knowledge base. The generation or discovery of rules can also be supported by user interaction and can thus be
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04Chap3.ps.gz, 19960125
Chapter 3 Uncertainty In chapter 1 we saw that uncertainty is an important concept for knowledge discovery. Firstly, the discovered rules will very unlikely be able to predict every case one hundred percent accurately. The predictions are therefore uncertain. Secondly, even when discoverying knowledge
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4Biblio.ps.gz, 19960125
Bibliography S-Plus, Guide to Statistical and Mathematical Analysis, version 3.2. December 1993. Mit dem Rechner Risiken erkennen (Detecting Risks with Computers). Finanz und Wirtschaft, 24 Dec 1994. in German. Moderne Prognose Instumente F ur Finanzm arkte (Modern Forecasting Instruments
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4Chap1.ps.gz, 19960125
Chapter 1 Introduction This chapter provides a short overview on the topics covered by the course COMP337/COMP537 Knowledge Discovery in Databases taught in Spring 96 at the Hong Kong University of Science and Technology. We intend to cover the following topics. 1.1 Course Outline ffl Overview and
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4Chap5.ps.gz, 19960125
Chapter 5 Learning Propositional Rules and Decision Trees In section 2.1 we introduced the syntax and the semantics of propositional rules which are equivalent in expressive power to decision trees. In this section we introduce basic symbolic machine learning techniques. More details on the topics
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4Chap8.ps.gz, 19960125
Chapter 8 Consistent Forecastings 8.1 Introduction In various application domains such as business, manufacturing and medicine, forecasting and discovery tools become increasingly important . Sales managers base forecasts on various product history variables; marketers consider the complex set of
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04Chap8.ps.gz, 19960125
Chapter 8 Consistent Forecastings 8.1 Introduction In various application domains such as business, manufacturing and medicine, forecasting and discovery tools become increasingly important . Sales managers base forecasts on various product history variables; marketers consider the complex set of
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04contents.ps.gz, 19960125
Knowledge Discovery in Databases Beat W uthrich The Hong Kong University of Science and Technology Clear Water Bay Kowloon, Hong Kong e-mail: beat@cs.ust.hk phone: (852) 2358 7013 fax: (852) 2358 1477 January 23, 1996 1
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04Chap10.ps.gz, 19960125
Chapter 10 Discovering Timely Information Novel techniques to forecast daily currency exchange rates and a system that incorporates these techniques are presented. Forecastings are obtained from automatically generated probabilistic decision rules, threshold values and global optimization techniques for
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4Chap7.ps.gz, 19960125
Chapter 7 Learning Probabilistic Datalog In this chapter we give the theoretical aspects underlying the system ProbKB. 7.1 Handling Rule Probabilities The calculus of probabilistic Datalog introduced in section 3.3 does not show how to handle conditional probabilities of rules but only deals with
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04Chap6.ps.gz, 19960125
Chapter 6 Learning Datalog Rules We outline ways and means to learn Datalog rules. Datalog programs are function-free Logic Programs and therefore the research area dealing with the learning of Datalog programs is also known under the name Inductive Logic Programming. As mentioned in chapter 2,
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4Chap2.ps.gz, 19960125
Chapter 2 Rule Languages We have seen that one way - the most popular one - of discovering knowledge is to learn deduction rules from training examples and information kept in a database or knowledge base. The generation or discovery of rules can also be supported by user interaction and can thus be
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04Chap7.ps.gz, 19960125
Chapter 7 Learning Probabilistic Datalog In this chapter we give the theoretical aspects underlying the system ProbKB. 7.1 Handling Rule Probabilities The calculus of probabilistic Datalog introduced in section 3.3 does not show how to handle conditional probabilities of rules but only deals with
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4ChapAck.ps.gz, 19960125
CHAPTER 10. DISCOVERING TIMELY INFORMATION 156 Acknowledgements I am very grateful to my postgraduate students Tong Wing Chung, Krishnan Sankaran and Cho Wing Sing. This book would not have been written without their collaboration and their contributions. Most of the systems mentioned herein have been
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04Chap9.ps.gz, 19960125
Chapter 9 Learning Probabilistic FQL* We present the data mining tool DISCOVER. describes and gives access to a database contains objects or patients each with the following information. 1. LCORE (patient's internal temperature in C): high (> 37), mid (>= 36 and <= 37), low (< 36) 2. LSURF
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4Chap9.ps.gz, 19960125
Chapter 9 Learning Probabilistic FQL* We present the data mining tool DISCOVER. describes and gives access to a database contains objects or patients each with the following information. 1. LCORE (patient's internal temperature in C): high (> 37), mid (>= 36 and <= 37), low (< 36) 2. LSURF
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-4contents.ps.gz, 19960125
Knowledge Discovery in Databases Beat W uthrich The Hong Kong University of Science and Technology Clear Water Bay Kowloon, Hong Kong e-mail: beat@cs.ust.hk phone: (852) 2358 7013 fax: (852) 2358 1477 January 23, 1996 1
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04Chap1.ps.gz, 19960125
Chapter 1 Introduction This chapter provides a short overview on the topics covered by the course COMP337/COMP537 Knowledge Discovery in Databases taught in Spring 96 at the Hong Kong University of Science and Technology. We intend to cover the following topics. 1.1 Course Outline ffl Overview and
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04Biblio.ps.gz, 19960125
Bibliography S-Plus, Guide to Statistical and Mathematical Analysis, version 3.2. December 1993. Mit dem Rechner Risiken erkennen (Detecting Risks with Computers). Finanz und Wirtschaft, 24 Dec 1994. in German. Moderne Prognose Instumente F ur Finanzm arkte (Modern Forecasting Instruments
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04ChapAck.ps.gz, 19960125
CHAPTER 10. DISCOVERING TIMELY INFORMATION 156 Acknowledgements I am very grateful to my postgraduate students Tong Wing Chung, Krishnan Sankaran and Cho Wing Sing. This book would not have been written without their collaboration and their contributions. Most of the systems mentioned herein have been
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-04Chap4.ps.gz, 19960125
Chapter 4 Time We have seen that uncertainty is a frequently occurring phenomenon of information or data. Another phenomenon is time. In many practical (discovery) applications it is not only crucial to store (predict respectively) information but also to keep track of when the information is valid. If
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/courseUai/lec2.ps, 19960129
2. Probabilistic reasoning (a). Bayesian newtorks In the intentional approach: ffl A problem domain is modelled by a list of variables x1, x2, : : : , xn, ffl Knowledge about the problem domain is represented by a joint probability P (x1; x2; : : : ; xn). Advantages: ffl Clear semantics, ffl In theory,
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp523/s95/hwk5.ps.gz, 19960201
Hong Kong University of Science and Technology COMP523: Artificial Neural Networks Spring Semester, 1994/95 Homework Assignment 5: Hopfield Model for Optimizing Switching Control Due date: 23 May 1995 Statement of the Problem In many networking applications, switching control is a crucial issue which
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/set1.ps.gz, 19960201
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Problem Set 1: Programming in Scheme Due: 9 February 1996, in lecture Preamble The exercises in this problem set were adapted from Springer and Friedman's Scheme and the Art of Programming. The
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp523/hwk5.ps.gz, 19960201
Hong Kong University of Science and Technology COMP523: Artificial Neural Networks Spring Semester, 1994/95 Homework Assignment 5: Hopfield Model for Optimizing Switching Control Due date: 23 May 1995 Statement of the Problem In many networking applications, switching control is a crucial issue which
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/set1.ps.gz, 19960201
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Problem Set 1: Programming in Scheme Due: 9 February 1996, in lecture Preamble The exercises in this problem set were adapted from Springer and Friedman's Scheme and the Art of Programming. The
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/mitsc-ref.ps.gz, 19960205
MIT Scheme Reference Manual Edition 1.52 beta for Scheme Release 7.4 30 May 1995 by Chris Hanson the MIT Scheme Team and a cast of thousands Copyright c 1988-95 Massachusetts Institute of Technology This material was developed by the Scheme project at the Massachusetts Institute of Technology,
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/mitsc-user.ps.gz, 19960205
MIT Scheme User's Manual Edition 1.27 beta for Scheme Release 7.4 May 30, 1995 by Stephen Adams Chris Hanson and the MIT Scheme Team Copyright c 1991-95 Massachusetts Institute of Technology This material was developed by the Scheme project at the Massachusetts Institute of Technology, Department of
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/mitsc-user.ps.gz, 19960205
MIT Scheme User's Manual Edition 1.27 beta for Scheme Release 7.4 May 30, 1995 by Stephen Adams Chris Hanson and the MIT Scheme Team Copyright c 1991-95 Massachusetts Institute of Technology This material was developed by the Scheme project at the Massachusetts Institute of Technology, Department of
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect2.ps, 19960209
COMP 361 DATA COMMUNICATIONS 1 DATA COMMUNICATIONS COMP 361 DATA COMMUNICATIONS 2 Data Transmission Data transmission from a sender to a receiver requires the use of a transmission medium: - Guided media: twisted pair, coaxial cable, fiber optic cable - Unguided media: microwave, satellite transmission,
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect4.ps, 19960209
COMP 361 DATA COMMUNICATIONS 29 Analog Modulation Carrier signal Modulating signal Amplitude modulated wave Phase-modulated wave Frequency-modulated wave COMP 361 DATA COMMUNICATIONS 30 Digital Transmission Digital data is transferred along a single communication path one bit at a time Synchronization
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect1.ps, 19960209
COMP 361 INTRODUCTION 1 COMP 361 COMPUTER COMMUNICATION NETWORKS Jogesh K. Muppala Section L2 COMP 361 INTRODUCTION 2 INTRODUCTION COMP 361 INTRODUCTION 3 Computer Communications Information technology has been the driving force this century There has been a revolution in the way information is
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect3.ps, 19960209
COMP 361 DATA COMMUNICATIONS 17 Guided Media: Coaxial Cable It is constructed using an outer hollow cylindrical conductor enclosing an inner single wire conductor Used in long distance telephone and tele- vision (cable) transmission and distribution Used to construct local area networks Data rate is
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect6.ps, 19960209
COMP 361 MEDIUM ACCESS SUBLAYER 1 MEDIUM ACCESS SUBLAYER COMP 361 MEDIUM ACCESS SUBLAYER 2 Local and Metropolitan Area Networks Local area networks (LANs) and metropolitan area networks (MANs) are designed to interconnect computers within a small geographical area like a room, building, campus, or a
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect5.ps, 19960209
COMP 361 DATA COMMUNICATIONS 37 RS-232-C Specifications The procedural specification indicates the protocol and handshaking used in the exchange of data User dials numbers Dial digits DTR on RI on RTS on Tone on CD on DTR on DCR on Short delay CTS on TxDData tones Tone off RxD CD off CTS off RTS on RTS
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-05.ps.gz, 19960212
Incorporation of Context Constraints for Compositional Reachability Analysis Shing-chi Cheung* and Jeff Kramer Technical Report HKUST-CS96-5 February 1996 *Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong (email: scc@cs.ust.hk)
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/courseinfo.ps, 19960213
HKUST Computer Science SYLLABUS (by week) 1. Introduction, hardware and software, high level programming versus low level programming; 2. Assembly language programming, registers, memory, programming model, DOS and BIOS interrupt calls; 3. Data representation, binary arithmetic; 4. 1 s complement, 2 s
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect1.ps, 19960214
COMP 361 INTRODUCTION 1 COMP 361 COMPUTER COMMUNICATION NETWORKS Jogesh K. Muppala Section L2 COMP 361 INTRODUCTION 2 INTRODUCTION COMP 361 INTRODUCTION 3 Computer Communications Information technology has been the driving force this century There has been a revolution in the way information is
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect2.ps, 19960214
COMP 361 DATA COMMUNICATIONS 1 DATA COMMUNICATIONS COMP 361 DATA COMMUNICATIONS 2 Data Transmission Data transmission from a sender to a receiver requires the use of a transmission medium: - Guided media: twisted pair, coaxial cable, fiber optic cable - Unguided media: microwave, satellite transmission,
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect3.ps, 19960214
COMP 361 DATA COMMUNICATIONS 17 Guided Media: Coaxial Cable It is constructed using an outer hollow cylindrical conductor enclosing an inner single wire conductor Used in long distance telephone and tele- vision (cable) transmission and distribution Used to construct local area networks Data rate is
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect4.ps, 19960214
COMP 361 DATA COMMUNICATIONS 29 Analog Modulation Carrier signal Modulating signal Amplitude modulated wave Phase-modulated wave Frequency-modulated wave COMP 361 DATA COMMUNICATIONS 30 Digital Transmission Digital data is transferred along a single communication path one bit at a time Synchronization
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect5.ps, 19960214
COMP 361 DATA COMMUNICATIONS 37 RS-232-C Specifications The procedural specification indicates the protocol and handshaking used in the exchange of data User dials numbers Dial digits DTR on RI on RTS on Tone on CD on DTR on DCR on Short delay CTS on TxDData tones Tone off RxD CD off CTS off RTS on RTS
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect6.ps, 19960214
COMP 361 MEDIUM ACCESS SUBLAYER 1 MEDIUM ACCESS SUBLAYER COMP 361 MEDIUM ACCESS SUBLAYER 2 Local and Metropolitan Area Networks Local area networks (LANs) and metropolitan area networks (MANs) are designed to interconnect computers within a small geographical area like a room, building, campus, or a
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec5.ps, 19960214
HKUST 1 Computer Science COMP 180 Lecture 5 Today s Topics Assembly Language -- Revisit Pseudo-ops Some useful directives Some useful operators Some arithmetic instructions Data representation. HKUST 2 Computer Science COMP 180 Lecture 5 The Structure of Assembly Language Programs The assembly language
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/hwk1.ps.gz, 19960215
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Programming Assignment 1: A Search Due: 29 February 1996, 5pm (Part A); 11 March 1996, 5pm (Part B) Part A: Warming Up with the 8-Puzzle Problem Description Detailed description of the 8-puzzle
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec1.ps, 19960215
COMP 180 INTRODUCTION 1 COMP 180 COMPUTER ORGANIZATION Dr. Bo Li Room 3505 E-Mail: BLI@cs.ust.hk COMP 180 INTRODUCTION 2 NOTICES Section 1 versus Section 2 Lab requirements Homework Assignment Midterm Examination (week 8) Final Examination Q & A Notes and Syllabus --> Library Reserve Office Hours 15:00
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/ispan96-camera.ps.gz, 19960215
Abstract1 In this paper, we survey algorithms that allocate a parallel program represented by an edge-weighted directed acyclic graph (DAG), also called a task graph or macrodataflow graph, to a set of homogeneous processors, with the objective of minimizing the completion time. We analyze 21 such
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec2.ps, 19960215
HKUST 1 Computer Science COMP 180 Lecture 2 Today s Topics Basic Computer Components Operation of CPU Data path Secondary memory Magnetic disks Magnetic tapes Input/Output structures of main-frame computers and PC s Terminals Modem HKUST 2 Computer Science COMP 180 Lecture 2 Computer Architecture
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec3.ps, 19960215
HKUST 1 Computer Science COMP 180 Lecture 3 Today s Topics Main Memory Structure. Q & A. Assembly Language. Assembler. Linker. Intel 8088 HKUST 2 Computer Science COMP 180 Lecture 3 Memory System (1) Main Memory It is also called RAM or Primary Storage (2) Secondary Memory Magnetic Tapes, Magnetic
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/set2.ps.gz, 19960215
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Problem Set 2: Problem Solving as Search Due: 1 March 1996, in lecture The exercises in this problem set are from the textbook. Exercises 4.1, 4.4, 5.1, 5.8a Optional 4.7, 5.16
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/set2.ps.gz, 19960215
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Problem Set 2: Problem Solving as Search Due: 1 March 1996, in lecture The exercises in this problem set are from the textbook. Exercises 4.1, 4.4, 5.1, 5.8a Optional 4.7, 5.16
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/survey-ispan96.ps.gz, 19960215
Abstract1 In this paper, we survey algorithms that allocate a parallel program represented by an edge-weighted directed acyclic graph (DAG), also called a task graph or macrodataflow graph, to a set of homogeneous processors, with the objective of minimizing the completion time. We analyze 21 such
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/hwk1.ps.gz, 19960215
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Programming Assignment 1: A Search Due: 29 February 1996, 5pm (Part A); 11 March 1996, 5pm (Part B) Part A: Warming Up with the 8-Puzzle Problem Description Detailed description of the 8-puzzle
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec6.ps, 19960217
HKUST 1 Computer Science COMP 180 Lecture 6 Today s Topics Conversion among different number system. Binary arithmetic. Signed Binary Numbers 1 s complement 2 s complement HKUST 2 Computer Science COMP 180 Lecture 6 Conversion from decimal to binary, octal, and hex. By repeated division or
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/cemnlp96-annex.ps.gz, 19960219
(advph(sadv ) , )(nounph(modph(aa(a )))(nounph(noun(nc ))))(clause(nounph(modph(aa(vi1 )))(nounph(noun(nc ))))(verbph(vi1(vadv )(vi1 )))) , (clause(verbph(verbph(vn(neg )(vn(auxvb(aux ))(vn )))(nounph(modph(aa(a )))(nounph(noun(nc )))))(verbph(advph(sadv ))(verbph(vn )(nounph(noun(nc ))))))) ,
open this document and view contentsftp://ftp.cs.ust.hk/pub/roland/cell.ps.Z, 19960221
Automated Analysis of Nerve-Cell Images Using Active Contour Models1 Ying-Lun Fok x, Joseph Chan z and Roland T. Chin xy y Electrical & Computer Engineering University of Wisconsin, Madison, Wisconsin 53706 x Computer Science Department Hong Kong University of Science & Technology z Division of
open this document and view contentsftp://ftp.cs.ust.hk/pub/roland/concave.ps.Z, 19960221
Decomposition of Arbitrarily-Shaped Morphological Structuring Elements Hochong Park and Roland T. Chin* Department of Electrical and Computer Engineering University of Wisconsin - Madison Madison, Wisconsin 53706
open this document and view contentsftp://ftp.cs.ust.hk/pub/roland/hajj.2d.ps.Z, 19960221
A 2D Multirate Bayesian Framework For Multiscale Feature Detection Hazem H. Hajj, Truong Q. Nguyen, and Roland T. Chin
open this document and view contentsftp://ftp.cs.ust.hk/pub/roland/convex.ps.Z, 19960221
Optimal Decomposition of Convex Morphological Structuring Elements for 4-Connected Parallel Array Processors Hochong Park and Roland T. Chin Department of Electrical and Computer Engineering University of Wisconsin - Madison 1415 Johnson Drive Madison, Wisconsin 53706
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic05.ps.gz, 19960222
COMP221: Fundamentals of Artificial Intelligence Topic 5: Knowledge Representation and Reasoning Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Knowledge Representation and Reasoning 1 Knowledge-Based Agents ffl Two main
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic05.ps.gz, 19960222
COMP221: Fundamentals of Artificial Intelligence Topic 5: Knowledge Representation and Reasoning Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Knowledge Representation and Reasoning 1 Knowledge-Based Agents ffl Two main
open this document and view contentsftp://ftp.cs.ust.hk/pub/roland/deform.ps.Z, 19960222
Deformable Contours: Modeling and Extraction1 Kok F. Lai and Roland T. Chin
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/kr92.ps.gz, 19960223
Stepwise-Decomposable Influence Diagrams (Nevin) Lianwen Zhang and David Poole Department of Computer Science University of British Columbia Vancouver, B.C., V6T 1Z2, Canada E-mail: lzhang@cs.ubc.ca poole@cs.ubc.ca
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/sol-quiz1.ps, 19960223
Department of Computer Science The Hong Kong University of Science and Technology COMP 361 Sec. 2 (Spring 1996) Quiz 1 1 COMP 361 Computer Communication Networks/Section 2 Spring Semester 1996 Quiz 1 Date: February 16, 1996 Time: 11:30 - 11:50 (20 minutes) Instructions: 1. Please write your name,
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/ais94.ps.gz, 19960223
Minimizing decision table sizes in influence diagrams: dimension shrinking1 Nevin Lianwen Zhang2, Runping Qi and David Poole Department of Computer Science University of British Columbia Vancouver, B.C. V6T 1Z2, CANADA
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/uai93.ps.gz, 19960223
Incremental computation of the value of perfect information in stepwise-decomposable influence diagrams (Nevin) Lianwen Zhang, Runping Qi, and David Poole Department of Computer Science University of British Columbia Vancouver, B.C., Canada flzhang, qi, pooleg@cs.ubc.ca
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4sol-quiz1.ps, 19960223
Dept. of CS/HKUST COMP 361 Sec. 2 (Spring 1996) Quiz 1 2 Student ID:____________________ 3. An asynchronous transmission system uses a start bit of length one bit time, and a stop bit of length two bit times. The character length, including the parity bit is 6 bit times. What is the percentage overhead
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect9.ps, 19960227
COMP 361 MEDIUM ACCESS SUBLAYER 21 IEEE 802.4 Token Bus Medium options: The medium access control technique is the token bus algorithm Medium access control A control frame is used to carry out ring maintenance operations Option Transmission medium Signalling technique Data rate (Mbps) Max. Seg. length
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect9.ps, 19960227
COMP 361 MEDIUM ACCESS SUBLAYER 21 IEEE 802.4 Token Bus Medium options: The medium access control technique is the token bus algorithm Medium access control A control frame is used to carry out ring maintenance operations Option Transmission medium Signalling technique Data rate (Mbps) Max. Seg. length
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic02.ps.gz, 19960229
COMP221: Fundamentals of Artificial Intelligence Topic 2: Scheme Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Scheme 1 The Scheme Programming Language ffl Scheme: { A dialect of Lisp { Interactive functional
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic02.ps.gz, 19960229
COMP221: Fundamentals of Artificial Intelligence Topic 2: Scheme Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Scheme 1 The Scheme Programming Language ffl Scheme: { A dialect of Lisp { Interactive functional
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic01.ps.gz, 19960229
COMP221: Fundamentals of Artificial Intelligence Topic 1: Introduction Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Introduction 1 Artificial Intelligence ffl The term Artificial Intelligence (AI)" was first coined in
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic03.ps.gz, 19960229
COMP221: Fundamentals of Artificial Intelligence Topic 3: Problem Solving as Search Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Problem Solving as Search 1 Problem-Solving Agents ffl Key ideas: { To determine what the
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic04.ps.gz, 19960229
COMP221: Fundamentals of Artificial Intelligence Topic 4: Game Playing Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Game Playing 1 Games as Search Problems ffl Mainly two-player games are considered. ffl Two-player
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic01.ps.gz, 19960229
COMP221: Fundamentals of Artificial Intelligence Topic 1: Introduction Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Introduction 1 Artificial Intelligence ffl The term Artificial Intelligence (AI)" was first coined in
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic06.ps.gz, 19960229
COMP221: Fundamentals of Artificial Intelligence Topic 6: First-Order Logic Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 First-Order Logic 1 Why First-Order Logic ffl Propositional logic is limited in representation
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic06.ps.gz, 19960229
COMP221: Fundamentals of Artificial Intelligence Topic 6: First-Order Logic Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 First-Order Logic 1 Why First-Order Logic ffl Propositional logic is limited in representation
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic04.ps.gz, 19960229
COMP221: Fundamentals of Artificial Intelligence Topic 4: Game Playing Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Game Playing 1 Games as Search Problems ffl Mainly two-player games are considered. ffl Two-player
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic03.ps.gz, 19960229
COMP221: Fundamentals of Artificial Intelligence Topic 3: Problem Solving as Search Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Problem Solving as Search 1 Problem-Solving Agents ffl Key ideas: { To determine what the
open this document and view contentsftp://ftp.cs.ust.hk/pub/avi/pubs/pixelInteraction.ps.Z, 19960303
Spatial non-linearities of grayscale CRT pixels Avi C. Naiman Walter Makous Center for Visual Science Psychology Department University of Rochester Rochester, New York, 14627
open this document and view contentsftp://ftp.cs.ust.hk/pub/avi/pubs/jaggies.SID.95.ps.Z, 19960303
10.1 / Naiman 10.1: The Visibility of Higher-Level Jags A. C. Naiman Hong Kong University of Science and Technology, Kowloon, Hong Kong W. Makous University of Rochester, Rochester, NY
open this document and view contentsftp://ftp.cs.ust.hk/pub/avi/pubs/jaggies.SID.94.ps.Z, 19960303
15.3: Late-News Paper: Jagged Edges and Their Visibility A. C. Naiman Hong Kong University of Science and Technology, Kowloon, Hong Kong W. Makous Center for Visual Science, University of Rochester, Rochester, NY
open this document and view contentsftp://ftp.cs.ust.hk/pub/avi/pubs/jaggies.PG.ps.Z, 19960303
International Conference Proceedings Pacific Graphics'94 / CADDM'94 August 26 29, 1994, Beijing, China COMPUTING THE JAGGEDNESS OF EDGES Avi C. Naiman Department of Computer Science, Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Walter Makous Center for Visual
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect10.ps, 19960305
COMP 361 MEDIUM ACCESS SUBLAYER 33 Comparison of Protocols In general there is no clear winner Property CSMA/CD Token Bus Token Ring Protocol Simple Complex Complex Addition/ Deletion Simple Bus maintenance Ring maintenance Delay Non-deterministic Deterministic Deterministic Priorities Not possible
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect10.ps, 19960305
COMP 361 MEDIUM ACCESS SUBLAYER 33 Comparison of Protocols In general there is no clear winner Property CSMA/CD Token Bus Token Ring Protocol Simple Complex Complex Addition/ Deletion Simple Bus maintenance Ring maintenance Delay Non-deterministic Deterministic Deterministic Priorities Not possible
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-01.ps.gz, 19960305
Theoretical Analysis of the Heterogeneous Dynamic Load Balancing Problem Using a Hydro-Dynamic Approachy Chi-Chung Hui and Samuel T. Chanson Technical Report HKUST-CS96-01 March 5, 1996 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lecture9-10.ps, 19960306
COMP 180 Lecture 9-10 1 of 17 Today s Topic Addressing Modes (8088) 8088 Registers Register Immediate Direct Register Indirect Base-Plus-Index Register Relative Base Relative-Plus-Index COMP 180 Lecture 9-10 2 of 17 8088 Registers (Re-visit) Data Registers: AX (accumulator), BX (Base register), CX
open this document and view contentsftp://ftp.cs.ust.hk/pub/video/papers/txture-classif.ps.gz, 19960307
1 An Efficient and Effective Texture Classification Approach Using a New Notion in Wavelet Theory1 Jian-Feng Liu and John Chung-Mong Lee Department of Computer Science, Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Email: jane@cs.ust.hk or cmlee@cs.ust.hk < Abstract>
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/trset1.ps, 19960307
COMP 361 - Spring 1996 March 7, 1996 1 COMP 361 - Spring 1996 Training Problem Set 1 1. Compute the bandwidth needed to transmit square wave with data transmission rate of 2 Mbps and without the DC component, if only the fundamental frequency and first three harmonics are transmitted. Solution: The bit
open this document and view contentsftp://ftp.cs.ust.hk/pub/dekai/ijcai95.Wu.ps.Z, 19960309
To appear in IJCAI-95, Proc. of the 14th International Joint Conference on Artificial Intelligence, Montreal: Aug. 95. Stochastic Inversion Transduction Grammars, with Application to Segmentation, Bracketing, and Alignment of Parallel Corpora Dekai Wu Technical Report HKUST-CS95-30 June 1995 HKUST
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec7-8.ps, 19960309
HKUST 1 Computer Science COMP 180 Lecture 7-8 Today s Topics Finite precision numbers. Floating point numbers. HKUST 2 Computer Science COMP 180 Lecture 7-8 Finite precision numbers. The arithmetic used by computer differs in certain ways from the arithmetic we use. The numbers used in computer is
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/set3.ps.gz, 19960311
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Problem Set 3: First-Order Logic and Reasoning Due: 22 March 1996, in lecture The exercises in this problem set are from the textbook. Exercises ffl 7.2 ffl 7.6 (modified): Write axioms describing
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/set3.ps.gz, 19960311
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Problem Set 3: First-Order Logic and Reasoning Due: 22 March 1996, in lecture The exercises in this problem set are from the textbook. Exercises ffl 7.2 ffl 7.6 (modified): Write axioms describing
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect14.ps, 19960312
COMP 361 DATA LINK LAYER 1 DATA LINK LAYER COMP 361 DATA LINK LAYER 2 Why Data Link Layer The data link layer is responsible for efficient and reliable communication across a physical link The data link layer must provide: - Frame synchronization: cleary identify the beginning and end of each frame
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic08.ps.gz, 19960312
COMP221: Fundamentals of Artificial Intelligence Topic 8: Probabilistic Reasoning Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Probabilistic Reasoning 1 Pure Logical Agents Are Inadequate ffl The logical agent approach
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4sol-quiz2.ps, 19960312
Department of Computer Science The Hong Kong University of Science and Technology COMP 361 Sec. 2 (Spring 1996) Quiz 2 1 COMP 361 Computer Communication Networks/Section 2 Spring Semester 1996 Quiz 2 Date: March 8, 1996 Time: 11:30 - 11:50 (20 minutes) Instructions: 1. Please write your name, student ID
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect14.ps, 19960312
COMP 361 DATA LINK LAYER 1 DATA LINK LAYER COMP 361 DATA LINK LAYER 2 Why Data Link Layer The data link layer is responsible for efficient and reliable communication across a physical link The data link layer must provide: - Frame synchronization: cleary identify the beginning and end of each frame
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/sol-quiz2.ps, 19960312
Department of Computer Science The Hong Kong University of Science and Technology COMP 361 Sec. 2 (Spring 1996) Quiz 2 1 COMP 361 Computer Communication Networks/Section 2 Spring Semester 1996 Quiz 2 Date: March 8, 1996 Time: 11:30 - 11:50 (20 minutes) Instructions: 1. Please write your name, student ID
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic08.ps.gz, 19960312
COMP221: Fundamentals of Artificial Intelligence Topic 8: Probabilistic Reasoning Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Probabilistic Reasoning 1 Pure Logical Agents Are Inadequate ffl The logical agent approach
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/GIS_slides.ps.gz, 19960314
Drew Historical Maps in GIS March , 1996 Integration of Technologies (Information) Could consider an integration of the two technologies (word/image mapper inside MVD browser and GIS) and hence, the types of information they support well. GIS already support annotation-to-feature mapping via a
open this document and view contentsftp://ftp.cs.ust.hk/pub/william/cheung.accv95.ps.gz, 19960314
A Unified Framework for Handwritten Character Recognition using Deformable Models Kwok-Wai Cheung, Dit-Yan Yeung and Roland T. Chin Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong Email: william@cs.ust.hk, dyyeung@cs.ust.hk, roland@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/william/cheung.dm_survey_draft.ps.gz, 19960314
Deformable Models for Visual Pattern Recognition: A Survey Kwok-Wai Cheung, We-Ming Go, Dit-Yan Yeung, Roland T. Chin Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong Email: fwilliam, williamg, dyyeung, rolandg@cs.ust.hk February 9, 1996
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic07.ps.gz, 19960315
COMP221: Fundamentals of Artificial Intelligence Topic 7: Logical Reasoning Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Logical Reasoning 1 Inference Rules ffl Inference rules for propositional logic and FOL: { Modus
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lecture11-12.ps, 19960315
HKUST 1 Computer Science COMP 180 Lecture 11 Today s Topics Procedures Stack Jumps HKUST 2 Computer Science COMP 180 Lecture 11 Example - Program Structure Figure 2.5 (J. T. Godfrey s book -- IBM Microcomputer Assembly Language) HKUST 3 Computer Science COMP 180 Lecture 11 Pseudo-ops segname SEGMENT
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.cvpr96.ps.gz, 19960315
Competitive Mixture of Deformable Models for Pattern Classification Kwok-Wai Cheung Dit-Yan Yeung Roland T. Chin Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong fwilliam, dyyeung, rolandg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic07.ps.gz, 19960315
COMP221: Fundamentals of Artificial Intelligence Topic 7: Logical Reasoning Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Logical Reasoning 1 Inference Rules ffl Inference rules for propositional logic and FOL: { Modus
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/trset2.ps, 19960316
COMP 361 Sect. 2 (Spring 96) Training Problem Set 2 1 COMP 361-Spring 1996 Training Problem Set 2 1. Explain the flaw in the following logic. Packet switching requires control and address bits to be added to each packet. This causes considerable overhead in packet switching. In circuit switching,
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/sockets.ps, 19960318
COMP 361 sockets 24 TCP client example: #include inet.h main(int argc, char *argv) int sockfd; struct sockaddr_in serv_addr; pname = argv; /* Fill in the structure serv_addr with the address of the server that we want to connect with. */ bzero((char *) &serv_addr, sizeof(serv_addr));
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/phase1.ps, 19960318
COMP 361 Spring 96 Course Project 1 Description of the project(Phase 1) The subject of the course project is implementation of a client-server Student Registration System based on connection oriented protocol (TCP). This is a group project for a group of two students. Each group of students are required
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/trset3.ps, 19960318
COMP 361 Sect. 2 (Spring 96) Training Problem Set 3 1 COMP 361 - Spring 96 Training Problem Set 3 1. Explain the meaning of the terms signal propagation delay and transmission time. Assuming the velocity of signal propagation in a metallic conductor is 2 108 m/s, assume packet sizes are P bits each,
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/seminar_3.19/presentation.ps, 19960320
Channel Access Protocols for High Speed Optical LANs: Bo Li Department of Computer Science Hong Kong University of Science and Technology Kowloon, Hong Kong Claims ffl This is not a paper. ffl This is not a talk on (All) Optical Networks (AONs) ffl This is not a solution oriented presentation. + 1
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect16.ps, 19960320
COMP 361 DATA LINK LAYER 17 Sliding Window Protocol Performance If two stations exchange data, and if one of them has data and an acknowledgement to send, then it sends both together in one frame, thus saving communication capacity This is referred to as piggybacking 0.2 0.4 0.6 0.8 1 0.1 1 10 100 1000
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect16.ps, 19960320
COMP 361 DATA LINK LAYER 17 Sliding Window Protocol Performance If two stations exchange data, and if one of them has data and an acknowledgement to send, then it sends both together in one frame, thus saving communication capacity This is referred to as piggybacking 0.2 0.4 0.6 0.8 1 0.1 1 10 100 1000
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lecture13-14.ps, 19960321
COMP 180 Lecture 13-14 1 of 18 Input/Output Four different I/O schemes are commonly used: Programmed I/O with busy waiting o memory-mapped I/O o port-mapped I/O (also called isolated I/O or I/O-mapped I/O) Interrupt-driven I/O DMA I/O I/O using data channels and I/O processors. COMP 180 Lecture 13-14 2
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect17.ps, 19960325
COMP 361 DATA LINK LAYER 33 Performance of stop-and- wait ARQ We define utilization as: where Tf is time for transmitter to emit a single frame, and Tt is total time engaged in the transmission of a single frame For error-free operation using stop-andwait ARQ: where Tp is the propogation delay and
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect17.ps, 19960325
COMP 361 DATA LINK LAYER 33 Performance of stop-and- wait ARQ We define utilization as: where Tf is time for transmitter to emit a single frame, and Tt is total time engaged in the transmission of a single frame For error-free operation using stop-and- wait ARQ: where Tp is the propogation delay and
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect18.ps, 19960327
COMP 361 DATA LINK LAYER 41 HDLC - Stations Three types of stations are supported: 1.Primary station: has the responsibility for controlling the operation of the link. Frames issued by primary are called commands. 2.Secondary station: operates under the control of the primary station. Frames issued by
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect18.ps, 19960327
COMP 361 DATA LINK LAYER 41 HDLC - Stations Three types of stations are supported: 1.Primary station: has the responsibility for controlling the operation of the link. Frames issued by primary are called commands. 2.Secondary station: operates under the control of the primary station. Frames issued by
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic09-example.ps.gz, 19960401
Example: Flashlight Diagnosis ffl Belief network: Bulb Battery VoltageBeam ffl Variables: Variable Possible Values Bulb Good Dead Battery Good (>2.8V) Weak (2.0{2.8V) Dead (<2.0V) Beam Bright Weak Dead Voltage >2.8V 2.0{2.8V <2.0V ffl The list of possible values (states) for each variable is mutually
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic09.ps.gz, 19960401
COMP221: Fundamentals of Artificial Intelligence Topic 9: Probabilistic Networks Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Probabilistic Networks 1 Belief Networks ffl A belief network is a compact graphical
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic09.ps.gz, 19960401
COMP221: Fundamentals of Artificial Intelligence Topic 9: Probabilistic Networks Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Probabilistic Networks 1 Belief Networks ffl A belief network is a compact graphical
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic09-example.ps.gz, 19960401
Example: Flashlight Diagnosis ffl Belief network: Bulb Battery VoltageBeam ffl Variables: Variable Possible Values Bulb Good Dead Battery Good (>2.8V) Weak (2.0{2.8V) Dead (<2.0V) Beam Bright Weak Dead Voltage >2.8V 2.0{2.8V <2.0V ffl The list of possible values (states) for each variable is mutually
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/set4.ps.gz, 19960402
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Problem Set 4: Probabilistic Reasoning Due: 12 April 1996, in lecture The exercises in this problem set are from the textbook. Exercises ffl 14.3 ffl 14.6 ffl 14.8 ffl 15.1
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/set4.ps.gz, 19960402
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Problem Set 4: Probabilistic Reasoning Due: 12 April 1996, in lecture The exercises in this problem set are from the textbook. Exercises ffl 14.3 ffl 14.6 ffl 14.8 ffl 15.1
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/CPFD-spdp94-camera.ps.gz, 19960408
Abstract1 Communication overhead is one of the main factors that can limit the speedup of parallel programs on messagepassing parallel architectures. This limiting factor is more predominant in distributed systems such as clusters of homogeneous or heterogeneous workstations. However, excessive
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/cpfd-spdp94.ps.gz, 19960408
Abstract1 Communication overhead is one of the main factors that can limit the speedup of parallel programs on messagepassing parallel architectures. This limiting factor is more predominant in distributed systems such as clusters of homogeneous or heterogeneous workstations. However, excessive
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect19.ps, 19960409
COMP 361 NETWORK LAYER 1 NETWORK LAYER COMP 361 NETWORK LAYER 2 The Network Layer The data link layer was primarily responsible for reliable transfer of information across a physical link The network layer is responsible for providing transfer of data from the source to the destination The network layer
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/hwk2.ps.gz, 19960409
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Programming Assignment 2: Bayesian Belief Networks Due: 30 April 1996 Netica API The Netica API (Application Program Interface) is a library of C-callable functions for working with Bayesian
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/hwk2.ps.gz, 19960409
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Programming Assignment 2: Bayesian Belief Networks Due: 30 April 1996 Netica API The Netica API (Application Program Interface) is a library of C-callable functions for working with Bayesian
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect19.ps, 19960409
COMP 361 NETWORK LAYER 1 NETWORK LAYER COMP 361 NETWORK LAYER 2 The Network Layer The data link layer was primarily responsible for reliable transfer of information across a physical link The network layer is responsible for providing transfer of data from the source to the destination The network layer
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/courseinfo.ps.gz, 19960411
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Instructor Dit-Yan Yeung, Rm 3541, 2358-6977, dyyeung@cs.ust.hk, http://www.cs.ust.hk/~dyyeung/ Office hours: Tuesday 10:00am{12:00noon (or by appointment) Teaching Assistant Sam P.M. Choi, Rm
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec17.ps, 19960411
COMP 180 Lecture 17 1 Todays Topics Combinational circuits. Arithmetic circuits COMP 180 Lecture 17 2 Combinatorial Circuits Logic circuits can be classified into two types: - Combinatorial circuits: The outputs of these circuits are dependent only on the present inputs to the circuit (representable by
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec16.ps, 19960411
COMP 180 Lecture 16 1 Today s Topic Transistor Logic gates (Integrated Circuits) Truth Tables Boolean Algebra COMP 180 Lecture 16 2 Digital Logic Digital computers are built using digital circuits Digital circuits are built using logic gates Logic gates are built out of electronic devices like
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/courseinfo.ps.gz, 19960411
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Instructor Dit-Yan Yeung, Rm 3541, 2358-6977, dyyeung@cs.ust.hk, http://www.cs.ust.hk/~dyyeung/ Office hours: Tuesday 10:00am{12:00noon (or by appointment) Teaching Assistant Sam P.M. Choi, Rm
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/tong/thesis.ps.gz, 19960413
TreeDraw: A Tree-Drawing System by Tong Luo A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Mathematics in Computer Science Waterloo, Ontario, Canada, 1993 c Tong Luo 1993 I hereby declare that I am the sole author of this thesis. I
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/fast-icpp96.ps.gz, 19960413
Abstract1 The DAG scheduling problem is a rich land of research and a plethora of algorithms for solving this problem have been reported in the literature. However, designing a scheduling algorithm of low complexity without sacrificing performance remains a challenging obstacle from a practical
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/FAST-icpp96-camera.ps.gz, 19960413
Abstract1 The DAG scheduling problem is a rich land of research and a plethora of algorithms for solving this problem have been reported in the literature. However, designing a scheduling algorithm of low complexity without sacrificing performance remains a challenging obstacle from a practical
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-07.ps.gz, 19960414
Multiparameter QoS admission control for ATM queues with Partial Buffer Sharing Mechanism y Jelena Mi<=si c and Samuel T. Chanson Technical Report HKUST-CS96-07 April 14, 1996 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yThis
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/trset4.ps, 19960415
COMP 361 Sec. 2 (Spring 1996) Training Problem Set 4 1 COMP 361 - Spring 1996 Training problem set 4 1. A channel has a data rate of R bps and a propagation delay of t seconds per kilometer. The distance between the sending and receiving nodes is L kilometers. Nodes exchange fixedsize frames of B bits.
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic10.ps.gz, 19960415
COMP221: Fundamentals of Artificial Intelligence Topic 10: Machine Learning Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Machine Learning 1 Learning Agents ffl Agents that can learn from experience as a result of
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic10.ps.gz, 19960415
COMP221: Fundamentals of Artificial Intelligence Topic 10: Machine Learning Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Machine Learning 1 Learning Agents ffl Agents that can learn from experience as a result of
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect21.ps, 19960417
COMP 361 NETWORK LAYER 21 Traffic Control Scope Host Packet-switched node Packet-switching network Hop level (node-to-node) Entry-to-exit level Stream scope (internal virtual circuit) Network access level (node-to-node) Host-to-host level (exter nal vir tual circuit, transport connection) Host Network
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/vlad/india.ps, 19960417
Foundations for Faster External Sorting (Extended Abstract) Vladimir Estivill-Castro1 and Derick Wood2 1 LANIA, R ebsamen 80, Xalapa, Veracruz 91090, M exico. vlad@xalapa.lania.mx 2 Department of Computer Science,University of Western Ontario, London, Ontario N6A-5B7, Canada. dwood@csd.uwo.ca
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/vlad/ext.ps, 19960417
External Sorting and Nearly Sortedness1 Vladimir Estivill-Castro2 Derick Wood3
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect21.ps, 19960417
COMP 361 NETWORK LAYER 21 Traffic Control Scope Host Packet-switched node Packet-switching network Hop level (node-to-node) Entr y-to-exit level Stream scope (inter nal virtual circuit) Network access level (node-to-node) Host-to-host level (external virtual circuit, transport connection) Host Network
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/vlad/var.ps, 19960417
An Adaptive Generic Sorting Algorithm that Uses Variable Partitioning1 Vladimir Estivill-Castro2 Derick Wood3
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/vlad/conn.ps, 19960417
An Adaptive Sorting Algorithm for the Connection Machine CM-2 Vladimir Estivill-Castro LANIA R ebsamen 80 Xalapa 91000, Ver. M exico Derick Wood Department of Computer Science University of Waterloo Waterloo, Ontario N2L 3G2 Canada
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/vlad/survey.ps, 19960417
1 A Survey of Adaptive Sorting Algorithms Vladimir Estivill-Castro LANIA R ebsamen 80 Xalapa, Veracruz 91000, M exico Derick Wood Department of Computer Science University of Western Ontario London, Ontario N6A 5B7, Canada The design and analysis of adaptive sorting algorithms has made important
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/vlad/generic.ps, 19960417
An Adaptive Generic Sorting Algorithm that Uses Variable Partitioning Vladimir Estivill-Castro1 Derick Wood2
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic11.ps.gz, 19960418
COMP221: Fundamentals of Artificial Intelligence Topic 11: Decision Trees Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Decision Trees 1 Decision Trees as Performance Elements ffl Simple decision trees represent Boolean
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.icann96.ps.gz, 19960418
Bayesian Regularization in Constructive Neural Networks Tin-Yau Kwok (jamesk@cs.ust.hk) Dit-Yan Yeung (dyyeung@cs.ust.hk) Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec19.ps, 19960418
COMP 180 Lecture 19 1 Today s Topic Clocks Flip-Flops Sequential circuits. Memory Access COMP 180 Lecture 19 2 Clocks In digital circuits, the order of events is critical Clocks are used to achieve the synchronization and sequencing of operations in digital circuits A clock is a circuit built around a
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic11.ps.gz, 19960418
COMP221: Fundamentals of Artificial Intelligence Topic 11: Decision Trees Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Decision Trees 1 Decision Trees as Performance Elements ffl Simple decision trees represent Boolean
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/phase2.ps, 19960419
COMP 361 Spring 1996 Course Project (Phase 2) 1 Deadline for Phase 2 Section 1 and 2 : Mid-night of 11/5 (i.e. before 23:59 of 11/5) 2 Description of the project The subject of the second phase of the course project is the implementation of a Student Registration System based on a connection-oriented
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec20.ps, 19960420
COMP 180 Lecture 20 1 Today s Topic Microprocessor Bus COMP 180 Lecture 20 2 Microprocessors Microprocessors are single chip CPUs A typical microprocessor has from 40-132 pins for communicating with the other devices of the computing system Microprocessor pins are of three types: Address, Data and
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4sol-midterm.ps, 19960420
Dept. of CS/HKUST COMP 361 Sec. 2 (Spring 1996) Midterm Examination 5 Student ID: SOLUTION 7. Compare the delay in sending an x-bit message over a k-hop path in a circuit-switched network and in a (lightly-loaded) packet-switched network. The circuit set-up time is s seconds, the propagation delay is d
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect22.ps, 19960423
COMP 361 NETWORK LAYER 41 Internet Protocol (IP) Internet protocol (IP) provides an unreliable, connectionless delivery mechanism - Unreliable: delivery is not guaranteed - Connectionless: each packet is treated independent of others - Best-effor t delivery: software makes an earnest attempt to deliver
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect22.ps, 19960423
COMP 361 NETWORK LAYER 41 Internet Protocol (IP) Internet protocol (IP) provides an unreliable, connectionless delivery mechanism - Unreliable: delivery is not guaranteed - Connectionless: each packet is treated independent of others - Best-effort delivery: software makes an earnest attempt to deliver
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic12.ps.gz, 19960425
COMP221: Fundamentals of Artificial Intelligence Topic 12: Perceptrons Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Perceptrons 1 Biological Neurons AxonCell body or SomaNucleusDendriteSynapsesAxonal arborizationAxon
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic12.ps.gz, 19960425
COMP221: Fundamentals of Artificial Intelligence Topic 12: Perceptrons Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Perceptrons 1 Biological Neurons AxonCell body or SomaNucleusDendriteSynapsesAxonal arborizationAxon
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect23.ps, 19960426
COMP 361 TRANSPORT LAYER 1 TRANSPORT LAYER COMP 361 TRANSPORT LAYER 2 Transport Layer The transport layer should provide reliable end-to-end transfer of data independent of the underlying communication system It should provide end-to-end error and flow control Transpor t Entity Transpor t Entity
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect23.ps, 19960426
COMP 361 TRANSPORT LAYER 1 TRANSPORT LAYER COMP 361 TRANSPORT LAYER 2 Transport Layer The transport layer should provide reliable end-to-end transfer of data independent of the underlying communication system It should provide end-to-end error and flow control Transport Entity Transport Entity Interface
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec21-22.ps, 19960427
COMP 180 Lecture 21 1 Today s Topics Virtual memory Cache Claim: Memory system is the bottleneck of the Von Neumann system. COMP 180 Lecture 21 2 Virtual Memory Memory size problem. Early day s memory size, - IBM 650 (late 1950s) --> 2K words. - DEC PDP-1 --> 4K words (18 bits). Overlay technique - the
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/hwk3.ps.gz, 19960429
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Programming Assignment 3: Learning Decision Trees Due: 15 May 1996 Preamble You have already learned a simple decision tree learning algorithm in class. In this assignment, you will explore some
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/hwk3.ps.gz, 19960429
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Programming Assignment 3: Learning Decision Trees Due: 15 May 1996 Preamble You have already learned a simple decision tree learning algorithm in class. In this assignment, you will explore some
open this document and view contentsftp://ftp.cs.ust.hk/pub/pam/au.ps.gz, 19960429
Interactions of Concurrent Workflow Processes over Shared Informationy Lyman Do and Pamela Drew Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong flyman,pamg@cs.ust.hk 1 Introduction There are two run-time functions particularly important in a
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-11.ps.gz, 19960501
The Roles and Views of Multimedia Objects Raymond K. Wong , H. Lewis Chau , and Frederick H. Lochovsky Technical Report HKUST-CS96-11 April 25, 1996 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-10.ps.gz, 19960501
A Non-Volatile Storage for Volatile Information Raymond K. Wong , H. Lewis Chau , and Frederick H. Lochovsky Technical Report HKUST-CS96-10 April 25, 1996 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec23.ps, 19960501
COMP 180 Lecture 23 1 Today s Topics Microprogramming COMP 180 Lecture 23 2 THE MICROPROGRAMMING LEVEL High-Level Language Level Assembly Language Level Operating System Level Conventional Machine Level Microprogramming Level Digital Logic Level 1 2 3 4 5 HARDWARE FIRMWARE APPLICATION SOFTWARE SOFTWARE
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-09.ps.gz, 19960501
DOOR = `Object with Roles' + `Schema Evolution' Raymond K. Wong , H. Lewis Chau , and Frederick H. Lochovsky Technical Report HKUST-CS96-9 April 25, 1996 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/trset5.ps, 19960502
COMP 361 Sec. 2 (Spring 1996) Training Problem Set 5 1 COMP 361 - Spring 1996 Training problem set 5 1. If delays are recorded as 8-bit numbers in a 100 node network, and delay vectors are exchanged twice a second, how much bandwidth per (full duplex) line is wasted by using the distributed routing
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect25.ps, 19960503
COMP 361 SESSION/PRESENTATION LAYER 1 SESSION LAYER COMP 361 SESSION/PRESENTATION LAYER 2 Why Session Layer The lower layers (physical, data link, network, and transport) of the OSI model are concerned with providing reliable and efficient end-to-end communications The upper layers are mainly concerned
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect25.ps, 19960503
COMP 361 SESSION/PRESENTATION LAYER 1 SESSION LAYER COMP 361 SESSION/PRESENTATION LAYER 2 Why Session Layer The lower layers (physical, data link, network, and transport) of the OSI model are concerned with providing reliable and efficient end-to-end communications The upper layers are mainly concerned
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/paper.ps, 19960504
A Petri Net Approach for Logical Inference of Clauses Jogesh K. Muppala Dept. of Computer Science The Hong Kong University of Science and Technology Clear Water Bay Kowloon, Hong Kong muppala@cs.ust.hk Chuang Lin Information Science Institute State Information Centre Beijing 100045 China clin@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/sven/ii40.ps.gz, 19960505
Restricted Orientation Visibility Sven Schuierery Derick Wood z Dezember 1991
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/topic13.ps.gz, 19960506
COMP221: Fundamentals of Artificial Intelligence Topic 13: Planning Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Planning 1 A Simple Planning Agent function SIMPLE-PLANNING-AGENT( percept) returns an action static: KB,
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/topic13.ps.gz, 19960506
COMP221: Fundamentals of Artificial Intelligence Topic 13: Planning Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Spring 1996 COMP221 Planning 1 A Simple Planning Agent function SIMPLE-PLANNING-AGENT( percept) returns an action static: KB,
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec24.ps, 19960506
COMP 180 Lecture 24 1 Today s Topics Microprogramming (Cont) COMP 180 Lecture 24 2 AN EXAMPLE MICROARCHITECTURE PC AC SP IR TIR +1 -1 AMASK SMASK A B C D E F MAR MBR AMUX A latch Shifter B latch ALU A bus B bus C bus L0 L1 To address bus To data bus M0 M1 M2 M3 Address out Data in A0 F0 F1 N
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/set5.ps.gz, 19960507
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Problem Set 5: Planning Due: 17 May 1996, in lecture The exercises in this problem set are from the textbook. Exercises ffl 11.1 ffl 11.4 (modified): Define a set of Strips operators that can be
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s96/set5.ps.gz, 19960507
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1996 Problem Set 5: Planning Due: 17 May 1996, in lecture The exercises in this problem set are from the textbook. Exercises ffl 11.1 ffl 11.4 (modified): Define a set of Strips operators that can be
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec25.ps, 19960508
COMP 180 Lecture 25 1 The Microprogram In the microarchitecture, PC, AC and SP are used to hold the three Mac-1 registers IR is the instruction register and TIR holds a temporary copy of IR for decoding the opcode AMASK is the address mask 007777 (octal) for separating out the opcode and the address
open this document and view contentsftp://ftp.cs.ust.hk/pub/avi/forStephanKeith/naiman.ps.Z, 19960508
Interactive Teaching Modules for Computer Graphics Avi C. Naiman Department of Computer Science Hong Kong University of Science & Technology
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect26.ps, 19960509
COMP 361 APPLICATION LAYER 1 APPLICATION LAYER COMP 361 APPLICATION LAYER 2 Application Layer The application layer provides access to the networking environment for the users and also provides distributed information services These services are frequently used by the users, and do not need to be
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect26.ps, 19960509
COMP 361 APPLICATION LAYER 1 APPLICATION LAYER COMP 361 APPLICATION LAYER 2 Application Layer The application layer provides access to the networking environment for the users and also provides distributed information services These services are frequently used by the users, and do not need to be
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-12.ps.gz, 19960510
DOOR: A Dynamic Object-Oriented Data Model with Roles Raymond K. Wong , H. Lewis Chau , and Frederick H. Lochovsky Technical Report HKUST-CS96-12 May 8, 1996 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec26.ps, 19960511
COMP 180 Lecture 26 1 Today s Topics Evolution of computer architecture Pipelining RISC processors COMP 180 Lecture 26 2 Evolution of Computer Architecture Conventional computers based on VonNeumann design use: - A single CPU - A few internal registers - An external memory - An assembly language
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect27.ps, 19960513
COMP 361 HIGH SPEED NETWORKING 1 HIGH SPEED NETWORKING COMP 361 HIGH SPEED NETWORKING 2 High Speed Networks Traditionally computer networks were mainly designed to carry data The rapid developments in computer technology has made it feasible to implement powerful computers supporting compute intensive
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect27.ps, 19960513
COMP 361 HIGH SPEED NETWORKING 1 HIGH SPEED NETWORKING COMP 361 HIGH SPEED NETWORKING 2 High Speed Networks Traditionally computer networks were mainly designed to carry data The rapid developments in computer technology has made it feasible to implement powerful computers supporting compute intensive
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp180/solution4.ps, 19960514
1) Pascal n:= a Mac-1 loco 234h ;load the address of a in ac addd 220h ;add the value of i to ac ; therefore ac will contain the address ; of a swap ;place the address of a in sp lodl 0 ;place the value of a in ac stod 120h ;store the value in n Mic-1 (list of microinstruction used to
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.iconip96.ps.gz, 19960514
Reference Priors for Neural Networks: Laplace versus Gaussian Tin-Yau Kwok (jamesk@cs.ust.hk), Dit-Yan Yeung (dyyeung@cs.ust.hk) Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4sol-quiz3.ps, 19960514
Dept. of CS/HKUST COMP 361 Sec. 2 (Spring 1996) Quiz 2 2 Student ID:____________________ 2. A channel has a data rate of 100 kbps and a propogation delay of 10 msec/km. The distance between the sending and the receiving nodes is 500 km. Nodes exchange fixed-size frames of 1000 bits. Assume that ACK
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/sol-quiz3.ps, 19960514
Department of Computer Science The Hong Kong University of Science and Technology COMP 361 Sec. 2 (Spring 1996) Quiz 2 1 COMP 361 Computer Communication Networks/Section 2 Spring Semester 1996 Quiz 3 Date: April 19, 1996 Time: 11:30 - 11:50 (20 minutes) Instructions: 1. Please write your name, student
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4sol-quiz4.ps, 19960514
Dept. of CS/HKUST COMP 361 Sec. 2 (Spring 1996) Quiz 4 2 Student ID:____________________ 2. Design the bridge protocol architecture for the following internetworking system. Specify the frame structure of the protocol data unit (PDU) at the point t6. (15 points) 3. Answer the following true/false
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/sol-quiz4.ps, 19960514
Department of Computer Science The Hong Kong University of Science and Technology COMP 361 Sec. 2 (Spring 1996) Quiz 4 1 COMP 361 Computer Communication Networks/Section 2 Spring Semester 1996 Quiz 4 Date: May 3, 1996 Time: 11:30 - 11:50 (20 minutes) Instructions: 1. Please write your name, student ID
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-13.ps.gz, 19960515
Automatic Video Data Structuring through Shot Partitioning and Key Frame Selectiony Wei XIONG , John Chung-Mong LEE , and Rui-Hua MA Technical Report HKUST-CS96-13 May 16, 1996 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yThis
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec27.ps, 19960515
COMP 180 Lecture 27 1 Today s Topics RISC processors Distinction between RISC and CISC Multiple registers Overlapping register windows COMP 180 Lecture 27 2 Why RISC The reason, computers had so many machine instructions is to be able to handle interpretation of the many high level languages. Some
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/dcp-icpp94.ps.gz, 19960520
Abstract1 An algorithm for compile-time static scheduling of task graphs onto multiprocessors is proposed. The proposed algorithm, which is called Dynamic Critical Path (DCP) scheduling algorithm, is different from previously reported algorithms in a number of ways. First, it determines the critical
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/BSA-spdp95-camera.ps.gz, 19960520
Abstract1 We propose an algorithm for scheduling and allocation of parallel programs to message-passing architectures. The algorithm considers arbitrary computation and communication costs, arbitrary network topology, link contention and underlying communication routing strategy. While our technique is
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/cpfd-icpp94.ps.gz, 19960520
A New Approach To Scheduling Parallel Programs Using Task Duplication Ishfaq Ahmad and Yu-Kwong Kwok Department of Computer Science Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong Abstract1 In this paper, we explore the problem of scheduling parallel programs using
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/PBSA-ipps95-camera.ps.gz, 19960520
Abstract1 The objective of this research is to propose a lowcomplexity static scheduling and allocation algorithm for message-passing architectures by considering factors such as communication delays, link contention, message routing and network topology. As opposed to the conventional list-scheduling
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/180/lec28.ps, 19960520
COMP 180 Lecture 28 1 Today s Topic Reviews COMP 180 Lecture 28 2 Boolean Algebra Sum-of-Product Product-of-Sum Truth Table Boolean Identities. Basic rules Logic expression and minimization COMP 180 Lecture 28 3 Karnaugh Maps n variables and 2n cells. Labeling --> only one input variable is different
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-14.ps.gz, 19960520
page 1 Devising a Flexible Event Model on Top of a Common Data/Knowledge Storage Manager* L.C. Chan Qing Li Technical Report HKUST-CS96-14 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong E-mail: {lcchan, qing}@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/bsa-spdp95.ps.gz, 19960520
Abstract1 We propose an algorithm for scheduling and allocation of parallel programs to message-passing architectures. The algorithm considers arbitrary computation and communication costs, arbitrary network topology, link contention and underlying communication routing strategy. While our technique is
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/CPFD-icpp94-camera.ps.gz, 19960520
A New Approach To Scheduling Parallel Programs Using Task Duplication Ishfaq Ahmad and Yu-Kwong Kwok Department of Computer Science Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong Abstract1 In this paper, we explore the problem of scheduling parallel programs using
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/pbsa-ipps95.ps.gz, 19960520
Abstract1 The objective of this research is to propose a lowcomplexity static scheduling and allocation algorithm for message-passing architectures by considering factors such as communication delays, link contention, message routing and network topology. As opposed to the conventional list-scheduling
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/DCP-icpp94-camera.ps.gz, 19960520
Abstract1 An algorithm for compile-time static scheduling of task graphs onto multiprocessors is proposed. The proposed algorithm, which is called Dynamic Critical Path (DCP) scheduling algorithm, is different from previously reported algorithms in a number of ways. First, it determines the critical
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.iwfhr96.ps.gz, 19960521
Recognition of Handwritten Digits Using Deformable Models Kwok-Wai Cheung, Dit-Yan Yeung and Roland T. Chin Department of Computer Science, The Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong Email: fwilliam,dyyeung,rolandg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/william/cheung.cvpr96.ps.gz, 19960521
Competitive Mixture of Deformable Models for Pattern Classification Kwok-Wai Cheung Dit-Yan Yeung Roland T. Chin Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong fwilliam, dyyeung, rolandg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/anne/treetex93.ps.gz, 19960527
Drawing Trees Nicely with TEX1 Anne Br uggemann-Klein2 Derick Wood3 May 27, 1996
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/BSA-jpdc-rev.ps.gz, 19960604
- 1 - Bubble Scheduling: An Efficient Algorithm for Compile-Time Scheduling of Tasks and Messages on Parallel Architectures Yu-Kwong Kwok and Ishfaq Ahmad1 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Corresponding Author: Ishfaq
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/tmp/BSA-jpdc-rev.ps.gz, 19960604
- 1 - Bubble Scheduling: An Efficient Algorithm for Compile-Time Scheduling of Tasks and Messages on Parallel Architectures Yu-Kwong Kwok and Ishfaq Ahmad1 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Corresponding Author: Ishfaq
open this document and view contentsftp://ftp.cs.ust.hk/pub/avi/pubs/wavefront.ps.Z, 19960605
78 Error Diffusion: Wavefront Traversal and Contrast Considerations Avi C. Naiman and David T. W. Lam Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Phone: +852 2358-6997 Fax: +852 2358-1477 e-mail: avi@cs.ust.hk and dada@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/avi/pubs/cgmodules.ps.Z, 19960605
Computer Graphics August 1996 1 Interactive Teaching Modules for Computer Graphics Avi C. Naiman Department of Computer Science Hong Kong University of Science & Technology
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-17.ps.gz, 19960610
Chinese Glyph Generation by Heuristic Search Pak-Keung Lai, Dit-Yan Yeung & Man-Chi Pong Technical Report HKUST-CS96-17 June 1996 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong fpklai,dyyeung,mcpongg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-18.ps.gz, 19960611
1 To appear in ICPR-96, Proceedings of the 13th International Conference on Pattern Recognition, Aug. 96. Efficient and Effective Texture Classification Using Wavelet Frame Packet Analysis Jian-Feng Liu* John Chung-Mong Lee* Technical Report HKUST-CS96-18 June 8, 1996 * Department of Computer Science
open this document and view contentsftp://ftp.cs.ust.hk/pub/dominic/papers/ssh_kerberos.ps, 19960614
Evaluation of Secure Shell and Kerberos Dominic Chi-Yuen Lai (dominic@cs.ust.hk) Keith Kam-Hing Lau (keithlau@cs.ust.hk) 18th May, 1996 Chapter 1 Introduction In the old days, say one or two decades ago, people did not consider much on computer network security, probably they needed not because the
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/hsfsys.ps.gz, 19960622
NIST Form-Based Handprint Recognition System NISTIR 5469 Michael D. Garris, James L. Blue, Gerald T. Candela, Darrin L. Dimmick, Jon Geist, Patrick J. Grother, Stanley A. Janet, and Charles L. Wilson National Institute of Standards and Technology, Building 225, Room A216 Gaithersburg, Maryland 20899
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/hsfsys.ps.gz, 19960622
NIST Form-Based Handprint Recognition System NISTIR 5469 Michael D. Garris, James L. Blue, Gerald T. Candela, Darrin L. Dimmick, Jon Geist, Patrick J. Grother, Stanley A. Janet, and Charles L. Wilson National Institute of Standards and Technology, Building 225, Room A216 Gaithersburg, Maryland 20899
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/topic01.ps.gz, 19960624
COMP300M: Introduction to Pattern Recognition Topic 1: Introduction Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Introduction Pattern Recognition ffl Pattern recognition can be defined as the categorization of input
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect1.ps, 19960624
Introduction to Database Systems COMP231 (Summer 1996) Introduction 1 What are Database Systems Introduction to Database Systems COMP231 (Summer 1996) Introduction 2 What is a Database Data: factual (undoubted) information used as a basis for reasoning, discussion, or calculation A database is a
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/topic01.ps.gz, 19960624
COMP300M: Introduction to Pattern Recognition Topic 1: Introduction Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Introduction Pattern Recognition ffl Pattern recognition can be defined as the categorization of input
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect2.ps, 19960624
Introduction to Database Systems COMP231 (Summer 1996) Introduction 1 Entity-Relationship (ER) Data Model Introduction to Database Systems COMP231 (Summer 1996) Introduction 2 Database Design Process REQUIREMENTS COLLECTION AND ANALYSIS CONCEPTUAL DESIGN LOGICAL DESIGN (DATA MODEL MAPPING) PHYSICAL
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect2.ps, 19960624
Introduction to Database Systems COMP231 (Summer 1996) Introduction 19 Relationships with higher Degree The Benjamin/Cummings Publishing Company, Inc. 1994, Elmasri/Navathe, Fundamentals of Database Systems, Second Edition (a) SUPPLY SName PartNo SUPPLIER Quantity PROJECT PART ProjName (b) PartNo M N
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-19.ps.gz, 19960625
An Adaptive Generic Sorting Algorithm that Uses Variable Partitioningz Vladimir Estivill-Castro and Derick Woody Technical Report HKUST-CS96-19 June 1996 School of Information Systems Queensland University of Technology Red Hill Q4059 Australia yDepartment of Computer Science Hong Kong University of
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-20.ps.gz, 19960625
Multiple-Guard Kernels of Simple Polygonsz Sven Schuierer and Derick Woody Technical Report HKUST-CS96-20 June 1996 Institut f ur Informatik Universit at Freiburg Rheinstr. 10{12 D-79104 Freiburg Germany yDepartment of Computer Science Hong Kong University of Science & Technology Clear Water Bay,
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/courseinfo.ps.gz, 19960625
Hong Kong University of Science and Technology COMP300M: Introduction to Pattern Recognition Summer 1996 Instructor Dit-Yan Yeung, Rm 3541, 2358-6977, dyyeung@cs.ust.hk, http://www.cs.ust.hk/~dyyeung/ Office hours: Tuesday 10:00am{12:00noon (or by appointment) Class Schedule Lecture: Tuesday & Wednesday
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-22.ps.gz, 19960626
Relaxed AVL Trees, Main-Memory Databases, and Concurrencyx Otto Nurmi , Eljas Soisalon-Soinineny, and Derick Woodz Technical Report HKUST-CS96-22 June 1996 Department of Computer Science University of Helsinki Teollisuuskatu 23 SF-05100 Helsinki, Finland yLaboratory of Information Processing Science
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/topic02.ps.gz, 19960626
COMP300M: Introduction to Pattern Recognition Topic 2: Bayes Decision Theory Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Bayes Decision Theory Classifier Training and Classification ffl Training: Classifier
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-23.ps.gz, 19960626
O-Convexity: Computing Hulls, Approximations, and Orientation Setsz V. Martynchik , N. Metelski , and Derick Woody Technical Report HKUST-CS96-23 June 1996 Institute of Mathematics Belarussian Academy of Sciences Surganova str. 11 Minsk, 220072 Belarus yDepartment of Computer Science Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/topic02.ps.gz, 19960626
COMP300M: Introduction to Pattern Recognition Topic 2: Bayes Decision Theory Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Bayes Decision Theory Classifier Training and Classification ffl Training: Classifier
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-24.ps.gz, 19960626
Grail: Engineering Automata in C++, Version 2.5z Darrell R. Raymond and Derick Woody Technical Report HKUST-CS96-24 June 1996 Department of Computer Science University of Western Ontario London, Ontario N2L 5B7 Canada yDepartment of Computer Science Hong Kong University of Science & Technology Clear
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/cedar.ps.gz, 19960627
A System to Read Names and Addresses on Tax Forms Sargur N. Srihari, Yong-Chul Shin, Vemulapati Ramanaprasad and Dar-Shyang Lee Center of Excellence for Document Analysis and Recognition and Department of Computer Science State University of New York at Buffalo Buffalo, NY 14260
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/cedar.ps.gz, 19960627
A System to Read Names and Addresses on Tax Forms Sargur N. Srihari, Yong-Chul Shin, Vemulapati Ramanaprasad and Dar-Shyang Lee Center of Excellence for Document Analysis and Recognition and Department of Computer Science State University of New York at Buffalo Buffalo, NY 14260
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-25.ps.gz, 19960627
Three-Dimensional Restricted-Orientation Convexityz Eugene Fink and Derick Woody Technical Report HKUST-CS96-25 June 1996 Department of Computer Science Carnegie{Mellon University Pittsburgh, PA 15213 U. S. A. yDepartment of Computer Science Hong Kong University of Science & Technology Clear Water Bay,
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-26.ps.gz, 19960627
Restricted-Orientation Halfspacesz Eugene Fink and Derick Woody Technical Report HKUST-CS96-26 June 1996 Department of Computer Science Carnegie{Mellon University Pittsburgh, PA 15213 U. S. A. yDepartment of Computer Science Hong Kong University of Science & Technology Clear Water Bay, Kowloon Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-27.ps.gz, 19960627
Generalizing Halfspacesz Eugene Fink and Derick Woody Technical Report HKUST-CS96-27 June 1996 Department of Computer Science Carnegie{Mellon University Pittsburgh, PA 15213 U. S. A. yDepartment of Computer Science Hong Kong University of Science & Technology Clear Water Bay, Kowloon Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-28.ps.gz, 19960627
Tabular formatting problemsz Xinxin Wang and Derick Woody Technical Report HKUST-CS96-28 June 1996 NorTel P.O. Box 3511, Station C Ottawa, Ontario K1Y 4H7 Canada yDepartment of Computer Science Hong Kong University of Science & Technology Clear Water Bay, Kowloon Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect3.ps, 19960629
Introduction to Database Systems COMP231 (Spring 1995) Relational Data Model 1 Relational Data Model Relational Algebra Introduction to Database Systems COMP231 (Spring 1995) Relational Data Model 2 Relational Model Concepts Relation (informally): A table of values. Each column in the table has a column
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect3.ps, 19960629
Introduction to Database Systems COMP231 (Spring 1995) Relational Data Model 1 Relational Data Model Relational Algebra Introduction to Database Systems COMP231 (Spring 1995) Relational Data Model 2 Relational Model Concepts Relation (informally): A table of values. Each column in the table has a column
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.tnn96.ps.gz, 19960629
IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 7, NO. 5, SEPTEMBER 1996 1 Use of Bias Term in Projection Pursuit Learning Improves Approximation and Convergence Properties Tin-Yau Kwok and Dit-Yan Yeung, Member, IEEE
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-29.ps.gz, 19960701
Xtable|A Tabular Editor and Formatterz Xinxin Wang and Derick Woody Technical Report HKUST-CS96-29 June 1996 NorTel P.O. Box 3511, Station C Ottawa, Ontario K1Y 4H7 Canada yDepartment of Computer Science Hong Kong University of Science & Technology Clear Water Bay, Kowloon Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-21.ps.gz, 19960701
Instruction Computation in Subset Constructionz J. Howard Johnson and Derick Woody Technical Report HKUST-CS96-21 June 1996 Institute for Information Technology National Research Council Nepean, Ontario Canada yDepartment of Computer Science Hong Kong University of Science & Technology Clear Water Bay,
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect4.ps, 19960702
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 30 Summary of SQL Queries A query in SQL can consist of up to six clauses, but only the first two are mandatory SELECT FROM
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect4.ps, 19960702
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 1 SQL Part 11 1. These transparencies were taken from the Transparency masters for the Fundamentals of Database systems text book. Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 2 Data Definition
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect1.ps, 19960702
Introduction to Database Systems COMP231 (Summer 1996) Introduction 21 Classification of DBMSs Based on the data model used: Traditional: Relational, Network, Hierarchical. Emerging: Object-oriented, Semantic, EntityRelationship, others. Other classifications: Single-user vs. multi-user (most DBMSs).
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-30.ps.gz, 19960703
SGML and Exceptionsz Pekka Kilpel ainen and Derick Woody Technical Report HKUST-CS96-30 June 1996 Department of Computer Science University of Helsinki Helsinki Finland yDepartment of Computer Science Hong Kong University of Science & Technology Clear Water Bay, Kowloon Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/hwk1.ps.gz, 19960703
Hong Kong University of Science and Technology COMP300M: Introduction to Pattern Recognition Summer 1996 Assignment 1: Parametric Classifier with Gaussian Density Functions Due: 15 July 1996, 5:00pm Classifier In this assignment, you will implement a simple parametric classifier with multivariate
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/hwk1.ps.gz, 19960703
Hong Kong University of Science and Technology COMP300M: Introduction to Pattern Recognition Summer 1996 Assignment 1: Parametric Classifier with Gaussian Density Functions Due: 15 July 1996, 5:00pm Classifier In this assignment, you will implement a simple parametric classifier with multivariate
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/topic03.ps.gz, 19960704
COMP300M: Introduction to Pattern Recognition Topic 3: Parametric Classifiers Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Parametric Classifiers Parametric Learning ffl Each probability density function of a
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/real-time.ps, 19960704
On Modeling Performance of Real-Time Systems in the Presence of Failures Jogesh K. Muppala1 Dept. of Electrical Engineering Duke University Durham, NC 27706 Steven P. Woolet IBM Research Triangle Park, NC 27709 Kishor S. Trivedi 2 Dept. of Electrical Engineering Duke University Durham, NC 27706
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/topic03.ps.gz, 19960704
COMP300M: Introduction to Pattern Recognition Topic 3: Parametric Classifiers Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Parametric Classifiers Parametric Learning ffl Each probability density function of a
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect6.ps, 19960705
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 1 Tuple Relational Calculus Domain Relational Calculus Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 2 Introduction A formal language based on first-order predicate calculus Many commercial
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect5.ps, 19960705
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 1 SQL Part II1 1. These transparencies were taken from the Transparency masters for the Fundamentals of Database systems text book. Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 2 Data
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect5.ps, 19960705
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 27 Cursors (Cont.) E2: writeln('enter the department name:'); readln(DNAME); $SELECT DNUMBER INTO %DNUMBER FROM DEPARTMENT WHERE DNAME= % DNAME; $DECLARE EMP CURSOR FOR SELECT SSN, FNAME, MINIT, LNAME, SALARY FROM EMPLOYEE
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect6.ps, 19960705
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 19 Domain Relational Calculus Query 6: Find the names of employees without dependents Q6:{ qs | ($ t) (EMPLOYEE(qrstuvwxyz) and (not($ l) (DEPENDENT(Imno) and t=l))) } Query 7: List the names of managers who have at least one
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect7.ps, 19960707
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 28 Data Retrieval in QBE WORKS_ON PROJECT ESSN PNO HOURS _PX >20 PNAME PNO PLOCATION DNUM P. _PX P. WORKS_ON PROJECT ESSN PNO HOURS _PX >20 PNAME PNO PLOCATION DNUM P.CNT._EX G._PX P. CONDITIONS CNT._EX > 2 Introduction to
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect7.ps, 19960707
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 1 QUEL QBE Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 2 Introduction QUEL is the query language for INGRES DBMS Developed at University of California, Berkeley, in 1970 s Based on tuple
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/topic04.ps.gz, 19960708
COMP300M: Introduction to Pattern Recognition Topic 4: Nearest-Neighbor Classifiers Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Nearest-Neighbor Classifiers Introduction ffl Nearest-neighbor classifiers are
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/topic04.ps.gz, 19960708
COMP300M: Introduction to Pattern Recognition Topic 4: Nearest-Neighbor Classifiers Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Nearest-Neighbor Classifiers Introduction ffl Nearest-neighbor classifiers are
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect8.ps, 19960708
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 23 EXAMPLE PID CNAME LOT# AREA LOTS1A fd1 fd2 AREA CNAME LOTS1AY fd5 PID LOT# AREA LOTS1AX A B C R fd1 fd2 Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 22 BCNF (Boyce-Codd Normal Form) A relation
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect8.ps, 19960708
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 1 Relational Database Design Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 2 Informal Design Guidelines for Relational Databases What is relational database design The grouping of attributes to
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/proj.ps.gz, 19960709
Hong Kong University of Science and Technology COMP300M: Introduction to Pattern Recognition Summer 1996 Project: Handwritten Digit Recognition Due: 9 August 1996, 11:59pm Preamble You are expected to team up as a group of two to do this project. Handwriting Data The data you will use for this project
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/proj.ps.gz, 19960709
Hong Kong University of Science and Technology COMP300M: Introduction to Pattern Recognition Summer 1996 Project: Handwritten Digit Recognition Due: 9 August 1996, 11:59pm Preamble You are expected to team up as a group of two to do this project. Handwriting Data The data you will use for this project
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/topic05.ps.gz, 19960709
COMP300M: Introduction to Pattern Recognition Topic 5: Probabilistic Neural Network Classifier Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Probabilistic Neural Network Classifier Introduction ffl Like nearest-neighbor
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/topic05.ps.gz, 19960709
COMP300M: Introduction to Pattern Recognition Topic 5: Probabilistic Neural Network Classifier Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Probabilistic Neural Network Classifier Introduction ffl Like nearest-neighbor
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect9.ps, 19960712
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 24 Relational Databases Design Algorithms Normal forms are not sufficient criteria for a good design Example: Any relation with two attributes is always in BCNF so we can create 2-attribute relations arbitrarily and get BCNF
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect9.ps, 19960712
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 36 Dangling Tuples Sometimes the attributes of a relation are "partitioned" into several relations with the primary key repeated in each of the relations Tuples whose primary key does not appear in all of the relations are
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect10.ps, 19960713
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 22 Using B-Trees and B+-Trees as Dynamic Multi-level Indexes If a deletion causes a node to become less than half full it must be merged with neighboring nodes Difference between B-tree and B+-tree: In a B-tree, pointers to
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect10.ps, 19960713
Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 1 File Organization and Index Structures Introduction to Database Systems COMP231 (Summer 1996) Relational Data Model 2 Disk Storage Devices Offer high storage capacity and low cost. Data stored as magnetized areas on magnetic
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/topic06.ps.gz, 19960715
COMP300M: Introduction to Pattern Recognition Topic 6: Layered Neural Network Classifiers Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Layered Neural Network Classifiers Another Approach ffl Unlike parametric
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/topic06.ps.gz, 19960715
COMP300M: Introduction to Pattern Recognition Topic 6: Layered Neural Network Classifiers Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Layered Neural Network Classifiers Another Approach ffl Unlike parametric
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/hwk2.ps.gz, 19960716
Hong Kong University of Science and Technology COMP300M: Introduction to Pattern Recognition Summer 1996 Assignment 2: Nearest-Neighbor Classifiers Due: 27 July 1996, 5:00pm Classifiers This assignment is essentially the same as the previous assignment but with the parametric classifier replaced by
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/hwk2.ps.gz, 19960716
Hong Kong University of Science and Technology COMP300M: Introduction to Pattern Recognition Summer 1996 Assignment 2: Nearest-Neighbor Classifiers Due: 27 July 1996, 5:00pm Classifiers This assignment is essentially the same as the previous assignment but with the parametric classifier replaced by
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/leec/www/20.ps, 19960719
c Dik L. Lee User Interface { Browsing the Map (c) Briefcase icon expanded. (d) Briefcase icon shrinked.
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/leec/www/19.ps, 19960719
c Dik L. Lee User Interface (a) WISE home page. (b) Response from WISE.
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/leec/www/1-18.ps, 19960719
c Dik L. Lee Resource Discovery and Integration on the World Wide Web Dik L. Lee Department of Computer Science Hong Kong University of Science and Technology July, 1996 c Dik L. Lee Outline ffl Overview of Information Retrieval Techniques ffl Information Retrieval on the World Wide Web ffl WWW Index
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/leec/www/21-64.ps, 19960719
c Dik L. Lee Ranking Algorithms: Boolean spreading activation ffl A query term found on a page contributes c1 to the score of the page and c2 to the scores of all pages pointed at by the page. Typically, c2 << c1. ffl Frequency information is ignored. Ri;q = MX j=1 Ii;j; where Ii;j =
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/thesis.ps.gz, 19960722
A SYSTEM TO FORECAST CURRENCY EXCHANGE RATES BY KRISHNAN P. SANKARAN A Thesis Presented to The Hong Kong University of Science and Technology In Partial Fulfillment of the Requirements for the Degree of Master of Philosophy in Computer Science Hong Kong January 1996 Copyright c by Krishnan P. Sankaran
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/icde.ps.gz, 19960722
On Updates and Inconsistency Repairing in Knowledge Bases B. W uthrich ECRC, Arabellastr. 17 D-8000 Munich 81, Germany
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/kdd.ps.gz, 19960722
Toward a Formal Framework for Comparing KD Techniques B. W uthrich Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong beat@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/leec/mobile/slides.ps, 19960722
c Dik L. Lee Information Filtering, Caching, and Channel Allocation on Wireless Channels Dik L. Lee Department of Computer Science Hong Kong University of Science and Technology July, 1996 c Dik L. Lee Overview ffl Introduction ffl System Architecture ffl Constraints and Characteristics ffl Information
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect11.ps, 19960722
Introduction to Database Systems COMP231 (Summer 1996) Query Processing & Optimization 24 Heuristic Algebraic Optimization 5.Using rules 3, 4, 7, and 11 concerning the cascading of and commuting of with other operations, break down and move the projection attributes down the tree as far as possible by
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect11.ps, 19960722
Introduction to Database Systems COMP231 (Summer 1996) Query Processing & Optimization 1 Query Processing Optimization Introduction to Database Systems COMP231 (Summer 1996) Query Processing & Optimization 2 Introduction A DBMS uses different techniques to process, optimize and execute high-level
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/sig-ws.ps.gz, 19960722
Data Mining Opportunities In Very Large Object Oriented Databases Beat W uthrich Kamalakar Karlapalem Department Of Computer Science University of Science and Technology Clear Water Bay, Kowloon, HONG KONG. fbeat,kamalg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/tkde.ps.gz, 19960722
Probabilistic Knowledge Bases Beat W uthrich The Hong Kong University of Science and Technology Clear Water Bay Kowloon, Hong Kong e-mail: beat@cs.ust.hk phone: (852) 358 7013 fax: (852) 358 1477 1
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/dpdr.ps.gz, 19960722
Discovering Probabilistic Decision Rules Beat W uthrich 1 The Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong e-mail: beat@cs.ust.hk phone: (852) 2358 7013 fax: (852) 2358 1477 1Part of the work was performed while the author was at ECRC, Arabellastr. 17, 81925 Munich,
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/leec/java/35-58.ps.gz, 19960724
Applets versus Applications ffl A Java program may exist in two forms: Java applet which must run on a Java-enabled browser and Java stand-alone application which runs as an independent process. ffl Applets are useful for software distribution. ffl An applet enforces a standard on the functionality and
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/leec/java/33.ps.gz, 19960724
Power of Java|ImageMap as An Example ffl Traditional imagemap: no feedback until user clicked. ffl Netscape client-side imagemap: displays cryptic URL on status bar.
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/leec/java/1-32.ps.gz, 19960724
Web Application Development with Java and Javascript Dik L. Lee Department of Computer Science Hong Kong University of Science and Technology July/August, 1996 Overview ffl Network-based applications ffl World Wide Web ffl Java ffl Javascript ffl Problems and impacts Internet-Based Information Systems)
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/leec/java/34.ps.gz, 19960724
ffl Java imagemap: displays custom messages on status bar, high-lights hot-spots, plays sound clips.
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect12.ps, 19960726
Introduction to Database Systems COMP231 (Summer 1996) Transaction Management and Concurrency Control 1 Transaction Processing Concurrency Control Introduction to Database Systems COMP231 (Summer 1996) Transaction Management and Concurrency Control 2 Introduction Single-User Versus Mutiuser Systems
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect12.ps, 19960726
Introduction to Database Systems COMP231 (Summer 1996) Transaction Management and Concurrency Control 40 Conservative TO Basic TO proceeds to execute an operation as soon as it receives it This may give rise to too many restarts of the rejected transactions Conservative TO delays proceeds to delay the
open this document and view contentsftp://ftp.cs.ust.hk/pub/keithlau/smalltest.ps, 19960730
-3 -2 -1 1 2 3 -3 -2 -1 1 2 -1 -0.5 0.5 1 theta tau Phi(theta, tau)
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/topic09.ps.gz, 19960803
COMP300M: Introduction to Pattern Recognition Topic 9: Performance Measures Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Performance Measures Performance at Character Level ffl Notation: N = total number of characters
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/topic09.ps.gz, 19960803
COMP300M: Introduction to Pattern Recognition Topic 9: Performance Measures Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Performance Measures Performance at Character Level ffl Notation: N = total number of characters
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4sol-midterm.ps, 19960804
Computer Science HKUST Summer 1996 COMP 231 Midterm Exam 1 COMP 231 - DATABASE MANAGEMENT SYSTEMS MIDTERM EXAM SOLUTIONS Note that there can be multiple solutions for the questions, one solution is concisely presented. I. Entity Relationship Diagram (Sub-Total 25 Points) Consider a university database
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect14.ps, 19960804
Introduction to Database Systems COMP231 (Summer 1996) Recovery 1 Security Introduction to Database Systems COMP231 (Summer 1996) Recovery 2 Security Usually refers to security from malicious access or misuse Some forms of malicious access: unauthorized reading of data unauthorized modification of data
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect14.ps, 19960804
Introduction to Database Systems COMP231 (Summer 1996) Recovery 1 Security Introduction to Database Systems COMP231 (Summer 1996) Recovery 2 Security Usually refers to security from malicious access or misuse Some forms of malicious access: unauthorized reading of data unauthorized modification of data
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect13.ps, 19960805
Introduction to Database Systems COMP231 (Summer 1996) Recovery 1 Recovery Introduction to Database Systems COMP231 (Summer 1996) Recovery 2 Failures in DBMSs Transaction Failures Transaction aborts due to software bugs, or deadlocks Average of 3% of transactions abort abnormally (not user-intended)
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect15.ps, 19960805
Introduction to Database Systems COMP231 (Summer 1996) Hierarchical and Network Datamodels 1 Hierarchical Data Model Network Data Model Introduction to Database Systems COMP231 (Spring 1995) Hierarchical & Network Data Model 2 Hierarchical Data Model The model is used by: - IBM s Information Management
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/dalloc-jsac.ps.gz, 19960805
- 1 - Design and Evaluation of Data Allocation Algorithms for Distributed Multimedia Database Systems Yu-Kwong Kwok, Kamalakar Karlapalem, Ishfaq Ahmad and Ng Moon Pun Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/alloc-jsac-proof.ps.gz, 19960805
- 1 - Design and Evaluation of Data Allocation Algorithms for Distributed Multimedia Database Systems Yu-Kwong Kwok, Kamalakar Karlapalem, Ishfaq Ahmad and Ng Moon Pun Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/A4Lect13.ps, 19960805
Introduction to Database Systems COMP231 (Summer 1996) Recovery 12 Handling Media Failures Secondary Stable Storage Local Recovery Manager Database Buffer Manager Database (Volatile database) Buffers Fetch Flush Main Memory Storage read write read write Stable Log read write Log Buffers read write
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp231/Lect15.ps, 19960805
Introduction to Database Systems COMP231 (Summer 1996) Hierarchical and Network Datamodels 1 Hierarchical Data Model Network Data Model Introduction to Database Systems COMP231 (Spring 1995) Hierarchical & Network Data Model 2 Hierarchical Data Model The model is used by: - IBM s Information Management
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/topic08.ps.gz, 19960806
COMP300M: Introduction to Pattern Recognition Topic 8: Multi-Classifier Systems Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Multi-Classifier Systems Introduction ffl For a given pattern recognition problem, usually a
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/topic08.ps.gz, 19960806
COMP300M: Introduction to Pattern Recognition Topic 8: Multi-Classifier Systems Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Multi-Classifier Systems Introduction ffl For a given pattern recognition problem, usually a
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lab4.ps, 19960809
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1996 Lab of week 5 (your TA will demonstrate you a model solution at the end of the lab section) Write a program to read in a string of characters that represent a Roman numeral and then convert it to Arabic form (an
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/infocom97/paper.ps, 19960809
1 Analysis of a Hybrid Cutoff Priority Scheme for Multiple Classes of Traffic in Multimedia Wireless Networks Chuang Lin*, Bo Li and Samuel T. Chanson Department of Computer Science Hong Kong University of Science & Technology, Hong Kong Clear Water Bay, Kowloon, Hong Kong {clin, bli, chanson}@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec6.ps, 19960809
COMP 104 Page 1 Chapter 6 #include void main () { void enter(int&, int&); void swap (int&, int&); void print(int, int); int n1, n2; enter(n1, n2); swap(n1,n2); print(n1,n2); void enter(int& x, int& y) { cout << endl << Enter two numbers> ; cin >> x >> y; } void swap (int& i, int& j) { int
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec5.ps, 19960809
COMP 104 Page 1 Chapter 5 count_star = 0; while (count_star < n) cout << * ; count_star++; for (count_star = 0; line < n; count_star++) cout << * ; count_star = 1; do cout << * ; count_star++; } while (count_star < n); COMP 104 Page 2 while statement #include #include int
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lab2.ps, 19960809
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1996 Lab of week 3 (your TA will demonstrate you a model solution at the end of the lab section) Write a program that will calculate and print out bills for the Hong Kong water company. The water rates vary depending on
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lab6.ps, 19960809
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1996 Lab of week 9 (your TA will demonstrate you a model solution at the end of the lab section) Design and implement a C++ class to model a telephone directory for a company. The directory should contain space for up to
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec1.ps, 19960809
COMP 104 Page 1 Chapter 1: Overview of Computers and Programming n Information processing n Computer organization n Hardware generations & categories n Software generations & categories n Data representation & coding schemes n Programming languages n Programming COMP 104 Page 2 INFORMATION PROCESSING n
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec7.ps, 19960809
COMP 104 Page 1 Chapter 7 n From we get (p.335) : INT_MAX, INT_MIN, LONG_MAX, SHRT_MAX, ... n From we get (p. 350) : tolower(c), isdigit(c), isspace(c), isupper(c), ... n Complements: next == A || next == a next != A && next != a n % m == 0 && flag n % m || !flag n Suppose x is
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec8.ps, 19960809
COMP 104 Page 1 Chapter 8 n offers: get and put to read individual characters; end of file test eof, end of line eoln, the newline sign , alarm sign a . (see ex1.cc) n offers: ifstream infile; ofstream outfile, infile.open(), outfile.open(), infile.fail(), outfile.fail(),
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/courseInfo.ps, 19960809
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1996 Course Information Instructor Dr. B. Wuthrich email: beat@cs.ust.hk office: 3518 Instructor Lecture notes and labs also available via http://www.cs.ust.hk/faculty/beat/bio.html Objective This course is designed to
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec15.ps, 19960809
COMP 104 Page 1 Chapter 15, recursion n A procedure or function is said to be recursive if it calls itself. function rec_fun() rec_fun(); n Any recursive program can be rewritten into non-recursive form. Recursion is expensive, hence avoid it when possible. n Why having recursion: the problem or data
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lab3.ps, 19960809
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1996 Lab of week 4 (your TA will demonstrate you a model solution at the end of the lab session) Write a program to simulate a electronic calculator. Your program should execute as follows. Step 1: Display a prompt and
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lab7.ps, 19960809
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1996 Lab of week 11 (your TA will demonstrate you a model solution at the end of the lab section) Write a function that accepts an 8-by-8 array of characters that represents a maze. Each position can contain either an X
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec4.ps, 19960809
COMP 104 Page 1 Chapter 4 n logical operators: <, <=, >, >=, ==, != n logical connectives: &&, ||, ! n Note that zero means FALSE and nonzero means TRUE (salary < min_salary) || (number_dependents > 5); (temperature > 90.0) && (humidity > 90.0); !(x == y); !((salary < min_salary) || (number_dependents >
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lab8.ps, 19960809
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1996 Lab of week 12 (your TA will demonstrate you a model solution at the end of the lab section) Implement your own linked list to realize a interactive bookkeeper. The bookkeeper starts from scratch and continously
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lab5.ps, 19960809
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1996 Lab of week 8 (your TA will demonstrate you a model solution at the end of the lab section) Another approach to sorting an array is to create an index array, where the index is an array whose element values represent
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec2.ps, 19960809
COMP 104 Page 1 Chapter 2 n variables are of type float, int, char, short int, long int, double, long double n constants: const n I/O: cin and cout n #include n reserved words such as return and special symbols such as ; n identifiers n assignment statements, expressions & operators COMP
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec16.ps, 19960809
COMP 104 Page 1 Chapter 16, dynamic data structured n Dynamic data structures grow and shrink while running the program. n Dynamic data structures are manipulated via pointers, and operators new and delete. int x = 1, y = 2, z; int *ip; // *ip is int, so ip is a pointer to int ip = &x; // ip points
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec3.ps, 19960809
COMP 104 Page 1 Chapter 3 n functions are subprograms used for stepwise refinement n functions must be defined outside other functions, hence prototypes needed. // File: drawFig.cc; #include void main () { // declarations of function prototypes void draw_circle (); void draw_triangle ();
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec9b.ps, 19960809
COMP 104 Page 1 Chapter 9, string and structures n char name; cin >> name; // user types Beat n One-dimensional array: n char name = Beat W ; n cout << name << endl; n provides functions such as strcpy(name, B. Wuth ); strcmp(s1,s2); 1 2 3 4 5 6 7 8 9 B e a t 0 COMP 104 Page 2
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec11.ps, 19960809
COMP 104 Page 1 Chapter 11, classes or abstract data types n class counter { public: void increment(); private: int value;}; n member functions, and data members or attributes n void counter::increment (){...}; n counter gold_medals; n gold_medals.increment(); n #ifndef COUNTER_H; #define COUNTER_H;
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec13.ps, 19960809
COMP 104 Page 1 Chapter 13 n offers functions such as char *strcpy(char *, const char *); // (target, source) char *strcat(char *, const char *); int strlen(const char *); #include int strixstr (const char ctrg , const char csrc ) int i, j, k; for (i=0; ctrg != 0 ; i++)
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec9a.ps, 19960809
COMP 104 Page 1 Chapter 9, arrays, searching and sorting n float x; n An array type is a structured data type representing a regular structure of components of the same type. n One-dimensional array: n x = 8.8; x = x; cout << x; n enum logical
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec14.ps, 19960809
COMP 104 Page 1 Chapter 14, program design (many ways lead to Rom) First way: void main() triangle tri; tri.read_triangle(); tri.print_triangle(); tri.print_area(); COMP 104 Page 2 class triangle public: read_triangle() for (int i=0; i < 3; i++) cout << Enter vertex x y > ; cin >> x >> y;
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lec12.ps, 19960809
COMP 104 Page 1 Chapter 12, inheritance n A side-remark on dynamic arrays: collection = new float; // float collection delete collection; // dispose complete array n A derived class is derived from a base class ( class professor: public clerk
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lab1.ps, 19960809
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1996 Lab of week 2 (your TA will demonstrate you a model solution at the end of the lab session) The Pythagorean theorem states that the sum of the squares of the sides of a right triangle is equal to the square of the
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.pr96.ps.gz, 19960823
On-line Handwritten Alphanumeric Character Recognition Using Dominant Points in Strokes Xiaolin Li and Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon HONG KONG Internet: fxiaolin,dyyeungg@cs.ust.hk Fax: +852-2358-1477 August 23, 1996
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/lec3.ps, 19960826
2. Probabilistic reasoning (b). Inference in Bayesian network Query: P (Alarm=Y jJohnCall=Y; MaryCall=N ) In general P (QjE=E0): ffl Q is a list of query variables. E.g. Q=fAlarmg ffl E is a list of evidence variables, and E0 is the corresponding list observed values. E.g. fJohnCall=Y, MaryCall=Ng
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/lec1.ps, 19960826
COMP 538, COMP 300O Reasoning and Decision under Uncertainty Fall Semester 1996-96 Dr. Nevin Lianwen Zhang (Rm 3509, lzhang@cs.ust.hk, Tel: 2358-7015, Fax: 2358-1477) 1. Computer programs that aid reasoning and decision making under uncertainty. ffl Tools for Decision analysis (Investment, bank loans,
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/lec2.ps, 19960826
2. Probabilistic reasoning (a). Bayesian newtorks ffl A problem domain is modeled by a list of variables x1, x2, : : : , xn, ffl Knowledge about the problem domain is represented by a joint probability P (x1; x2; : : : ; xn). Advantages: ffl Clear semantics, ffl In theory, can perform arbitrary
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/outline.ps, 19960826
COMP 538, COMP 300O: Reasoning and Decision under Uncertainty Fall Semester 1996-97 Dr. Nevin Lianwen Zhang (Rm 3509, lzhang@cs.ust.hk, Tel: 2358-7015, Fax: 2358-1477) Course description Methods of reasoning and decision making under uncertainty as applied to artificial intelligence. Probability theory
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/aij96.ps.gz, 19960826
Irrelevance and Parameter Learning in Bayesian Networks Nevin Lianwen Zhang Department of Computer Science, University of Science & Technology, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/intro.ps, 19960830
COMP 251 Principles of Programming Languages 1996-1997 Fall Semester Lectures: Monday, Wednesday, Friday 12:00-12:50pm Instructor: Fangzhen Lin (flin@cs) Room 3552, Telephone 2358-6975 Office hours: Monday 4-5pm, Friday 3-5pm Tutorial: Wednesday 4:00-4:50pm TA: TBA Office Hours: TBA
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/evolbro.fm.ps, 19960902
Evolution of broadband technologies COMP 560 Jelena Misic 1 Overview of NISDN (ISDN) The first step towards ISDN was in integration of digital switching and digital transmission in Integrated Digital Networks (IDN). This evolution was dr iven by the need to have economic voice communications. The
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/Intro.fm.ps, 19960902
Introduction to broadband networking COMP 560 Jelena Misic 1 COMP 560 COMPUTER COMMUNICATION PROTOCOLS Dr. Jelena Misic Introduction to broadband networking COMP 560 Jelena Misic 2 INTRODUCTION Near future will face us with the following sophisticated communication services: video voice mail: voice -
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/INTRO.fm.ps, 19960902
Introduction to broadband networking COMP 560 Jelena Misic 1 COMP 560 COMPUTER COMMUNICATION PROTOCOLS Dr. Jelena Misic Introduction to broadband networking COMP 560 Jelena Misic 2 INTRODUCTION Near future will face us with the following sophisticated communication services: video voice mail: voice -
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/EVOLBRO.fm.ps, 19960902
Evolution of broadband technologies COMP 560 Jelena Misic 1 Overview of NISDN (ISDN) The first step towards ISDN was in integration of digital switching and digital transmission in Integrated Digital Networks (IDN). This evolution was driven by the need to have economic voice communications. The
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Information/outline.ps, 19960903
COMP 211: Introduction to Software Engineering COURSE OUTLINE Fall Semester, 1996 OBJECTIVES This course provides an introduction to the concepts, techniques and technology of software engineering. A software engineering project will allow students to apply these concepts and techniques to a real-world
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/courseinfo.ps.gz, 19960903
Hong Kong University of Science and Technology COMP327/527: Pattern Recognition Fall 1996 Instructor Dit-Yan Yeung Rm 3541, 2358-6977, dyyeung@cs.ust.hk, http://www.cs.ust.hk/~dyyeung/ Teaching Assistant Hiu-Chung Law Rm 4203, 2358-8831, martin@cs.ust.hk Class Schedule Lecture: Tuesday & Thursday
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Information/schedule.ps, 19960903
COMP 211: Introduction to Software Engineering SCHEDULE Fall Semester, 1996 DATE PROJECT QUIZZES Out Due 1. Sept. 2, 4 2. Sept. 9, 11 Task 1 - Sept. 9 3. Sept. 16, 18 4. Sept. 23, 25 5. Sept. 30, Oct. 2 Task 2 - Sept. 30 Task 1 - Sept. 30 Quiz 1 6. Oct. 7, 9 7. Oct. 14, 16 8. Oct. 23 Task 3 - Oct. 23
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec1.ps, 19960903
COMP272: Theory of Computation Fall Semester 1996-97 Lecture 1: Motivation and Overview ffl Thue system: A finite set of unordered pairs of strings. fab, cdg, fcbd, bcg, fb, dabg, fda, abcg ffl Given a Thue system, two strings are equivalent if one can be obtained from the other by successively
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/syll.ps, 19960903
COMP 272 Theory of Computation 1996 Fall Semester Lecture 1: Dr. Mordecai Golin golin@cs.ust.hk, Rm 3547, 2358{6993 Lectures: T, Th 16:30 -17:50, LTD. Lecture 2: Dr. Nevin Zhang lzhang@cs.ust.hk, Rm 3509, 2358{7015 Lectures: T, Th 16:30 -17:50, Rm. 4505. TEXTBOOK : Elements of the Theory of Computation,
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec2.ps, 19960903
Lecture 2: Sets, Relations, and Functions (a Review) 1. Sets ffl A set is a collection of objects. ffl Let L = fa; b; c; dg be a set of four elements. We use a 2 L to denote that a is in L; and z 62 L to denote that z is not in L. ffl The empty set, denoted by ;, contains zero elements. All other sets
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class1.ps, 19960903
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 1 (Introduction) 1 COMP 252 (SECTION 2) PRINCIPLES OF SYSTEMS SOFTWARE FALL 1996 COMP 252 -- Fall 1996 (Dr. Bo Li) Class 1 (Introduction) 2 Points To Be Noted Notes will be put into following directories: - /appl/Public/bli/252/ (for ftp server) -
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/f96/courseinfo.ps.gz, 19960903
Hong Kong University of Science and Technology COMP327/527: Pattern Recognition Fall 1996 Instructor Dit-Yan Yeung Rm 3541, 2358-6977, dyyeung@cs.ust.hk, http://www.cs.ust.hk/~dyyeung/ Teaching Assistant Hiu-Chung Law Rm 4203, 2358-8831, martin@cs.ust.hk Class Schedule Lecture: Tuesday & Thursday
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/vincPap.ps.gz, 19960905
1 Probabilistic Data Mining from Fragmented Information Sources Vincent Cho and Dr. Beat W thrich {wscho, beat}@cs.ust.hk The Hong Kong University of Science and Technology Department of Computer Science Keywords: Data Mining and Knowledge Discovery
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class2.ps, 19960905
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 2 (Introduction) 24 Parallel Systems Parallel Systems are composed of more than one CPU in a tightly coupled fashion: the CPUs share bus, the clock, sometime memory and peripheral devices Such system increases the throughput by being able to get more jobs done
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/Task1.ps, 19960906
COMP 211 2/2 Department of Computer Science Appendix: A sample of capabilities and constraints of a library system. Capabilities Users: Check out/return a copy of a book Reserve a copy of a book currently on loan List user s current borrowings Retrieve a list of books by author, title, or subject area
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/appendixF.ps, 19960906
Postgraduate Studies Department of Computer Science Revised 9/96 PhD Qualifying Examination Result (For Departmental file only) Student information Student name: ________________________________________ Student#: ________________________ (Please print; underline family name) Programme: MSc MPhil PhD
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec7.ps, 19960906
6: Proofs that languages are and are not reg- ular Example: = f0; 1; : : : ; 9g ffl L1 =
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/RFP.ps, 19960906
COMP 211 4/4 Department of Computer Science offered in the coming semester and asked to submit three choices of courses for which they would like to be a TA (see Appendix I). Faculty are also asked to indicate their preferred choice of TAs (see Appendix J). If the preference of the faculty and the
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec3.ps, 19960906
Lecture 3: Languages and Regular Expressions Basic concepts ffl An Alphabet is a finite set of symbols. ffl A word (or string) is a finite sequence of symbols from the alphabet. Alphabet Words fa, b, : : : , zg man, abc, : : : f0, 1g 000, 010101, : : : f#, $, a, b, cg #cb$, $$$, : : : ffl The set of all
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/appendixH.ps, 19960906
Postgraduate Studies Fall 1996-97 semester Department of Computer Science Revised 9/96 I meet with my advisor: weekly biweekly monthly other: _____________________ Semi-annual Progress Report for MPhil/PhD Programme (For Departmental file only) Part A: Student s report Email: __________________________
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/appendixA.ps, 19960906
Postgraduate Studies Department of Computer Science Revised 9/96 Request to Assign/Change Academic Advisor (For Departmental file only) New academic advisor acknowledgment This is to request that: Prof./Dr. ____________________________________________ and (Please print) Prof./Dr.
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/appendixE.ps, 19960906
Postgraduate Studies Department of Computer Science Revised 9/96 Request to Take a PhD Qualifying Exam (For Departmental file only) Student information Student name: ________________________________________ Student#: ________________________ (Please print; underline family name) Programme: MSc MPhil PhD
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp531/Lect2.ps, 19960906
Database and Knowledge base Systems COMP531 (Fall 1996) Conceptual Modelling 1 Conceptual Modelling Database and Knowledge base Systems COMP531 (Fall 1996) Conceptual Modelling 2 Conceptual Modeling 1.Introduction 2.Record-oriented database modeling Representatives (i.e. the network, hierarchical and
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec5.ps, 19960906
Lecture 4.1: The fundamental theorem Let L . Then the following three statements are equivalent. 1. L is accepted by some NFA. 2. L is accepted by some DFA. 3. L is a regular language. Proof: Proof plan 3 => 1 => 2 => 3 3 => 1: ffl Given: L is a regular language. ffl Need to show: L is accepted by some
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/appendixC.ps, 19960906
Postgraduate Studies Department of Computer Science Revised 9/96 Request for Area Exemption/Course Credit (For Departmental file only) Course information Exemption requested: AI CE DB ST TH Credit requested: Yes (3 check one only, if applicable) (3 check if applicable) Institution name:
View the documentftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec6.ps, 19960906
5: Properties of regular languages Properties of languages accepted by NFA's or DFA's. Theorem 1 The set of regular languages are closed under 1. Concatenation, 2. Union, 3. Kleene star, 4. Complementation. 5. Intersection, and 6. Reversal. Proof: 1, 2, 3, and 6 were proved earlier. Item 4: ffl Give
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/comp531/A4Lect2.ps, 19960906
Database and Knowledge base Systems COMP531 (Fall 1996) Conceptual Modelling 26 Recent Trends to build fully-fledged DBMSs based on semantic models directly merge into the object database family continue to develop and evolve! Database and Knowledge base Systems COMP531 (Fall 1996) Conceptual Modelling
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/appendixJ.ps, 19960906
Department of Computer Science Fall 1996 Instructor TA Preferences Fall 1996 >>> Please complete and return this form by Friday, August 23, 1996 <<< COURSE & INSTRUCTOR INFORMATION Course: Instructor: TA INFORMATION Special skills needed (e.g., background and/or programming languages): Request for
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/appendixI.ps, 19960906
Department of Computer Science Fall 1996 Preferences for TA Duties Fall 1996 >>> This form must be completed and returned by all full-time PG students. <<< >>> Please complete and return this form by Friday, August 23, 1996 <<< Name: ______________________________________
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/appendixG.ps, 19960906
Postgraduate Studies Department of Computer Science Revised 9/96 PhD Thesis Proposal Examination Result (For Departmental file only) Student information Student name: ________________________________________ Student#: ________________________ (Please print; underline family name) Study mode: Full-time
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/lec5.ps, 19960907
5.Elimination ordering and complexity of VE The elimination process: ffl Let x be a node (vertex) in an undirected graph G. adj(x) | the set of neighbors of ffl Eliminating x from G means: 1. adding edges so that all nodes in adj(x) are pairwise adjacent, and 2. removing x and its incidenet edges. ffl
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect1.ps, 19960907
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 1 COMP 211 Introduction to Software Engineering Instructors Dr. Kamal Karlapalem, Room 3506, Tel.: 2358-6991, Email: kamal@cs Prof. Fred Lochovsky, Room 3527, Tel.: 2358-6996, Email: fred@cs Teaching Assistant Mr. James Purchase, Room
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect1.ps, 19960907
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 42 Combining Paradigms Paradigms are guidelines. Combine/modify them when needed. Requirements Analysis 4GT Spiral Model Prototyping Preliminary Requirements Gathering 4GT Maintenance Testing 4GT Coding Design Spiral Model: nth
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-31.ps.gz, 19960909
Planning in Stochastic Domains: Problem Characteristics and Approximation Nevin L. Zhang and Wenju Liu Technical Report HKUST-CS96-31 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect7.ps, 19960910
COMP 361 DATA COMMUNICATIONS 33 PHYSICAL LAYER INTERFACES COMP 361 DATA COMMUNICATIONS 34 Physical Layer Interfaces Most data processing devices cannot directly attach to the communications medium These devices, called data terminal equipment (DTE), for example, terminals, computers, use the data
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/set1.ps.gz, 19960910
Hong Kong University of Science and Technology COMP327/527: Pattern Recognition Fall 1996 Problem Set 1 (5%) Assigned: 10/9/96 Due: 24/9/96 Policy Issues 1. Your submission will be collected in class on the due date. Late submission will not be accepted. 2. Only five problems with highest marks will be
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class3.ps, 19960910
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 3 (Introduction) 47 Main Memory Management Main memory is the repository of quickly accessible data shared by the CPU and the I/O devices. Also primary memory Main memory is the only device that the CPU is able to address directly For a program to be executed, it
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect7.ps, 19960910
COMP 361 DATA COMMUNICATIONS 33 PHYSICAL LAYER INTERFACES COMP 361 DATA COMMUNICATIONS 34 Physical Layer Interfaces Most data processing devices cannot directly attach to the communications medium These devices, called data terminal equipment (DTE), for example, terminals, computers, use the data
open this document and view contentsftp://ftp.cs.ust.hk/pub/fred/proposal.ps, 19960911
ERG 1 (Revised 3/95) RGC Ref No. (to be completed by the UGC Secretariat) RESEARCH GRANTS COUNCIL Application for Allocation from the Earmarked Grant for Research 1996-97 PART I SUMMARY OF THE RESEARCH PROPOSAL 1. Project Title: Finding and Managing Information in Distributed, Digital Information
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect2.ps, 19960911
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 1 Case Study: A Telephone Switching System (Ghezzi p384) Problem: A big telecommunication company wishes to upgrade their existing telephone switching system to double its existing capacity while maintaining the same level of
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture2/1.overview1pp.ps, 19960911
COMP 211 1-1 SE Overview COMP 211 INTRODUCTION TO SOFTWARE ENGINEERING Instructors Dr. Kamal Karlapalem, Room 3506, Tel.: 2358-6991, Email: kamal@cs Prof. Fred Lochovsky, Room 3527, Tel.: 2358-6996, Email: fred@cs Teaching Assistant Mr. James Purchase, Room 4221a, Tel.: 2358-8840, Email: jamesp@cs Text
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect2.ps, 19960911
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 4 What actually happened Although many defects were found in integrated testing, they were all local to individual subsystems. Since no major design errors were discovered, the development cycle was fairly linear. The system was quite
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/xinxin/table.ps.gz, 19960911
Tabular Abstraction for Tabular Editing and Formatting Xinxin Wang Derick Woody
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.tnn97.ps.gz, 19960911
16 IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. XX, NO. Y, MONTH 1999 T.Y. Kwok and D.Y. Yeung, Use of bias term in projection pursuit learning improvesapproximationand convergenceproperties," 1996, To appear in IEEE Transactions on Neural Networks. W. Fang and R.C. Lacher, Network
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/xinxin/tr357.ps.gz, 19960911
An Abstract Model for Tables Xinxin Wang y Derick Wood z
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture2/1.overview2pp.ps, 19960911
COMP 211 1-1 SE Overview COMP 211 INTRODUCTION TO SOFTWARE ENGINEERING Instructors Dr. Kamal Karlapalem, Room 3506, Tel.: 2358-6991, Email: kamal@cs Prof. Fred Lochovsky, Room 3527, Tel.: 2358-6996, Email: fred@cs Teaching Assistant Mr. James Purchase, Room 4221a, Tel.: 2358-8840, Email: jamesp@cs Text
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/6.ps, 19960912
Structured Programming A program is structured if the flow of control through the program is evident from the syntactic structure of the program text. The flow of control through a program is evident if there is only a singleentry and a single-exit of the program. All the constructs that we have covered
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class5.ps, 19960912
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 4 (Processes and Process Scheduling) 1 PROCESSES AND PROCESS SCHEDULING COMP 252 -- Fall 1996 (Dr. Bo Li) Class 4 (Processes and Process Scheduling) 2 Process Concepts A process is a program in execution A process is an active entity, with a program counter
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture3.ps, 19960912
Expressions Consider the formula for computing one of the roots of the quadratic equation: root = B + pB2 4 A C 2 A : ffl Coded in a typical assembly or machine language it would require at least 15 instructions, and probably far more. ffl Moreover, the programmer would have to provide storage for each
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture1.ps, 19960912
What's a PL for Stroustrup (1994): ffl A tool for instructing machines ffl A means for communicating between programmers ffl A vehicle for expressing high level designs ffl A notation for algorithms ffl A way of expressing relationships between concepts ffl A tool for experimentation ffl A means for
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Examples/repository.example1pp.ps, 19960912
COMP 211 1/4 Department of Computer Science COMP 211: Introduction to Software Engineering Example Case Study: Technical Papers Repository Management Within the Department of Computer Science, the Database Group maintains a repository of technical papers. The repository consists of published and
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture5.ps, 19960912
Imperative Programming Action oriented. Primitive actions are machine-oriented: assignments, read, write, etc. A computation is a sequence of actions. Control structures specify how computation (sequences of action) is doen given the inputs. #include /* count characters in input */ main() int
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture4.ps, 19960912
Imperative programming ffl Imperative programming languages begin with Fortran, and include Algol, Pascal, and C. ffl The facilities provided by Pascal and C are well-developed and mature. ffl We shall concentrate on C for two reasons: { It's widely used both in academic and industry. { Its
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture2.ps, 19960912
Language Description A language has two parts: ffl Syntax: describes the sequence of symbols that make up valid programs. ffl Semantics: specifies what the programs mean. 1 What Are Reals Examples of reals: 0.1 23.6, .45 Non-examples: 23., 12.a, 2363 Informal rules: ffl A real has three parts: the
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Examples/repository.example2pp.ps, 19960912
COMP 211 1/4 Department of Computer Science COMP 211: Introduction to Software Engineering Example Case Study: Technical Papers Repository Management Within the Department of Computer Science, the Database Group maintains a repository of technical papers. The repository consists of published and
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class4.ps, 19960912
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 4 (Introduction) 65 Operating System Structure The approach to design large and complex systems such as OS Monolithic systems (simple systems) Layered systems Virtual machines Client Server systems COMP 252 -- Fall 1996 (Dr. Bo Li) Class 4 (Introduction) 66 Simple
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect3.ps, 19960912
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 5 Case Study: Budget Control System (Ghezzi, p389) Problem: Build a software system that suppor ts budget control for a small, high-tech software consulting and development company. Scenario: The main goal of budget control is
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect3.ps, 19960912
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 9 What actually happened It was decided to integrate BCS into the companywide information system. At that point, two independent systems existed: Administrative information system (AIS), running on a minicomputer, and budget control
open this document and view contentsftp://ftp.cs.ust.hk/pub/dwood/xinxin/thesis.ps.gz, 19960912
Tabular Abstraction, Editing, and Formatting by Xinxin Wang A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Doctor of Philosophy in Computer Science Waterloo, Ontario, Canada, 1996 c Xinxin Wang 1996 I hereby declare that I am the sole author of
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/hwk1.ps, 19960912
HKUST 1 Computer Science HONG KONG UNIVERSITY OF SCIENCE & TECHNOLOGY COMP 104: Programming Fundamentals and Methods Fall Semester 1996 HOMEWORK ASSIGNMENT #1 Final program due on Oct. 11, 1996, in class (hand-in procedure: put floppy disc with source code put into an envelop carrying your name, your
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec4.ps, 19960912
Lecture 4: Finite Automata Deterministic finite automata (DFA): A language recognizer. 1. An input tape divided into squares: for string input. 2. A machine which can be in a finite number of states | finite control. 3. A movable reading head. Figure 2-1 1 Deterministic finite automata 4.
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect4.ps, 19960915
Introduction to Software Engineering COMP211 (Fall 1996) Computer System Engineering 17 System Specification 1.System Overview objectives scope constraints 2.Functional and data description functional requirements data formats and requirements 3.System Architecture architecture context diagram ACD
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect4.ps, 19960915
Introduction to Software Engineering COMP211 (Fall 1996) Computer System Engineering 1 Computer System Engineering Introduction to Software Engineering COMP211 (Fall 1996) Computer System Engineering 2 Introduction The elements of computer based-system are: Software, Hardware, People, Database,
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/7.ps, 19960916
Procedure Activations (Chapter 5 of Sethi) 1 ffl A procedures is a construct for giving a name to a piece of coding, its body. ffl When a procedure is called the body is executed. Each execution of the body is called an activation of the body. ffl Functional procedures { extend the built-in operators.
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture2/2.systems-engineering2pp.ps, 19960916
COMP 211 2-1 Computer System Engineering COMPUTER SYSTEMS ENGINEERING n desired system functions are: l uncovered l analyzed l allocated to individual system elements Hardware Database Documents Software People System Procedures INPUT OUTPUT COMP 211 2-2 Computer System Engineering SYSTEM
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture2/2.systems-engineering1pp.ps, 19960916
COMP 211 2-1 Computer System Engineering COMPUTER SYSTEMS ENGINEERING n desired system functions are: l uncovered l analyzed l allocated to individual system elements Hardware Database Documents Software People System Procedures INPUT OUTPUT COMP 211 2-2 Computer System Engineering SYSTEM
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/hw1.ps, 19960917
COMP 272 Theory of Computation Fall Semester 1996 Homework 1 As previously stated, the solutions to these problems can be submitted to the TAs but are not required to be. Problems 1-6 should be handed in at the tutorial on Friday, September 20 and problems 7-9 on Friday September 27. Late submissions
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/solution1.ps, 19960917
COMP 251 1996-97 Fall Semester Assignment #1 Date assigned: Friday, Sept 6, 1996 Due time: Before 12:00pm on Friday, Sept 13, 1996. Late paper will not be accepted Problem 1. (40%) Normally, it is easy to see how a given string can be generated by a given grammar, but harder to show that a given string
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/Performan.fm.ps, 19960917
Performance requirements for broadband networking COMP 560 Jelena Misic 1 Performance requirements for broadband networking The task is to define transfer mode of the single, universal broadband network, which is capable to fulfil all the requirements of expected and even unexpected services in the
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/PERFORMAN.fm.ps, 19960917
Performance requirements for broadband networking COMP 560 Jelena Misic 1 Performance requirements for broadband networking The task is to define transfer mode of the single, universal broadband network, which is capable to fulfil all the requirements of expected and even unexpected services in the
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/f96/set1.ps.gz, 19960918
Hong Kong University of Science and Technology COMP327/527: Pattern Recognition Fall 1996 Problem Set 1 (5%) Assigned: 10/9/96 Due: 24/9/96 Policy Issues 1. Your submission will be collected in class on the due date. Late submission will not be accepted. 2. Only five problems with highest marks will be
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/8.ps, 19960918
(COMP251 LECTURE 8) 1 Procedure Activations (Continued) Scope Rules for Names. Motivating examples: int x=1; main() { int x=2; { int x=3; printf("%n",x); test; } printf("%n",x); test() { printf("%n",x);} The scope rules of a language determine which declaration of a name x applies to an occurrence of x
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect11.ps, 19960919
COMP 361 MEDIUM ACCESS SUBLAYER 9 CSMA Protocols A compromise between the above two protocols is the p-persistent CSMA: 1.If the medium is idle, transmit with probability p, and delay one time unit (typically the maximum propogation delay) with probability (1-p) 2.If the medium is busy, continue to
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class6.ps, 19960919
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 6 (Processes and Process Scheduling) 21 Process Scheduling Concepts While discussing batch systems, we realized that if programs are executed in a fixed sequence, the CPU may be idle when the program requires input/output The objective of multiprogramming as a
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect11.ps, 19960919
COMP 361 MEDIUM ACCESS SUBLAYER 9 CSMA Protocols A compromise between the above two pro- tocols is the p-persistent CSMA: 1.If the medium is idle, transmit with probability p, and delay one time unit (typically the maximum propogation delay) with probability (1-p) 2.If the medium is busy, continue to
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/task1.ps, 19960920
20 September 1996 1 COMP211: Software Engineering Course Project Course Scheduling System Phase 1: The System Requirements Spring, 1996 The Computer Science Department has distributed a Request For Proposals (RFP) to local software houses (that means your group) to develop a course scheduling system
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp361/Physical.fm.ps, 19960920
COMP 361 DATA COMMUNICATIONS 1 DATA COMMUNICATIONS COMP 361 DATA COMMUNICATIONS 2 Data Transmission Data transmission from a sender to a receiver requires the use of a transmission medium: - Guided media: twisted pair, coaxial cable, fiber optic cable - Unguided media: microwave, satellite transmission,
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp361/Network.fm.ps, 19960920
COMP 361 NETWORK LAYER 1 NETWORK LAYER COMP 361 NETWORK LAYER 2 The Network Layer The data link layer was primarily responsible for reliable transfer of information across a physical link The network layer is responsible for providing transfer of data from the source to the destination The network layer
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/9.ps, 19960920
(COMP251 LECTURE 9) 1 Tail Recursion A call in the body of a procedure is recursive if executing this call may eventually lead to a call of this procedure: int fact(int x) void p() void q() { if (x == 0) return 1 { q;} { p;} else return x*fact(x-1); So a procedure is recursive iff there is a recursive
open this document and view contentsftp://ftp.cs.ust.hk/pub/horner/04_moreutilities.ps, 19960920
I-3 More UNIX Utilities Redirection Using the > character after a command redirects output into a named file. Using the < character after a command redirects input from a named file I-2 More UNIX Utilities More utilities apropos Helpful way to find a command name echo Display command line input to
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp361/Mac.fm.ps, 19960920
COMP 361 MEDIUM ACCESS SUBLAYER 1 MEDIUM ACCESS SUBLAYER COMP 361 MEDIUM ACCESS SUBLAYER 2 Local and Metropolitan Area Networks Local area networks (LANs) and metropolitan area networks (MANs) are designed to interconnect computers within a small geographical area like a room, building, campus, or a
open this document and view contentsftp://ftp.cs.ust.hk/pub/horner/06_shellbasics.ps, 19960920
COMP111 Lecture Notes Pattern matching You already know about * and The notation matches any single one of the enclosed characters. The notation matches any single character except the listed ones: Finally, many shells allow you to give a list of strings in curly brackets, comma
open this document and view contentsftp://ftp.cs.ust.hk/pub/horner/05_filesystems.ps, 19960920
II-15 Odds and Ends Redirection You already know about input redirection (cat < file) and output redirection (cat > file). You can also append to a file using >> : % date > wholist % who >> wholist Simple file pattern matching The pattern * matches any number of any character: % ls /etc/pass* finds all
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp361/Dlink.fm.ps, 19960920
COMP 361 DATA LINK LAYER 1 DATA LINK LAYER COMP 361 DATA LINK LAYER 2 Why Data Link Layer The data link layer is responsible for efficient and reliable communication across a physical link The data link layer must provide: - Frame synchronization: cleary identify the beginning and end of each frame
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec2.ps, 19960922
HKUST 1 Computer Science comp 102 Lecture 2 Introduction to Computer Systems Information processing Computer organization Evolution of computers Hardware generations & categories HKUST 2 Computer Science comp 102 Lecture 2 Information Processing Simplified Work Model Computer Work Model Worker
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec5.ps, 19960922
HKUST 1 Computer Science comp 102 Lecture 5 Topics Introduction to C++ A sample program Another Example Input and Output HKUST 2 Computer Science comp 102 Lecture 5 Introduction to C++ C++ is the successor of C language. It was developed by Dennis Ritchie of AT & T Bell Laboratories. C and UNIX
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec4.ps, 19960922
HKUST 1 Computer Science comp 102 Lecture 4 Topics Fundamentals of programming Algorithm design Software life cycle Introduction to C++ A sample program An in-class quiz HKUST 2 Computer Science comp 102 Lecture 4 The Right Approach In computer-based problem solving, what is the most difficult part
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec6.ps, 19960922
HKUST 1 Computer Science comp 102 Lecture 6 Topics Variable Identifier Rules Reserved Words Comments Assignment Statement Testing and Debugging HKUST 2 Computer Science comp 102 Lecture 6 Variables Once a person has understood the way variables are used in the programming, he has understood the
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec3.ps, 19960922
HKUST 1 Computer Science comp 102 Lecture 3 Topics Future computing trends Multi-level structured computer organization Types of software Steps involved in computer programming Program documentation Compiling and editing HKUST 2 Computer Science comp 102 Lecture 3 Future Computing Trends Computing power
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/10.ps, 19960923
(COMP251 LECTURE 10) 1 Data Types A PL has two major components: data types and operations. Data structures in imperative PLs embody many of the unique features of such languages: ffl The emphasis in imperative languages is on data structures with assignable components; that is, components that can hold
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/assgn2.ps, 19960923
COMP 538, 300O: Homework Assignment 2 The purpose of this exercise for you to experience the process of constructing a Bayesian network and learn how to use some of the softwares. You are asked to build a Bayesian network for a bank that will allow the bank to determine whether or not to grant a person
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/solution1.ps, 19960923
COMP272 Tutorial 2 date: 9/20/96 notes prepared by YAN, Li Q6 Let P = fa; bg. Write regular expressions represent- ing the following sets: (a) All strings in P with exactly one or two a-s (but not a-s. or more than two a-s). b ab
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/netica/manual.ps, 19960923
Netica TM API Programmer's Library Reference Manual Version 1.00 - 2 - Netica API Programmer's Library Reference Manual Version 1.00 September 20, 1995 Copyright 1995 by Norsys Software Corp. This document may be copied and stored freely, provided it is duplicated in its entirety, without modification,
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class7.ps, 19960924
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 7 (Processes and Process Scheduling) 40 SJF - Predicting Next CPU Burst We can use the past history of a process s CPU burst to predict the next CPU burst We predict the next CPU burst as an exponential average of the measured lengths of previous CPU bursts as
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec7.ps, 19960925
HKUST 1 Computer Science comp 102 Lecture 7 Topics Standard Input Standard Output Data Types Expression and Operators HKUST 2 Computer Science comp 102 Lecture 7 Standard Input cin the standard input stream Input operator ">>" - Extracting data from input stream - Skip white spaces - Extract only
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect5.ps, 19960925
Introduction to Software Engineering COMP211 (Fall 1996) Requirements & Structured System Analysis 1 Requirements Analysis Overview Structured System Analysis Introduction to Software Engineering COMP211 (Fall 1996) Requirements & Structured System Analysis 2 Overview The scope of the software
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect5.ps, 19960925
Introduction to Software Engineering COMP211 (Fall 1996) Requirements & Structured System Analysis 30 Summary DFDs DFD is a picture of a system it shows - partitioning - interfaces - data flows it does not show - procedures - control flow - trivial error paths (top levels) - system startup and system
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec8.ps, 19960925
HKUST 1 Computer Science comp 102 Lecture 8 Topics Expression and Operators Precedence Mixed-Type Assignment Program Branching Logical Expression Logical Operators HKUST 2 Computer Science comp 102 Lecture 8 Expressions Operator precedence: * / % are completed before operators with the same precedence
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/11.ps, 19960925
(COMP251 LECTURE 11) 1 Structures A structure, also called a record, is a collection of one or more variables, possibly of different types, grouped together under a single name for convenient handling. A structure type with k components (fields) has the following form: struct { T1 ; T2
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/12.ps, 19960927
(COMP251 LECTURE 12) 1 Types and Error Checking How do compilers detect type errors Are the following statements in C legal int x; char c; x = 2.3; x = 2 + 2.3; x = c + 2.3; x = c; c = x; The rules of type in a langauge will answer questions like these. (COMP251 LECTURE 12) 2 Variable Bindings Rules
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/hw/hw1.ps, 19960929
COMP 102 (Fall 96) 1 HONG KONG UNIVERSITY OF SCIENCE & TECHNOLOGY COMP 102: Computer Fundamentals & Programming (Section 1) Fall Semester, 1996 HOMEWORK ASSIGNMENT #1: Payroll Program Due on October 11th, 1996 before 5:00pm Problem Description: A company has 3 types of employees: E (Executive), O
open this document and view contentsftp://ftp.cs.ust.hk/pub/video/papers/SPIE96.ps.gz, 19960930
An Experimental Video Database Management System Based on Advanced Object-Oriented Techniques Liusheng Huang John Chung-Mong Lee Qing Li Wei Xiong Department of Computer Science Hong Kong University of Science and Technology, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/13.ps, 19960930
(COMP251 LECTURE 13) 1 Object-Oriented Programming "Object-oriented programming holds the promise of making complex systems easier to structure and manage. This promise can be realized by starting afresh from the problem to be solved and thinking at the application level, in terms of objects and
open this document and view contentsftp://ftp.cs.ust.hk/pub/video/papers/Paper_beijing.ps.gz, 19960930
VIMS: Towards an Adaptive and Versatile Video Manipulation Server John Chung-Mong Lee Qing Li Wei Xiong Department of Computer Science Hong Kong University of Science and Technology, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/Task2.ps, 19960930
COMP 211 1/1 Department of Computer Science COMP 211: Introduction to Software Engineering Task 2: Requirements Specification Assigned: September 30, 1996 Value: 10% of course mark Due: October 23, 1996 The Computer Science Department is pleased to inform you that your software house (that means your
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/sol2.ps, 19960930
COMP 251 1996-97 Fall Semester Assignment #2 Date assigned: Friday, Sept 13, 1996 Due time: 12:00pm on Friday, Sept 20, 1996 (Bring it to the class, and hand it in just before the class) Late paper will not be accepted Problem 1. (60%) Write a C program that eliminates extra spaces in the input. For
open this document and view contentsftp://ftp.cs.ust.hk/pub/video/papers/ACCV95.ps.gz, 19960930
Video Segment Indexing Through Classification and Interactive View-based Query John Chung-Mong Leey, Wei Xiongy, Ding-Gang Shenzand Ruihua May yDepartment of Computer Science The Hong Kong University of Science & Technology, Hong Kong zInstitute of Optic-Fibre Technology Shanghai Jiaotong University,
open this document and view contentsftp://ftp.cs.ust.hk/pub/video/papers/Paper_mta.ps.gz, 19960930
Multimedia Tools and Applications, 9, 1{25 (1992) c 1992 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. VIMS: A Video Information Management System JOHN CHUNG-MONG LEE, QING LI AND WEI XIONG fcmlee,qing,csxweig@cs.ust.hk Department of Computer Science, Hong Kong University of
open this document and view contentsftp://ftp.cs.ust.hk/pub/video/papers/SPIE95.ps.gz, 19960930
Net comparison: a fast and effective method for classifying image sequences Wei Xiong John Chung-Mong Lee Man-Ching Ip Department of Computer Science Hong Kong University of Science and Technology, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/solution1-2.ps, 19960930
q2 q3 s q1 7. 1 0 1 0 1 0 > 1 0 0 0 1 1 0 1 1 0 1 0 8a. a a b b b b a a 8b. a a a b b a a a b b > b a b a b b a a a b b b q1 q2 q7q6q5q4q3 s q5q4q3q2q1 q10q9q8q7q6 s a a 8c. a b b a a b
open this document and view contentsftp://ftp.cs.ust.hk/pub/video/papers/Paper_mva.ps.gz, 19960930
Automatic Video Data Structuring through Shot Partitioning and Key Frame Computing Wei XIONG, John Chung-Mong LEE, Rui-Hua MA
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/hw2.ps, 19960930
COMP 272 Theory of Computation Fall Semester 1996 Homework 2 Due 4 October, 1996 As previously stated, the solutions to these problems can be submitted to the TAs but are not required to be. 1. Draw NFAs that accept the following languages (a) (ab
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/tut1.ps, 19960930
+0/0 -0/0 +1/0 -1/0 +2/0 -2/0 +3/0 -3/0 ... +0/1 -0/1 +1/1 -1/1 +2/1 -2/1 +3/1 -3/1 ... +0/2 -0/2 +1/2 -1/2 +2/2 -2/2 +3/2 -3/2 ... +0/3 -0/3 +1/3 -1/3 +2/3 -2/3 +3/3 -3/3 ... Question 2: Show that if A is uncountable and B is countable then f: A fi B is not one-to-one. Proof: Assume A is uncountable
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Examples/TPRM-dataflows2pp.ps, 19961002
COMP 211 Requirements Analysis TPRM DATA FLOWS New-addition = eywords} New-paper-data = R-categories} +
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4DFD.ps, 19961002
Introduction to Database Systems COMP231 (Spring 1995) Requirements & Structured System Analysis 36 PROCESS 4: Maintain repository b Repository Users D1 Paper pile D2 Repository Papers File folder Maintain repository 4 c Paper Sources D4 Entries on loan Papers File folder Overdue papers Paper review
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Examples/TPRM-level1-processes1pp.ps, 19961002
COMP 211 Requirements Analysis PROCESS 1: Add papers Repository Users D1 Paper pile D2 Repository Papers Add papers 1 D3 Index card holder Paper Sources Papers File folder New additions Index card COMP 211 Requirements Analysis PROCESS 2: Query repository Repository Users D2 Repository Query repository
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/14.ps, 19961002
(COMP251 LECTURE 14) 1 C++ Reference book: Ellis and Stroustrup, The Annotated C++ Reference Manual, 1990. A copy of this book is in the library course reserve section. (COMP251 LECTURE 14) 2 A Brief History of C++ ffl Stroustrup extends C with Simula like classes while working at AT&T Bell Labs in the
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Examples/TPRM-dataflows1pp.ps, 19961002
COMP 211 Requirements Analysis TPRM DATA FLOWS New-addition = eywords} New-paper-data = R-categories} +
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/DFD.ps, 19961002
Introduction to Database Systems COMP231 (Spring 1995) Requirements & Structured System Analysis 33 PROCESS 1: Add papers b Repository Users D1 Paper pile D2 Repository Papers Add papers 1 D3 Index card holder c Paper Sources Papers File folder New additions Index card Introduction to Database Systems
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Example.ps, 19961002
COMP 211 1/4 Department of Computer Science COMP 211: Introduction to Software Engineering Example Case Study: Technical Papers Repository Management Within the Department of Computer Science, the Database Group maintains a repository of technical papers. The repository consists of published and
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-34.ps.gz, 19961002
Page 21 technique. The results also show that more globally optimizing techniques which consider a larger number of messages during sequencing and assignment decisions, perform consistently better than others which do not take an aggregate view of the scheduling problem. As a general trend, we observed
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Examples/TPRM-level1-processes2pp.ps, 19961002
COMP 211 Requirements Analysis PROCESS 1: Add papers Repository Users D1 Paper pile D2 Repository Papers Add papers 1 D3 Index card holder Paper Sources Papers File folder New additions Index card COMP 211 Requirements Analysis PROCESS 2: Query repository Repository Users D2 Repository Query repository
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec10.ps, 19961002
HKUST 1 Computer Science comp 102 Lecture 9 Topics Quiz HKUST 2 Computer Science comp 102 Lecture 9 1. Which of the following, if any, are legal identifiers for a C++ program If not why a) 12 b) 3X c) data d) %change e) prog.cpp Ans: Only C 2. Which of the following are likely to be poor choices for an
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Examples/repository-example1pp.ps, 19961002
COMP 211 1/4 Department of Computer Science COMP 211: Introduction to Software Engineering Example Case Study: Technical Papers Repository Management Within the Department of Computer Science, the Database Group maintains a repository of technical papers. The repository consists of published and
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Examples/repository-example2pp.ps, 19961002
COMP 211 1/4 Department of Computer Science COMP 211: Introduction to Software Engineering Example Case Study: Technical Papers Repository Management Within the Department of Computer Science, the Database Group maintains a repository of technical papers. The repository consists of published and
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec9.ps, 19961002
HKUST 1 Computer Science comp 102 Lecture 9 Topics While Loop Increment and Decrement Operators Do-While Loop HKUST 2 Computer Science comp 102 Lecture 9 WHILE Loop Repeat a set of instructions as long as a specified condition is true. #include int main() int count_down; cout << How many
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/transfermodes.fm.ps, 19961003
Transfer modes for broadband networking COMP 560 Jelena Misic 1 Transfer modes for broadband networking This section covers Multirate circuit switching, fast circuit switching, frame relay, Switched multimegabit data service, SMDS Fast packet switching - Asynchronous transfer mode Transfer modes for
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/broadbandLAN.fm.ps, 19961003
Broadband (highspeed) LANs and MANs COMP 560 Jelena Misic 1 Definition of a MAN A MAN is a network capable of providing high speed (more than 1 Mbit/s), switched end-to-end connectivity across distances typically ranging between 5 and 50km. MAN should allow the simultaneous transport of data, voice and
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/lec7.ps, 19961003
7. Causal independence ffl Let e be a variable in a BN and let c1, c2, : : : , cm be its parents. The size of the conditional probability table (CPT) of e is exponential in m. ffl There is a need to exploit structures in CPT's to ease knowl- edge acquisition and inference. ffl Causal independence | one
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class9.ps, 19961003
COMP 252 -- Fall 1993 (Dr. Bo Li) Class 9 (Process Coordination) 1 PROCESS COORDINATION COMP 252 -- Fall 1993 (Dr. Bo Li) Class 9 (Process Coordination) 2 Cooperating Processes A process is considered independent if it cannot affect or be affected by other processes in the system Otherwise the process
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/BROADBANDLAN.fm.ps, 19961003
Broadband (highspeed) LANs and MANs COMP 560 Jelena Misic 1 Definition of a MAN A MAN is a network capable of providing high speed (more than 1 Mbit/s), switched end-to-end connectivity across distances typically ranging between 5 and 50km. MAN should allow the simultaneous transport of data, voice and
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec6-1.ps, 19961003
6: A Second Pumping Theorem The pumping theorem we saw previously was: Theorem 1 Let L be an infinite regular language. Then there exist strings x, y, and z such that y <> e; and xynz2L for all n >= : We can also prove a stronger pumping theorem (Ex. 2.6.4): Theorem 2 Let M = (K; ; ffi; s; F ) be a DFA.
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/TRANSFERMODES.fm.ps, 19961003
Transfer modes for broadband networking COMP 560 Jelena Misic 1 Transfer modes for broadband networking This section covers Multirate circuit switching, fast circuit switching, frame relay, Switched multimegabit data service, SMDS Fast packet switching - Asynchronous transfer mode Transfer modes for
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/15.ps, 19961005
(COMP251 LECTURE 15) 1 Overview In this lecture, we shall continue our discussion of this pointer. We'll then discuss static class members, which are like global variables. We'll then talking about scope rules about classes. We'll finish this lecture with nested and local classes. In case you don't
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Ex6.ps, 19961006
Introduction to Database Systems COMP231 (Spring 1995) Introduction 22 Paper-status = Library# + Date-borrowed Usage-query = (Library#) Usage-report = Library# + {Author-name} + Title + Usage-count User-query = (Library#) + ({Author-name}) + (Title) Query-response = Library# + {Author-name} + Title +
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect6.ps, 19961007
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 1 Data Dictionary Introduction to Software Engineering COMP211 (Fall 1996) Introduction 2 Introduction A data dictionary (DD) is a set of definitions of data and processes declared in the DFDs It is a repository of meta data (data
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/16.ps, 19961007
(COMP251 LECTURE 16) 1 Review and Overview We have been talking about class declarations in C++, and some of the special features of C++ classes such as this pointer. We have also talked about the scope rules for C++ classes. In general, C++ uses the lexical scope rules. However, some of the scope rules
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect6.ps, 19961007
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 1 Data Dictionary Introduction to Software Engineering COMP211 (Fall 1996) Introduction 2 Introduction A data dictionary (DD) is a set of definitions of data and processes declared in the DFDs It is a repository of meta data (data
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/asg1.ps.gz, 19961008
Hong Kong University of Science and Technology COMP327: Pattern Recognition Fall 1996 Computer Assignment 1 (10%) Assigned: 8/10/96 Due: 24/10/96 Policy Issues 1. Your submission will be collected in class on the due date. 2. Late submission will only be accepted if it is submitted directly to the
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect7.ps, 19961008
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 21 Representing Process Logic Problem 1: Many ways to say the same thing Identify the actions and the conditions and use the common sentence structure to cast the sentence into the IF-THEN-ELSE-SO model Problem 2: Imprecise ranges Up
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/f96/asg1.ps.gz, 19961008
Hong Kong University of Science and Technology COMP327: Pattern Recognition Fall 1996 Computer Assignment 1 (10%) Assigned: 8/10/96 Due: 24/10/96 Policy Issues 1. Your submission will be collected in class on the due date. 2. Late submission will only be accepted if it is submitted directly to the
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec9.ps, 19961008
9: Pushdown Automata ffl Language recognizer for CFLs. ffl Example: L = fwcwR : w 2 fa; bg g ffl CFG: S ! aSa S ! bSb S ! c. ffl A recognizer for this language { Input: a string w. { Output: YES if w 2 L, NO otherwise. 1. C-Flag = FALSE. 2. Scan w from left to right. For each symbol oe scanned, { If1 oe
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect7.ps, 19961008
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 21 Representing Process Logic Problem 1: Many ways to say the same thing Identify the actions and the conditions and use the common sentence structure to cast the sentence into the IF-THEN-ELSE-SO model Problem 2: Imprecise ranges Up
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/sol3.ps, 19961008
COMP 251 1996-97 Fall Semester Assignment #3 Date assigned: Friday, Sept 20, 1996 Due time: 12:00pm on Friday, Sept 27, 1996 Solution prepared by flai@cs.ust.hk Problem 1. (20%) What are the differences between C procedures and macro definitions (#define statements) What are their advantages and
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec11.ps, 19961008
HKUST 1 Computer Science comp 102 Lecture 11 Topics More about logical expressions Logic variables in C++ Multi-way If-statement The switch statement HKUST 2 Computer Science comp 102 Lecture 11 Truth table for && and || Operand1 Operand2 Operand1 && Operand2 1 (True) 1 (True) 1 (True) 1 (True) 0
open this document and view contentsftp://ftp.cs.ust.hk/pub/horner/07_shellprog_part1.ps, 19961008
1 The UNIX Shells Main kinds of shells (but you wouldn t believe some of the strange things that are out there on the net ) Bourne shell and kin sh Bourne shell; original UNIX shell written in C la pseudo Algol (!) ksh Korn shell; job history, functions, arithmetic bash GNU Bourne again shell with
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class10.ps, 19961008
COMP 252 -- Fall 1993 (Dr. Bo Li) Class 10 (Process Coordination) 20 Two Process Solutions Solution 3: - Combines the approaches of solutions 1 and 2 1. repeat 4. while (flag1=true do noop; 5. critical section; 6. flag0 := false; 7. remainder 8. until false; 1. repeat 4. while (flag0= true do noop; 5.
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec8.ps, 19961008
8: Context-Free Languages Context-free grammars ffl A language generator that is more powerful than regular expressions. ffl Example: = fa; bg L = fstrings that begin with a and end with b and that contain a string of a's or a string of b's in betweeng ffl Regular expression: a(a
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec10.ps, 19961008
Properties of CFLs Theorem 1 CFLs are closed under union, concatenation, and Kleene Star. Proof ffl G1 = (V1; 1; R1; S1), G2 = (V2; 2; R2; S2). ffl Let G = (V1
open this document and view contentsftp://ftp.cs.ust.hk/pub/horner/07_shellprog_part2.ps, 19961008
1 Command substitution Running a pipeline surrounded by backquotes causes the shell to: Run the pipeline Substitute the output of the pipeline for everything inside the quotes The following uses the expr command to reset the value of a shell variable: $ i=1 $ expr $i + 1 2 $ echo $i 1 $ i= expr $1 + 1 $
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/Homework2.fm.ps, 19961009
COMP 560, Homework 2, due date 22. October 1) Introduction: From a networking perspective, where engineering the network delay is a hard problem, solving the problem of delay variation (jitter) is even more frustrating. Here is the example of timing requirements for networks which are imposed by audio
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/Homework1.fm.ps, 19961009
COMP 560, Homework 1, due date 3. October 1) User equipped with the ISDN basic user-network interface, needs to access the public packet switched network. Suppose that packet switched node through which the user enters the packet switched network has only X.25 physical interface (e.g. EIA 232 or X.21).
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/f96/set2.ps.gz, 19961009
Hong Kong University of Science and Technology COMP327/527: Pattern Recognition Fall 1996 Problem Set 2 (5%) Assigned: 24/9/96 Due: 8/10/96 Policy Issues 1. Your submission will be collected in class on the due date. Late submission will not be accepted. 2. Only five problems with highest marks will be
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/lec8.ps, 19961009
8. Approximate inference Approximation is a necessity in large networks. Many approaches have been proposed. ffl Pruning of insignificant probabilities. ffl Simulation. ffl Search. ffl Abstraction. ffl Pruning of weak dependencies. ffl : : : etc. Basic issue: Tradeoff between accuracy and complexity.
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/set2.ps.gz, 19961009
Hong Kong University of Science and Technology COMP327/527: Pattern Recognition Fall 1996 Problem Set 2 (5%) Assigned: 24/9/96 Due: 8/10/96 Policy Issues 1. Your submission will be collected in class on the due date. Late submission will not be accepted. 2. Only five problems with highest marks will be
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/lec9.ps, 19961009
9. Learning Where do Bayesian networks come from ffl Both structures and parameters from experts. ffl Structures from experts and parameters from data (parameter learning). ffl Both structures and parameters from data (structure learning). Learning is also necessary for system self-improvement. We shall
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/17.ps, 19961009
(COMP251 LECTURE 17) 1 Overview We shall continue talking about special member functions: constructors and destructors. Closely related are issues regarding class initialization. So we'll talk about that as well. We'll get on with C++ class inheritances beginning next week. (COMP251 LECTURE 17) 2 Class
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/solution2.ps, 19961010
R(1,3,2) = a U ee*a = a R(2,3,2) = / U (a U b)e*a = aa U ba R(3,3,2) = e U (a U b)e*a = e U aa U ba R(3,2,2) = / U (a U b)e*b = ab U bb R(3,1,2) = (a U b) U (a U b)e*e = a U b R(1,1,3) = e U b(e U ab U bb)*(a U b) = e U b(ab U bb)*(a U b) R(1,3,3) = a U b(e U ab U bb)*(aa U ba) = a U b(ab U bb)*(aa U
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/proj.ps.gz, 19961010
Hong Kong University of Science and Technology COMP527: Pattern Recognition Fall 1996 Computer Project (20%) Assigned: 15/10/96 Due: 28/11/96 Policy Issues 1. Your submission will be collected in class on the due date. 2. Late submission will only be accepted if it is submitted directly to the
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/f96/proj.ps.gz, 19961010
Hong Kong University of Science and Technology COMP527: Pattern Recognition Fall 1996 Computer Project (20%) Assigned: 15/10/96 Due: 28/11/96 Policy Issues 1. Your submission will be collected in class on the due date. 2. Late submission will only be accepted if it is submitted directly to the
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class12.ps, 19961011
COMP 252 -- Fall 1993 (Dr. Bo Li) Class 12 (Process Coordination) 65 Interprocess Communication We have addressed the synchronization problems between processes so far The larger problem is one of communication between processes Two schemes of interprocess communication are popular: - Shared memory in
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/solution3.ps, 19961011
COMP272 Tutorial on Homework3 date: 10/11/96 notes prepared by YAN, Li Q1 (a) P ref(L) Let L = L(M);M = f ; K; ffi; s; Fg then P ref(L) = L(M ); M = f ; K; ffi; s; F g where q2F iff there exists a path in DFA from q to some state in F . (b) Suf(L) Suf(L) = (P ref(LR))R (d) L=L0, where L0 is accepted by
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/hw3.ps, 19961011
COMP 272 Theory of Computation Fall Semester 1996 Homework 3 { Due 11 October, 1996 As previously stated, the solutions to these problems can be submitted to the TAs but are not required to be. 1. Problems 2.4.5 (a), (b), (d), (g) in Lewis and Papadimitirou 2. For each of the following languages say
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class11.ps, 19961011
COMP 252 -- Fall 1993 (Dr. Bo Li) Class 12 (Process Coordination) 46 The Dining-Philosophers Problem Five philosophers sit around a common circular table and spend their time thinking and eating There is a chopstick between every two philosophers When a philosopher thinks, s/he does not interact with
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec12.ps, 19961012
HKUST 1 Computer Science comp 102 Lecture 12 Topics More about logical expressions The switch statement The for loop HKUST 2 Computer Science comp 102 Lecture 12 Example #include int main( ) double fuel_gauge_reading; cout << Enter fuel gauge reading: ; cin >> fuel_gauge_reading; cout <<
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect8.ps, 19961013
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 29 Decision Trees Decision trees have the same purpose as decision tables Usually it is easier to depict conditions and decision points using decision trees Decision trees are very readable (to a lay person) and usually self
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect8.ps, 19961013
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 29 Decision Trees Decision trees have the same pur pose as decision tables Usually it is easier to depict conditions and decision points using decision trees Decision trees are very readable (to a lay person) and usually self
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec13.ps, 19961013
HKUST 1 Computer Science comp 102 Lecture 13 Topics More about for-loop The break-statement Nested loops Loop debugging techniques HKUST 2 Computer Science comp 102 Lecture 13 Selection of LOOP constructs: For Loop: Calculation that is repeated a fixed number of times using a value that is changed by
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/hwk2.ps, 19961014
HKUST 1 Computer Science HONG KONG UNIVERSITY OF SCIENCE & TECHNOLOGY COMP 104: Programming Fundamentals and Methods Fall Semester 1996 HOMEWORK ASSIGNMENT #2 Final program due on Nov. 8, 1996 in class (hand-in procedure: put floppy disc with source code print out in an envelop carrying your name, your
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/18.ps, 19961014
(COMP251 LECTURE 18) 1 Overview In this lecture, we shall put what we have learned so far about C++ classes into action to design a list class. (COMP251 LECTURE 18) 2 The List Class Conceptual modeling: a list: item item item item NULL The value in an item can be of any type: integer, float, character,
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec14.ps, 19961016
HKUST 1 Computer Science comp 102 Lecture 14 Topics Some more nested loops Loop debugging techniques Top-down design techniques Functions HKUST 2 Computer Science comp 102 Lecture 14 Example Write a loop that will read in a list of even numbers (such as 2 -4 8 6) and compute the total of the numbers on
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/20.ps, 19961016
(COMP251 LECTURE 20) 1 Overview Topics covered in this class: memory management for derived classes; standard conversion; derived class object initialization; virtual functions (COMP251 LECTURE 20) 2 Memory Management An object of a class is typically represented by a contiguous region of memory. For
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/19.ps, 19961016
(COMP251 LECTURE 19) 1 Overview We're now ready to study the key relation between two classes in OOP: inheritance. A mechanism of inheritance has to address the following issues: ffl How are data members and member functions inherited ffl How are access controls inherited ffl Do we allow multiple
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture2/3.requirements-analysis1pp.ps, 19961017
COMP 211 3-1 Requirements Analysis REQUIREMENTS ANALYSIS OVERVIEW l refine the statement of scope for software developed during computer systems engineering l build a prototype of the software if requirements are unclear l iterate with the user l build a (data flow) model for the software l develop
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture2/3.requirements-analysis2pp.ps, 19961017
COMP 211 3-1 Requirements Analysis REQUIREMENTS ANALYSIS OVERVIEW l refine the statement of scope for software developed during computer systems engineering l build a prototype of the software if requirements are unclear l iterate with the user l build a (data flow) model for the software l develop
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-36.ps.gz, 19961018
Incorporating Verification of Liveness Properties in Compositional Reachability Analysis Shing-Chi Cheung , Dimitra Giannakopoulou y , and Jeff Kramer y Technical Report HKUST-CS96-36 October 1996 HKUST Department of Computer Science University of Science & Technology Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/21.ps, 19961018
(COMP251 LECTURE 21) 1 Overview Topics covered in this class: vertual functions, multiple inheritances, and virtual base classes. (COMP251 LECTURE 21) 2 Virtual Functions (Continued) A virtual function is a special member function invoked through a public base class reference or pointer; it is bound
open this document and view contentsftp://ftp.cs.ust.hk/pub/gan/rocling96.ps.Z, 19961021
A Preliminary Study of Disambiguating VO- and VN-Constructions Using Selection Preferences Kok-Wee Gan Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong E-mail: gankw@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect9.ps, 19961022
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 42 Defining Data Stores Defined in terms of the data flows contained in it plus relationships among data in a data store. Need to describe logical properties of data stores 1.Entity types ( data structure) - generic description of a
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/DT.ps, 19961022
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 56 Decision Trees (Example) The subsidy to the cub scout pack is based on the number of scouts, rank and length of membership. The subsidy for each scout is $25 for first year members, $35 for second year members and $50 for scouts
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect9.ps, 19961022
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 42 Defining Data Stores Defined in terms of the data flows contained in it plus relationships among data in a data store. Need to describe logical properties of data stores 1.Entity types ( data structure) - generic description of a
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4DT.ps, 19961022
Introduction to Software Engineering COMP211 (Fall 1996) Introduction 56 Decision Trees (Example) The subsidy to the cub scout pack is based on the number of scouts, rank and length of membership. The subsidy for each scout is $25 for first year members, $35 for second year members and $50 for scouts
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/scheme.ps, 19961023
Revised4 Report on the Algorithmic Language Scheme WILLIAM CLINGER AND JONATHAN REES (Editors) H. ABELSON R. K. DYBVIG C. T. HAYNES G. J. ROZAS N. I. ADAMS IV D. P. FRIEDMAN E. KOHLBECKER G. L. STEELE JR. D. H. BARTLEY R. HALSTEAD D. OXLEY G. J. SUSSMAN G. BROOKS C. HANSON K. M. PITMAN M. WAND Dedicated
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class14.ps, 19961023
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 14 (Deadlock) 1 DEADLOCK COMP 252 -- Fall 1996 (Dr. Bo Li) Class 14 (Deadlock) 2 What is a Deadlock A process is said to be in a state of deadlock if it is waiting for an event that will never occur A system in which one or more processes are deadlocked, is said
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class15.ps, 19961023
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 14 (Deadlock) 19 The Banker s Algorithm The algorithm is so named because of its resemblance to the way a bank handles loan requests A process entering the system must declare the maximum number of instances of each resource type that it may need When a process
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Quizzes/quiz1.F96.solution2pp.ps, 19961024
COMP 332 1/6 Department of Computer Science COMP 211: Introduction to Software Engineering Quiz 1 October 4, 1996 Value: 15% of course mark Time: 50 minutes Total marks: 100 1. Circle the best answer in each question. Each correct answer is worth 2.5 points. Each incorrect answer will result in a
open this document and view contentsftp://ftp.cs.ust.hk/pub/dlee/slides-final.ps.gz, 19961024
c Dik L. Lee Resource Discovery and Integration on the World Wide Web Dik L. Lee Department of Computer Science Hong Kong University of Science and Technology July, 1996 c Dik L. Lee Outline ffl Overview of Information Retrieval Techniques ffl Information Retrieval on the World Wide Web ffl WWW Index
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Quizzes/quiz1.F96.solution1pp.ps, 19961024
COMP 332 1/6 Department of Computer Science COMP 211: Introduction to Software Engineering Quiz 1 October 4, 1996 Value: 15% of course mark Time: 50 minutes Total marks: 100 1. Circle the best answer in each question. Each correct answer is worth 2.5 points. Each incorrect answer will result in a
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/conf/tanc97/cfp1.ps, 19961025
Preliminary Call for Papers TANC-97 Hong Kong International Workshop on Theoretical Aspects of Neural Computation: A Multidisciplinary Perspective May 26-28, 1997 Hong Kong University of Science and Technology Over the past decade or so, neural computation has emerged as a research area with active
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec16.ps, 19961025
15. Uncomputability ffl If a language or a problem is not Turing-decidable, it is said to be unsolvable. ffl If Church's thesis is correct then there exist no algorithms to solve such a problem. ffl In this lecture, we will see a few unsolvable problems. 1 15. Uncomputability Theorem 1 The language K1 =
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/solution4.ps, 19961025
Question 1 (a) S -> aSa | bSb | c (b) S -> aSa | bSb | e (c) S -> aSa | bSb | a | b Question 2 (a) S -> aSb | A A -> aA | e (c) S -> ABB | BAB | BBA A -> a | aS | Sa B -> b | bS | Sb (d) S -> Xb X -> aXa | bXb | aXb | bXa | a (f) S -> aASb A -> a | e Question 3 e b > b ab ba,e a S f B A
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec11.ps, 19961025
11. Turing Machines Formal model of computers, consisting of ffl An infinite tape (with a left end), ffl A finite control which can be in a finite number of states, and ffl A read/write head. Figure 4-1 here 1 11. Turing Machines Operations of a Turing Machine: ffl Input string inscribed at left end of
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec15.ps, 19961025
15. Universal Turing Machines ffl Turing machines are fixed at time of design to solve a par- ticular problem. ffl Computers are general purpose" programmable machines. ffl How to make Turing machines programmable Idea: Unviversal Turing machines, U . ffl Input: { Description of a TM M = (K; ; ffi; s).
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec12.ps, 19961025
12. Turing Machines/Combinations of ffl We claimed that Turing machines are a formal model of computers. They are capable of performing any computations that can be carried out by the existing computers or computers in the future. ffl This lecture justifies this claim by showing how complex machines can
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec14.ps, 19961025
14. Turing Machines and Grammars ffl In a context-free grammar G = (V; ; R; S), R is a subset of (V ) V : The left hand side of every rule is one nonterminal. ffl A grammar ( or a rewriting system or an unre- stricted grammar) is a quadruple G = (V; ; R; S) where R is a subset of (V (V )V ) V : The left
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec13.ps, 19961025
13. Turing Machines/Extensions of Ways to extend Turing machines: 1. Allow two-way infinite tape. Figure 4-18 here 2. Allow multiple tapes. Figure 4-23 here 1 3. Allow multiple heads. 4. Allow two-dimensional tape. 5. Combination of some or all of the above. Theorem 1 The operation of a machine allowing
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture2/4.software-design2pp.ps, 19961025
COMP 211 4-1 Software Design SOFTWARE DESIGN OVERVIEW Computer systems engineering Software requirements analysis Software design Design Code Test Information model Data design Procedural design Architectural design Program modules Integrated and validated software Other requirements Behavioral
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture2/4.software-design1pp.ps, 19961025
COMP 211 4-1 Software Design SOFTWARE DESIGN OVERVIEW Computer systems engineering Software requirements analysis Software design Design Code Test Information model Data design Procedural design Architectural design Program modules Integrated and validated software Other requirements Behavioral
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/kj_mphil_thesis.ps.gz, 19961026
age(paul, 35) male(paul) father(paul, amy) father(A, B) :- parent(A, B), male(A). parent(A, B) :- father(A, B). parent(A, B) :- mother(A, B). into
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/Task3.ps, 19961028
COMP 211 1/1 Department of Computer Science COMP 211: Introduction to Software Engineering Task 3: Design Specification Assigned: October 28, 1996 Value: 10% of course mark Due: November 18, 1996 In this phase of the project, the Computer Science Department requests that you produce a design
open this document and view contentsftp://ftp.cs.ust.hk/pub/wongkk/design.ps.Z, 19961029
The Design of an Object-Role Database Management System Raymond K. Wong H. Lewis Chau Frederick H. Lochovsky Department of Computer Science Hong Kong University of Science & Technology Clear Water Bay, Hong Kong fwongkk,lewis,fredg@cs.ust.hk Number: 165
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/hw/hw2.ps, 19961029
COMP 102 (Fall 96) 1 HONG KONG UNIVERSITY OF SCIENCE & TECHNOLOGY COMP 102: Computer Fundamentals & Programming (Section 1) Fall Semester, 1996 HOMEWORK ASSIGNMENT #2: RASTER GRAPHICS Due on November 7th, 1996 before 5:00pm Problem Description: Assume a two-dimensional space of and .
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec16.ps, 19961029
HKUST 1 Computer Science comp 102 Lecture 16 Topics Functions Placement of Functions Procedural Abstraction Local Variables Global Variables Global Constants Scope Rules HKUST 2 Computer Science comp 102 Lecture 16 Placement of Functions Each function call (inside the function main() or inside some
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class17.ps, 19961029
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 16 (Memory Management) 27 Paging Physical memory is divided into a number of equal sized frames Logical memory is divided into a number of equal sized pages Processes generate logical addresses which are mapped to physical addresses Paging permits the logical
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class16.ps, 19961029
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 16 (Memory Management) 1 MEMORY MANAGEMENT COMP 252 -- Fall 1996 (Dr. Bo Li) Class 16 (Memory Management) 2 Why Memory Management Through CPU scheduling and multiprogramming, we are able to improve the CPU utilization and the response time To achieve this, we have
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect10.ps, 19961030
Introduction to Software Engineering COMP211 (Fall 1996) Requirements & Structured System Analysis 1 Software Design Fundamentals Introduction to Software Engineering COMP211 (Fall 1996) Requirements & Structured System Analysis 2 Software Design Overview] Computer systems engineering Software
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/24.ps, 19961030
(COMP251 LECTURE 24) 1 Overview General introductions to Scheme programs, expressions, and definitions. Basic data types in Scheme. In all the slides about Scheme, S & R refers to the book: G. Springer and D.P. Friedman. Scheme and the Art of Programming. MIT Press. 1991. R4RS refers to the following
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/ATMarchitecture.fm.ps, 19961030
ATM ARCHITECTURE COMP 560 Jelena Misic 1 Basic principles of ATM This section covers: 1.ATM cell format 2.Principles of information transfer, Routing, Quality of Service, Usage parameter control, Flow control. 3.BISDN protocol architecture: ATM adaptation layer AAL (AAL 1, AAL 2, AAL 3/4 and AAL 5) ATM
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect10.ps, 19961030
Introduction to Software Engineering COMP211 (Fall 1996) Requirements & Structured System Analysis 1 Software Design Fundamentals Introduction to Software Engineering COMP211 (Fall 1996) Requirements & Structured System Analysis 2 Software Design Overview] Computer systems engineering Software
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/Homework3.fm.ps, 19961030
COMP 560, Homework 3, due date 14. November 1) A 1000-byte MAC frame is to be transmitted accross a DQDB SMDS network. Using the transmission overheads for SIP3 and SIP2 layers derive the number of queued arbitrated slots that are required to carry out the transfer of the frame and hence the total
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/ATMARCHITECTURE.fm.ps, 19961030
ATM ARCHITECTURE COMP 560 Jelena Misic 1 Basic principles of ATM This section covers: 1.ATM cell format 2.Principles of information transfer, Routing, Quality of Service, Usage parameter control, Flow control. 3.BISDN protocol architecture: ATM adaptation layer AAL (AAL 1, AAL 2, AAL 3/4 and AAL 5) ATM
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/topic07.ps.gz, 19961031
COMP300M: Introduction to Pattern Recognition Topic 7: Feature Extraction Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Feature Extraction Karhunen-Lo eve (K-L) Transform ffl One domain-independent method commonly used
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp300/s96/topic07.ps.gz, 19961031
COMP300M: Introduction to Pattern Recognition Topic 7: Feature Extraction Dit-Yan Yeung Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk Summer 1996 COMP300M Feature Extraction Karhunen-Lo eve (K-L) Transform ffl One domain-independent method commonly used
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/ATMswitching.fm.ps, 19961031
ATM switch architectures COMP 560 Jelena Misic 1 Switch architectures General architecture of an ATM switch consists of: Input controller (IC) Output controller (OC) Control processor and Switch fabric ATM switch architectures:flgeneral
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/ATMenvironments.fm.ps, 19961031
ATM environments COMP 560 Jelena Misic 1 ATM environments This section covers: ATM LANs Call processing in ATM LANs: connection oriented calls connectionless calls LAN emulation Classical IP over ATM ATM in wide area networks ATM environments COMP 560 Jelena Misic 2 ATM LANs Communication requirements
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/project2.ps, 19961031
Department of Computer Science The Hong Kong University of Science and Technology COMP 252 Fall 1996 Project 2 1 COMP 252 - Principles of Systems Software Project 2 Due: November 21, 1996. In this part of the assignment, you will implement the MEMORY module of a simplified operating system, and will
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Examples/tutorial.Nov11pp.ps, 19961101
COMP 211 1 Department of Computer Science COMP 211: Introduction to Software Engineering Tutorial Exercises Nov 1, 1996 1. Consider the following data dictionary definition for a data structure: TAX-RETURN= FORM-1020+ {W-2-FORM}+ SCHEDULE-B+ SCHEDULE-C+ {SUPPORTING-SCHEDULES}+ (PERSONAL-CHECK) (a) Is at
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture25.ps, 19961101
(COMP251 LECTURE 25) 1 Overview Literal expressions. Constructing lists using cons. Taking lists apart by using car and cdr. Conditional expressions. Lambda expressions. Recursive procedures. (COMP251 LECTURE 25) 2 Read-Eval-Print Loop Before we go any further, it is necessary to look at how Scheme
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Examples/tutorial.Nov12pp.ps, 19961101
COMP 211 1 Department of Computer Science COMP 211: Introduction to Software Engineering Tutorial Exercises Nov 1, 1996 1. Consider the following data dictionary definition for a data structure: TAX-RETURN= FORM-1020+ {W-2-FORM}+ SCHEDULE-B+ SCHEDULE-C+ {SUPPORTING-SCHEDULES}+ (PERSONAL-CHECK) (a) Is at
open this document and view contentsftp://ftp.cs.ust.hk/pub/horner/08_regexps.ps, 19961101
1 Regular Expressions A regular expression is a pattern description using a meta language, that is, a language that you use to describe particular patterns of interest. The basic elements regular expressions are: . Matches any single character * Matches zero or more occurrences of the preceding
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec15.ps, 19961102
COMP102 (Fall 96) Lecture 15 1 of 13 Functions o facilitate top-down design - decomposition - information hiding - easily understandable - easily modifiable o reusability Function COMP102 (Fall 96) Lecture 15 2 of 13 Functions (Cont d) // compute the square of an input number #include
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/lec10.ps, 19961104
10. Decision Theory Two kinds: ffl Normative decision theory How people should decide. (Rational agent) ffl Descriptive decision theory How people actually decide. 1 10. Normative Decision Theory ffl S | a set of possible outcomes, some of which are preferred over others. ffl A decision d can influence
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/nldr.ps.gz, 19961104
Non Linear Dimensionality Reduction David DeMers & Garrison Cottrelly Dept. of Computer Science & Engr., 0114 Institute for Neural Computation University of California, San Diego 9500 Gilman Dr. La Jolla, CA, 92093-0114
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/f96/set3.ps.gz, 19961104
Hong Kong University of Science and Technology COMP327/527: Pattern Recognition Fall 1996 Problem Set 3 (5%) Assigned: 24/10/96 Due: 7/11/96 Policy Issues 1. Your submission will be collected in class on the due date. Late submission will not be accepted. 2. Only five problems with highest marks will be
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/set3.ps.gz, 19961104
Hong Kong University of Science and Technology COMP327/527: Pattern Recognition Fall 1996 Problem Set 3 (5%) Assigned: 24/10/96 Due: 7/11/96 Policy Issues 1. Your submission will be collected in class on the due date. Late submission will not be accepted. 2. Only five problems with highest marks will be
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/lec11.ps, 19961104
11. Decision Analysis Applying normative decision theory. ffl How to represent a decision problem. ffl How to compute optimal decisions. Two major frameworks: ffl Decision trees1 ffl Influence diagrams, decision networks. 1Different from decision trees used in the learning community. 1 11. Decision
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/hwk3.ps, 19961104
HKUST 1 Computer Science HONG KONG UNIVERSITY OF SCIENCE & TECHNOLOGY COMP 104: Computer Fundamentals & Programming Fall Semester 1996 HOMEWORK ASSIGNMENT #3 Final program due on Nov. 29, 1996 in class PROBLEM DESCRIPTION Hong Kong is a major financial centre. The major asset classes traded in financial
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/f96/nldr.ps.gz, 19961104
Non Linear Dimensionality Reduction David DeMers & Garrison Cottrelly Dept. of Computer Science & Engr., 0114 Institute for Neural Computation University of California, San Diego 9500 Gilman Dr. La Jolla, CA, 92093-0114
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/asg2.ps.gz, 19961105
Hong Kong University of Science and Technology COMP327: Pattern Recognition Fall 1996 Computer Assignment 2 (10%) Assigned: 7/11/96 Due: 21/11/96 Policy Issues 1. Your submission will be collected in class on the due date. 2. Late submission will only be accepted if it is submitted directly to the
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class18b.ps, 19961105
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 18 (Virtual Memory) 1 VIRTUAL MEMORY COMP 252 -- Fall 1996 (Dr. Bo Li) Class 18 (Virtual Memory) 2 What is Virtual Memory So far we assumed that for a process to run, it must be completely resident in memory Virtual memory is a technique that allows the execution
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/f96/asg2.ps.gz, 19961105
Hong Kong University of Science and Technology COMP327: Pattern Recognition Fall 1996 Computer Assignment 2 (10%) Assigned: 7/11/96 Due: 21/11/96 Policy Issues 1. Your submission will be collected in class on the due date. 2. Late submission will only be accepted if it is submitted directly to the
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/lec13.ps, 19961105
12. Removable arcs ffl In principle, ID's can be evaluated by using SDDN-EVALUATE. ffl Because of the no-forgetting constraints, some decision nodes d in an ID can have a large number of parents and consequently the corresponding evaluation functionals e(ssd; d) might be too large to handle. ffl
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class18a.ps, 19961105
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 18 (Memory Management) 38 User s View of Memory The user views memory as a collection of variable-sized segments with no necessary ordering among the segments The user s view of the (logical) memory is mapped onto physical memory Paging separates the users view of
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/lec12.ps, 19961105
12. Evaluating Influence Diagrams History ffl Howard and Matheson (1984) transform IDs into decision trees, which are evaluated by using the average-out and folding-back algorithm. ffl Shachter (1986) has shown that IDs can be evaluated by applying series of arc reversal and node removal operations on
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture26.ps, 19961105
(COMP251 LECTURE 26) 1 Overview Flat recursion. Deep recursion. Lambda expressions with any number of arguments. Binding constructs. Locally defined procedures. (COMP251 LECTURE 26) 2 Recursive Procedures (More Examples) Append. Given two lists ls1 and ls2, (append ls1 ls2) returns a new list consisting
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect11.ps, 19961106
Introduction to Software Engineering COMP211 (Fall 1996) Requirements & Structured System Analysis 1 Software Design Fundamentals Introduction to Software Engineering COMP211 (Fall 1996) Requirements & Structured System Analysis 2 Software Design Overview] Computer systems engineering Software
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec17.ps, 19961106
HKUST 1 Computer Science comp 102 Lecture 17 Topics Void Functions Function Call-by-Reference HKUST 2 Computer Science comp 102 Lecture 17 Void Functions In C++ a function might return a value or no value at all. A function that returns no value is called a void-function. Such a function does something
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture27.ps, 19961106
(COMP251 LECTURE 27) 1 Overview Binding constructs. Locally defined procedures. Procedures as values. Currying. (COMP251 LECTURE 27) 2 Binding Constructs Sec.4.2.2 of R4RS and Ch.5 of S&F Scheme has three binding constructs: let, let*, and letrec. The syntax for all three of them is identical: (let
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/assgn4.ps, 19961106
COMP 538, 300O: Homework Assignment 4 Due: November 27, 1996 Strong junction tree propagation (Jensen et al 1994) is a popular algorithm for evaluating influence diagrams. Due to time constraints, we will not be able to cover it in class. In this assignment, you are asked to learn the algorithm by your
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect30.ps, 19961106
COMP 361 NETWORK LAYER 1 NETWORK LAYER COMP 361 NETWORK LAYER 2 The Network Layer The data link layer was primarily responsible for reliable transfer of information across a physical link The network layer is responsible for providing transfer of data from the source to the destination The network layer
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect29.ps, 19961106
COMP 361 DATA LINK LAYER 41 HDLC - Stations Three types of stations are supported: 1.Primary station: has the responsibility for controlling the operation of the link. Frames issued by primary are called commands. 2.Secondary station: operates under the control of the primary station. Frames issued by
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect30.ps, 19961106
COMP 361 NETWORK LAYER 1 NETWORK LAYER COMP 361 NETWORK LAYER 2 The Network Layer The data link layer was primarily responsible for reliable transfer of information across a physical link The network layer is responsible for providing transfer of data from the source to the destination The network layer
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect11.ps, 19961106
Introduction to Software Engineering COMP211 (Fall 1996) Requirements & Structured System Analysis 1 Software Design Fundamentals Introduction to Software Engineering COMP211 (Fall 1996) Requirements & Structured System Analysis 2 Software Design Overview] Computer systems engineering Software
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect29.ps, 19961106
COMP 361 DATA LINK LAYER 41 HDLC - Stations Three types of stations are supported: 1.Primary station: has the responsibility for controlling the operation of the link. Frames issued by primary are called commands. 2.Secondary station: operates under the control of the primary station. Frames issued by
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class20.ps, 19961107
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 19 (Virtual Memory) 36 Memory Management in UNIX Early versions of Unix were implemented on machines with small real storage address spaces The total memory resources available did not justify the implementation of complex memory management strategies The early
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class19.ps, 19961107
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 19 (Virtual Memory) 14 Page Replacement Algorithms Page Fault Rate: fraction of the total memory references that cause a page fault (requiring a page to be brought in) Reference String: A sequence of memory addresses produced by a process Evaluating page
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/cpol/paper.ps, 19961108
A Heuristic Search Approach to Chinese Glyph Generation Using Hierarchical Character Composition Pak-Keung Lai , Dit-Yan Yeung, Man-Chi Pong y Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong fpklai,dyyeung,mcpongg@cs.ust.hk November 8,
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture28.ps, 19961108
(COMP251 LECTURE 28) 1 Overview Currying (Continued). Abstraction of flat recursion. (COMP251 LECTURE 28) 2 Currying (Continued) The map function: (define map (lambda f ls) (if (null ls) '() (cons (f (car ls)) (map f (cdr ls))))) can be similarly curried: (define c-map (lambda (f) (letrec ((helper
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/Task4.ps, 19961108
COMP 211 1/1 Department of Computer Science COMP 211: Introduction to Software Engineering Task 4: User Interface and System Prototyping Assigned: November 11, 1996 Value: 10% of course mark Due: December 7, 1996 In this phase of the project, the Computer Science Department requests that you prototype
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec19.ps, 19961111
Lecture 19: NP-Complete Problems The bounded tiling problem ffl A tile is a square with markings on the four edges. ffl Two tiles can be next to each other if their marking on the touching edges are the same. ffl There is an infinite supply of copies of each tile. ffl First row given. Can we extend the
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/sol4.ps, 19961111
COMP 251 1996-97 Fall Semester Assignment #4 Solution Problem 1. Below is the suggested solution of the file pool:c. I made a little change in the print function so that it prints in the order of the start array. #include int length_start=0; readin(char *pool, char **start) int i=0, j=0; char
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec18.ps, 19961111
HKUST 1 Computer Science comp 102 Lecture 18 Topics Introduction to Arrays HKUST 2 Computer Science comp 102 Lecture 18 Array Types A sequence or list of variables of the same type An array type is a structured data type representing a regular structure of components of the same type. Syntax
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/sol7.ps, 19961111
COMP 251 1996-97 Fall Semester Assignment #7 solution Problem 1. (60%) Adapted from Exercise 7.11 in Sethi, page 297. Put the main program in file ree1.cc", and the class definitions in ree1.h" The expression tree shown below has three kinds of nodes: (1) leaves with an integer value, (2) unary
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect12.ps, 19961111
Introduction to Software Engineering COMP211 (Fall 1996) User Interface Design 1 User Interface Design Introduction to Software Engineering COMP211 (Fall 1996) User Interface Design 2 User Interface Design Requirements analysis specifies where user interface will be UI design specifies what interfaces
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect12.ps, 19961111
Introduction to Software Engineering COMP211 (Fall 1996) User Interface Design 1 User Interface Design Introduction to Software Engineering COMP211 (Fall 1996) User Interface Design 2 User Interface Design Requirements analysis specifies where user interface will be UI design specifies what interfaces
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec18.ps, 19961111
Lecture 18: NP-Completeness ffl Are there problems solvable in principle for which no efficient algorithms exist ffl Assuming N <> NP. ffl Suppose there is a language L in NP that has the following property: L 2 P implies L0 2 P for any L0 2 NP. ffl Said to be NP-Complete, L must not be in P . ffl In
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/lec17.ps, 19961111
Lecture 17: Computational Complexity Introduction Q1:What problems are solvable (in principle) by computers and what problems are not Q2: What problems are solvable (in practice) by computers and what problems are not Solvability in principle does not necessarily mean solvability in practice. 1 Lecture
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/sol6.ps, 19961111
COMP 251 1996-97 Fall Semester Assignment #6 Solution Since the program listing is so long and it is hard to just list parts of the code. Therefore, I put the code in the directory louis=comp251=hw6. For PG student, please access the directory with your UG account. The code is taken from the submission
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect31.ps, 19961112
COMP 361 NETWORK LAYER 9 Flooding Each arriving packet is retransmitted on every outgoing link except for the link that it arrived from It creates many duplicate packets. When a packet has been routed for more than a predefined number of hops (e.g., the shortest path, the network diameter), the packet
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect33.ps, 19961112
COMP 361 NETWORK LAYER 25 Internetworking Requirements Any internetworking facility must provide: 1.Link between networks. At minimum, a physical and link control connection 2.Routing and delivery of data between processes on different networks 3.An accounting service that keeps track of network and
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/sol5.ps, 19961112
COMP 251 1996-97 Fall Semester Assignment #5 Suggested Solutions Problem 1. 15% Explain the differences between the concept of abstract specifications and that of information hiding. Why do you think the truly abstract specifications are hard to achieve Answer Abstract specifications specify the
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect31.ps, 19961112
COMP 361 NETWORK LAYER 9 Flooding Each arriving packet is retransmitted on every outgoing link except for the link that it arrived from It creates many duplicate packets. When a packet has been routed for more than a predefined number of hops (e.g., the shortest path, the network diameter), the packet
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec19.ps, 19961112
HKUST 1 Computer Science comp 102 Lecture 19 Topics Arrays as arguments Searching Linear Search HKUST 2 Computer Science comp 102 Lecture 19 Arrays as Arguments Pass individual elements (indexed variable) of an array to a function Example: int main() int A =
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect33.ps, 19961112
COMP 361 NETWORK LAYER 25 Internetworking Requirements Any internetworking facility must provide: 1.Link between networks. At minimum, a physical and link control connection 2.Routing and delivery of data between processes on different networks 3.An accounting service that keeps track of network and
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect32.ps, 19961112
COMP 361 NETWORK LAYER 17 Congestion When packets arrive at a rate faster than the node can process them or faster than the packets can be cleared from output buffers, then eventually packets will arr ive for which no memory is available If this situation happens: - Discard any incoming packet for which
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect32.ps, 19961112
COMP 361 NETWORK LAYER 17 Congestion When packets arrive at a rate faster than the node can process them or faster than the packets can be cleared from output buffers, then eventually packets will arrive for which no memory is available If this situation happens: - Discard any incoming packet for which
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture2/5.UI-design1pp.ps, 19961113
COMP 211 5-1 User Interface Design USER INTERFACE DESIGN n requirements analysis specifies where user interface will be n UI design specifies what interfaces will look like from the users point of view n parallel development l analysis phase UI definition l design phase UI design l
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture2/5.UI-design2pp.ps, 19961113
COMP 211 5-1 User Interface Design USER INTERFACE DESIGN n requirements analysis specifies where user interface will be n UI design specifies what interfaces will look like from the users point of view n parallel development l analysis phase UI definition l design phase UI design l
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture30.ps, 19961113
(COMP251 LECTURE 30) 1 Overview OOP in Scheme: boxes; stacks; evaluating postfix expressions using a stack. (COMP251 LECTURE 30) 2 OOP in Scheme One implementation of the ideas of OOP in Scheme is to represent classes by higher-order functions (functions that take other functions as arguments). Example
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture29.ps, 19961113
(COMP251 LECTURE 29) 1 Overview Pointer representation of pairs. Mutators. Garbage collection. Case Expression. Apply. OOP in Scheme. (COMP251 LECTURE 29) 2 Pointer Representation of Pairs Sec.11.3 of S&F A pair (first . rest) is normally implemented as a pointer to a cell with two fields: 3 4 5 3 4 car
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class21.ps, 19961114
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 21( Secondary Storage Management) 1 SECONDARY STORAGE MANAGEMENT COMP 252 -- Fall 1996 (Dr. Bo Li) Class 21( Secondary Storage Management) 2 Why Secondary Storage Programs executed by the system should ideally be resident permanently in main memory Main memory is
open this document and view contentsftp://ftp.cs.ust.hk/pub/horner/09_awk.ps, 19961114
1 AWK Awk is a pattern scanning and processing language written at Bell Labs as part of UNIX in the 70 s by Al Aho, Peter Weinburger and Brian Kernighan It is most useful for producing reports and filtering text. It takes many of its constructs from C, and has historical roots in SNOBOL Awk is an
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/hwk3Hints.ps, 19961115
COMP 104 Page 12 #include // solution to hwk3 class equity public: struct date date day; float value; eq_node *next; }; char name; eq_node *first; class
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/solution6.ps, 19961115
COMP272 Tutorial on Homework3 date: 15/11/96 notes prepared by YAN, Li P212: 4.1.3 (q0; aaabbbaa) `M (q2; aaabbbaa) `M (q1; ababbbaa) `M (q2; ababbbaa) `M (q1; abbbbbaa) `M (q2; abbbbbaa) `M (q3; abbabbaa) `M (q4; abbabbaa) `M (q4; abbabbaa) `M (q4; abbabbaa) `M (q2; abbabbaa) `M (q1; abbabbab) `M (q2;
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Quizzes/quiz2.F96.solution1pp.ps, 19961115
COMP 211 1/5 Department of Computer Science COMP 211: Introduction to Software Engineering Quiz 2 November 8, 1996 Value: 15% of course mark Time: 50 minutes Total marks: 100 1. Circle the best answer in each question. Each correct answer is worth 2.5 points. Each incorrect answer will result in a
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/sol8.ps, 19961115
COMP 251 1996-97 Fall Semester Assignment #8 Date assigned: Monday, Nov 4, 1996 Due time: 12:00pm on Monday, Nov 11, 1996 Marking Scheme: Correctness 80%, Style 10%, Documentation 10% prepared by flin@cs.ust.hk, flai@cs.ust.hk Style and comments concerns the readability of your program. If we deduct
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Quizzes/quiz2.F96.solution2pp.ps, 19961115
COMP 211 1/5 Department of Computer Science COMP 211: Introduction to Software Engineering Quiz 2 November 8, 1996 Value: 15% of course mark Time: 50 minutes Total marks: 100 1. Circle the best answer in each question. Each correct answer is worth 2.5 points. Each incorrect answer will result in a
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture31.ps, 19961118
(COMP251 LECTURE 31) 1 Overview This is the last lecture on Scheme. It's about writing Scheme interpreter in Scheme. The main reference material for this lecture is Sec. 13.6 and 13.7 in Sethi. (COMP251 LECTURE 31) 2 Association Lists An association list, or simply a-list, is a list of pairs. Examples:
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/gray-prolog.ps, 19961119
Using Quintus Prolog|The Basics Notes by James W. Gray, III Last modified: October 22, 1995 This document gives some very basic information on using Quintus Prolog, release 3, at HKUST. 1. Getting Access (Instructions for Faculty): There are a limited number of licenses for Quintus Prolog. Currently, we
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/f96/set4.ps.gz, 19961119
Hong Kong University of Science and Technology COMP327/527: Pattern Recognition Fall 1996 Problem Set 4 (5%) Assigned: 21/11/96 Due: 5/12/96 Policy Issues 1. Your submission will be collected in class on the due date. Late submission will not be accepted. 2. Only five problems with highest marks will be
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/set4.ps.gz, 19961119
Hong Kong University of Science and Technology COMP327/527: Pattern Recognition Fall 1996 Problem Set 4 (5%) Assigned: 21/11/96 Due: 5/12/96 Policy Issues 1. Your submission will be collected in class on the due date. Late submission will not be accepted. 2. Only five problems with highest marks will be
open this document and view contentsftp://ftp.cs.ust.hk/pub/wongkk/mmm96.ps.Z, 19961119
THE ROLES AND VIEWS OF MULTIMEDIA OBJECTS R.K. WONG, H.L. CHAU, F.H. LOCHOVSKY Department of Computer Science, University of Science and Technology, Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/Class22b.ps, 19961119
COMP 252 -- Fall 94 (Dr. Bo Li) Class 22b (File Systems) 1 FILE SYSTEMS COMP 252 -- Fall 94 (Dr. Bo Li) Class 22b (File Systems) 2 What is a File A file is a collection of related information defined by its creator Files may be free-form, such as text files, or may be formatted rigidly Files can be of
open this document and view contentsftp://ftp.cs.ust.hk/pub/wongkk/tools96.ps.Z, 19961119
DOOR: A Dynamic Object-Oriented Data Model with Roles Raymond K. Wong H. Lewis Chau Frederick H. Lochovsky Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/wongkk/multimedia.ps.Z, 19961119
THE ROLES AND VIEWS OF MULTIMEDIA OBJECTS R.K. WONG, H.L. CHAU, F.H. LOCHOVSKY Department of Computer Science, University of Science and Technology, Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/Class22a.ps, 19961119
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 22a (Secondary Storage Management) 23 Disk Formatting Physical formatting involves breaking the disk into sectors on each track that the head can address Each sector has the sector number and space for an error correcting code (ECC) The ECC is updated every time
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/kdd-95.ps.gz, 19961120
6 Bayesian Classification (AutoClass): Theory and Results Peter Cheeseman RIACS John Stutz NASA
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/Project3.ps, 19961120
Department of Computer Science The Hong Kong University of Science and Technology COMP 252 Fall 1996 Project 3 1 COMP 252 - Principles of Systems Software Project 3 Date: November 20, 1996 Due: December 7, 1996 In this assignment, you are to implement the module DEVICES of OSP. In module DEVICES you
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp327+527/f96/kdd-95.ps.gz, 19961120
6 Bayesian Classification (AutoClass): Theory and Results Peter Cheeseman RIACS John Stutz NASA
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture32.ps, 19961120
(COMP251 LECTURE 32) 1 Plan 1. Introduction to LP. 2. Prolog basics. 3. Control in Prolog. 4. Programming techniques in Prolog. (COMP251 LECTURE 32) 2 Main References ffl Sethi, Chapter 11, pages 425-473. ffl W.F. Clocksin and C.S. Mellish. Programming in Prolog. Library open reserve. ffl James W. Gray,
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/hw/hw3.ps, 19961121
COMP 102 (Fall 96) 1 HONG KONG UNIVERSITY OF SCIENCE & TECHNOLOGY COMP 102: Computer Fundamentals & Programming (Section 1) Fall Semester, 1996 HOMEWORK ASSIGNMENT #3: PATH FINDER Due on November 29th, 1996 before 5:00pm Problem Description: A graph is defined as a set of nodes and edges. A node is an
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class23.ps, 19961121
COMP 252 -- Fall 94 (Dr. Bo Li) Class 23 (File Systems) 23 Consistency Semantics This is an important criterion for systems that support sharing of files It specifies the rules and regulations under which multiple users access a shared file It specifies when the modifications of data in a file by one
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect37.ps, 19961122
COMP 361 TRANSPORT LAYER 1 TRANSPORT LAYER COMP 361 TRANSPORT LAYER 2 Transport Layer The transport layer should provide reliable end-to-end transfer of data independent of the underlying communication system It should provide end-to-end error and flow control Transport Entity Transport Entity Interface
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect37.ps, 19961122
COMP 361 TRANSPORT LAYER 1 TRANSPORT LAYER COMP 361 TRANSPORT LAYER 2 Transport Layer The transport layer should provide reliable end-to-end transfer of data independent of the underlying communication system It should provide end-to-end error and flow control Transpor t Entity Transpor t Entity
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture33.ps, 19961122
(COMP251 LECTURE 33) 1 Prolog Syntax Illustrated flight(X,Z) :- direct_flight(X,Y), flight(Y,Z). direct_flight(hongkong, tokyo). clauses (facts) clauses (rules) atoms relations, predicates, functors variables clauses are ended with period "." All but clauses and separators are terms! (COMP251 LECTURE
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec21.ps, 19961124
HKUST 1 Computer Science comp 102 Lecture 21 Topics Example of 2-dimensional Arrays Operations on Strings Strings as Parameters HKUST 2 Computer Science comp 102 Lecture 21 Example // A grade entering program #include int main () const students = 100; int midterm = 0; int final = 1; double
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture34.ps, 19961125
(COMP251 LECTURE 34) 1 Overview This lecture talks about how to process lists in Prolog. It shows you how to write some non-trivial Prolog programs before we go into details of how Prolog interpreter works, and how to control it. (COMP251 LECTURE 34) 2 List Structures ffl In Prolog lists are provided as
open this document and view contentsftp://ftp.cs.ust.hk/pub/william/cheung.cvpr97.ps.gz, 19961126
Robust Deformable Matching for Character Extraction Kwok-Wai Cheung Dit-Yan Yeung Roland T. Chin Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong fwilliam, dyyeung, rolandg@cs.ust.hk Keywords: Document Image Analysis, Off-line Handwriting
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/uai96/lec14.ps, 19961126
Partially Observable Markov Decision Processes and Planning in Stochastic Domains Nevin Lianwen Zhang HKUST AI&Stats Meeting July 7, 1996 References: 1. M. L. Littman, TR CS-96-09, Brown U. 2. A. R. Cassandra, L. P. Kaelbling, J. A. Kurien, TR CS- 96-17, Brown U. 1 Outline ffl POMDPs ffl Belief states
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/vod.fm.ps, 19961126
Multimedia applications over ATM COMP 560 Jelena Misic 1 Video-on-Demand This section covers: Introduction VOD Network Architecture Advantages in Using ATM (and alternative schemes reviewed) Access Networ k Ser vice Gateway/Service Operations Center Introduction Television - a widespread communication
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class24a.ps, 19961126
COMP 252 -- Fall 96 (Dr. Bo Li) Class 24a (File Systems) 51 Indexed Allocation To allow for large files, we can use Linked scheme: Multilevel index: COMP 252 -- Fall 96 (Dr. Bo Li) Class 24a (File Systems) 52 Indexed Allocation Combined Scheme: Figure 11.7 Page 395 -- The UNIX Inode COMP 252 -- Fall 96
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec22.ps, 19961127
HKUST 1 Computer Science comp 102 Lecture 22 Topics Sorting an array HKUST 2 Computer Science comp 102 Lecture 22 Sorting It is one of the most widely used programming tasks. Given a list of values, the objective is to sort from lowest to highest or from highest to lowest. The values of the list could
open this document and view contentsftp://ftp.cs.ust.hk/pub/conferences/TANC97/cfp1.ps, 19961127
Preliminary Call for Papers TANC-97 Hong Kong International Workshop on Theoretical Aspects of Neural Computation: A Multidisciplinary Perspective May 26-28, 1997 Hong Kong University of Science and Technology Over the past decade or so, neural computation has emerged as a research area with active
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture35.ps, 19961127
(COMP251 LECTURE 35) 1 Overview How does Prolog interpreter work Unification and substitutions (this lecture). Prolog search trees (next lecture). (COMP251 LECTURE 35) 2 Substitutions and Unification ffl Unification is central to Prolog: How do we match a query with a given fact How do we match a query
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec20.ps, 19961127
HKUST 1 Computer Science comp 102 Lecture 20 Topics Strings 2-dimensional Arrays HKUST 2 Computer Science comp 102 Lecture 20 Strings A string variable is an array of characters. We have seen many values of string before enclosed between double quotes. "Hello" "This output is " A string variable is
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/solution5.ps, 19961128
3.5.2 a) Let L = {ap: p is a prime}. Theorem a): L is not CF. Proof: Suppose L is CFL. Then there exist grammar G = (V, S, R, S). Let K be the con- stant in the CFL Pumping Lemma. Set w = aq where q is a prime > K. Then the Pumping Lemma says there exist uvxyz with w = uvxyz, |vy| > 0 and for all n>0,
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect39.ps, 19961128
COMP 361 SESSION/PRESENTATION LAYER 1 SESSION LAYER COMP 361 SESSION/PRESENTATION LAYER 2 Why Session Layer The lower layers (physical, data link, network, and transport) of the OSI model are concerned with providing reliable and efficient end-to-end communications The upper layers are mainly concerned
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect39.ps, 19961128
COMP 361 SESSION/PRESENTATION LAYER 1 SESSION LAYER COMP 361 SESSION/PRESENTATION LAYER 2 Why Session Layer The lower layers (physical, data link, network, and transport) of the OSI model are concerned with providing reliable and efficient end-to-end communications The upper layers are mainly concerned
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect41.ps, 19961128
COMP 361 HIGH SPEED NETWORKING 1 HIGH SPEED NETWORKING COMP 361 HIGH SPEED NETWORKING 2 High Speed Networks Traditionally computer networks were mainly designed to carry data The rapid developments in computer technology has made it feasible to implement powerful computers supporting compute intensive
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect41.ps, 19961128
COMP 361 HIGH SPEED NETWORKING 1 HIGH SPEED NETWORKING COMP 361 HIGH SPEED NETWORKING 2 High Speed Networks Traditionally computer networks were mainly designed to carry data The rapid developments in computer technology has made it feasible to implement powerful computers supporting compute intensive
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class25.ps, 19961128
COMP 252 -- Fall 1996 (Dr. Bo Li) Class 25 (Protection and Security) 1 PROTECTION AND SECURITY COMP 252 -- Fall 1996 (Dr. Bo Li) Class 25 (Protection and Security) 2 Why Protection Protection refers to a mechanism for controlling access of programs, processes or users to the resources defined by a
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/A4Lect40.ps, 19961128
COMP 361 APPLICATION LAYER 1 APPLICATION LAYER COMP 361 APPLICATION LAYER 2 Application Layer The application layer provides access to the networking environment for the users and also provides distributed information services These services are frequently used by the users, and do not need to be
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/Lect40.ps, 19961128
COMP 361 APPLICATION LAYER 1 APPLICATION LAYER COMP 361 APPLICATION LAYER 2 Application Layer The application layer provides access to the networking environment for the users and also provides distributed information services These services are frequently used by the users, and do not need to be
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture36.ps, 19961129
(COMP251 LECTURE 36) 1 Overview How does Prolog interpreter work Unification and substitutions (last lecture). Prolog search trees (this lecture). (COMP251 LECTURE 36) 2 Prolog Search Trees A Prolog search tree is conditioned on the following two inputs: 1. A Prolog program, which is a sequence of
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/exam2-sol.ps, 19961129
COMP 251 1996-97 Fall Semester Exam #2 Friday, Nov 15, 1996 Suggested Solutions Important. ffl Please take a look at the problems now, and ask for clarifications if you don't understand them. After the first 30 minutes, no clarifications will be given. ffl Spend your times wisely, and try to solve every
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/sol11.ps, 19961130
COMP 251 1996-97 Fall Semester Assignment #11 Date assigned: Monday, Dec 2, 1996 Suggested solution will be out on Monday, Dec 9, 1996 Given that this is the last week of class, this assignment will be optional. However, doing it will help you prepare for the final exam on questions relating to Prolog.
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec23.ps, 19961201
HKUST 1 Computer Science comp 102 Lecture 23 Topics Input and output Open and closing files Read and writing with files HKUST 2 Computer Science comp 102 Lecture 23 Streams A stream is a flow of characters (or other kind of data). If the flow is out of your program, the stream is called an output
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture37.ps, 19961202
(COMP251 LECTURE 37) 1 Prolog Search Trees (Review) ffl To appreciate Prolog search trees (procedural interpretation of Prolog programs), it helps to understand first the logical meaning of Prolog programs and queries. ffl A Prolog program is like a logical theory, and a query is like a goal to prove
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture2/6.quality-assurance2pp.ps, 19961202
COMP 211 6-1 Software Quality QUALITY ASSURANCE Quality assurance consists of those procedures, techniques, and tools applied by professionals to ensure that a product meets or exceeds pre-specified standards during a product s development cycle. E.H. Bersoff, 1984. n principles of Quality
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture2/6.quality-assurance1pp.ps, 19961202
COMP 211 6-1 Software Quality QUALITY ASSURANCE Quality assurance consists of those procedures, techniques, and tools applied by professionals to ensure that a product meets or exceeds pre-specified standards during a product s development cycle. E.H. Bersoff, 1984. n principles of Quality
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/252/class26.ps, 19961203
COMP 252 -- Fall 1996 (Dr. Bo Li) class 26 (Distributed System) 1 DISTRIBUTED SYSTEMS COMP 252 -- Fall 1996 (Dr. Bo Li) class 26 (Distributed System) 2 What are Distributed Systems A distributed system is a collection of loosely coupled processors interconnected by a communication network The processors
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp560/traffic.fm.ps, 19961203
Traffic and congestion control in ATM networks COMP 560 Jelena Misic 1 Traffic and congestion control in ATM networks This section covers: Introduction Basic ATM traffic control functions Traffic parameter specification Traffic contract specification Granularity of traffic contract parameters Bound on
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/comp102/lectures/lec24.ps, 19961204
HKUST 1 Computer Science comp 102 Lecture 24 Topics Character input and output End-of-file function Predefined character functions HKUST 2 Computer Science comp 102 Lecture 24 Character I/O All data is input and output as character data. When your program outputs the number 10, it is actually character
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture38.ps, 19961204
(COMP251 LECTURE 38) 1 Cuts (Motivation) ffl We need to limit the size of search spaces to do any useful computation without running out of memory. ffl This can be done to a certain degree using clause and goal ordering. ffl However, often the problem is with backtracking which a lot of time is
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Quizzes/final-exam.outline.ps, 19961204
COMP 211 Final Exam COMP 211 Final Exam, Fall 1996 3 hours; 110 points possible (out of 100) 1. Multiple choice 2. Agree, disagree, justify 3. Data flow diagram 4. Process logic 5. Data description 6. Structure chart 7. Testing 8. Project-related
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/A4Lect13.ps, 19961204
Introduction to Software Engineering COMP211 (Fall 1996) User Interface Design 1 Quality Assurance And Testing Introduction to Software Engineering COMP211 (Fall 1996) User Interface Design 2 Quality Assurance Quality assurance consists of those procedures, techniques, and tools applied by professionals
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Lecture1/Lect13.ps, 19961204
Introduction to Software Engineering COMP211 (Fall 1996) User Interface Design 1 Quality Assurance And Testing Introduction to Software Engineering COMP211 (Fall 1996) User Interface Design 2 Quality Assurance Quality assurance consists of those procedures, techniques, and tools applied by professionals
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp361/sol-midterm.ps, 19961204
Department of Computer Science The Hong Kong University of Science and Technology COMP 361 (Fall 1996) Midterm Examination 1 COMP 361 Computer Communication Networks Fall Semester 1996 Midterm Examination Date: October 23, 1996 Time: 09:00 - 09:50 Instructions: 1. This examination paper consists of 7
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Project/Demo.schedule.ps, 19961205
COMP 211 1/2 Department of Computer Science COMP 211: Introduction to Software Engineering Task 4: Prototype Demo Schedule Friday, December 6, 1996 Prof. Fred Lochovsky Dr. Kamal Karlapalem Group# Date Time Platform Programming Lang 1 39 6/12 10:00am Unix CGI 2 23 6/12 10:15am Unix Java 3 15 6/12
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp251/lecture39.ps, 19961206
(COMP251 LECTURE 39) 1 Overview A Prolog program is a sequence of clauses. In many ways, it is a knowledge base consisting of facts and rules. In this lecture, we finish Prolog with an example which shows how to manipulate this knowledge base. (COMP251 LECTURE 39) 2 Assert and Retract These are special
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/solution7.ps, 19961206
COMP272 Homework7 date: 6/12/96 notes prepared by YAN, Li P359: 7.1.1.(a) If L is regular, LR is also regular. Let M be a DFA that accepts wR2LR. Construct TM that decides w2L from M as follows: ffl While M is ready to start to scan its input wR from left to right, TM moves one step to the left, then
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-37.ps.gz, 19961211
Probabilistic Inference in Influence Diagrams Nevin L. Zhang Technical Report HKUST-CS96-37 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/wongkk/slide1.ps.Z, 19961213
THE ROLES AND VIEWS OF MULTIMEDIA OBJECTS Raymond K. Wong H. Lewis Chau Frederick H. Lochovsky Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong Outline of the Presentation ffl Problems to be addressed. ffl Introduction to roles and views. ffl
open this document and view contentsftp://ftp.cs.ust.hk/pub/wongkk/slide2.ps.Z, 19961213
The DOOR Group at HKUST 1 Object Evolution with Roles Raymond K. Wong Hong Kong University of Science & Technology http://www.cs.ust.hk/~wongkk ftp: ftp.cs.ust.hk:/pub/wongkk email: wongkk@cs.ust.hk The DOOR Group at HKUST 2 Outline of the Presentation l Problems l Solution: Roles l The design of DOOR,
open this document and view contentsftp://ftp.cs.ust.hk/pub/wongkk/ics-camera.ps, 19961216
DOOR = `Object with Roles' + `Schema Evolution' Raymond K. Wong H. Lewis Chau Frederick H. Lochovsky Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong Email: fwongkk,lewis,fredg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/wongkk/ics96.ps.Z, 19961216
DOOR = `Object with Roles' + `Schema Evolution' Raymond K. Wong H. Lewis Chau Frederick H. Lochovsky Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong Email: fwongkk,lewis,fredg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Quizzes/final.F96.solution2pp.ps, 19961217
COMP 211 1/10 Department of Computer Science COMP 211: Introduction to Software Engineering Final Exam December 14, 1996 Time: 3 hours 1. Circle the best answer in each question. Each correct answer is worth 1 point. Each incorrect answer will result in a deduction of .5 point. (A) A programmer who
open this document and view contentsftp://ftp.cs.ust.hk/pub/conferences/TANC97/cfp.ps, 19961217
Call for Papers TANC-97 Hong Kong International Workshop on Theoretical Aspects of Neural Computation: A Multidisciplinary Perspective May 26-28, 1997 Hong Kong University of Science and Technology Over the past decade or so, neural computation has emerged as a research area with active involvement by
open this document and view contentsftp://ftp.cs.ust.hk/pub/comp211/Quizzes/final.F96.solution1pp.ps, 19961217
COMP 211 1/10 Department of Computer Science COMP 211: Introduction to Software Engineering Final Exam December 14, 1996 Time: 3 hours 1. Circle the best answer in each question. Each correct answer is worth 1 point. Each incorrect answer will result in a deduction of .5 point. (A) A programmer who
open this document and view contentsftp://ftp.cs.ust.hk/pub/wongkk/slide3.ps, 19961217
DOOR = `Objects with Roles' + `Schema Evolution' Raymond K. Wong H. Lewis Chau Frederick H. Lochovsky Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong Outline of the Presentation ffl Problems to be addressed. ffl Introduction to roles. ffl Schema
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-38.ps.gz, 19961218
1 A 3-Dimensional Perspective on Integrated Management of Rules and Objects1 Dickson K.W. Chiu Qing Li Technical Report HKUST-CS96-38 Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong E-mail: {kwchiu, qing}@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/wongkk/icde97.ps.Z, 19970106
A Data Model and Semantics of Objects with Dynamic Roles Raymond K. Wong1 H. Lewis Chau1 Frederick H. Lochovsky Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay, Hong Kong fwongkk,lewis,fredg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/yeung.cpol96.ps.gz, 19970107
COMPUTER PROCESSING OF ORIENTAL LANGUAGES VOL.10, NO.3. 1996 307 A Heuristic Search Approach to Chinese Glyph Generation Using Hierarchical Character Composition PAK KEUNG LAI*, DIT YAN YEUNG, and MAN CHI PONG** Department of Computer Science Hong Kong University of Science and Technology Clear Water
open this document and view contentsftp://ftp.cs.ust.hk/pub/william/cheung.iwfhr96.ps.gz, 19970110
Recognition of Handwritten Digits Using Deformable Models Kwok-Wai CHEUNG, Dit-Yan YEUNG, Roland T. CHIN The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong E-mail: fwilliam,dyyeung,rolandg@cs.ust.hk Deformable models are used to recognize handwritten characters which have a
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-31v2.ps.gz, 19970110
Planning in Stochastic Domains: Problem Characteristics and Approximations (Version II) Nevin L. Zhang and Wenju Liu Technical Report HKUST-CS96-31 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/scc/apsec.ps.gz, 19970116
Call for Papers Joint 1997 Asia Pacific Software Engineering Conference and International Computer Science Conference December 2-5, 1997 Hong Kong WHAT ARE APSEC AND ICSC The Asia Pacific Software Engineering Conference (APSEC) is a major annual international software engineering conference in the Asia
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-15.ps.gz, 19970116
A Delay Scheduling Strategy for Dynamic Load Balancing Schedulers Chi-Chung Hui & Samuel T. Chanson Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/papers/parcom.ps, 19970116
-1- Express versus PVM: A Performance Comparison Ishfaq Ahmad1 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Email: iahmad@cs.ust.hk, Phone: (852) 2358-6980, FAX: (852) 2358-1477
open this document and view contentsftp://ftp.cs.ust.hk/pub/ahmad/papers/astar-icpp97.ps, 19970120
- 1 - Parallel Algorithms for Optimal Scheduling of Arbitrary Task Graphs to Multiprocessors Yu-Kwong Kwok1, Ishfaq Ahmad, Muhammad Kafil, and Imtiaz Ahmad* Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong *Department of Electrical and
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/schedule.ps.gz, 19970124
Bandwidth Scheduling of Prerecorded VBR Video Sources for ATM Networks John Lauderdale, Danny H. K. Tsang feelauder,eetsangg@ee.ust.hk Department of Electrical and Electronic Engineering Hong Kong University of Science and Technology Clearwater Bay Road, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/visual96.ps.gz, 19970124
1 An Improved Algorithm for Lossless Smoothing of MPEG Video with Delay Constraints John Lauderdale, Danny H.K. Tsang, George Baciu Hong Kong University of Science and Technology, Clear Water Bay Rd. Kowloon, Hong Kong E-mails: eelauder@ee.ust.hk eetsang@ee.ust.hk gbaciu@cs.ust.hk Supported by Hongkong
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/server_icc.ps.Z, 19970124
A New Technique for Transmission of Pre-Encoded MPEG VBR Video Using CBR Service John Lauderdale and Danny H. K. Tsang eelauder@ee.ust.hk eetsang@ee.ust.hk Department of Electrical and Electronic Engineering The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/server.ps.gz, 19970124
A New Technique for Transmission of Pre-Encoded MPEG VBR Video Using CBR Service John Lauderdale and Danny H. K. Tsang eelauder@ee.ust.hk eetsang@ee.ust.hk Department of Electrical and Electronic Engineering The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/thesis.ps.gz, 19970124
Variable Bit Rate Video Transmission over ATM Networks A thesis submitted to The Hong Kong University of Science and Technology in partial fulfillment of the requirements for the Degree of Master of Philosophy in Electrical and Electronic Engineering by JOHN LAUDERDALE Department of Electrical and
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/main.ps.Z, 19970124
Variable Bit Rate Video Transmission over ATM Networks A thesis submitted to The Hong Kong University of Science and Technology in partial fulfillment of the requirements for the Degree of Master of Philosophy in Electrical and Electronic Engineering by JOHN LAUDERDALE Department of Electrical and
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/laud96b.ps.gz, 19970124
A New Technique for Transmission of Pre-Encoded MPEG VBR Video Using CBR Service John Lauderdale and Danny H. K. Tsang eelauder@ee.ust.hk eetsang@ee.ust.hk Department of Electrical and Electronic Engineering The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/thesis_present.ps.gz, 19970124
The Hong Kong University of Science & Technology P.1 Department of Electrical & Electronic Engineering VBR video transmission over ATM networks John Lauderdale, MPhil. Thesis Presentation Department of Electrical & Electronic Engineering The Hong Kong University of Science & Technology, Clear Water Bay,
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/smooth.ps.gz, 19970124
An Improved Algorithm for Lossless Smoothing of MPEG Video with Delay Constraints John Lauderdale, Danny H. K. Tsang feelauder,eetsangg@ee.ust.hk Department of Electrical and Electronic Engineering George Baciu gbaciu@cs.ust.hk Department of Computer Science Hong Kong University of Science and
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/schedule_summary.ps.gz, 19970124
Bandwidth Scheduling of Prerecorded VBR Video Sources for ATM Networks John Lauderdale, Danny H. K. Tsang feelauder,eetsangg@ee.ust.hk Department of Electrical and Electronic Engineering Hong Kong University of Science and Technology Clearwater Bay Road, Kowloon, Hong Kong Extended Abstract 1
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp351/lect2.ps, 19970124
COMP 351/651A INTRODUCTION 9 Performance Evaluation Techniques Measurement Model-based Simulation Trace-driven Discrete-event Analytical Modeling State spaceNon state Markov chains Stochastic Petri nets Product form queueing networks Reliability block diagrams Fault trees basedspace based COMP 351/651A
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp351/lect1.ps, 19970124
COMP 351/651A INTRODUCTION 1 COMP 351/651A PERFORMANCE EVALUATION OF COMPUTER SYSTEMS Jogesh K. Muppala muppala@cs.ust.hk COMP 351/651A INTRODUCTION 2 INTRODUCTION I keep six honest serving men. They taught me all I knew. Their names are What and Why and When and How and Where and Who. - Rudyard Kipling
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/ieice.ps.gz, 19970124
IEICE TRANS. COMMUNICATIONS, VOL. E00{A, NO. 1 JANUARY 1996 1 PAPER Special Issue on Multimedia on Demand Using the Minimum Reservation Rate for Transmission of Pre-Encoded MPEG VBR Video Using CBR Service John LAUDERDALEy and Danny H.K. TSANGy, Nonmembers SUMMARY This paper presents the system issues
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp351/A4lect2.ps, 19970124
COMP 351/651A INTRODUCTION 9 Performance Evaluation Techniques Measurement Model-based Simulation Trace-driven Discrete-event Analytical Modeling State spaceNon state Markov chains Stochastic Petri nets Product form queueing networks Reliability block diagrams Fault trees basedspace based COMP 351/651A
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/mrr.ps.gz, 19970124
The Minimum Reservation Rate Problem for the Transmission of MPEG VBR Video John Lauderdale, Danny H.K. Tsang feelauder,eetsangg@ee.ust.hk Department of Electrical and Electronic Engineering Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong Rev. 2 February 21 1996
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/itel_final.ps.gz, 19970124
Internet Telephony: Technology, Trends, and Opportunities John Lauderdale Cyberspace Center, Computer Science Dept. The Hong Kong University of Science and Technology Clearwater Bay, Kowloon, HONG KONG Phone: (852) 2358 8765 Fax: 2358 8777 email: JohnL@cs.ust.hk Final Revision, 19 August 1996. Appears
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp351/A4lect1.ps, 19970124
COMP 351/651A INTRODUCTION 1 COMP 351/651A PERFORMANCE EVALUATION OF COMPUTER SYSTEMS Jogesh K. Muppala muppala@cs.ust.hk COMP 351/651A INTRODUCTION 2 INTRODUCTION I keep six honest serving men. They taught me all I knew. Their names are What and Why and When and How and Where and Who. - Rudyard Kipling
open this document and view contentsftp://ftp.cs.ust.hk/pub/johnl/ATM_workshop_present.ps.gz, 19970124
The Hong Kong University of Science & Technology P.1 Department of Electrical & Electronic Engineering Bandwidth Scheduling of Pre-encoded VBR video sources for ATM Networks John Lauderdale, Danny H.K. Tsang {eelauder,eetsang}@ee.ust.hk Department of Electrical & Electronic Engineering The Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s97/topic-a1.ps.gz, 19970125
COMP221: Fundamentals of Artificial Intelligence Topic A1: Introduction Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Introduction Artificial Intelligence ffl The term Artificial
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/INTRO.fm.ps, 19970126
COMP 252 (Spring 1997) Introduction 1 COMP 252 PRINCIPLES OF SYSTEMS SOFTWARE FALL 1995 COMP 252 (Spring 1997) Introduction 2 Course Outline 1.Introduction 1.1.Definitions 1.2.History of Operating Systems 1.3.Computer System Structures 1.4.Operating System Structures 2.Process Management 2.1.Processes
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/Intro.fm.ps, 19970126
COMP 252 (Spring 1997) Introduction 1 COMP 252 PRINCIPLES OF SYSTEMS SOFTWARE FALL 1995 COMP 252 (Spring 1997) Introduction 2 Course Outline 1.Introduction 1.1.Definitions 1.2.History of Operating Systems 1.3.Computer System Structures 1.4.Operating System Structures 2.Process Management 2.1.Processes
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s97/topic-b2.ps.gz, 19970127
COMP221: Fundamentals of Artificial Intelligence Topic B2: Game Playing Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Game Playing Games as Search Problems ffl Mainly two-player games
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Trans537/t3.fm.ps.gz, 19970127
COMP337/537 HKUST Spring 97 1 BW 5. Learning Prop Rules and Decision Trees Outlook Temp(F) Humidity(%) Windy Class sunny 75 70 true play sunny 80 90 true don t play sunny 85 85 false dont play sunny 72 95 false don t play sunny 69 70 false play overcast 72 90 true play overcast 83 78 false play overcast
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Trans537/info-97.fm.ps, 19970127
HKUST Computer Science Comp 337/537 Knowledge Discovery in Databases Spring Semester, 1997 Course Information Instructor Dr. Beat Wuthrich, room 3518, email: beat@cs.ust.hk, tf: 2358 7013 Objective This course is designed to introduce both undergraduate and postgraduate students into the field and
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Trans537/t5a.fm.ps.gz, 19970127
COMP337/537 HKUST Spring 97 1 BW 3. Uncertainty 3.1 Foundations of Probability Theory An algebraic structure (A, and, or), where A is a set of elements and and and or are binar y infix operations, is a lattice if the following holds. - both operations are idempotent, - commutative, - associative, and -
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s97/courseinfo.ps.gz, 19970127
Hong Kong University of Science and Technology COMP300M: Introduction to Pattern Recognition Summer 1996 Instructor Dit-Yan Yeung, Rm 3541, 2358-6977, dyyeung@cs.ust.hk, http://www.cs.ust.hk/~dyyeung/ Office hours: Tuesday 10:00am{12:00noon (or by appointment) Class Schedule Lecture: Tuesday & Wednesday
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp351/tut1.ps, 19970127
Chapter 2 Basic Probability 2.1 What is Probability Let S be the sample space, the set of all possible outcomes of an experiment. Let E be the event that includes all the outcomes of interest (E S). We define P (E) as the probability measure such that, <= P (E) <= 1 P (S) = 1 P (;) = 2.2 Probability
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/intro.ps, 19970127
COMP 535/300P Knowledge Representation and Reasoning 1996-1997 Spring Semester Lectures: Tuesday and Thursday 10:30-11:50am Instructor: Fangzhen Lin (flin@cs) Room 3552, telephone 2358-6975 Office hours: Thursday 2-4pm or by appointment TA: Kam Fai Chan (kchan@cs) Room 4204, telephone
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Trans537/t2.fm.ps.gz, 19970127
COMP337/537 HKUST Spring 97 1 BW 2. Rule Languages 2.1 Propositional Rules and Decision Trees has_cancer = true <-- smoker = true, bad_habits = true bad_habits = true <-- vegetarian = false, bad_habits = true <-- drinks_alc = true Person has_cancer smoker vegetarian drinks_alc a no yes yes no b yes yes
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Trans537/t5b.fm.ps.gz, 19970127
COMP337/537 HKUST Spring 97 1 BW 3.3 Probabilistic Datalog Rules are not always completely accurate. has_cancer(x) <-- person(x),smoker(x) has_cancer(x) <-- person(x), not does_sport(x) has_cancer(x) <-- person(x), ancestor(y,x), has_cancer(y) Two sources of uncer tainty: factual uncer tainty rule
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Trans537/t1.fm.ps.gz, 19970127
COMP337/537 HKUST Spring 97 1 BW Knowledge Discovery in Databases Beat W thrich email: beat@cs.ust.hk tf: 2358 7013 fax: 2358 1477 room 3518 1.2 Basic Notions 1.3 Motivation 2.1 Propositional Rules and Decision Trees COMP337/537 HKUST Spring 97 2 BW 1.2 Basic Notions What is knowledge discovery and why
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Trans537/t6.fm.ps.gz, 19970127
COMP337/537 HKUST Spring97 1 B.W. 7. Learning Probabilistic Knowledge Generate comp(X) <-- int(X), pro(X) comp(X) <-- int(X), sol(X), app(X) comp(X) <-- int(X),pro(X),inn(X),rep(X) from training examples EX =
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Trans537/t4.fm.ps.gz, 19970127
COMP337/537 HKUST Spring 97 1 BW 6. Learning Datalog Rules Inductive Logic Programming, or learn SQL views (not using aggregation functions). parent female male sibling a1 a2 a2 a1 a2 a3 a1 a3 a4 a3 a3 a2 a4 a2 ... ... ... a4 a3 How can we discover the family relationships mother, father, brother,
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/lect1.ps, 19970128
(COMP535 LECT 1) 1 Artificial Intelligence (AI) What is AI (COMP535 LECT 1) 2 AI and Knowledge Representation (KR) Much of AI involves building systems that are knowledge-based: ffl language understanding, planning, diagnosis, "expert systems", ... Some, to a certain extent ffl game-playing, vision,...
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp351/lect3.ps, 19970130
COMP 351/651A MEASUREMENT TECHNIQUES AND TOOLS 1 MEASUREMENT TECHNIQUES AND TOOLS COMP 351/651A MEASUREMENT TECHNIQUES AND TOOLS 2 Questions in Measurement Measurement involves monitoring the system while it is being subjected to a particular workload 1. What are the different types of workloads 2.
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp351/A4lect3.ps, 19970130
COMP 351/651A MEASUREMENT TECHNIQUES AND TOOLS 1 MEASUREMENT TECHNIQUES AND TOOLS COMP 351/651A MEASUREMENT TECHNIQUES AND TOOLS 2 Questions in Measurement Measurement involves monitoring the system while it is being subjected to a particular workload 1. What are the different types of workloads 2.
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/lect2.ps, 19970130
(COMP535 LECT 2) 1 Overview Propositional logic: language, semantics, entailment. 3 queens problem. (COMP535 LECT 2) 2 Language The language (syntax) of a logic describes how to form sentences. This is like the syntax of a programming language. E.g. the syntax of C says that ++x is a legal expression,
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/jair96.ps.Z, 19970131
Journal of Artificial Intelligence Research 5 (1996) 301-328 Submitted 4/96; published 12/96 Exploiting Causal Independence in Bayesian Network Inference Nevin Lianwen Zhang LZHANG@CS.UST.HK Department of Computer Science, University of Science & Technology, Hong Kong David Poole POOLE@CS.UBC.CA
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp361/Physical.ps, 19970202
COMP 361 (SPRING 1997) DATA COMMUNICATIONS 1 PHYSICAL LAYER Data communications Transmission media Data encoding Physical layer interface Multiplexing/Switching techniques COMP 361 (SPRING 1997) DATA COMMUNICATIONS 2 Data Transmission Data transmission from a sender to a receiver requires the use of a
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/Process-sched.fm.ps, 19970204
COMP 252 (Spring 1997)) Processes and Process Scheduling 1 PROCESSES AND PROCESS SCHEDULING COMP 252 (Spring 1997)) Processes and Process Scheduling 2 Process Concepts A process is a program in execution A process is an active entity, with a program counter specifying the next instruction to execute A
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp351/A4lect5.ps, 19970204
COMP 351/651A MEASUREMENT TECHNIQUES AND TOOLS 17 Monitor Comparison Criterion Hardware Monitor Software Monitor Domain Difficult to monitor OS events Difficult to monitor hardware events Input rate ~105 per second possible Limited by the processor MIPS and overhead Time resolution 10 ns possible 10-16
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp351/lect5.ps, 19970204
COMP 351/651A MEASUREMENT TECHNIQUES AND TOOLS 17 Monitor Comparison Criterion Hardware Monitor Software Monitor Domain Difficult to monitor OS events Difficult to monitor hardware events Input rate ~105 per second possible Limited by the processor MIPS and overhead Time resolution 10 ns possible 10-16
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp351/A4lect4.ps, 19970204
COMP 351/651A MEASUREMENT TECHNIQUES AND TOOLS 9 Workload Selection The four major considerations in selecting the workload are the services exercised by the workload, the level of detail, representativeness, and timeliness Services exercised: The requests at the service-interface level of the SUT
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp361/Introduction.ps, 19970204
COMP 361 (SPRING 1997) INTRODUCTION 1 INTRODUCTION Elements of computer networks Layered Approach The OSI Reference Model Layers in TCP/IP Architecture COMP 361 (SPRING 1997) INTRODUCTION 2 Goals of Networking Information and data exchange: - Remote login - Access to remote databases - Multimedia
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s97/topic-b1.ps.gz, 19970204
COMP221: Fundamentals of Artificial Intelligence Topic B1: Problem Solving as Search Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Problem Solving as Search Problem-Solving Agents ffl
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/PROCESS-sched.fm.ps, 19970204
COMP 252 (Spring 1997)) Processes and Process Scheduling 1 PROCESSES AND PROCESS SCHEDULING COMP 252 (Spring 1997)) Processes and Process Scheduling 2 Process Concepts A process is a program in execution A process is an active entity, with a program counter specifying the next instruction to execute A
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp351/lect4.ps, 19970204
COMP 351/651A MEASUREMENT TECHNIQUES AND TOOLS 9 Workload Selection The four major considerations in selecting the workload are the services exercised by the workload, the level of detail, representativeness, and timeliness Services exercised: The requests at the service-interface level of the SUT
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/lect3.ps, 19970204
(COMP535 LECT 3) 1 Overview Propositional logic II: circuit design, 2 and 3 queens problems, inference procedures, clausal representation of sentences, resolution and proof by refutation. (COMP535 LECT 3) 2 An Aside: Switching Circuits A B C D AND AND NOT OR AND Figure 1: Circuit for ((A ^ B)) ^ D _ ((A
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/forkexample1.ps, 19970211
UNIX fork() and other System Calls fork() is the only way to create a new process in UNIX. It creates an exact duplicate of the original process, including all the file descriptors, registers and everthing else. All the variables (in the two processes) have identical values at the same time of the
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/forkexample2.ps, 19970211
File Table and UNIX fork() Process table entry is a table stored in the ker- nel for every process in UNIX. It hold informa- tion on all the file descriptors the process cur- rently holds and pointers to the file tables of all these descriptors. File tables, in turn, hold information on the opened
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/Process-coord.fm.ps, 19970218
COMP 252 (Spring 1997) Process Coordination 1 PROCESS COORDINATION COMP 252 (Spring 1997) Process Coordination 2 Cooperating Processes A process is considered independent if it cannot affect or be affected by other procesess in the system Otherwise the process is considered a cooperating process Why do
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/lect6.ps, 19970218
(COMP535 LECT 6) 1 Knowledge Engineering KB is first and foremost about knowlegde: ffl meaning and entailment. ffl find individuals and properties, then encode facts sufficient for entailments. Before implementing, need to understand clearly: ffl what is to be computed ffl why and where inference is
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/97/tr97-1.ps.gz, 19970218
1 Checking and Correcting Safety Properties using Compositional Reachability Analysis Shing Chi Cheung Jeff Kramer Department of Computer Science Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong Department of Computing Imperial College of Science, Technology and Medicine,
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/lect7.ps, 19970220
(COMP535 LECT 7) 1 An Incomplete Reasoning System Inference rules: see handout. Plus the following one for equality: t = s; Derivation: given a set of premises , a sequence of formula ff1; :::; ffn is a proof of ff iff: ffl ffn = ff. ffl for each 1 <= i <= n, either ffi 2 or there
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/lect8.ps, 19970225
(COMP535 LECT 8) 1 Answer Predicate: Motivating Example KB: P lus(zero; x; x); P lus(x; y; z) oe P lus(succ(x); y; succ(z)) Q: 9uP lus(2; 3; u) where for readability, we use for zero, 2 for succ(succ(zero)), etc.
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/lect9.ps, 19970227
(COMP535 LECT 9) 1 Horn Clauses Recall that a clause is a set of literals. A Horn clause is one with at most one positive literal. Examples: , . Non-examples: . Generally, a Horn clause with exactly one positive literal has the form:
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/sol2.ps, 19970228
1000110S 1 10 100 1000 10001 100011 1 1 1 1 1 1,0 1 1 Problem 1. Problem 2(a) even a's even b's even a's odd b's odd a's even b's odd a's odd b's b b a a b b a a Problem 2(b) S a aa aaa b bb b bb a aa aab a a a a a b b a,b b a b b b b a b b a a a,b
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/97221/dc1.ps, 19970303
COMP221: Fundamentals of Artificial Intelligence Topic C1: Knowledge Representation and Reasoning/Detailed notes Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Knowledge Representation
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/Threads.fm.ps, 19970305
COMP 252 (Spring 1997) Threads 1 THREADS JUSTIFICATION AND MOTIVATION Problems with the classical process model: - many applications require several more or less independent tasks running concurrently, yet sharing a common address space and other resources. For instance, a database server may listen for
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/sol3.ps, 19970306
2.4.5 a) Let L = L(M), M= {S, K, d, s, F}. Let M be a DFA such that, M = {S, K, d, s, F } where q F iff there exists a path in M from q to some state in F. Given w, w Pref(L) iff w is a prefix of some string s L. Thus w Pref(L) iff w is a prefix of s and s has a path leading from the initial state in M
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/97221/dc2.ps, 19970306
COMP221: Fundamentals of Artificial Intelligence Topic C2: Inference in FOL (I) Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Inference in FOL (I) Inference in FOL We shall study this
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/Deadlock.fm.ps, 19970309
COMP 252 (Spring 1997)) Deadlock 1 DEADLOCK COMP 252 (Spring 1997)) Deadlock 2 What is a Deadlock A process is said to be in a state of deadlock if it is waiting for an event that will never occur A system in which one or more processes are deadlocked, is said to be in deadlock In a multiprogramming
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/97221/dc3.ps, 19970311
COMP221: Fundamentals of Artificial Intelligence Topic C2: Inference in FOL (II) Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Inference in FOL (II) Inference in KBs with variables The
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/97221/pset2.ps, 19970313
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1997 Problem Set 2: Knowledge representation and reasoning Due: 5pm, 24 March 1997, to the instructors There are five questions in this problem set. Each question is worth 1 final grade point.
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/Memory.fm.ps, 19970318
COMP 252 (Spring 1997) Memory Management 1 MEMORY MANAGEMENT COMP 252 (Spring 1997) Memory Management 2 Why Memory Management Through CPU scheduling and multiprogramming, we are able to improve the CPU utilization and the response time To achieve this, we have several active processes simultaneously
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/papers/ordergelfond.ps.Z, 19970323
An Ordering on Subgoals for Planning Fangzhen Lin Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong fl@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/midterm.ps, 19970403
COMP 300P/535 1996-97 Spring Semester Midterm Examination March 18, 1997 Suggested solutions for some of the problems Problem 1 (20%). Given the three predicates: P (x) (x is a person), T (x) (x is an instance of time), and F (x; y) (you can fool x at time y), represent the following English statements
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/Virtual.fm.ps, 19970406
COMP 252 (Spring 1997) Virtual Memory 1 VIRTUAL MEMORY COMP 252 (Spring 1997) Virtual Memory 2 What is Virtual Memory So far we assumed that for a process to run, it must be completely resident in memory Virtual memory is a technique that allows the execution of processes that are not completely
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Trans537/t8.ps.gz, 19970409
COMP337/537 HKUST Spring 97 1 BW Regression Analysis regression analysis deals with numbers only it is a widely used technique Problem 1: when a softdrink company increases its advertisments, it expects that this outlay will increase sales. Determine this relationship. Problem 2: in a study of
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Trans537/t9.ps.gz, 19970409
COMP337/537 HKUST Spring 97 1 BW Regression Analysis of Time Data Cross-sectional data are gathered on many individuals at the same point in time. Time-series data are gathered on a single individual (person, firm, etc) over a fixed sequence of time periods such as days, weeks, months, etc. firm1, 1989,
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/Secondary.fm.ps, 19970415
COMP 252 (Spring 1997) Secondar y Storage Management 1 SECONDARY STORAGE MANAGEMENT COMP 252 (Spring 1997) Secondary Storage Management 2 Why Secondary Storage Programs executed by the system should ideally be resident permanently in main memory Main memory is too small to accommodate all needed
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s97/pset3.ps.gz, 19970415
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1997 Problem Set 3: Probabilistic Reasoning Due: 29 April 1997 There are five questions in this problem set. Each is worth one final grade point. You will be graded on the four questions that you
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp361/Network2.ps, 19970415
COMP 361 (SPRING 1997) NETWORK LAYER 33 Routing With Bridges Bridges have to use routing, which can be either fixed or adaptive An adaptive bridge connects two or more LANs, forwarding frames from one to another. It uses source addresses to learn which machines lie on which LAN segment, and it combines
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp361/Transport.ps, 19970417
COMP 361 (SPRING 1997) TRANSPORT LAYER 1 TRANSPORT LAYER Transport services - reliable sequencing network service - reliable nonsequencing network service - unreliable network service TCP UDP COMP 361 (SPRING 1997) TRANSPORT LAYER 2 Transport Layer The transport layer should provide reliable end-to-end
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s97/e1.ps.gz, 19970419
COMP221: Fundamentals of Artificial Intelligence Topic E1: Machine Learning Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Machine Learning Learning Agents ffl Agents that can learn from
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s97/topic-e1.ps.gz, 19970419
COMP221: Fundamentals of Artificial Intelligence Topic E1: Machine Learning Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Machine Learning Learning Agents ffl Agents that can learn from
open this document and view contentsftp://ftp.cs.ust.hk/pub/gbaciu/vtri/paper/paper.ps, 19970420
1 The Virtual Trackball-Ruler Interface George Baciu Computer Science Department The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong E-mail: gbaciu@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/97221/d3.ps, 19970421
COMP221: Fundamentals of Artificial Intelligence Topic D3: Decision Networks Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Decision Networks Decision Networks Decision networks: the
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/lect19.ps, 19970422
(COMP535 LECT 19) 1 Abductive reasoning So far: have concentrated on reasoning that is primarily deductive: ffl given KB, is ff entailed ffl given KB, for what x is ff(x) entailed Now consider a new type of question: Given KB, and an ff that I do not believe ffl what would be sufficient to make me
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/Filesystems.fm.ps, 19970422
COMP 252 (Spring 1997) File Systems 1 FILE SYSTEMS COMP 252 (Spring 1997) File Systems 2 What is a File A file is a collection of related information defined by its creator Files may be free-form, such as text files, or may be formatted rigidly Files can be of several types and have a defined structure
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp361/hw4.ps, 19970422
COMP361 (Spring 1997) Homework #4 1 Due Date May 7, 1997 (Wednesday) 1. The current routing table of node 1 in the following network is shown in the figure below. The network uses a distributed adaptive routing algorithm similar to the ARPANET routing algorithm. Node 1 periodically receives the delay
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/sol6.ps, 19970422
b) Let L = {ann: n >= 0}. Theorem b): L is not CF. Proof: Suppose L is CFL. Then there exist grammar G = (V, S, R, S). Let K be the con- stant in the CFL Pumping Lemma. Set w = aq, where |w| > K and q = n2 for some n >= 0. Then the Pumping Lemma says there exist uvxyz with w = uvxyz, |vy| > 0 and for
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s97/e3.ps.gz, 19970423
COMP221: Fundamentals of Artificial Intelligence Topic E3: Perceptrons Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Perceptrons Biological Neurons AxonCell body or
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s97/topic-e2.ps.gz, 19970423
COMP221: Fundamentals of Artificial Intelligence Topic E2: Decision Trees Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Decision Trees Decision Trees as Performance Elements ffl Simple
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s97/topic-e3.ps.gz, 19970423
COMP221: Fundamentals of Artificial Intelligence Topic E3: Perceptrons Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Perceptrons Biological Neurons AxonCell body or
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s97/e2.ps.gz, 19970423
COMP221: Fundamentals of Artificial Intelligence Topic E2: Decision Trees Dit-Yan Yeung & Nevin L. Zhang Department of Computer Science Hong Kong University of Science and Technology dyyeung@cs.ust.hk, lzhang@cs.ust.hk Spring 1997 COMP221 Decision Trees Decision Trees as Performance Elements ffl Simple
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/lect20.ps, 19970424
(COMP535 LECT 20) 1 Reasoning About Actions A B C B C A Consider the blocks world: Initially block A is on B, B is on C, and C is on the table. A robot can perform: pick up a block, putdown a block she's holding either on the table or on top of another block. Can the robot achieve the goal of having B
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp361/Session.ps, 19970425
COMP 361 (SPRING 1997) HIGH LEVEL LAYERS 1 SESSION LAYER Relative THIN layer Introduction Session (connection) management Structuring data transfer Synchronization and recovery COMP 361 (SPRING 1997) HIGH LEVEL LAYERS 2 Why Session Layer The lower layers (physical, data link, network, and transport) of
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/papers/ijcai97.ps.Z, 19970425
Applications of the Situation Calculus To Formalizing Control and Strategic Information: The Prolog Cut Operator Fangzhen Lin (flin@cs.ust.hk) Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp361/Presentation.ps, 19970428
COMP 361 (SPRING 1997) HIGH LEVEL LAYERS 9 PRESENTATION LAYER Issues in presentation layer ASN.1 Data compression technique COMP 361 (SPRING 1997) HIGH LEVEL LAYERS 10 Why Presentation Layer A fundamental question: - suppose we could copy (completely reliably) from one computer s memory to another
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/lect21.ps, 19970429
(COMP535 LECT 21) 1 Indirect Effects For stack(x; y): Poss(stack(x; y); s) oe H(handEmpty; do(stack(x; y); s)); Poss(stack(x; y); s) oe :H(holding(x); do(stack(x; y); s)); Poss(stack(x; y); s) oe :H(clear(y); do(stack(x; y); s)); Poss(stack(x; y); s) oe H(clear(x); do(stack(x; y); s)): For pickup(x; y):
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/course/comp221/s97/pset4.ps.gz, 19970430
Hong Kong University of Science and Technology COMP221: Fundamentals of Artificial Intelligence Spring 1997 Problem Set 4: Machine Learning Due: 10 May 1997, 12noon, to the instructors There are three questions in this problem set. Each is worth one final grade point. You will be graded on the two
open this document and view contentsftp://ftp.cs.ust.hk/pub/dyyeung/paper/workshop.ps.gz, 19970501
Robust Deformable Matching for Character Extraction Kwok-Wai Cheung Dit-Yan Yeung Roland T. Chin Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong fwilliam, dyyeung, rolandg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/william/workshop.ps.gz, 19970501
Robust Deformable Matching for Character Extraction Kwok-Wai Cheung Dit-Yan Yeung Roland T. Chin Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Hong Kong fwilliam, dyyeung, rolandg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/lect22.ps, 19970501
(COMP535 LECT 22) 1 Successor State Axioms - Example Consider the fluent clear: ffl Positive effect axioms: Poss(stack(x; y); s) oe H(clear(x); do(stack(x; y); s)); Poss(pickup(x; y); s) oe H(clear(y); do(pickup(x; y); s)); Poss(putdown(x); s) oe H(clear(x); do(putdown(x); s)): Rewrite it into a single
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/uai97liu.ps.gz, 19970503
Region-Based Approximations for Planning in Stochastic Domains Nevin L. Zhang and Wenju Liu Department of Computer Science Hong Kong University of Science and Technology flzhang, wliug@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/comp535/lect23.ps, 19970506
(COMP535 LECT 23) 1 Temporal Explanations One-step temporal explanation: given an observation OE(do(A; S0)) about the situation resulting from doing A in S0, find a formula about S0 to explain this observation. ffl There are many approaches to this problem, none of them are entirely satisfactory. ffl
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp361/Highspeed.ps, 19970507
COMP 361 (SPRING 1997) HIGH SPEED NETWORKING 1 HIGH SPEED NETWORKING What happens when we go faster! Implications Integrated services ATM basics - cell format - cell switching (VPI/VCI) COMP 361 (SPRING 1997) HIGH SPEED NETWORKING 2 Is Gbps really fast It is not multi-terabit (Tbps --> 1012 bps)
open this document and view contentsftp://ftp.cs.ust.hk/pub/scc/tosem95.ps.gz, 19970508
1 Checking and Correcting Safety Properties using Compositional Reachability Analysis1 Shing Chi Cheung Jeff Kramer Department of Computer Science Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong Department of Computing Imperial College of Science, Technology and Medicine,
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/Distributed.fm.ps, 19970509
COMP 252 (Spring 1997) Distributed Systems 1 DISTRIBUTED SYSTEMS COMP 252 (Spring 1997) Distributed Systems 2 What are Distributed Systems A distributed system is a collection of loosely coupled processors interconnected by a communication network The processors do not share memory or a clock. Each
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/final97training.fm.ps, 19970509
Dept. of Computer Science The Hong Kong University of Science and Technology Fall 1995 COMP 252 Final Exam 1 COMP 252 - TRAINING PROBLEMS. 1. What are the advantages of using a linked allocation of disk blocks, versus a contiguous allocation, for a large file What are the disadvantages 2. Consider a
open this document and view contentsftp://ftp.cs.ust.hk/pub/jmisic/comp252/final97training.fm.ps, 19970509
Dept. of Computer Science The Hong Kong University of Science and Technology Fall 1995 COMP 252 Final Exam 1 COMP 252 - TRAINING PROBLEMS. 1. What are the advantages of using a linked allocation of disk blocks, versus a contiguous allocation, for a large file What are the disadvantages 2. Consider a
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/97/tr97-3.ps.gz, 19970512
The Role Players and Owners in DOOR Raymond K. Wongy, H. Lewis Chau , and Frederick H. Lochovsky Technical Report HKUST-CS97-03 May 1997 Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong y School of MPCE Computing Macquarie University
open this document and view contentsftp://ftp.cs.ust.hk/pub/ipe/FAQ.ps, 19970518
Ipe Frequently Asked Questions Otfried Schwarzkopf Ipe is a drawing editor for creating figures for inclusion into LaTeX documents. This document tries to answer some common questions by Ipe users. I add an entry to this file whenever I answer a question, so the collection of questions is rather
open this document and view contentsftp://ftp.cs.ust.hk/pub/ipe/iums.ps, 19970518
Ipe User Macros Otfried Schwarzkopf Here is a little library of Ipe extensions or Ipe user macros that have been written by myself or other Ipe users, and that you are welcome to share. These Ipe user macros or Iums are distributed as sources, and all use a commonMaster Makefile. Most of them|certainly
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/ijisafm.ps.gz, 19970520
Discovering Probabilistic Decision Rules Beat W uthrich The Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong e-mail: beat@cs.ust.hk phone: (852) 2358 7013 fax: (852) 2358 1477 1
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/uai97zhang.ps.gz, 19970523
Fast Value Iteration for Goal-Directed Markov Decision Processes Nevin L. Zhang and Weihong Zhang Department of Computer Science Hong Kong University of Science & Technology flzhang, wzhangg@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/conferences/TANC97/final-pgm.ps, 19970523
TANC-97 - 1 - Hong Kong TANC-97 Hong Kong International Workshop on Theoretical Aspects of Neural Computation: A Multidisciplinary Perspective May 26-28, 1997 Hong Kong University of Science and Technology TANC-97 Secretariat Department of Physics Hong Kong University of Science and Technology Clear
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/uai97yan.ps.gz, 19970523
Independence of Causal Influence and Clique Tree Propagation Nevin Lianwen Zhang and Li Yan Department of Computer Science, Hong Kong University of Science & Technology flzhang, yanlig@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/casch-icpp97.ps.gz, 19970527
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/dalloc-compsac97-camera.ps.gz, 19970527
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/dalloc-compsac97.ps.gz, 19970527
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/casch-icpp97-camera.ps.gz, 19970527
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/casch-europar97-camera.ps.gz, 19970527
A Graphical Tool for Automatic Parallelization and Scheduling of Programs on Multiprocessors Yu-Kwong Kwok1, Ishfaq Ahmad1, Min-You Wu2 and Wei Shu2 1Department of Computer Science, The Hong Kong University of Science and Technology, Hong Kong 2Department of Computer Science, State University of New
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/casch-europar97.ps.gz, 19970527
A Graphical Tool for Automatic Parallelization and Scheduling of Programs on Multiprocessors Yu-Kwong Kwok1, Ishfaq Ahmad1, Min-You Wu2 and Wei Shu2 1Department of Computer Science, The Hong Kong University of Science and Technology, Hong Kong 2Department of Computer Science, State University of New
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp361/final_sol.ps, 19970527
May 21 (Wednesday) 1 COMP 361 Spring 1997 Final Exam Solution 1. Truth and False Questions : Answer: 1) A reliable transport service can be provided over a T unreliable network service 2) The session layer can group the data together to be T transmitted over the same session (connection) 3)
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/94/tem.ps, 19970528
Knowledge Discovery in Databases Beat W uthrich The Hong Kong University of Science and Technology Clear Water Bay Kowloon, Hong Kong e-mail: beat@cs.ust.hk phone: (852) 358 7013 fax: (852) 358 1477 May 11, 1994
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/CPFD-hpc97-camera.ps.gz, 19970604
A Comparison of Task-Duplication-Based Algorithms for Scheduling Parallel Programs to Message-Passing Systems Ishfaq Ahmad and Yu-Kwong Kwok Department of Computer Science The Hong Kong University of Science and Technology, Hong Kong Email: {iahmad, csricky}@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/cpfd-hpc97.ps.gz, 19970604
A Comparison of Task-Duplication-Based Algorithms for Scheduling Parallel Programs to Message-Passing Systems Ishfaq Ahmad and Yu-Kwong Kwok Department of Computer Science The Hong Kong University of Science and Technology, Hong Kong Email: {iahmad, csricky}@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec8.ps, 19970606
COMP 104 Page 1 Topic 8 : streams n offers: get and put to read individual characters; end of file test eof; end of line eoln; the newline sign ; alarm sign a . n offers: ifstream infile; ofstream outfile, infile.open(), outfile.open(), infile.fail(), outfile.fail(),
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lab8.ps, 19970606
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1996 Lab of week 12 (your TA will demonstrate you a model solution at the end of the lab section) Write a function called merge_list that takes two call-by-reference arguments that are pointer variables that point to the
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lab7.ps, 19970606
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1997 Lab of week 11 (your TA will demonstrate you a model solution at the end of the lab section) Write a recursive function that has argument that is an array of characters and two arguments that are bounds on array
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec5.ps, 19970606
COMP 104 Page 1 Topic 5 : loops and scope of variables count_star = 0; while (count_star < n) { cout << * ; count_star++; for (count_star = 0; count_star < n; count_star++) cout << * ; count_star = 1; do{ cout << * ; count_star++; } while (count_star < n); COMP 104 Page 2 while statement #include
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lab5.ps, 19970606
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1996 Lab of week 8 (your TA will demonstrate you a model solution at the end of the lab section) Another approach to sorting an array is to create an index array, where the index is an array whose element values represent
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lab4.ps, 19970606
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1997 Lab of week 5 (your TA will demonstrate you a model solution at the end of the lab section) Write a program to read in a string of characters that represent a Roman numeral and then convert it to Arabic form (an
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lab6.ps, 19970606
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1997 Lab of week 9 (your TA will demonstrate you a model solution at the end of the lab section) Define a class or a type called counterType. An object of this type is used to count things, so it records a count that is a
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec6.ps, 19970606
COMP 104 Page 1 Topic 6 : Parameters #include void main () { void enter(int&, int&); void swap (int&, int&); void print(int, int); int n1, n2; enter(n1, n2); swap(n1,n2); print(n1,n2); void enter(int& x, int& y) { cout << endl << Enter two numbers> ; cin >> x >> y; } void swap (int& i, int&
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec7.ps, 19970606
COMP 104 Page 1 Topic 7 : miscellaneous n From we get INT_MAX, INT_MIN, LONG_MAX, SHRT_MAX, n From we get tolower(c), isdigit(c), isspace(c), isupper(c), ... n Complements: next == A || next == a next != A && next != a n % m == 0 && flag n % m || !flag n Suppose x is float, i is
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec3.ps, 19970606
COMP 104 Page 1 Topic 3 : functions n functions are subprograms used for stepwise refinement n functions must be defined outside other functions, hence prototypes needed. // File: drawFig.cc; #include void main () { // declarations of function prototypes void draw_circle (); void
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec4.ps, 19970606
COMP 104 Page 1 Topic 4 : logical expressions, if and switch n logical operators: <, <=, >, >=, ==, != n logical connectives: &&, ||, ! n Note that zero means FALSE and nonzero means TRUE (salary < min_salary) || (number_dependents > 5); (temperature > 90.0) && (humidity > 90.0); !(x == y); !((salary <
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec15.ps, 19970606
COMP 104 Page 1 Topic 15 : friend functions and inheritance int global_counter = 0; class account public: friend int equal(account, account); account(); double get_amount(); private: double amount; int number; account::account() { amount=0; number = global_counter; global_counter++; } double
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec12.ps, 19970606
COMP 104 Page 1 Topic 12 :recursion n A procedure or function is said to be recursive if it calls itself. function rec_fun() rec_fun(); function rec_fun(int n) if (n = 0) return ...; else rec_fun(n-1); COMP 104 Page 2 void write_vertical(int x) if (x < 10) cout << x << endl; else write_vertical(x/10);
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lab3.ps, 19970606
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1997 Lab of week 4 (your TA will demonstrate you a model solution at the end of the lab session) Write a program to gauge the rate of inflation for the past year. The program asks for the price of an item (such as a
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec2.ps, 19970606
COMP 104 Page 1 Topic 2 : basics n variables are of type float, int, char, short int, long int, double, long double n constants: const n I/O: cin and cout n #include n reserved words such as return and special symbols such as ; n identifiers n assignment statements, expressions & operators
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec14.ps, 19970606
COMP 104 Page 1 Topic 14 : dynamic data structure n Dynamic data structures grow and shrink while running the program. n Dynamic data structures are manipulated via pointers, and operators new and delete. n p = new float; a new variable of type float is created to which p now points. With new created
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lab2.ps, 19970606
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1997 Lab of week 3 (your TA will demonstrate you a model solution at the end of the lab section) Write a program that will calculate and print out bills for the Hong Kong water company. The water rates vary depending on
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec9.ps, 19970606
COMP 104 Page 1 Topic 9 : arrays, searching and sorting n float x; n An array type is a structured data type representing a regular structure of components of the same type. n One-dimensional array: n x = 8.8; x = x; cout << x; n enum logical
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lab1.ps, 19970606
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1997 Lab of week 2 (your TA will demonstrate you a model solution at the end of the lab session) Write a program that reads in the length and width of a rectangular yard and the length and width of a rectangular house
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec17.ps, 19970606
COMP 104 Page 1 Chapter 17 : more on OO program design First way: void main()
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec16.ps, 19970606
COMP 104 Page 1 Topic 16 : templates n templates can be used to parameterize (there may be more than one parameter) classes, and functions. n classes: template class c_name ..};
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec13.ps, 19970606
COMP 104 Page 1 Topic 13 : pointers int x = 1, y = 2, z; int *ip; // *ip is int, so ip is a pointer to int ip = &x; // ip points to x // & gives the location where x is stored // *ip is now the same as x y = *ip; // y is now 1 *ip = 0; // x is now 0 ip = &z; // ip now points to z COMP 104 Page
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec11.ps, 19970607
COMP 104 Page 1 Topic 11 : classes, abstract data types class bankAccount { public: double get_balance(); void set_balance(double); private: double balance; double bankAccount::get_balance() { return balance; } void bankAccount::set_balance(double x) { balance = x; } void main () { bankAccount
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec10.ps, 19970607
COMP 104 Page 1 Topic 10 : strings and structures n char name; cin >> name; // user types Beat n One-dimensional array: n char name = Beat W ; n cout << name << endl; n provides functions such as strcpy(name, B. Wuth ); strcmp(s1,s2); 1 2 3 4 5 6 7 8 9 B e a t 0 COMP 104 Page 2
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/papers/cut.ps.Z, 19970617
Applications of the Situation Calculus To Formalizing Control and Strategic Information: The Prolog Cut Operator Fangzhen Lin (flin@cs.ust.hk) Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/papers/cutl.ps.Z, 19970617
Applications of the Situation Calculus To Formalizing Control and Strategic Information: The Prolog Cut Operator Fangzhen Lin (flin@cs.ust.hk) Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/papers/ijcai97l.ps.Z, 19970617
Applications of the Situation Calculus To Formalizing Control and Strategic Information: The Prolog Cut Operator Fangzhen Lin (flin@cs.ust.hk) Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/flin/papers/ordergelfondl.ps.Z, 19970617
An Ordering on Subgoals for Planning Fangzhen Lin Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong fl@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/pgs-pdcs97-camera.ps.gz, 19970624
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/pgs-pdcs97.ps.gz, 19970624
open this document and view contentsftp://ftp.cs.ust.hk/pub/kamal/mate.ps, 19970703
Algorithms for Materialized View Design in Data Warehousing Environment Jian Yang School of Computer Science University College, UNSW Australian Defence Force Academy Canberra ACT 2600, Australia. jian@csadfa.cs.adfa.oz.au Kamalakar Karlapalem Dept of Computer Science Univ. of Science & Technology Clear
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/97/tr97-4.ps.gz, 19970705
Motion Compensated Color Image Classification and Parameter Estimation in a Markovian Framework Zoltan Kato , Ting-Chuen Pong , and John Chung-Mong Lee Technical Report HKUST-CS97-04 May 1997 Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/96/tr96-16.ps.gz, 19970713
Video Annotation by Motion Interpretation using Optical Flow Streamsy G. Sudhir and John C.M. Lee Technical Report HKUST-CS96-16 July 13, 1997 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yThis research was supported by Sino
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/97/tr97-5.ps.gz, 19970721
A neural model of contour integration in the primary visual cortex y Zhaoping Li Technical Report HKUST-CS97-5 July 21, 1997 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yI thank Jochen Braun for introducing me to the topic and
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/97/tr97-11.ps.gz, 19970725
Primary Cortical Dynamics for Visual Grouping y Zhaoping Li Technical Report HKUST-CS97-11 July 26, 1997 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yI thanks Peter Dayan for many conversations and discussions. This work was
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/info.ps, 19970730
HKUST Computer Science Comp104: Computer Fundamentals & Programming Fall Semester, 1997 Course Information Instructor Dr. B. Wuthrich Dr. D.Y. Yeung email: beat@cs.ust.hk email: dyyeung@cs.ust.hk office: 3518 office: 3541 Instructor Lecture notes and labs also available via
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/lec1.ps, 19970804
COMP 104 Page 1 Topic 1: Overview of Computers and Programming n Computer organization n Data representation & coding schemes n Programming languages n Programming COMP 104 Page 2 MULTILEVEL STRUCTURED ORGANIZATION OF A COMPUTER SYSTEM Human level Programming language level Assembly language level
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/97/tr97-2.ps.gz, 19970807
Automatic Classification of Tennis Video for High-level Content-based Retrievalz G. Sudhir , John C. M. Lee , and Anil K. Jainy Technical Report HKUST-CS97-2 August 7, 1997 Department of Computer Science The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong yDepartment
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/roadmap.ps, 19970829
A Road Map Through Nachos Thomas Narten Department of Computer Sciences Levine Science Research Center Duke University Box 90129 Durham, N.C. 27708-0129 narten@cs.duke.edu January 4, 1995
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/A4lect1.ps, 19970830
COMP 252 INTRODUCTION 1 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. COMP 252 PRINCIPLES OF SYSTEMS SOFTWARE FALL 1997 COMP 252 INTRODUCTION 2 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. Course Outline 1. Introduction 1.1.Basic Concepts 1.2.History of Operating Systems
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/lect1.ps, 19970830
COMP 252 INTRODUCTION 1 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. COMP 252 PRINCIPLES OF SYSTEMS SOFTWARE FALL 1997 COMP 252 INTRODUCTION 2 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. Course Outline 1. Introduction 1.1.Basic Concepts 1.2.History of Operating Systems
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/lect2.ps, 19970901
COMP 252 INTRODUCTION 25 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. COMPUTER SYSTEM STRUCTURES (Hardware Support for Operating System) COMP 252 INTRODUCTION 26 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. Computer System Structure The I/O devices and CPU can execute
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/lect3.ps, 19970901
COMP 252 INTRODUCTION 41 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. Operating System Services The OS provides the following services to programs and the users of the programs: - Program execution - I/O operations - File-system manipulation - Communications - Error detection The following
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/A4lect2.ps, 19970901
COMP 252 INTRODUCTION 25 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. COMPUTER SYSTEM STRUCTURES (Hardware Support for Operating System) COMP 252 INTRODUCTION 26 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. Computer System Structure The I/O devices and CPU can execute
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/A4lect3.ps, 19970901
COMP 252 INTRODUCTION 41 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. Operating System Services The OS provides the following services to programs and the users of the programs: - Program execution - I/O operations - File-system manipulation - Communications - Error detection The following
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/A4lect4.ps, 19970902
COMP 252 PROCESSES AND THREADS 1 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. PROCESSES AND THREADS COMP 252 PROCESSES AND THREADS 2 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. Process Concepts A process is a program in execution A process is an operating system abstraction
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/dood97.ps.gz, 19970902
A DATA MINING ALGORITHM OPTIMAL FOR SINGLE RULES K. Jim, J. Lai, B. W thrich The Hong Kong University of Science and Technology Clear Water Bay Kowloon, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/lect4.ps, 19970902
COMP 252 PROCESSES AND THREADS 1 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. PROCESSES AND THREADS COMP 252 PROCESSES AND THREADS 2 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. Process Concepts A process is a program in execution A process is an operating system abstraction
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/A4/pfast-pact97.ps.gz, 19970903
open this document and view contentsftp://ftp.cs.ust.hk/pub/csricky/PFAST-pact97-camera.fm5.ps.gz, 19970903
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp361/Lecture1.ps, 19970903
COMP 561/300S (Fall 1997) Introduction 1 Bo Li COMP 561/300S: High- Speed Networking Bo Li Department of Computer Science HKUST Note: http://www.cs.ust.hk/faculty/bli/comp561.html COMP 561/300S (Fall 1997) Introduction 2 Bo Li Topics History of Communication Networks Networking Principles Future
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp561/Lecture1.ps, 19970903
COMP 561/300S (Fall 1997) Introduction 1 Bo Li COMP 561/300S: High- Speed Networking Bo Li Department of Computer Science HKUST Note: http://www.cs.ust.hk/faculty/bli/comp561.html COMP 561/300S (Fall 1997) Introduction 2 Bo Li Topics History of Communication Networks Networking Principles Future
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/lect5.ps, 19970903
COMP 252 PROCESSES AND THREADS 17 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. Threads Traditionally the address space and the execution stream were tightly coupled so that each address space can have only one execution stream associated with it Why not decouple the two The resulting
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/A4lect5.ps, 19970903
COMP 252 PROCESSES AND THREADS 17 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. Threads Traditionally the address space and the execution stream were tightly coupled so that each address space can have only one execution stream associated with it Why not decouple the two The resulting
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/lect6.ps, 19970905
COMP 252 THREAD AND PROCESS COORDINATION 1 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. THREAD AND PROCESS COORDINATION COMP 252 THREAD AND PROCESS COORDINATION 2 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. Independent and Cooperating Threads A thread is considered independent
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp561/Lecture2.ps, 19970905
COMP 561/300S (Fall 1997) Introduction 25 Bo Li Future Networks INTERNET cheap, low bit rate, delay-insensitive service real-time, high speed, delay-sensitive one backbone link upgrade (155 or 622 Mbps) QoS guaranteed network layer protocol (IPv6) +Advantages: Large installed base Backward compatibility
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/A4lect6.ps, 19970905
COMP 252 THREAD AND PROCESS COORDINATION 1 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. THREAD AND PROCESS COORDINATION COMP 252 THREAD AND PROCESS COORDINATION 2 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. Independent and Cooperating Threads A thread is considered independent
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/overview.ps, 19970908
Nachos: Not Another Completely Heuristic Operating System Tom Anderson Computer Science 162 January 24, 1993 Project Overview I hear and I forget, I see and I remember, I do and I understand." | Chinese proverb The project for this course is to build an operating system from scratch. We believe that
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/c++.ps, 19970908
A Quick Introduction to C++ Tom Anderson based on an earlier version written by Wayne Christopher August 30, 1995 If programming in Pascal is like being put in a straightjacket, then programming in C is like playing with knives, and programming in C++ is like juggling chainsaws." Anonymous. 1
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/lect7.ps, 19970909
COMP 252 THREAD AND PROCESS COORDINATION 13 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. The Critical Section A set of asynchronous concurrent processes/threads may access shared data in an arbitrarily interleaved manner This arbitrary interleaving of executions may result in inconsistent
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/A4lect7.ps, 19970909
COMP 252 THREAD AND PROCESS COORDINATION 13 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. The Critical Section A set of asynchronous concurrent pro- cesses/threads may access shared data in an arbitrarily interleaved manner This arbitrary interleaving of executions may result in inconsistent
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/lect8.ps, 19970910
COMP 252 THREAD AND PROCESS COORDINATION 25 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. The Swap Instruction The swap instruction swaps the contents of two words atomically: procedure swap (var a,b: boolean); var temp: boolean; begin temp:= a; a:= b; b:= temp; end; The swap instruction is
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp561/Intro.ps, 19970910
COMP 561/300S (Fall 1997) Introduction 1 Bo Li COMP 561/300S: High- Speed Networking Bo Li Department of Computer Science HKUST Note: http://www.cs.ust.hk/faculty/bli/comp561.html COMP 561/300S (Fall 1997) Introduction 2 Bo Li Topics History of Communication Networks Networking Principles Future
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp561/Lecture3.ps, 19970910
COMP 561/300S (Fall 1997) Introduction 44 Bo Li Networking Mechanisms Objectives: Share resources Improve performance (e.g., high prior ity (small delay), low priority (high delay); High throughput, etc. TV = shared link Ether net Token Ring Coax modem Central office Bridge COMP 561/300S (Fall 1997)
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/A4lect8.ps, 19970910
COMP 252 THREAD AND PROCESS COORDINATION 25 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. The Swap Instruction The swap instruction swaps the contents of two words atomically: procedure swap (var a,b: boolean); var temp: boolean; begin temp:= a; a:= b; b:= temp; end; The swap instruction is
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C88.ps, 19970912
Design of Protocols in Timed CSP for Highly Reliable and Available Client{Server System Noriki OGURA Nihon Unisys, Ltd. Tokyo Bay Development Center 1-10-9 Shinonome, Koto, Tokyo 135, JAPAN. Noriki.Ogura@unisys.co.jp Keizo SAISHO, Akira FUKUDA Graduate School of Information Science, Nara Institute of
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/C1.ps, 19970912
1 Software Metrics and Application Domain Complexity Wei Li and Harry Delugach Computer Science Department The University of Alabama in Huntsville Huntsville, AL 35899 {wli, delugach}@cs.uah.edu
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/C7.ps, 19970912
Integration Of Application Systems By Modelling Information Shared Among Applications Parames Ghosh George Feuerlicht ALLTEL International Resource Management, Inc. School Of Computing Sciences Level 4, 223-239, Liverpool Road, Ashfield University of Technology, Sydney NSW 2131; Australia P.O. Box 123,
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C67.ps, 19970912
Multi-Plan Attribute Grammars WUU YANG Department of Computer and Information Science National Chiao-Tung University Hsin-Chu, Taiwan, R.O.C. wuuyang@cis.nctu.edu.tw
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/T52.ps, 19970912
Component-Based Software Development A New Paradigm in Software Engineering Wolfgang Pree University of Constance Universit tsstr. 10 D-78457 Constance, Germany +49-7531-88-44-33 pree@acm.org
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C49.ps, 19970912
Client Location Tracking with K-Step Prediction and Cache Policy in Ubiquitous Information Service Network Jang, Hung-Chin (jang@cs.nccu.edu.tw), Lien, Yao-Nan (lien@cs.nccu.edu.tw) Dept. of Computer Science, National Cheng-Chi University, Taipei, Taiwan, R.O.C. Huang, Jyh-Shyan (frank@cs.nccu.edu.tw)
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T70.ps, 19970912
The Development of an Object-Oriented, Discrete-Event Simulation Language Using Java. Dr. Peter Martin Department of Computing University of the West of England UK (e-mail peter.martin@csm.uwe.ac.uk)
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C78.ps, 19970912
An Architecture and a Framework for IP Applications Masami Noro, Kunio Goto Department of Information Systems & Quautiative Sciences Nanzan University 18 Yamazato-cho Shouwa-ku Nagoya Aichi 466 Japan masami@iq.nanzan-u.ac.jp, goto@iq.nanzan-u.ac.jp
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C102.ps, 19970912
Detecting Common Mode Failures in N-Version Software Using Weakest Precondition Analysis Gwang Sik Yoon, Sung Deok Cha, and Yong Rae Kwon Department of Computer Science Korea Advanced Institute of Science and Technology 373-1, Kusong-dong, Yusong-gu, Taejon 305-701, Korea fgsyoon,cha,yrkwong@
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T68.ps, 19970912
TPAL : A Timed-Probabilistic Model for Concurrent Processes Antonio Bueno Valent n Valero Fernando Cuartero Departamento de Inform atica Escuela Polit ecnica de Albacete Univ. de Castilla-La Mancha Campus Univ. s/n. 02071. Albacete, Spain. fabueno, valentin, fernandog@info-ab.uclm.es
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/C14.ps, 19970912
LOODS: a new learning-based object-oriented system development environment Qi Deyu (Dept. of Computer, South China University of Technology, Guangzhou, 510641, P.R. CHINA email: csqideyu@scut.edu.cn)
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/T71.ps, 19970912
Not Whether Java but How Java Chris Wallace & Peter Martin Department of Computing University of the West of England UK (e-mails chris.wallace & peter.martin@csm.uwe.ac.uk)
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C82.ps, 19970912
A Methodology for Object-Oriented Constraint Programming Hon Wai Chun Department of Electronic Engineering, City University of Hong Kong, Tat Chee Avenue, Kowloon, Hong Kong email: eehwchun@cityu.edu.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T33.ps, 19970912
Scenario Reuse: A Technique for Complementing Scenario-Based Requirements Engineering Approaches W. Lam Department of Computer Science, The University of Hertfordshire Hatfield, Herts AL10 9AB, UK. Tel: +44 01707 284337, Fax: +44 01707 284303 E-mail: W.Lam@herts.ac.uk
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T40.ps, 19970912
MetaBuilder: a Generic CASE Tool Builder Maokai Gong, Louise Scott, and Ray Offen CSIRO-Macquarie University Joint Research Center for Advanced Systems Engineering Macquarie University, Sydney, NSW 2109, Australia e-mail: gmk@mpce.mq.edu.au
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/C28.ps, 19970912
A Visual Programming Environment for Z Specifications Stephen W C Lam, Keith C C Chan, Hareton K N Leung and Lawrence M L Chung Department of Computing, The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong. Email: cswclam / cskcchan / cshleung@comp.polyu.edu.hk Tel: (852) 2766 7265 Fax:
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/tutorial_summary/TS2.ps, 19970912
Design Patterns Essentials, Experience, Java Case Study Wolfgang Pree University of Constance Universit tsstr. 10 D-78457 Constance, Germany +49-7531-88-44-33 pree@acm.org Hermann Sikora RACON Software, Inc. Goethestr. 80 A-4020 Linz, Austria +43-70-6929-213 lrzgsik@grz-linz.raiffeisen.at
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/T57.ps, 19970912
Exploiting the Advantages of Object Oriented Programming in the Implementation of a Database Design Environment Nigel Stanger and Richard Pascoe Department of Information Science, University of Otago, Dunedin, New Zealand
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C22.ps, 19970912
Criticality Prediction Models using SDL Metrics Set Euy-Seok Hong and Chi-Su Wu Department of Computer Science Seoul National University Shinlim-Dong, Kwanak-Gu, Seoul, Korea, 151-742 e-mail: hes@drum.snu.ac.kr, wuchisu@selab.snu.ac.kr
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/T54.ps, 19970912
An Overview of Legacy Information System Migration Jesus Bisbal, Deirdre Lawless, Ray Richardson1, D O Sullivan2, Bing Wu, Jane Grimson, Vincent Wade Broadcom ireann Research, Computer Science Department, Dublin, Ireland. Trinity College, Dublin, Ireland. Email: 1 : rr@broadcom.ie Email:
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C21.ps, 19970912
'22' 6HUYHU &HQWUDO 5HSRVLWRU &RPPXQLFDWLRQ 6HUYHU '22' &OLHQW 5HSRVLWRU 6HUYHU 7UDQVDFWLRQ 0DQDJHU &RPPXQLFDWLRQ &OLHQW 6KDUHG 6FUDWFKSDG /RFDO 5HSRVLWRU 2EMHFW 0RGHOOHU 'QDPLF 0RGHOOHU )XQFWLRQDO 0RGHOOHU '22' &OLHQW &RPPXQLFDWLRQ &OLHQW 6KDUHG 6FUDWFKSDG /RFDO 5HSRVLWRU 2EMHFW 0RGHOOHU 'QDPLF
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T90.ps, 19970912
A Theory of Interactions and Scenes for User Centered Systems Specification and Verification Alberto Faro Daniela Giordano Istituto di Informatica e Telecomunicazioni Education Department, Graduate Program in Facolt di Ingegneria, Universit di Catania Educational Technology, Concordia University viale
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/T98.ps, 19970912
A Z Specification of Use Cases: A Preliminary Report Greg Butler Peter Grogono Department of Computer Science Concordia University Montr eal, Qu ebec, H3G 1M8 Canada Email: fgregb,grogonog@cs.concordia.ca Ferhat Khendek Dept of Electrical and Computer Engineering Concordia University Montr eal, Qu ebec,
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/C9.ps, 19970912
Software Requirements Definition for Specification Database Atsushi OHNISHI Department of Computer Science, Ritsumeikan University Shiga 525-77, JAPAN
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T66.ps, 19970912
Cognitive De ciencies in Software Library Design Steven Atkinson Software Veri cation Research Centre School of Information Technology The University of Queensland, Australia S.Atkinson@it.uq.edu.au
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T81.ps, 19970912
Possum: An Animator for the SUM Specification Language Daniel Hazel Paul Strooper Owen Traynor Software Verification Research Centre, School of Information Technology The University of Queensland, Brisbane, Qld. 4072, Australia email: odin, pstroop, owen@it.uq.edu.au
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C72.ps, 19970912
On the Criteria of Allocating Test Cases under Uncertainty T. Y. Chen and Y. T. Yu Department of Computer Science University of Melbourne Parkville 3052, Australia E-mail: ftyc,ytyg@cs.mu.oz.au
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp561/Lecture4.ps, 19970912
COMP 561/300S (Fall 1997) Fast Circuit Switching 1 Bo Li Topics SONET Narrow-band ISDN Intelligent Networks COMP 561/300S (Fall 1997) Fast Circuit Switching 2 Bo Li SONET (Synchronous Optical NETwork) SONET, as an ITU standard, is being deployed in the telephone network by various telephone companies,
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C19.ps, 19970912
A Reverse Engineering Method and Experiences for Industrial COBOL System Ikuyo Nagaoka Institute of Advanced Business Systems, Hitachi, Ltd. 2-2 Kagahara, Tsuzuki, Yokohama, Kanagawa 224, Japan ikuyo@iabs.hitachi.co.jp Daisuke Ikeo, Toshinori Nagashima Information Technology Center, Kawasaki Steel
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T46.ps, 19970912
Finite Symbolic Reachability Graphs for High-Level Petri Nets Nabil Hameurlain, Christophe Sibertin-Blanc CERISS, IRIT Universit Toulouse 1, Place Anatole France, 31042 Toulouse France E-mail: {nabil, sibertin}@{univ-tlse1, irit}.fr
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C65.ps, 19970912
A Test-case Generation Method for Concurrent Programs Including Task-types Tetsuro Katayama Graduate School of Information Science, Nara Institute of Science and Technology. 8916-5 Takayama Ikoma, Nara 630-01, Japan. kat@is.aist-nara.ac.jp Zengo Furukawa Educational Center for Information Processing,
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C100.ps, 19970912
Compacting Regression-Suites On-The-Fly Erez Buchnik1, Applied Materials Dr. Shmuel Ur, IBM Haifa Research Lab Email: erez@amil.co.il Email: sur@vnet.ibm.com 1 This work was done by the first author, under the supervision of the second author, as part of the requirements for a degree in the Technion,
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C64.ps, 19970912
Measuring Class Coupling and Cohesion: A Formal Metamodel Approach Simon Moser CSSE/COTAR Swinburne University of Technology 1 John St., Hawthorn Vic 3122 Australia moser@acm.org Vojislav B. Mi si c The Hong Kong University of Science and Technology Clear Water Bay, Kowloon Hong Kong vmisic@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T96.ps, 19970912
Integrating Safety Analysis and Requirements Engineering Gerald Kotonya, Ian Sommerville, Computing Department, Computing Department, Lancaster University, Lancaster University, Lancaster LA1 4YR, UK Lancaster LA1 4YR, UK gerald@comp.lancs.ac.uk is@comp.lancs.ac.uk
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C110.ps, 19970912
A Formal Operational Semantics for SOFL Chris Ho-Stuart School of Computing Science Queensland University of Technology GPO Box 2434, Brisbane 4001, Australia hostuart@fit.qut.edu.au Shaoying Liu Faculty of Information Science Hiroshima City University Asaminami-ku, Hiroshima, 731-31, Japan
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T43.ps, 19970912
HKBCN - A Hybrid Intelligent System for Knowledge Revising Xinyu Wu and John G. Hughes School of Information and Software Engineering University of Ulster at Jordanstown Co. Antrim BT37 0QB, N. Ireland Telephone: +44 (0)1232 368157, Fax: +44 (0)1232 366803 Email: w.xinyu, jg.hughes@ulst.ac.uk
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T58.ps, 19970912
Translating Object-Z Specifications to Object-Oriented Test Oracles Jason McDonald, Leesa Murray and Paul Strooper Software Verification Research Centre School of Information Technology The University of Queensland, St Lucia, Qld, 4072, Australia email: jasonm, leesam, pstroop@it.uq.edu.au
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T91.ps, 19970912
About the Suitability of Petri Nets for Describing, Validating and Evaluating SA-RT Speci cations Adel Benzina, Mario Paludetto and Jer ome Delatour LAAS-CNRS. 7, Av du Colonel Roche, F-31077 Toulouse Cedex 4. France. Tel:(33) 561 33 62 60. Fax: (33) 561 33 69 36. fbenzina,mario,delatourg@laas.fr
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C101.ps, 19970912
$Q $SSURDFK WR 6RIWZDUH 3URFHVV 0DQDJHPHQW %DVHG RQ )RUPDO 3URFHVV 0RGHOLQJ DQG $QDOVLVfl 6DQJ
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T97.ps, 19970912
Specifying the UQ editor user-interface with Object-Z Andrew Hussey and David Carrington Software Verification Research Centre School of Information Technology The University of Queensland Brisbane, Qld, 4072, Australia email: fahussey,davecg@it.uq.edu.au
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C103.ps, 19970912
Software Development as a Work ow Process Daniel K.C. Chan INRIA - Rocquencourt Domaine de Voluceau, B.P. 105 78153 Le Chesnay Cedex, France Daniel.Chan@inria.fr Karl R.P.H. Leung Department of Computing Hong Kong Polytechnic University Hunghom, Hong Kong cskleung@comp.polyu.edu.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C3.ps, 19970912
Conditional Evaluation in Simple Multi-Visit Attribute-Grammar Evaluators WUU YANG Department of Computer and Information Science National Chiao-Tung University Hsin-Chu, Taiwan, R.O.C. wuuyang@cis.nctu.edu.tw
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T38.ps, 19970912
A Formal Model of Concurrency for Distributed Object-Oriented Systems Manuel Barrio and Pablo de la Fuente Department of Computer Science University of Valladolid 47011 Valladolid, Spain fmbarrio,pablog@infor.uva.es.
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C18.ps, 19970912
A Tool-Suite for Reachability Analysis of Concurrent Object-Oriented Programs Sridhar Iyer S. Ramesh Department of Computer Science and Engineering Indian Institute of Technology, Bombay, INDIA. e-mail: fsri,rameshg@cse.iitb.ernet.in
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C69.ps, 19970912
Towards Constructing a Class Evolution Model Takako NAKATANI Tetsuo TAMAI !! Graduate School of Arts and Sciences University of Tokyo 3-8-1, Komaba, Meguro-ku, Tokyo 153, Japan tina@graco.c.u-tokyo.ac.jp, tamai@graco.c.u-tokyo.ac.jp Atsushi TOMOEDA Harumi MATSUDA SI Business Department, SRA Co., Ltd.
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C60.ps, 19970912
A Distributed Constraint-Based Search Architecture For Bus Timetabling and Duty Assignment Hon Wai Chun Department of Electronic Engineering, City University of Hong Kong, Tat Chee Avenue, Kowloon, Hong Kong email: eehwchun@cityu.edu.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C83.ps, 19970912
Software Engineering Research: A Methodological Analysis Franck XIA Business Information Systems University of Macao email: fbafx@umacap1.umac.mo
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/T87.ps, 19970912
Software Assisted Handover of Mobile Clients in Heterogeneous Wireless Computing Environments Edmond Sung and Arkady Zaslavsky Department of Computer Technology, Monash University 900 Dandenong Road, Caulfield East 3145, Vic, Australia Email: {ymsung, azaslavs}@broncho.ct.monash.edu.au Nowadays,
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T92.ps, 19970912
Modular Reasoning in Object-Z Alena Griffiths Software Verification Research Centre School of Information Technology University of Queensland, Australia. 4072 alena@it.uq.edu.au
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T37.ps, 19970912
Quality and Reuse in Industrial Software Engineering Greg Butler Department of Computer Science Concordia University Montreal, PQ H3G 1M8 Canada gregb@cs.concordia.ca
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T36.ps, 19970912
Reducing Uncertainties in Data Mining Yuhe Li and Haihong Dai Department of Computer Science The Queen s University of Belfast Belfast BT7 1NN N. Ireland, UK Telephone: 44-1232-274624 / 274620 Fax: 44-1232-683890 E-Mail: {y.h.li, h.dai}@qub.ac.uk
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T35.ps, 19970912
Using Extended Event Traces to Describe Communication in Software Architectures1 Manfred Broy, Christoph Hofmann, Ingolf Kr ger, Monika Schmidt Institut f r Informatik Technische Universit t M nchen D-80290 M nchen, Germany {broy, hofmannc, kruegeri, schmidtm}@informatik.tu-muenchen.de
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/C24.ps, 19970912
Conceptual Issues of an Object-Centered Process Model Makoto Matsushitay matusita@ics.es.osaka-u.ac.jp Makoto Oshitay oshita@ics.es.osaka-u.ac.jp Hajimu Iidaz iida@itc.aist-nara.ac.jp Katsuro Inouey inoue@ics.es.osaka-u.ac.jp yOsaka University Dept. of Information and Computer Sciences Faculty of
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T42.ps, 19970912
Discovery of Cases for Case-Based Reasoning in Engineering Haihong Dai Department of Computer Science Queen's University of Belfast BELFAST BT7 1NN N. Ireland, UK Telephone: +44 (0)1232 274620 Fax: +44 (0)1232 683890 Email: h.dai@qub.ac.uk
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T55.ps, 19970912
Legacy Systems Migration - A Method and its Tool-kit Framework Bing Wu, Deirdre Lawless, Jesus Bisbal, D O Sullivan1, Ray Richardson2 Jane Grimson, Vincent Wade Broadcom ireann Research, Computer Science Department, Dublin, Ireland. Trinity College, Dublin, Ireland. Email: 1 : dosullivan@ broadcom.ie;
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T85.ps, 19970912
Mapping Ada Source Code into an Abstract Program Space Paul A. Bailes, Paul Burnim, Murray Chapman Centre for Software Maintenance, School of Information Technology The University of Queensland QLD 4072, AUSTRALIA E-Mail: paul@it.uq.edu.au
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T107.ps, 19970912
A Design Framework for System Re-engineering X. Liu, Z. Chen, H. Yang and H. Zedan Software Technology Research Laboratory De Montfort University, England William C. Chu Department of Information Engineering Feng Chia University Taiwan
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T53.ps, 19970912
Petri Nets Based Proofs of ADA 95 solution for Preference Control K.Barkaoui, C.Kaiser and J.F. Pradat-Peyre Conservatoire National des Arts et M etiers Laboratoire CEDRIC barkaoui@cnam.fr, kaiser@cnam.fr, peyre@cnam.fr
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T44.ps, 19970912
Design by Contract for Python Reinhold Pl sch Ch. Doppler Laboratory for Software Engineering Johannes Kepler University of Linz Altenbergerstr. 69, A-4040 Linz, Austria ploesch@swe.uni-linz.ac.at
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C76.ps, 19970912
Denotational Semantics for JSD W. Lok Yeung Department of Computer Studies Lingnan College, Hong Kong Email: wlyeung@ln.edu.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/project1.ps, 19970913
COMP 252 Principles of Systems Software, Fall 1997 Nachos Project #1: Build a thread system Due: Oct. 06, 1997 6:00 pm. In this project, we give you part of a working thread system; your job is to complete it, and then to use it to solve two synchronization problems. The first step is to read and
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/tutorial_summary/TS3.ps, 19970915
OPEN-MeNtOR: A Third Generation OO Methodology Advanced Tasks and Techniques Paul A. Swatman Centre for Information Systems Research School of Information Technology Swinburne University of Technology PO Box 218, Hawthorn Australia 3122
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T63.ps, 19970915
Slicing Object-Oriented Programs Jiun-Liang Chen* Feng-Jian Wang* Yung-Lin Chen+ *Department of Computer Science and Information Engineering National Chiao Tung University, Hsinchu, Taiwan +Software Engineering Laboratory Institute for Information Industry, Taipei, Taiwan
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/invited_paper/IP2.ps, 19970915
Keynote Address Observations Regarding Internet and Intranet Technology Bruce Shriver Genesis 2, Inc. and The University of Tromso, Tromso, Norway The distributed computing landscape is changing dramatically around us -- from plug-ins to applets, from fat clients to thin clients, from uniprocessor
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/invited_paper/IP1.ps, 19970915
Keynote Address Who will build the digital systems Prof. Les Belady Head of North American R&D Operations, Mitsubishi Electric Corporation Over the last few decades Asia, particularly Japan, developed tremendous engineering capabilities in many industries, including that in Information Technology. More
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/invited_paper/IP3.ps, 19970915
Keynote Address Software Industry in Mainland China --- Opportunities and Problems Prof. Zhou, Xiling Beijing Information Technology institute Mainland China is not only the world's largest potential software market, but is also becoming a multi-billion dollar real market by the year of 2000. In the
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/tutorial_summary/TS4.ps, 19970915
Design and Implementation of Coordination and Workflow Management Technology Frank von Martial DeTeMobil GmbH, Bonn, author postal address: Gartenstrasse 80, D-53721 Siegburg, Germany
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/A4lect9.ps, 19970915
COMP 252 THREAD AND PROCESS COORDINATION 37 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. The Dining-Philosophers Problem Five philosophers sit around a common circular table and spend their time thinking and eating There is a chopstick between every two philosophers When a philosopher
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/lect9.ps, 19970915
COMP 252 THREAD AND PROCESS COORDINATION 37 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. The Dining-Philosophers Problem Five philosophers sit around a common circular table and spend their time thinking and eating There is a chopstick between every two philosophers When a philosopher
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/concise_paper/C80.ps, 19970915
An Approach To software Testability Measurement Jin-Cherng Lin, Szu-Wen Lin & Louis Huang Dept. of Computer Science and Engineering Tatung Institue of Technology Taipei 10451, Taiwan, R.O.C jclin@cse.ttit.edu.tw Tel: (02)592-5252 ext 3295
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/sol11.ps, 19970916
COMP272 Theory of Computation Fall Semester 1997 Homework 1 Solution Teacher Assistant : Lee Siu Shan, Stephen Session : 1A, 1B email : sslee@cs.ust.hk homepage : http://www.cs.ust.hk/ sslee Office hours : 14:00 - 16:00 (Wed) Q1 (a) true (b) false (c) true (d) true (e) true (f) true (g) false (h) true
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/Comp104/hwk1.ps, 19970918
HKUST 1 Computer Science HONG KONG UNIVERSITY OF SCIENCE & TECHNOLOGY COMP 104: Programming Fundamentals and Methods Fall Semester 1997 HOMEWORK ASSIGNMENT #1 Final program due on Oct 7, 1997 in class (hand-in procedure: put floppy disc with source code print out in an envelop carrying your name, your
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/tut2.ps, 19970918
COMP 272 Theory of Computation Fall Semester 1997 Teacher Assistant : Lee Siu Shan, Stephen session : 1A, 1B email : sslee@cs.ust.hk homepage : http://www.cs.ust.hk/ sslee Office hours : 14:00 - 16:00 (Wed) Tutorial 1 Halting problem is insolvable There does not exist a checker program that can take any
open this document and view contentsftp://ftp.cs.ust.hk/pub/techreport/97/tr97-13.ps.gz, 19970918
1 Department of Computer Science Hong Kong University of Science and Technology Clearwater Bay, Hong Kong http://www.cs.ust.hk/faculty/dimitris/bio.html 2 Dept. of Electrical and Computer Engineering National Technical University of Athens Zographou, Athens, Greece dinos@dbnet.ntua.gr 3 Action AID INRIA
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp561/Lecture5.ps, 19970919
COMP 561/300S (Fall 1997) Fast Circuit Switching 18 Bo Li ISDN (Integrated Services Digital Network) Narrowband ISDN provides digital services to users. The channels can be circuit switched or packet switched. Support of voice and non-voice applications using a limited set of standardized facilities.
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/lect12.ps, 19970919
COMP 252 CPU SCHEDULING 1 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. CPU SCHEDULING COMP 252 CPU SCHEDULING 2 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. CPU Scheduling Concepts While discussing batch systems, we realized that if programs are executed in a fixed sequence,
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/A4lect12.ps, 19970919
COMP 252 CPU SCHEDULING 1 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. CPU SCHEDULING COMP 252 CPU SCHEDULING 2 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. CPU Scheduling Concepts While discussing batch systems, we realized that if programs are executed in a fixed sequence,
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/T99.ps, 19970923
Genericity in Method Construction Veronique Plihon GECT Universit de Toulon et du Var BP 132 83957 La Garde Cedex, France plihon@univ-tln.fr Colette Rolland CRI Universit Paris I Sorbonne 17 rue de la Sorbonne 75005 Paris, France rolland@masi.ibp.fr
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/vldb.ps.gz, 19970923
Cumulative Updates S. M. Sripada European Computer-Industry Research Centre Arabellastrasse 17 81925 Munich, Germany sripada@ecrc.de B. W uthrich The Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong Kong beat@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/dood95Ws.ps.gz, 19970923
A Temporal and Probabilistic, Deductive and Object-Oriented Query Language B. W uthrich W.C. Tong K. Sankaran Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong beat@cs.ust.hk tongjo@oocl.com pskvi@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C104.ps, 19970923
Object-Oriented Web Application Architectures and Development Strategies Eun Sook Cho, Soo Dong Kim, Sung Yul Rhew Department of Computer Science Soong Sil University, Seoul, Korea escho@sel.soongsil.ac.kr, {sdkim,syrhew}@computing.soongsil.ac.kr Sang Duck Lee, Chang Kap Kim Systems Engineering Research
open this document and view contentsftp://ftp.cs.ust.hk/pub/lzhang/teach/272/quiz1.ps, 19970923
COMP 272 Theory of Computation March 7, 1997, Quiz One Name: E-mail: Student No: Tutorial: ffl Answer ALL questions. You are only required to write down the answers; you do not need to justify them. In questions 4 and 5 you only need to draw the state diagram of the DFA; you do not need to prove it is
open this document and view contentsftp://ftp.cs.ust.hk/pub/apsec/regular_paper/C13.ps, 19970923
JB-OODBT: An Object-Oriented Database Toolkit for JB/CASE Xu Xuebiao Gu Ning and Shi Baile Department of Computer Science Fudan University 220,Handan Rd,Shanghai,P.R.China,200433 E-mail: fxbxu,ngu,bshig@fudan.edu.cn
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/jiis.ps.gz, 19970923
On the Learning of Rule Uncertainties and their Integration into Probabilistic Knowledge Bases Beat W uthrich ECRC, Arabellastr. 17 D-8000 Munich 81, Germany e-mail: beat@ecrc.de
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp561/Circuit.ps, 19970924
COMP 561/300S (Fall 1997) Fast Circuit Switching 1 Bo Li Topics SONET Narrow-band ISDN Intelligent Networks Performance of Circuit-Switched Net- works COMP 561/300S (Fall 1997) Fast Circuit Switching 2 Bo Li SONET (Synchronous Optical NETwork) SONET, as an ITU standard, is being deployed in the
open this document and view contentsftp://ftp.cs.ust.hk/pub/bli/comp561/Lecture6.ps, 19970924
COMP 561/300S (Fall 1997) Fast Circuit Switching 30 Bo Li Performance of Circuit- Switched Network Circuit-switched network consists of switches interconnected by links, whose bandwidth or capacity is divided into fixed-rate circuits Call admission determines whether to admit or reject a incoming call
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/lpar.ps.gz, 19970924
Towards Probabilistic Knowledge Bases Beat W uthrich ECRC GmbH, Arabellastr. 17 D-8000 M unchen 81, Germany e-mail: beat@ecrc.de
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/frechDBconf.ps.gz, 19970924
On Consistency Checking in Deductive Databases 1 Beat W uthrich ECRC GmbH, Arabellastr. 17 D-8000 Munich 81, Germany e-mail: beat@ecrc.de phone: +49(89)92699-164
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/methIntSys.ps.gz, 19970924
CONSISTENT PREDICTION FOR CATEGORICAL DATA Vincent Cho and Beat Wuthrich The Hong Kong University of Science and Technology Department of Computer Science Clear Water Bay, Hong Kong Email: wscho@cs.ust.hk beat@cs.ust.hk
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/aigen.ps.gz, 19970924
Temporal Deductive Databases: Data Manipulation and Consistency Beat W uthrich Swiss Federal Institute of Technology, ETH-Zentrum 8092 Zurich, Switzerland e-mail: wuethrich@inf.ethz.ch
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/mathFunDBKB.ps.gz, 19970924
Semantic Improvement of Deductive Databases Beat W uthrich Institut f ur Informationssysteme Swiss Federal Institute of Technology (ETH) Zurich ETH-Zentrum, 8092 Zurich, Switzerland
open this document and view contentsftp://ftp.cs.ust.hk/pub/beat/infoSys.ps.gz, 19970924
Rule Discovery: Error Measures and Conditional Rule Probabilities Kenny Jim, Beat Wuthrich {csjsk,beat}@cs.ust.hk Hong Kong University of Science and Technology Clear Water Bay, Hong Kong
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/hw1.ps, 19970925
COMP 252 Principles of Systems Software, Fall 1997 Homework 1 Due Sep. 29, 1997 6:00 pm This assignment is meant to encourage you to think about the nachos implementation of threads and thread synchronization before you start to write any code of your own. There is no need to write or execute any
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/A4lect13.ps, 19970926
COMP 252 CPU SCHEDULING 17 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. SJF - Predicting Next CPU Burst We can use the past history of a process s CPU burst to predict the next CPU burst We predict the next CPU burst as an exponential average of the measured lengths of previous CPU bursts
open this document and view contentsftp://ftp.cs.ust.hk/pub/muppala/comp252/A4lect17.ps, 19970926
COMP 252 DEADLOCKS 1 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. DEADLOCKS COMP 252 DEADLOCKS 2 Copyright 1997 by Jogesh K. Muppala, All Rights Reserved. What is a Deadlock A process/thread is said to be in a state of deadlock if it is waiting for an event that will never occur A system in