TRADEOFF LOWER LOUNDS FOR STACK MACHINES

Størrelse: px
Starte visningen fra side:

Download "TRADEOFF LOWER LOUNDS FOR STACK MACHINES"

Transkript

1 comput. complex. c Springer Basel 2013 DOI /s computational complexity TRADEOFF LOWER LOUNDS FOR STACK MACHINES Matei David and Periklis A. Papakonstantinou Abstract. A space-bounded Stack Machine is a regular Turing Machine with a read-only input tape, several space-bounded read-write work tapes, and an unbounded stack. Stack Machines with a logarithmic space bound have been connected to other classical models of computation, such as polynomial-time Turing Machines (P) (CookinJ Assoc Comput Mach 18:4 18, 1971) and polynomial size, polylogarithmic depth, bounded fan-in circuits (NC) e.g., Borodin et al. (SIAM J Comput 18, 1989). In this paper, we present significant new lower bounds and techniques for Stack Machines. This comes in the form of a trade-off lower bound between space and number of passes over the input tape. Specifically, we give an explicit permuted inner product function such that any Stack Machine computing this function requires either Ω ( N 1/4 ɛ) space or Ω ( N 1/4 ɛ) number of passes for every constant ɛ>0, where N is the input size. In the case of logarithmic space Stack Machines, this yields an unconditional Ω ( N 1/4 ɛ) lower bound for the number of passes. To put this result in perspective, we note that Stack Machines with logarithmic space and a single pass over the input can compute Parity, Majority, as well as certain languages outside NC. The latter follows from Allender (J Assoc Comput Mach 36: , 1989), conditional on the widely believed complexity assumption that PSPACE EXP. Our technique is a novel communication complexity reduction, thereby extending the already wide range of models of computation for which communication complexity can be used to obtain lower bounds. Informally, we show that a k-player number-in-hand (NIH) communication protocol for a base function f can efficiently simulate a space- and pass-bounded Stack Machine for a related function F, which consists

2 2 David & Papakonstantinou cc (2013) of several permuted instances of f, bundled together by a combining function h. Trade-off lower bounds for Stack Machines then follow from known communication complexity lower bounds. The framework for this reduction was given by Beame & Huynh-Ngoc (2008), who used it to obtain similar trade-off lower bounds for Turing Machines with a constant number of pass-bounded external tapes. We also prove that the latter cannot efficiently simulate Stack Machines, conditional on the complexity assumption that E PSPACE. It is the treatment of an unbounded stack which constitutes the main technical novelty in our communication complexity reduction. Keywords. Turing Machine, stack, AuxPDA, lower bound, communication complexity, space bound, reversals, streaming. Subject classification. 68Q Introduction One of the goals of complexity theory is understanding the relative power of various models of computation. Consider the classes P and LOGSPACE of languages decided by deterministic Turing Machines (TMs) in polynomial time and logarithmic space, respectively. Also consider NC = i 0 NCi,whereNC i is the class of languages decided by (uniform) circuits of polynomial size and depth O ((log n) i ), consisting of bounded fan-in And, Or, and Not gates. We regard P and LOGSPACE as modeling efficient time-bounded and space-bounded computation, respectively, and we regard the class NC as modeling efficient parallelizable computation. We know that NC 1 LOGSPACE NC 2 NC i P, but we do not know whether any of the inclusions are proper. One possible way to attack the problem of separating complexity classes defined using different models of computation (e.g., Turing Machines, combinatorial circuits) and different resource bounds (e.g., time, space, size, depth) is to rephrase the problem as separations of classes based on a common computational model and a common resource bound and prove lower bounds for that common resource.

3 cc (2013) Tradeoff lower lounds for stack machines 3 Consider the problem of characterizing polynomial-time computation in terms of a space bound. We know that a logarithmic-space Turing Machine can be simulated by a polynomial-time Turing Machine, and we believe that the opposite is not true in general (i.e., that LOGSPACE P). Furthermore, we also believe that, for example, some polylogarithmic-space Turing Machine cannot be simulated by a polynomial-time Turing Machine. Thus, there seems to be no obvious way to exactly capture polynomial-time computation in terms of a space bound. A stack, also called a push-down store, models an unlimited storage space that comes with a Last-In First-Out access restriction. A Stack Machine (or SM for short) is a classical Turing Machine equipped with a push-down tape. Previous work (see e.g., Cook 1971) makes a distinction between a stack and a pushdown memory. In older works a stack is defined as a push-down memory with additional read-only access to its content. We do not make such a distinction here. For us a stack is what was known as a push-down store. In particular, we use the term Stack Machine to refer to what was previously known as deterministic auxiliary push-down automaton (or AuxPDA). A space bound for a Stack Machine refers exclusively to the size of its work tapes and not to its stack. In light of the previous paragraph, Cook (1971) gives a fascinating characterization of a time-bounded complexity class in terms of a space-bounded computational model, showing that the class of languages decided by logarithmic-space Stack Machines exactly equals that of languages decided by polynomial-time Turing Machines (P). It is not hard to show that there is no loss in computational power in assuming that a logarithmic space Stack Machine also operates in at most exponential (2 no(1) ) time (Ruzzo 1980). A series of subsequent results, for example, Allender (1989), Borodin et al. (1989), Ruzzo (1980, 1981), Venkateswaran (1991) establish a perhaps surprising connection between simultaneously space- and time-bounded Stack Machines and combinatorial circuits: nondeterministic logarithmic-space Stack Machines that run in time 2 O(logi n) precisely characterize SAC i, the extension of NC i in which Not gates are at the input level and we allow Or gates with

4 4 David & Papakonstantinou cc (2013) unbounded fan-in. Furthermore, denoting by SM(s, t) theclass of languages decided by deterministic Stack Machines operating in space s and time t, we now know that, for every integer i 1, ( NC i SM O(logn), 2 O((log n)i ) ) NC i+1 ( P = SM O(logn), 2 no(1)). In spite of the connections laid out above between Stack Machines and major open problems in computational complexity, this model is not well understood Our contribution. As the main contribution of this work, we provide involved new lower bounds and techniques specifically for Stack Machines, which significantly improve Brandenburg (1977). We do not know how to tackle time lower bounds directly. Instead, we consider the number of (two-way) passes a Stack Machine makes over its input. We assume that a Stack Machine has at least logarithmic space and, without losing generality, that in every pass, the input head moves from one end of the tape to the other. Sometimes this measure is also called reversal complexity, as the number of passes equals one plus the number of reversals. The lower bounds we prove come in the form of trade-off lower bounds between space and number of passes. Specifically, we give two examples of functions for which any Stack Machine requires either Ω ( N β) space or Ω ( N β) passes, for some β<1. In the case of logarithmic-space Stack Machines, this translates into unconditional Ω ( N β) lower bounds for the number of passes. Communication complexity has been used to derive lower bounds in a wide variety of other areas of theoretical computer science: cell probe complexity, VLSI circuit design, Turing Machine complexity, circuit complexity, pseudorandomness, algorithmic game theory, proof complexity, and streaming. Perhaps as important as its corollaries, our main technical contribution is to show that communication complexity can also be used to derive lower bounds for Stack Machines. Consider a base function f = f k,n :({0, 1} n ) k {0, 1} and a combining function h : {0, 1} m {0, 1} that is symmetric and has

5 cc (2013) Tradeoff lower lounds for stack machines 5 a neutral element (e.g., this is the case for OR and XOR, with neutral element 0). Let F = F k,m n :(({0, 1} n ) m ) k {0, 1} be a lifted function which consists, informally, of m instances of f on disjoint inputs, permuted in a way made precise in Section 3, and glued together by h. Our main technical contribution is the following reduction, saying that a k-player number-in-hand communication protocol for f can efficiently simulate a Stack Machine for F. Theorem 1.1. Let k = k(n) 2 be a non-decreasing function and let m = m(n) 1 be a non-decreasing function such that k m O(1).LetN = N(n) :=k m n. Lets = s(n) and r = r(n) be non-decreasing functions and let δ<1/2 be a constant. Let d := k r log r/ m. Let f = f k,n be a boolean base function, and let F = F N be a function related to f in the sense informally described above and made precise in Section 3. Assume there exists a randomized (even, nonuniform) Stack Machine for F with space bound s, pass bound r, and error δ. Then, there exists a k-player number-in-hand randomized protocol for f, withcosto(k r s log(k r)) anderroratmostδ +O(d). As a consequence of Theorem 1.1 andoftheknowncommunication complexity lower bound for the Inner Product function (Chor & Goldreich 1988), we obtain the following trade-off lower bound, which is the first of its kind. Corollary 1.2 (Informal statement). Let ɛ>0 and δ<1/2 be constants. There exists an inner product-like function F = F N LOGSPACE such that any Stack Machine computing F with error δ requires space s = ω ( N 1/4 ɛ) or passes r = ω ( N 1/4 ɛ). In particular, a log-space Stack Machine needs ω ( N 1/4 ɛ) passes to compute F. The l-th frequency moment of a sequence ā = (a 1,...,a t ), where a i [R], is Freq l (ā)= j [R] f l j,wheref j = {i [t] a i =j}. Computing Freq l is a well-studied problem in the streaming literaturealon et al. (1999). As another consequence of Theorem 1.1, we also obtain the following result, which can be interpreted as saying that a stack does not help in computing frequency moments.

6 6 David & Papakonstantinou cc (2013) Corollary 1.3. Let l>4, ɛ 0, andδ<1/2 be constants. There exists a constant 0 <β<1 such that any randomized Stack Machine computing a (1+ɛ) multiplicative approximation of Freq l with error δ requires space s = ω ( N β) or passes r = ω ( N β), where N denotes the input size. In particular, a log-space Stack Machine needs ω ( N β) passes to approximate Freq l. In fact, this corollary holds true even when the Stack Machine has read-write access to its input (but still the number of passes is bounded). For this result, we use a number-in-hand communication complexity lower bound for the promise Set Intersection function (Gronemeier 2009), along with a streaming reduction between the problems of computing the promise Set Intersection function and the frequency moments of a data stream, originating from Alon et al. (1999). Remark 1.4. Clearly, the number of passes is also a lower bound on the running time of a Stack Machine. If interpreted in this way, our method comes with an important limitation. Specifically, by using a reduction to communication complexity, it is not clear how to obtain any super-linear lower bounds, because the communication complexity of any function is at most linear. Still, as explained in Section 7, Stack Machines with logarithmic space and few passes over the input are quite powerful, so a lower bound on passes can be seen as interesting in its own right. Remark 1.5. Some of the technical effort in our proofs is directed toward dealing with Stack Machines that have two-way rather than one-way access to their input tape. We point out that these restrictions are polynomially, but super-linearly, related: A Turing Machine (with or without a stack) that makes r(n) two-way passes over an input of size N can be simulated by a similar Turing Machine M that makes N r(n) one-way passes. However, the method presented in this work can only derive lower bounds of the form r(n) Ω(N α ) for some 0 <α 1. Therefore, we cannot use our current methods to first prove lower bounds for one-way

7 cc (2013) Tradeoff lower lounds for stack machines 7 access and then transfer them to two-way access using the simple argument above Related work. Turing Machines with limited reversals have been studied before, e.g., Chen & Yap (1991). However, in that line of work, reversals are bounded on all tapes. By comparison, the Stack Machines we consider are significantly more powerful, because reversals are unbounded on both their space-bounded internal tapes and their stack. This type of a reduction, connecting efficient communication protocols and space-bounded computation, is not new. One of the first examples is Babai et al. (1992), which derives timespace trade-offs for multi-head Turing Machines. Subsequently, such reductions have been used to derive lower bounds in streaming (Alon et al. 1999), an area of computer science whose object of study is the power of Turing Machines with small space and a single (or, very few) pass(es) over the input tape. At the technical level, Stack Machines are related to (r, s, t) read-write stream algorithms. The latter are Turing Machines that have a constant number t of external read-write tapes, several internal tapes of combined space s, and a total number r of passes, counted over all external tapes. These machines were introduced by Grohe & Schweikardt (2005) as an extension of the standard streaming model, in which the machines have access to a single external read-only tape. Grohe & Schweikardt (2005), Grohe et al. (2006) derived several lower bounds for deterministic and one-sided error randomized read-write stream (r, s, t) algorithms. Beame et al. (2007) showed that two of the standard measures that are used to bound communication complexity, discrepancy and corruption, can be used to derive lower bounds for computing certain direct-sum type functions with two-sided error randomized stream algorithms. Finally, Beame & Huynh-Ngoc (2008) gavea simpler and more direct reduction between number-in-hand communication protocols and read-write stream algorithms, obtaining trade-off lower bounds between space and number of passes that inspired some the technical arguments in this paper. Stack Machines and read-write stream algorithms are somewhat similar at the technical level because they both augment a

8 8 David & Papakonstantinou cc (2013) space-bounded Turing Machine, with an unbounded stack, onthe one hand, and with several pass-bounded read-write tapes, onthe other hand. However, the motivation for considering these models is essentially different. Stack Machines are intimately connected to combinatorial circuits, which in turn model efficient parallel computation, whereas read-write stream algorithms model efficient computation in the presence of unlimited but slow external memory and fast but limited internal memory. In fact, we show that read-write stream algorithms cannot efficiently simulate Stack Machines, conditional on the widely believed complexity assumption that E PSPACE. It is the treatment of the stack that constitutes the main technical novelty in our result. To put this into perspective, observe that a Turing Machine equipped with two unbounded stacks can decide any decidable language, using no workspace at all and a single pass over the input (e.g., Sipser 1997, Problem 3.9). In comparison, Turing Machines with any constant number of external tapes with space bound s and pass bound r can only compute languages in DSPACE (r 2 s) (Hernich & Schweikardt 2008, Lemma 4.8) Organization. The heart of our result is a new communication complexity reduction. In Section 2, we give an outline of this reduction in a simplified setting which still involves most difficulties. In Section 3, we give the formal definitions needed for our results. In Section 4, we give the proof of the main reduction, Theorem 1.1. InSection 5, we give the proofs for the consequences of our reduction (see Corollaries 1.2 and 1.3). In Section 6, we put the unconditional lower bounds for logarithmic space Stack Machines in perspective, showing that Stack Machines with a single pass over the input can compute languages outside NC (conditional on PSPACE EXP), and also that such Stack Machines cannot be simulated by the read-write stream algorithms of Grohe &Schweikardt(2005) (conditional on E PSPACE). We conclude in Section Outline of the argument Consider the regular Inner Product function IP = IP 2,n : ({0, 1} n ) 2 {0, 1}, which is defined by IP 2,n (x 1,x 2 )= n i=1 x 1,i x 2,i

9 cc (2013) Tradeoff lower lounds for stack machines 9 where the operations are over F 2. Let (x 1,x 2 ) be an input, with x p =(x p,1,...,x p,n ), where x p,j {0, 1} for p [2] and j [n]. In the communication complexity world, we are interested in computing this function with 2 player protocols, in which player p gets x p, for p [2]. We know that R 2 (IP 2,n ) Ω(n) (Chor & Goldreich 1988), where R 2 denotes the private-coin, randomized 2-party communication complexity, where the error is a constant smaller than 1/2 (see e.g., Kushilevitz & Nisan 1997 for a detailed definition). In the TM world, we are interested in computing this function when its input is given on a tape in the natural way: first the n bits of x 1, then the n bits of x 2. The input size for the TM is N =2 n. In this section, we give a simplified outline of our reduction, ignoring probabilistic machines and two-way passes. We study the trade-off between the space s(n) and the number of one-way passes r(n) that a deterministic TM needs. In the full proof, we allow k 2 players, we allow two-way passes, and we allow randomization in the TM. In the absence of a stack. When there is no stack, there is a simple, well-known, simulation of a space- and pass-bounded TM by a 2 player communication protocol. Player 1 simulates the TM until the head first crosses into the input zone containing x 2, at which point it sends the full state of the TM to player 2. The latter continues the simulation until the head crosses back into x 1 and so on. In total, the communication in this protocol is O(s(N) r(n)). By the communication complexity lower bound, we get s(n) r(n) Ω(n) = Ω(N). This simple simulation breaks down in the case of a SM because there might be transfer of information via the stack between the parts of the computation when the input head is scanning x 1 and x 2. Onewaytoseethisisto observe that the configuration of a TM can be described by O (s) bits, whereas that of a SM might require up to 2 Θ(s) bits. A framework for dealing with a stack. In order to deal with the presence of a stack, we adapt a framework that was originally introduced by Beame & Huynh-Ngoc (2008) in the context of TMs with several external tapes.

10 10 David & Papakonstantinou cc (2013) Consider a function f which we know is hard in the communication model. We assume that an efficient SM M exists for a related function F. Using this assumption, we build an efficient communication protocol P for f. Letx be an input to f in P.The players in P first construct an input v to F (which contains x and some public padding ), they simulate M on v, computing F (v), and finally they derive f(x) fromf (v). The simulation of M on v must be efficient so that communication lower bounds apply. Let Γ be the sequence of configurations of M on v. In P,the players simulate Γ using a series of publicly and privately simulated sections. The public simulation is cheap in the sense that it does not cost any communication. The private simulation is expensive because, at the end of each private section, the player simulating it must communicate something in order for the other player(s) to know where they are in Γ. Each section in Γ where the input head scans a symbol from x (which is the input to P ) is to be simulated privately by the player who knows that symbol. Moreover, the basic idea is that, since we do not have any bounds on how a SM can use its stack, we want to avoid communicating stack content in P. Thus, we do not mind if either: A symbol is pushed on the stack during public simulation and popped during either public or private simulation; or a symbol is pushed on the stack in a privately simulated section by player p and later popped in a (possibly different) privately simulated section by the same player p. Whatwewanttoavoid is the remaining scenario: A symbol is pushed on the stack in a privately simulated section by player p 1 and later popped in a privately simulated section by player p 2 p 1. Informally, the way we achieve this protection against M using its stack on x is by hiding x into the larger input v, so that, with high probability, M only uses its stack for meaningless computation. Concretely, let m = n = N/2. Suppose that in a communication protocol two players want to compute IP 2,n, and they have access to an efficient (space s(n), one-way passes r(n)) SM for IP 2,N/2. We think of IP 2,N/2 as m instances of IP 2,n glued together by a top-level XOR m gate.

11 cc (2013) Tradeoff lower lounds for stack machines 11 In the communication protocol P, the players get inputs x 1,x 2 {0, 1} n, respectively. They begin by choosing a random i [m] and random y 1,i,y 2,i {0, 1} n for i [m] \{i }, all using public coins. Let v =(v 1,v 2 ) be the input to M defined by, v p,i := x p and v p,i := y p,i, for i i and p [2]. Henceforth, the goal of P is to simulate M on v. Thus, both players know most of the input to the SM, except for two pieces of n bits each, where their respective inputs from the communication protocol are embedded in the N bit input v to M. Furthermore, observe that if they were indeed able to simulate the SM, they could compute the output for the protocol as IP(x 1,x 2 )= IP(v 1,i,v 2,i )=XOR 2 (IP(v 1,v 2 ), XOR m 1 (IP(v 1,i,v 2,i ) i i )). Unique stack symbols. For the purposes of the analysis, we assume that each symbol on the stack is given a unique tag. Thus, even though the same symbol might appear many times on the stack, we assume we can distinguish between any of those appearances. In particular, to say that a symbol is placed on the stack in configuration γ 1 and popped in configuration γ 2 formally means that the stack level is the same in γ 1 and in the configuration immediately following γ 2 ; and the stack level is strictly higher in any intermediate configuration between those two. Corrupted instances. A key concept in our argument is that of a corrupted instance. For a SM M and an input v, wesay that instance i is corrupted in v on M if, during the run of M on v, a symbol is placed on the stack while the input head is scanning v p1,i and popped while it is scanning v p2,i, wherep 1 p 2. Henceforth, our argument is built on the follow- Three claims. ing three claims: (i) The number of corrupted instances in any one input is small. (ii) The choice of i and of v in the communication protocol is statistically independent of each other.

12 12 David & Papakonstantinou cc (2013) (iii) If the input x to the communication protocol is not embedded in a corrupted instance in the input v to the SM, then the protocol can efficiently simulate the SM. The intuition for claim (i). Fix a SM M and an input v. We want to give a bound for the number of corrupted instances in v on M. We associate each corrupted instance i [m] with a unique 4-tuple (l 1 l 2,p 1 p 2 ), such that a symbol is pushed on the stack in the pass l 1 over v p1,i and popped in the pass l 2 over v p2,i. Note, for each corrupted instance there might be several such 4-tuples to choose from, here, we associate i with only (any) one of them. We say that i is corrupted by this 4-tuple. Let l 1 l 2 r and let p 1 p 2 [2]. During the pass l 1 over v p1, the input head scans the instances in v going from left-to-right in the order: 1, 2,...,m. The same is true for the pass l 2 over v p2. Assume instances i 1 i 2 are corrupted by this particular 4-tuple. Without losing generality, say 1 i 1 <i 2 m. We see that the stack symbol associated with i 1 is pushed first, then the stack symbol associated with i 2, then the stack symbol associated with i 1 is popped, and finally the stack symbol associated with i 2 is popped. This contradicts the First-In Last-Out access semantics of a stack. Hence, at most one instance is corrupted by any one 4-tuple. Since the number of 4-tuples is at most 2 r 2,wederivethat at most O (r 2 ) instances can be corrupted in v on M. Thus, as long as r 2 /m = o (1), the fraction of corrupted instances in any one input is small. This argument is extended to work for two-way access, and slightly improved, as Lemma 4.1. The intuition for claim (ii). To see why we need (ii), observe that in the communication protocol P, v is constructed based on i. For (i) to be useful, we would like the choice of i to probabilistically hide the instance containing the input to P from the set of corrupted instances in v on M. It seems that we would need i to be chosen after v. To achieve (ii), we use an argument that goes through distributional communication complexity (see e.g., Kushilevitz & Nisan 1997): For every distribution D on the inputs to IP 2,n in the communication protocol, the players choose the m 1 decoy instances

13 cc (2013) Tradeoff lower lounds for stack machines 13 from that same distribution D, sothatv is distributed according to D m independently of i. In this case, we can permute the choices of v and i, so that claim (i) gives a bound on the probability the communication protocol embeds the real input in a corrupted instance. We go back to randomized communication complexity (for which we have lower bounds) using Yao s min max principle (Kushilevitz & Nisan 1997, Theorem 3.20) connecting these two measures. This argument is made precise inside the proof of Theorem 1.1. The intuition for claim (iii). Assume that the instance i, where the real input x =(x 1,x 2 ) to the communication protocol P is embedded in v, is not corrupted. We argue that P can efficiently simulate M. Let Γ be the sequence of configurations that M goes through on input v. We say that a configuration is input-private to player p if the input head is scanning a symbol from v p,i (which is where x p is embedded). Intuitively, we want player p to simulate the transition out of a configuration that is input-private to player p, because only it knows the symbols in v p,i = x p. Moreover, symbols might be pushed on the stack in such a transition, in which case we say that any such stack symbol is private to player p. We say that a configuration is stack-private to player p if the transition out of this configuration pops a stack symbol that is private to player p. Intuitively, we want player p to simulate such a transition in order to avoid communicating stack contents during the protocol. All other configurations are public. Since we assumed instance i is not corrupted, we know there is no configuration which is input-private and stack-private to different players. The players simulate Γ by alternating between public and private simulation. At the end of each privately simulated section, the player performing that simulation communicates: the state of the SM, the lowest stack level reached during the private simulation section, the current stack level, and the top stack symbol. It can be shown that the cost of the communication at the end of each privately simulated section is O(s). In the proof of Lemma 4.2, we argue that the information communicated is sufficient for the players to obtain a hollow view of the stack: Each player knows the

14 14 David & Papakonstantinou cc (2013) public stack symbols, the stack symbols which are private to itself, and the locations of the stack symbols private to other players. Moreover, this hollow view is sufficient for the players to continue the simulation until the end of Γ. Finally, let us give an informal bound on the amount of communication. Observe that input-private configurations form exactly 2 r contiguous subsequences in Γ. Let us denote these contiguous zones of input-private configurations in Γ by S a, for 1 a 2 r. Let γ a and γ a be the configurations at the beginning and end of S a, respectively. Observe that the stack at the end of S a (in γ a) contains at most a contiguous zones of private stack symbols, at most one such zone corresponding to each previous input-private section S a,witha a. Some of these zones might be accessed before S a+1. As explained in detail in the proof of Lemma 4.2, the players in the protocol can simulate the sequence of configurations between γ a and γ a+1 using as many privately simulated sections as there are contiguous zones of private stack symbols in γ a. Since a 2 r, the number of privately simulated sections between γ a and γ a+1 is O (r). Summing over all a and taking into account the privately simulated sections S a, we get that, in total, the simulation of Γ can be performed using at most O (r 2 ) privately simulated sections. Hence, the communication bound for the entire protocol is O (r 2 s). Putting (i), (ii) and (iii) together, assuming that we have a SM for IP 2,N/2, we obtain a randomized communication protocol for IP 2,n that has error O (r 2 /m) andcosto(r 2 s). As long as r 2 /m = o (1), the known randomized communication complexity lower bound R 2,ɛ (IP 2,n ) Ω(n) applies (Chor & Goldreich 1988), where R 2,ɛ denotes the 2-party randomized communication complexity for protocols with error ɛ (see e.g., Kushilevitz & Nisan 1997 for definitions). Thus, we obtain the trade-off lower bound r(n) 2 s(n) Ω(n) =Ω ( N 1/2). What was left out of this outline. First, the number of players in this outline is set to k = 2. While this is sufficient to derive SM trade-off lower bounds for Inner Product-like functions, we

15 cc (2013) Tradeoff lower lounds for stack machines 15 need to allow the number of players to be a function of the input size, that is, k = k(n), in order to obtain inapproximability results for the frequency moments problem in Corollary 1.3. Second, the Inner Product function is of such a nature that no matter how the players in P choose the decoy instances y p,i {0, 1} n for p [2] and i i, they can always retrieve f(x) = IP(x 1,x 2 )fromf(v) =IP(v 1,v 2 ) by computing the XOR of all decoy instances IP(y 1,i,y 2,i ) together with F (v). This is a property of the top-level gate in IP, which is XOR. In order to deal with the frequency moments problem, we use a reduction involving the promise Set Intersection problem, which has top-level gate OR. In this case, in order to be able to retrieve f(x) fromf (v), the decoy instances must be 0-instances, and only then do we have f(x) = F (v). To accommodate for this requirement and still achieve claim (ii), we need to treat 0-inputs and 1-inputs differently inside the proof of Theorem 1.1. Third, we need to fill in the details of the simulation informally described as claim (iii). Fourth, there is the issue of two-way versus one-way passes. This outline only considers how to obtain trade-off lower bounds for SMs with one-way access to the input. A SM with two-way access to the input can compute IP with only 2 passes (use the stack to store one vector for the inner product). The point where this framework breaks down is claim (i), which is outright false. Consider the case when p 1 =1,p 2 = 2, the pass l 1 = 1 is left-toright, and the pass l 2 = 2 is right-to-left. We see that the instances are visited in the pass 1 in the order 1, 2,...,m 1,m,andthey are visited in the pass 2 in the order m, m 1,...,2, 1. Then, the associated corrupting stack symbols can be pushed in the order 1,...,m and popped in the order m,...,1, without violating the access semantics of a stack. Thus, potentially all instances can be corrupted by a single 4-tuple (1, 2, 1, 2), which is precisely what happens in the simple 2-pass protocol seen earlier. In order to obtain trade-off lower bounds for SMs with twoway access, we need to fix claim (i). To that end, we scramble the order in which the m instances are seen in pass l 1 over v p1 and in pass l 2 over v p2, no matter what p 1 and p 2 are, and no

16 16 David & Papakonstantinou cc (2013) matter whether the passes l 1 and l 2 are left-to-right or right-toleft. Informally, we achieve this by reordering the m instances corresponding to each player using a family of permutations Φ = (ϕ 1,...,ϕ k ), with one permutation for each player that has the following property. For p [k], let σ p := (ϕ p (1),...,ϕ p (m)) and σp rev := (ϕ p (m),...,ϕ p (1)). Then, for every p 1 p 2, σ 1 {σ p1,σp rev 1 }, and σ 2 {σ p2,σp rev 2 }, σ 1 and σ 2 have as small a common subsequence as possible. It turns out that there exist families Φ where any such common subsequence has size O ( m)(beame & Huynh-Ngoc 2008). 3. Definitions and facts We use standard definitions for computational complexity classes (see, e.g., Arora & Barak 2009) and communication complexity notions (see, e.g., Kushilevitz & Nisan 1997). Notation. We use n to denote the size of the input to a player in a communication protocol. The number of players is k = k(n), which is a non-decreasing function of n. A (randomized) k-player number-in-hand protocol (NIH) is defined as a communication protocol where each player uses private randomness holds only her own part (1/k-th) of the input and communication happens through a shared blackboard (for a detailed definition see Kushilevitz & Nisan 1997). We use f = f k,n :({0, 1} n ) k {0, 1} to denote a generic boolean function which we are interested in computing in the communication model. We use F to denote a generic function that we are interested in computing in the Stack Machine model. In general, F consists of m instances of a base function f k,n combined together by combining function h m : {0, 1} m {0, 1}. The number of instances, m = m(n), is a non-decreasing function of n. WedenotebyN the size of the input to F,soN = N(n) =k m n. Weuses = s(n) and r = r(n) to denote non-decreasing functions bounding the space and the number of passes a SM is allowed (these are defined below).

17 cc (2013) Tradeoff lower lounds for stack machines 17 The Inner Product function IP 2,n :({0, 1} n ) 2 {0, 1} is defined as in the beginning of the previous section. The Set Intersection function SetInt k,n : ({0, 1} n k {0, 1} is defined by SetInt k,n (x 1,...,x k )= n ( ) i=1 k j=1 x j,i. In the promise Set Intersection function psetint k,n, we are promised that the inputs satisfy the following: There is at most one i [n] such that k j=1x j,i =1; and for every i [n]where k j=1x j,i = 0, there is at most one j [k] such that x j,i =1. Stack machines. A deterministic (uniform) Stack Machine (SM) is a Turing Machine with a fixed number of internal tapes, a single read-only external tape of unbounded size containing the input and a stack. The stack is implemented as an additional oneway infinite tape that follows the access semantics of a push-down store (Cook 1971). A randomized SM is allowed to flip an unbiased coin before every single transition. We say that a randomized SM computes a (boolean) function with error δ if it computes correctly (two-sided) with probability 1 δ. Let s, r be non-decreasing functions. A SM has a space bound s if, for every N, thesize of its work tapes is at most s(n) on inputs of length N. A SM has a pass bound r if, for every N, thenumber of passes it makes over the input tape is at most r(n) on inputs of length N. Neither of these bounds refers in any way to the stack. Without losing generality, we make the following assumptions about SMs: (1) A SM has enough space on its work tapes to record the position of the head on the input tape. That is, s(n) Ω(logN). (2) In every pass over the input tape, the input head travels from one end of the tape to the other. (3) The stack in a SM is empty both at the beginning and at the end of its computation. (4) In every transition of a SM, exactly one of the following occurs: the input head moves on the input tape, referred to as a move transition; or a symbol is pushed on the stack, referred to as a push transition; or

18 18 David & Papakonstantinou cc (2013) a symbol is popped from the stack, referred to as a pop transition. It turns out that we need to consider non-uniform Stack Machines in one of our proofs. Naturally, the non-uniform model is more powerful than the uniform one, so lower bounds for the nonuniform model are stronger. Moreover, communication protocols are by definition a non-uniform model of computation, so when a communication protocol simulates a Stack Machine, we might as well assume the Stack Machine is also non-uniform. For a fixed input length N, astack automaton A N is an automaton with a read-only input tape of size N, a set of states whose size can now depend on N, and a stack. Assumptions (1) (4) still apply. A stack automaton A N has a space bound s(n) ifa N has at most 2 s(n) states. A N has a pass bound r(n) ifa N makes at most r(n) passes over its input. A non-uniform Stack Machine is a collection A = (A N ) N N of stack automata, one for each input length. For non-decreasing functions r, s, a non-uniform SM A =(A N ) has a space bound s and a pass bound r if, for every N, A N has a space bound s(n) and a pass bound r(n), respectively. A (full) configuration of a SM contains: the state and the full contents of the work tapes in the uniform case, or simply the state in the non-uniform case; the location of the head on the input tape; and theentirecontentsofthestack. A surface configuration of a SM is the same as a full configuration, but instead of the entire stack contents, it only includes the top stack symbol. Fact 3.1. Let A =(A N ) be a non-uniform SM that halts on every input and runs in space s = s(n). Then, for large enough N and for every input w of length N, the maximum stack height of A during its run on w is at most 2 4 s(n). Proof (Proof of Fact 3.1). Assume the claim does not hold. Let c denote the (constant) number of symbols in the stack alphabet

19 cc (2013) Tradeoff lower lounds for stack machines 19 of A. Let N be large enough so that s(n) log c (note that s(n) log N by assumption (1)). Fix an input w of size N on which the stack reaches height more than 2 4 s(n). Let Γ be the sequence of configurations of M on w. Let γ Γ be a configuration in which the stack contains strictly more than 2 4 s(n) symbols. For every stack level l, with1 l 2 3 s(n) +1< 2 4 s(n),let γ l be the last configuration preceding γ in which the symbol at level l is at the top of the stack. Obviously, the transition out of γ l is a push transition. For every such l, let γ l denotes the surface configuration corresponding to γ l. Observe that a surface configuration can be represented using log N +s(n)+log c 3 s(n) bits. Since there are more than 2 3 s(n) symbols on the stack, a surface configuration must be repeated. Accordingly, let 1 l 1 <l s(n) + 1 be stack levels such that γ l1 = γ l2. By definition, γ l1 is the last configuration when the stack level was l 1. Hence, the SM got from γ l1 to γ l2 without accessing a symbol at level l 1 or below. But then, since γ l2 = γ l1, the SM is bound to repeat this part of its computation, eventually ending up in a configuration γ l3 with l 3 l 2 = l 2 l 1 and γ l3 = γ l2. This process is repeated indefinitely, so the SM does not halt on w, a contradiction. Permutations, sequences, and sortedness. Let S m denotes the set of all permutations of [m]. Let id denotes the identity permutation. For a permutation π S m,letseq(π) denotes the m-element sequence (π(1),π(2),...,π(m)). For a sequence σ, let σ rev denotes σ reversed. For example, seq(π) rev =(π(m),...,π(1)). For two sequences σ 1,σ 2,letLCS(σ 1,σ 2 )denotetheirlongest common (not necessarily contiguous) subsequence. For a sequence σ, let σ denotes its length. Consider two permutations ϕ 1,ϕ 2 S m. We measure their relative sortedness according to the following experiment. Intuitively, imagine we lay out seq(ϕ 1 )=(ϕ 1 (1),..., ϕ 1 (m)) on one tape and seq(ϕ 2 )=(ϕ 2 (1),...,ϕ 2 (m)) on another tape. We are allowed two passes, one over each tape, in parallel, with the heads moving

20 20 David & Papakonstantinou cc (2013) Formally, independently of each other. We can choose to make the pass over each tape left-to-right or right-to-left. We eliminate an index a [m] if, at some point during the two passes, a is the value being scanned on both tapes. We define the relative sortedness of ϕ 1 and ϕ 2 to be the maximum number of indices we can eliminate in this way. relsort (ϕ 1,ϕ 2 ) := max { LCS(σ 1,σ 2 ) i [2],σ i {seq(ϕ i ), seq(ϕ i ) rev }} For example, for ( ) ϕ 1 = and ϕ 2 = ( ) , we have relsort (ϕ 1,ϕ 2 ) = 4, because (2, 1, 4, 3) is a common subsequence of seq(ϕ 1 )andseq(ϕ 2 ) rev. ForasetofpermutationsΦ={ϕ 1,...,ϕ t }, we define its relative sortedness to be the maximum relative sortedness of any two of its members. Formally, relsort (Φ) := max {relsort (ϕ i,ϕ j ) i j [t]}. We use the following Fact to obtain sets of permutations with small relative sortedness. Fact 3.2. Let ϕ 1,ϕ 2 S m.ifrelsort (ϕ 1,ϕ 2 )=t, thenseq(ϕ 1 2 ϕ 1 ) contains a monotone subsequence of length t. Proof (of Fact 3.2). First, assume (i 1,i 2,...,i t ) is a common subsequence of seq(ϕ 1 )andseq(ϕ 2 ). In this case, the corresponding sequences of pre-images are both non-decreasing, (ϕ 1 1 (i 1 ) < ϕ 1 1 (i 2 ) < <ϕ 1 1 (i t )) and (ϕ 1 2 (i 1 ) <ϕ 1 2 (i 2 ) < <ϕ 1 2 (i t )). Let i j := ϕ 1 1 (i j ) for j [t], and observe that ϕ 1 2 (ϕ 1 (i j)) = ϕ 1 2 (i j ). Then, (i 1,i 2,...,i t) is a subsequence of (1, 2,...,m), so (ϕ 1 2 ϕ 1 (i 1) <ϕ 1 2 ϕ 1 (i 2) < <ϕ 1 2 ϕ 1 (i t)) is an increasing subsequence of (ϕ 1 2 ϕ 1 (1),ϕ 1 2 ϕ 1 (2),...,ϕ 1 2 ϕ 1 (m)) = seq(ϕ 1 2 ϕ 1 ).

21 cc (2013) Tradeoff lower lounds for stack machines 21 The cases when the subsequence (i 1,i 2,...,i t ) comes from seq(ϕ 1 ) rev instead of seq(ϕ 1 ), or from seq(ϕ 2 ) rev instead of seq(ϕ 2 ), or both, are treated similarly. The only difference is that one or both of the corresponding sequences of pre-images are now decreasing, which might change the monotonicity of the resulting subsequence of seq(ϕ 1 2 ϕ 1 ). By Fact 3.2, to obtain permutations with small relative sortedness, it is enough to require that the (sequences of their) corresponding compositions have small monotone subsequences. This method comes with a limitation, as by the Erdös Szekeres Theorem (Erdös & Szekeres 1935), every sequence of m distinct elements contains a monotone subsequence of length m. Thus, the smallest relative sortedness that we can achieve between two permutations using Fact 3.2 is Θ ( m). Grohe & Schweikardt (2005) show that, in fact, a very simple permutation has asymptotically optimal relative sortedness with the identity permutation. Fact 3.3 (Lemma 6 in Grohe & Schweikardt 2005). For every m, there exists a permutation ψm S m such that relsort (id,ψm) 2 m 1. Furthermore, ψm can be computed in space O(logm). Beame & Huynh-Ngoc (2008) use a simple counting argument to show that a similar bound, still asymptotically optimal, can be achieved even for sets of permutations. Fact 3.4 (Corollary 2.2 in Beame & Huynh-Ngoc 2008). Let k = k(m) be a function such that k m O(1). There exists a family Φ = ( ) Φ k,m where m Φ k,m = {ϕ 1,...,ϕ k } is a set of k permutations from S m, such that relsort ( Φk,m) O( m). Permuted functions. Let f = f k,n :({0, 1} n ) k {0, 1} be a base function. Let h = h m : {0, 1} m {0, 1} be a combining function. Let Φ = Φ k,m = {ϕ 1,...,ϕ k } be a set of k permutations from S m. In what follows, we define LiftMix (f k,n,h m, Φ k,m ): ({0, 1} m n ) k {0, 1} which is a lift-and-mix function that consists of m instances of f, permuted by Φ, and combined by h. Let v ({0, 1} m n ) k be an input. Let v =(v 1,...,v k ), where v p {0, 1} m n for every p [k]. Let v p =(v p,1,...,v p,m ), where

22 22 David & Papakonstantinou cc (2013) v p,i {0, 1} n for every (p, i) [k] [m]. Let v p,i =(v p,i,1,...,v p,i,n ), where v p,i,j {0, 1} for every (p, i, j) [k] [m] [n]. When v is given as an input to a TM, v appears on the input tape as v 1,1,...,v }{{ 1,m,v } 2,1,...,v 2,m,...,v }{{} k,1,...,v k,m, }{{} v 1 v k v 2 and for (p, i) [k] [m], v p,i appears as the sequence of bits v p,i,1,v p,i,2,...,v p,i,n. For (p, i ) [k] [m], we say that v p,ϕ 1 p (i ) is the i -th instance (of f) inside v p. For i [m], we define the i -th instance (of f) inside v to be ( ) v [i ],Φ := v 1,ϕ 1 1 (i ),v 2,ϕ 1 2 (i ),...,v k,ϕ 1 k (i ) ({0, 1} n ) k. For (p, i) [k] [m], v p,i appears in v [i ],Φ if and only if i = ϕ 1 p (i ). Since this is equivalent to i = ϕ p (i), we observe the following basic fact. Fact 3.5. The order on the tape of the m instances inside v p is (ϕ p (1),ϕ p (2),...,ϕ p (m)), which is precisely seq(ϕ p ). Thus, a left-to-right tape scan over v p visits the m instances in the order seq(ϕ p ), and a right-to-left tape scan visits them in the order seq(ϕ p ) rev. We now define the lift-and-mix function LiftMix (f,h,φ) : ({0, 1} m n ) k {0, 1} by LiftMix (f,h,φ) (v) :=h(f(v [1],Φ ),f(v [2],Φ ),...,f(v [m],φ )). We embed an input to f into a specific instance of an input to F as follows. Let x ({0, 1} n ) k be an input to f. Let i [m] be an instance number. Let ȳ i =(y 1,...,y i 1,y i +1,...,y m )be asetofm 1 inputs to f, wherey i ({0, 1} n ) k for i i. We define v Φ (i,x,ȳ i ) to be the input to F in which x is embedded at instance i and y i is embedded at instance i, for i i. Formally, { v Φ (i,x,ȳ i ):=v ({0, 1} m n ) k v [i],φ = x, i = i, such that v [i],φ = y i, i i.

23 cc (2013) Tradeoff lower lounds for stack machines 23 Corrupted instances. Let M be a deterministic SM and v be an input of size N = k m n. We say that instance i [m] is corrupted in v on M if there exist players p 1 p 2 [k] such that, during the run of M on v, a symbol is pushed on the stack when the input head is scanning v p1,ϕ 1 p 1 (i) and that symbol is popped when the input head is scanning v p2,ϕ 1 p 2 (i),whereϕ p 1,ϕ p2 Φ k,m. Observe that both strings above are part of v [i],φ, which is instance i inside v. Let BAD(M,v) [m] be the set of all instances which are corrupted in v on M. Observe that this definition implicitly depends on the values of k, m, n, and Φ, so we should formally write BAD k,m,n,φ (M,v). We use the shorter form for brevity. Neutral element. We say that a combining function h has a neutral element e {0, 1} if for every b {0, 1} and for every i [m], h(e,...,e,b,e,...,e)=b. }{{}}{{} i 1 m i Observe that both OR and XOR have neutral element e =0. 4. The reduction Theorem 1.1 (Restated). Let k = k(n) 2 be a non-decreasing function, and let m = m(n) 1 be a non-decreasing function such that k m O(1). Let N = N(n) := k m n. Let s = s(n) and r = r(n) be non-decreasing functions. Let δ<1/2 be a constant. Let Φ = (Φ k,m ) m be a family of permutations, where Φ k,m = {ϕ 1,...,ϕ k } are k permutations from S m.letd := k r log r relsort (Φ k,m ) /m. Let f = f k,n be a boolean base function and let h = h m be a combining function with a neutral element. Let F = F N := LiftMix (f k,n,h m, Φ k,m ). Assume there exists a randomized non-uniform SM M for F with space bound s, pass bound r, and error δ. Then, there exists a randomized k-player NIH communication protocol P for f, with cost O(k r s log(k r)) and error at most δ +O(d).

24 24 David & Papakonstantinou cc (2013) To prove this Theorem, we use the following two Lemmas, which correspond to claims (i) and (iii) in the outline from Section 2. Throughout this entire section, let n, k, m, N, s, r, Φbeas in Theorem 1.1. Furthermore, in what follows for the fixed Φ the players construct an input v Φ ( ), which we denote by v( ) for simplicity. The first Lemma gives a bound on the number of corrupted instances inside a fixed input. As such, it directly corresponds to claim (i) from the outline in Section 2. As opposed to that claim, the Lemma allows for a growing number of players k = k(n) and for two-way passes over the input tape thanks to the scrambling of instances according to the family of permutations Φ. Lemma 4.1. Let M be a deterministic non-uniform SM with space bound s and (two-way) pass bound r. Let v be an input of size N. Then, BAD(M,v ) O(k r log r relsort (Φ k,m )). The next Lemma corresponds to claim (iii) from the outline in Section 2. It says that if the players in a communication protocol embed their input in a non-corrupted instance, then the protocol can efficiently simulate the SM. Lemma 4.2. Let M be a deterministic non-uniform SM. Let i [m] be an instance number, and let ȳ i = (y 1,..., y i 1,y i +1,...,y m ) be a set of m 1 inputs to f. Then, there exists a deterministic k-player NIH communication protocol P = P (M,i, ȳ i ) such that, on input x: if i BAD(M,v(i,x,ȳ i )), thenp outputs fail ; otherwise, P correctly simulates M and outputs M (v(i,x, ȳ i )); the cost of P is O(k r log(k r) s). We give the proofs of Theorem 1.1 and Lemmas 4.1 and 4.2 in the following three sections Proof of the main theorem. In this section, we prove Theorem 1.1 using Lemmas 4.1 and 4.2. For every q, letm q denote the deterministic non-uniform SM obtained by running M with random string q.

25 cc (2013) Tradeoff lower lounds for stack machines 25 Let D be any distribution on the space ({0, 1} n ) k of inputs to f. Below, we give a randomized protocol P D for f with cost and error as described in Theorem 1.1, but with error computed over the choice of the input x from D and of the random coins ρ in P. By standard arguments, 1 we can fix ρ to obtain a deterministic protocol with the same error, but only over the choice of x from D. Since such a protocol exists for every distribution D, by Yao s min max principle (e.g., Theorem 3.20 in Kushilevitz & Nisan 1997), the conclusion of Theorem 1.1 follows. Without loss of generality, assume that the neutral element of the combining function h is e = 0. If instead we have neutral element e = 1, the same proof applies with the roles of 0 and 1 reversed. If D has support only on 0-inputs or only on 1-inputs, P D is trivial. Otherwise, let D 0 be the distribution D, conditioned on f(x) = 0. Similarly, we define D 1 as D conditioned on f(x) =1. Consider the following protocol P D : On input x (where player p gets x p ) and shared random string ρ: Publicly draw i uniformly from [m] Publicly draw ȳ i =(y 1,...,y i 1,y i +1,...,y m 1 )from (D 0 ) m 1 Publicly draw q uniformly (where q has as many bits as the running time of M) Run P = P (M q,i, ȳ i ) (from Lemma 4.2) on input x, simulating M q on v(x, i, ȳ i ) If P outputs fail, then P D outputs 1. Else, P D outputs the same value as P,thatis, M q (v(x, i, ȳ i )) Observe that, since the neutral element of h is e = 0, and since the instances in ȳ i are drawn from D 0, we always have f(x) =F (v), where v = v(i,x,ȳ i ). Clearly, the cost of P D is 1 That is, some ρ must perform well on the average. Now consider the deterministic algorithm that fixes the randomness to this ρ (see Theorem 3.20 Kushilevitz & Nisan 1997) for a detailed similar argument.

Basic statistics for experimental medical researchers

Basic statistics for experimental medical researchers Basic statistics for experimental medical researchers Sample size calculations September 15th 2016 Christian Pipper Department of public health (IFSV) Faculty of Health and Medicinal Science (SUND) E-mail:

Læs mere

Vina Nguyen HSSP July 13, 2008

Vina Nguyen HSSP July 13, 2008 Vina Nguyen HSSP July 13, 2008 1 What does it mean if sets A, B, C are a partition of set D? 2 How do you calculate P(A B) using the formula for conditional probability? 3 What is the difference between

Læs mere

Skriftlig Eksamen Beregnelighed (DM517)

Skriftlig Eksamen Beregnelighed (DM517) Skriftlig Eksamen Beregnelighed (DM517) Institut for Matematik & Datalogi Syddansk Universitet Mandag den 31 Oktober 2011, kl. 9 13 Alle sædvanlige hjælpemidler (lærebøger, notater etc.) samt brug af lommeregner

Læs mere

Black Jack --- Review. Spring 2012

Black Jack --- Review. Spring 2012 Black Jack --- Review Spring 2012 Simulation Simulation can solve real-world problems by modeling realworld processes to provide otherwise unobtainable information. Computer simulation is used to predict

Læs mere

Exercise 6.14 Linearly independent vectors are also affinely independent.

Exercise 6.14 Linearly independent vectors are also affinely independent. Affine sets Linear Inequality Systems Definition 6.12 The vectors v 1, v 2,..., v k are affinely independent if v 2 v 1,..., v k v 1 is linearly independent; affinely dependent, otherwise. We first check

Læs mere

On the complexity of drawing trees nicely: corrigendum

On the complexity of drawing trees nicely: corrigendum Acta Informatica 40, 603 607 (2004) Digital Object Identifier (DOI) 10.1007/s00236-004-0138-y On the complexity of drawing trees nicely: corrigendum Thorsten Akkerman, Christoph Buchheim, Michael Jünger,

Læs mere

Sign variation, the Grassmannian, and total positivity

Sign variation, the Grassmannian, and total positivity Sign variation, the Grassmannian, and total positivity arxiv:1503.05622 Slides available at math.berkeley.edu/~skarp Steven N. Karp, UC Berkeley FPSAC 2015 KAIST, Daejeon Steven N. Karp (UC Berkeley) Sign

Læs mere

Skriftlig Eksamen Beregnelighed (DM517)

Skriftlig Eksamen Beregnelighed (DM517) Skriftlig Eksamen Beregnelighed (DM517) Institut for Matematik & Datalogi Syddansk Universitet Mandag den 7 Januar 2008, kl. 9 13 Alle sædvanlige hjælpemidler (lærebøger, notater etc.) samt brug af lommeregner

Læs mere

PARALLELIZATION OF ATTILA SIMULATOR WITH OPENMP MIGUEL ÁNGEL MARTÍNEZ DEL AMOR MINIPROJECT OF TDT24 NTNU

PARALLELIZATION OF ATTILA SIMULATOR WITH OPENMP MIGUEL ÁNGEL MARTÍNEZ DEL AMOR MINIPROJECT OF TDT24 NTNU PARALLELIZATION OF ATTILA SIMULATOR WITH OPENMP MIGUEL ÁNGEL MARTÍNEZ DEL AMOR MINIPROJECT OF TDT24 NTNU OUTLINE INEFFICIENCY OF ATTILA WAYS TO PARALLELIZE LOW COMPATIBILITY IN THE COMPILATION A SOLUTION

Læs mere

Generalized Probit Model in Design of Dose Finding Experiments. Yuehui Wu Valerii V. Fedorov RSU, GlaxoSmithKline, US

Generalized Probit Model in Design of Dose Finding Experiments. Yuehui Wu Valerii V. Fedorov RSU, GlaxoSmithKline, US Generalized Probit Model in Design of Dose Finding Experiments Yuehui Wu Valerii V. Fedorov RSU, GlaxoSmithKline, US Outline Motivation Generalized probit model Utility function Locally optimal designs

Læs mere

Privat-, statslig- eller regional institution m.v. Andet Added Bekaempelsesudfoerende: string No Label: Bekæmpelsesudførende

Privat-, statslig- eller regional institution m.v. Andet Added Bekaempelsesudfoerende: string No Label: Bekæmpelsesudførende Changes for Rottedatabasen Web Service The coming version of Rottedatabasen Web Service will have several changes some of them breaking for the exposed methods. These changes and the business logic behind

Læs mere

Resource types R 1 1, R 2 2,..., R m CPU cycles, memory space, files, I/O devices Each resource type R i has W i instances.

Resource types R 1 1, R 2 2,..., R m CPU cycles, memory space, files, I/O devices Each resource type R i has W i instances. System Model Resource types R 1 1, R 2 2,..., R m CPU cycles, memory space, files, I/O devices Each resource type R i has W i instances. Each process utilizes a resource as follows: request use e.g., request

Læs mere

Skriftlig Eksamen Kombinatorik, Sandsynlighed og Randomiserede Algoritmer (DM528)

Skriftlig Eksamen Kombinatorik, Sandsynlighed og Randomiserede Algoritmer (DM528) Skriftlig Eksamen Kombinatorik, Sandsynlighed og Randomiserede Algoritmer (DM58) Institut for Matematik og Datalogi Syddansk Universitet, Odense Torsdag den 1. januar 01 kl. 9 13 Alle sædvanlige hjælpemidler

Læs mere

Skriftlig Eksamen Diskret matematik med anvendelser (DM72)

Skriftlig Eksamen Diskret matematik med anvendelser (DM72) Skriftlig Eksamen Diskret matematik med anvendelser (DM72) Institut for Matematik & Datalogi Syddansk Universitet, Odense Onsdag den 18. januar 2006 Alle sædvanlige hjælpemidler (lærebøger, notater etc.),

Læs mere

Project Step 7. Behavioral modeling of a dual ported register set. 1/8/ L11 Project Step 5 Copyright Joanne DeGroat, ECE, OSU 1

Project Step 7. Behavioral modeling of a dual ported register set. 1/8/ L11 Project Step 5 Copyright Joanne DeGroat, ECE, OSU 1 Project Step 7 Behavioral modeling of a dual ported register set. Copyright 2006 - Joanne DeGroat, ECE, OSU 1 The register set Register set specifications 16 dual ported registers each with 16- bit words

Læs mere

Skriftlig Eksamen Automatteori og Beregnelighed (DM17)

Skriftlig Eksamen Automatteori og Beregnelighed (DM17) Skriftlig Eksamen Automatteori og Beregnelighed (DM17) Institut for Matematik & Datalogi Syddansk Universitet Odense Campus Lørdag, den 15. Januar 2005 Alle sædvanlige hjælpemidler (lærebøger, notater

Læs mere

The X Factor. Målgruppe. Læringsmål. Introduktion til læreren klasse & ungdomsuddannelser Engelskundervisningen

The X Factor. Målgruppe. Læringsmål. Introduktion til læreren klasse & ungdomsuddannelser Engelskundervisningen The X Factor Målgruppe 7-10 klasse & ungdomsuddannelser Engelskundervisningen Læringsmål Eleven kan give sammenhængende fremstillinger på basis af indhentede informationer Eleven har viden om at søge og

Læs mere

Strings and Sets: set complement, union, intersection, etc. set concatenation AB, power of set A n, A, A +

Strings and Sets: set complement, union, intersection, etc. set concatenation AB, power of set A n, A, A + Strings and Sets: A string over Σ is any nite-length sequence of elements of Σ The set of all strings over alphabet Σ is denoted as Σ Operators over set: set complement, union, intersection, etc. set concatenation

Læs mere

CHAPTER 8: USING OBJECTS

CHAPTER 8: USING OBJECTS Ruby: Philosophy & Implementation CHAPTER 8: USING OBJECTS Introduction to Computer Science Using Ruby Ruby is the latest in the family of Object Oriented Programming Languages As such, its designer studied

Læs mere

Large Scale Sequencing By Hybridization. Tel Aviv University

Large Scale Sequencing By Hybridization. Tel Aviv University Large Scale Sequencing By Hybridization Ron Shamir Dekel Tsur Tel Aviv University Outline Background: SBH Shotgun SBH Analysis of the errorless case Analysis of error-prone Sequencing By Hybridization

Læs mere

Besvarelser til Lineær Algebra Reeksamen Februar 2017

Besvarelser til Lineær Algebra Reeksamen Februar 2017 Besvarelser til Lineær Algebra Reeksamen - 7. Februar 207 Mikkel Findinge Bemærk, at der kan være sneget sig fejl ind. Kontakt mig endelig, hvis du skulle falde over en sådan. Dette dokument har udelukkende

Læs mere

Curve Modeling B-Spline Curves. Dr. S.M. Malaek. Assistant: M. Younesi

Curve Modeling B-Spline Curves. Dr. S.M. Malaek. Assistant: M. Younesi Curve Modeling B-Spline Curves Dr. S.M. Malaek Assistant: M. Younesi Motivation B-Spline Basis: Motivation Consider designing the profile of a vase. The left figure below is a Bézier curve of degree 11;

Læs mere

Probabilistic properties of modular addition. Victoria Vysotskaya

Probabilistic properties of modular addition. Victoria Vysotskaya Probabilistic properties of modular addition Victoria Vysotskaya JSC InfoTeCS, NPK Kryptonite CTCrypt 19 / June 4, 2019 vysotskaya.victory@gmail.com Victoria Vysotskaya (Infotecs, Kryptonite) Probabilistic

Læs mere

Satisability of Boolean Formulas

Satisability of Boolean Formulas SAT exercises 1 March, 2016 slide 1 Satisability of Boolean Formulas Combinatorics and Algorithms Prof. Emo Welzl Assistant: (CAB G36.1, cannamalai@inf.ethz.ch) URL: http://www.ti.inf.ethz.ch/ew/courses/sat16/

Læs mere

Help / Hjælp

Help / Hjælp Home page Lisa & Petur www.lisapetur.dk Help / Hjælp Help / Hjælp General The purpose of our Homepage is to allow external access to pictures and videos taken/made by the Gunnarsson family. The Association

Læs mere

Aktivering af Survey funktionalitet

Aktivering af Survey funktionalitet Surveys i REDCap REDCap gør det muligt at eksponere ét eller flere instrumenter som et survey (spørgeskema) som derefter kan udfyldes direkte af patienten eller forsøgspersonen over internettet. Dette

Læs mere

Linear Programming ١ C H A P T E R 2

Linear Programming ١ C H A P T E R 2 Linear Programming ١ C H A P T E R 2 Problem Formulation Problem formulation or modeling is the process of translating a verbal statement of a problem into a mathematical statement. The Guidelines of formulation

Læs mere

University of Copenhagen Faculty of Science Written Exam - 3. April Algebra 3

University of Copenhagen Faculty of Science Written Exam - 3. April Algebra 3 University of Copenhagen Faculty of Science Written Exam - 3. April 2009 Algebra 3 This exam contains 5 exercises which are to be solved in 3 hours. The exercises are posed in an English and in a Danish

Læs mere

DoodleBUGS (Hands-on)

DoodleBUGS (Hands-on) DoodleBUGS (Hands-on) Simple example: Program: bino_ave_sim_doodle.odc A simulation example Generate a sample from F=(r1+r2)/2 where r1~bin(0.5,200) and r2~bin(0.25,100) Note that E(F)=(100+25)/2=62.5

Læs mere

Unitel EDI MT940 June 2010. Based on: SWIFT Standards - Category 9 MT940 Customer Statement Message (January 2004)

Unitel EDI MT940 June 2010. Based on: SWIFT Standards - Category 9 MT940 Customer Statement Message (January 2004) Unitel EDI MT940 June 2010 Based on: SWIFT Standards - Category 9 MT940 Customer Statement Message (January 2004) Contents 1. Introduction...3 2. General...3 3. Description of the MT940 message...3 3.1.

Læs mere

Statistik for MPH: 7

Statistik for MPH: 7 Statistik for MPH: 7 3. november 2011 www.biostat.ku.dk/~pka/mph11 Attributable risk, bestemmelse af stikprøvestørrelse (Silva: 333-365, 381-383) Per Kragh Andersen 1 Fra den 6. uges statistikundervisning:

Læs mere

DET KONGELIGE BIBLIOTEK NATIONALBIBLIOTEK OG KØBENHAVNS UNIVERSITETS- BIBLIOTEK. Index

DET KONGELIGE BIBLIOTEK NATIONALBIBLIOTEK OG KØBENHAVNS UNIVERSITETS- BIBLIOTEK. Index DET KONGELIGE Index Download driver... 2 Find the Windows 7 version.... 2 Download the Windows Vista driver.... 4 Extract driver... 5 Windows Vista installation of a printer.... 7 Side 1 af 12 DET KONGELIGE

Læs mere

ECE 551: Digital System * Design & Synthesis Lecture Set 5

ECE 551: Digital System * Design & Synthesis Lecture Set 5 ECE 551: Digital System * Design & Synthesis Lecture Set 5 5.1: Verilog Behavioral Model for Finite State Machines (FSMs) 5.2: Verilog Simulation I/O and 2001 Standard (In Separate File) 3/4/2003 1 ECE

Læs mere

Constant Terminal Voltage. Industry Workshop 1 st November 2013

Constant Terminal Voltage. Industry Workshop 1 st November 2013 Constant Terminal Voltage Industry Workshop 1 st November 2013 Covering; Reactive Power & Voltage Requirements for Synchronous Generators and how the requirements are delivered Other countries - A different

Læs mere

University of Copenhagen Faculty of Science Written Exam April Algebra 3

University of Copenhagen Faculty of Science Written Exam April Algebra 3 University of Copenhagen Faculty of Science Written Exam - 16. April 2010 Algebra This exam contains 5 exercises which are to be solved in hours. The exercises are posed in an English and in a Danish version.

Læs mere

IBM Network Station Manager. esuite 1.5 / NSM Integration. IBM Network Computer Division. tdc - 02/08/99 lotusnsm.prz Page 1

IBM Network Station Manager. esuite 1.5 / NSM Integration. IBM Network Computer Division. tdc - 02/08/99 lotusnsm.prz Page 1 IBM Network Station Manager esuite 1.5 / NSM Integration IBM Network Computer Division tdc - 02/08/99 lotusnsm.prz Page 1 New esuite Settings in NSM The Lotus esuite Workplace administration option is

Læs mere

Det er muligt at chekce følgende opg. i CodeJudge: og

Det er muligt at chekce følgende opg. i CodeJudge: og Det er muligt at chekce følgende opg. i CodeJudge:.1.7 og.1.14 Exercise 1: Skriv en forløkke, som producerer følgende output: 1 4 9 16 5 36 Bonusopgave: Modificer dit program, så det ikke benytter multiplikation.

Læs mere

Multivariate Extremes and Dependence in Elliptical Distributions

Multivariate Extremes and Dependence in Elliptical Distributions Multivariate Extremes and Dependence in Elliptical Distributions Filip Lindskog, RiskLab, ETH Zürich joint work with Henrik Hult, KTH Stockholm I II III IV V Motivation Elliptical distributions A class

Læs mere

Engelsk. Niveau D. De Merkantile Erhvervsuddannelser September Casebaseret eksamen. og

Engelsk. Niveau D. De Merkantile Erhvervsuddannelser September Casebaseret eksamen.  og 052431_EngelskD 08/09/05 13:29 Side 1 De Merkantile Erhvervsuddannelser September 2005 Side 1 af 4 sider Casebaseret eksamen Engelsk Niveau D www.jysk.dk og www.jysk.com Indhold: Opgave 1 Presentation

Læs mere

How Long Is an Hour? Family Note HOME LINK 8 2

How Long Is an Hour? Family Note HOME LINK 8 2 8 2 How Long Is an Hour? The concept of passing time is difficult for young children. Hours, minutes, and seconds are confusing; children usually do not have a good sense of how long each time interval

Læs mere

Vores mange brugere på musskema.dk er rigtig gode til at komme med kvalificerede ønsker og behov.

Vores mange brugere på musskema.dk er rigtig gode til at komme med kvalificerede ønsker og behov. På dansk/in Danish: Aarhus d. 10. januar 2013/ the 10 th of January 2013 Kære alle Chefer i MUS-regi! Vores mange brugere på musskema.dk er rigtig gode til at komme med kvalificerede ønsker og behov. Og

Læs mere

User Manual for LTC IGNOU

User Manual for LTC IGNOU User Manual for LTC IGNOU 1 LTC (Leave Travel Concession) Navigation: Portal Launch HCM Application Self Service LTC Self Service 1. LTC Advance/Intimation Navigation: Launch HCM Application Self Service

Læs mere

Statistik for MPH: oktober Attributable risk, bestemmelse af stikprøvestørrelse (Silva: , )

Statistik for MPH: oktober Attributable risk, bestemmelse af stikprøvestørrelse (Silva: , ) Statistik for MPH: 7 29. oktober 2015 www.biostat.ku.dk/~pka/mph15 Attributable risk, bestemmelse af stikprøvestørrelse (Silva: 333-365, 381-383) Per Kragh Andersen 1 Fra den 6. uges statistikundervisning:

Læs mere

Particle-based T-Spline Level Set Evolution for 3D Object Reconstruction with Range and Volume Constraints

Particle-based T-Spline Level Set Evolution for 3D Object Reconstruction with Range and Volume Constraints Particle-based T-Spline Level Set for 3D Object Reconstruction with Range and Volume Constraints Robert Feichtinger (joint work with Huaiping Yang, Bert Jüttler) Institute of Applied Geometry, JKU Linz

Læs mere

Bilag. Resume. Side 1 af 12

Bilag. Resume. Side 1 af 12 Bilag Resume I denne opgave, lægges der fokus på unge og ensomhed gennem sociale medier. Vi har i denne opgave valgt at benytte Facebook som det sociale medie vi ligger fokus på, da det er det største

Læs mere

Engelsk. Niveau C. De Merkantile Erhvervsuddannelser September 2005. Casebaseret eksamen. www.jysk.dk og www.jysk.com.

Engelsk. Niveau C. De Merkantile Erhvervsuddannelser September 2005. Casebaseret eksamen. www.jysk.dk og www.jysk.com. 052430_EngelskC 08/09/05 13:29 Side 1 De Merkantile Erhvervsuddannelser September 2005 Side 1 af 4 sider Casebaseret eksamen Engelsk Niveau C www.jysk.dk og www.jysk.com Indhold: Opgave 1 Presentation

Læs mere

Portal Registration. Check Junk Mail for activation . 1 Click the hyperlink to take you back to the portal to confirm your registration

Portal Registration. Check Junk Mail for activation  . 1 Click the hyperlink to take you back to the portal to confirm your registration Portal Registration Step 1 Provide the necessary information to create your user. Note: First Name, Last Name and Email have to match exactly to your profile in the Membership system. Step 2 Click on the

Læs mere

Richter 2013 Presentation Mentor: Professor Evans Philosophy Department Taylor Henderson May 31, 2013

Richter 2013 Presentation Mentor: Professor Evans Philosophy Department Taylor Henderson May 31, 2013 Richter 2013 Presentation Mentor: Professor Evans Philosophy Department Taylor Henderson May 31, 2013 OVERVIEW I m working with Professor Evans in the Philosophy Department on his own edition of W.E.B.

Læs mere

E-PAD Bluetooth hængelås E-PAD Bluetooth padlock E-PAD Bluetooth Vorhängeschloss

E-PAD Bluetooth hængelås E-PAD Bluetooth padlock E-PAD Bluetooth Vorhängeschloss E-PAD Bluetooth hængelås E-PAD Bluetooth padlock E-PAD Bluetooth Vorhängeschloss Brugervejledning (side 2-6) Userguide (page 7-11) Bedienungsanleitung 1 - Hvordan forbinder du din E-PAD hængelås med din

Læs mere

Financial Literacy among 5-7 years old children

Financial Literacy among 5-7 years old children Financial Literacy among 5-7 years old children -based on a market research survey among the parents in Denmark, Sweden, Norway, Finland, Northern Ireland and Republic of Ireland Page 1 Purpose of the

Læs mere

UNISONIC TECHNOLOGIES CO.,

UNISONIC TECHNOLOGIES CO., UNISONIC TECHNOLOGIES CO., 3 TERMINAL 1A NEGATIVE VOLTAGE REGULATOR DESCRIPTION 1 TO-263 The UTC series of three-terminal negative regulators are available in TO-263 package and with several fixed output

Læs mere

GUIDE TIL BREVSKRIVNING

GUIDE TIL BREVSKRIVNING GUIDE TIL BREVSKRIVNING APPELBREVE Formålet med at skrive et appelbrev er at få modtageren til at overholde menneskerettighederne. Det er en god idé at lægge vægt på modtagerens forpligtelser over for

Læs mere

how to save excel as pdf

how to save excel as pdf 1 how to save excel as pdf This guide will show you how to save your Excel workbook as PDF files. Before you do so, you may want to copy several sheets from several documents into one document. To do so,

Læs mere

ATEX direktivet. Vedligeholdelse af ATEX certifikater mv. Steen Christensen stec@teknologisk.dk www.atexdirektivet.

ATEX direktivet. Vedligeholdelse af ATEX certifikater mv. Steen Christensen stec@teknologisk.dk www.atexdirektivet. ATEX direktivet Vedligeholdelse af ATEX certifikater mv. Steen Christensen stec@teknologisk.dk www.atexdirektivet.dk tlf: 7220 2693 Vedligeholdelse af Certifikater / tekniske dossier / overensstemmelseserklæringen.

Læs mere

Brug sømbrættet til at lave sjove figurer. Lav fx: Få de andre til at gætte, hvad du har lavet. Use the nail board to make funny shapes.

Brug sømbrættet til at lave sjove figurer. Lav fx: Få de andre til at gætte, hvad du har lavet. Use the nail board to make funny shapes. Brug sømbrættet til at lave sjove figurer. Lav f: Et dannebrogsflag Et hus med tag, vinduer og dør En fugl En bil En blomst Få de andre til at gætte, hvad du har lavet. Use the nail board to make funn

Læs mere

RoE timestamp and presentation time in past

RoE timestamp and presentation time in past RoE timestamp and presentation time in past Jouni Korhonen Broadcom Ltd. 5/26/2016 9 June 2016 IEEE 1904 Access Networks Working Group, Hørsholm, Denmark 1 Background RoE 2:24:6 timestamp was recently

Læs mere

IPv6 Application Trial Services. 2003/08/07 Tomohide Nagashima Japan Telecom Co., Ltd.

IPv6 Application Trial Services. 2003/08/07 Tomohide Nagashima Japan Telecom Co., Ltd. IPv6 Application Trial Services 2003/08/07 Tomohide Nagashima Japan Telecom Co., Ltd. Outline Our Trial Service & Technology Details Activity & Future Plan 2 Outline Our Trial Service & Technology Details

Læs mere

Popular Sorting Algorithms CHAPTER 7: SORTING & SEARCHING. Popular Sorting Algorithms. Selection Sort 4/23/2013

Popular Sorting Algorithms CHAPTER 7: SORTING & SEARCHING. Popular Sorting Algorithms. Selection Sort 4/23/2013 Popular Sorting Algorithms CHAPTER 7: SORTING & SEARCHING Introduction to Computer Science Using Ruby Computers spend a tremendous amount of time sorting The sorting problem: given a list of elements in

Læs mere

what is this all about? Introduction three-phase diode bridge rectifier input voltages input voltages, waveforms normalization of voltages voltages?

what is this all about? Introduction three-phase diode bridge rectifier input voltages input voltages, waveforms normalization of voltages voltages? what is this all about? v A Introduction three-phase diode bridge rectifier D1 D D D4 D5 D6 i OUT + v OUT v B i 1 i i + + + v 1 v v input voltages input voltages, waveforms v 1 = V m cos ω 0 t v = V m

Læs mere

Userguide. NN Markedsdata. for. Microsoft Dynamics CRM 2011. v. 1.0

Userguide. NN Markedsdata. for. Microsoft Dynamics CRM 2011. v. 1.0 Userguide NN Markedsdata for Microsoft Dynamics CRM 2011 v. 1.0 NN Markedsdata www. Introduction Navne & Numre Web Services for Microsoft Dynamics CRM hereafter termed NN-DynCRM enable integration to Microsoft

Læs mere

1 What is the connection between Lee Harvey Oswald and Russia? Write down three facts from his file.

1 What is the connection between Lee Harvey Oswald and Russia? Write down three facts from his file. Lee Harvey Oswald 1 Lee Harvey Oswald s profile Read Oswald s profile. Answer the questions. 1 What is the connection between Lee Harvey Oswald and Russia? Write down three facts from his file. 2 Oswald

Læs mere

The GAssist Pittsburgh Learning Classifier System. Dr. J. Bacardit, N. Krasnogor G53BIO - Bioinformatics

The GAssist Pittsburgh Learning Classifier System. Dr. J. Bacardit, N. Krasnogor G53BIO - Bioinformatics The GAssist Pittsburgh Learning Classifier System Dr. J. Bacardit, N. Krasnogor G53BIO - Outline bioinformatics Summary and future directions Objectives of GAssist GAssist [Bacardit, 04] is a Pittsburgh

Læs mere

Den nye Eurocode EC Geotenikerdagen Morten S. Rasmussen

Den nye Eurocode EC Geotenikerdagen Morten S. Rasmussen Den nye Eurocode EC1997-1 Geotenikerdagen Morten S. Rasmussen UDFORDRINGER VED EC 1997-1 HVAD SKAL VI RUNDE - OPBYGNINGEN AF DE NYE EUROCODES - DE STØRSTE UDFORDRINGER - ER DER NOGET POSITIVT? 2 OPBYGNING

Læs mere

Design til digitale kommunikationsplatforme-f2013

Design til digitale kommunikationsplatforme-f2013 E-travellbook Design til digitale kommunikationsplatforme-f2013 ITU 22.05.2013 Dreamers Lana Grunwald - svetlana.grunwald@gmail.com Iya Murash-Millo - iyam@itu.dk Hiwa Mansurbeg - hiwm@itu.dk Jørgen K.

Læs mere

Optimal Aggregation Algorithms for Middleware

Optimal Aggregation Algorithms for Middleware Optimal Aggregation Algorithms for Middleware Ronald Fagin Amnon Lotem y Moni Naor z Abstract: Assume that each object in a database has m grades, or scores, one for each of m attributes. For example,

Læs mere

Special VFR. - ved flyvning til mindre flyveplads uden tårnkontrol som ligger indenfor en kontrolzone

Special VFR. - ved flyvning til mindre flyveplads uden tårnkontrol som ligger indenfor en kontrolzone Special VFR - ved flyvning til mindre flyveplads uden tårnkontrol som ligger indenfor en kontrolzone SERA.5005 Visual flight rules (a) Except when operating as a special VFR flight, VFR flights shall be

Læs mere

F o r t o l k n i n g e r a f m a n d a l a e r i G I M - t e r a p i

F o r t o l k n i n g e r a f m a n d a l a e r i G I M - t e r a p i F o r t o l k n i n g e r a f m a n d a l a e r i G I M - t e r a p i - To fortolkningsmodeller undersøgt og sammenlignet ifm. et casestudium S i g r i d H a l l b e r g Institut for kommunikation Aalborg

Læs mere

Remember the Ship, Additional Work

Remember the Ship, Additional Work 51 (104) Remember the Ship, Additional Work Remember the Ship Crosswords Across 3 A prejudiced person who is intolerant of any opinions differing from his own (5) 4 Another word for language (6) 6 The

Læs mere

Molio specifications, development and challenges. ICIS DA 2019 Portland, Kim Streuli, Molio,

Molio specifications, development and challenges. ICIS DA 2019 Portland, Kim Streuli, Molio, Molio specifications, development and challenges ICIS DA 2019 Portland, Kim Streuli, Molio, 2019-06-04 Introduction The current structure is challenged by different factors. These are for example : Complex

Læs mere

frame bracket Ford & Dodge

frame bracket Ford & Dodge , Rev 3 02/19 frame bracket 8552005 Ford & Dodge ITEM PART # QTY DESCRIPTION 1 00083 8 NUT,.50NC HEX 2 00084 8 WASHER,.50 LOCK 3 14189-76 2 FRAME BRACKET 4 14194-76 1 411AL FRAME BRACKET PASSENGER SIDE

Læs mere

Trolling Master Bornholm 2014

Trolling Master Bornholm 2014 Trolling Master Bornholm 2014 (English version further down) Den ny havn i Tejn Havn Bornholms Regionskommune er gået i gang med at udvide Tejn Havn, og det er med til at gøre det muligt, at vi kan være

Læs mere

Observation Processes:

Observation Processes: Observation Processes: Preparing for lesson observations, Observing lessons Providing formative feedback Gerry Davies Faculty of Education Preparing for Observation: Task 1 How can we help student-teachers

Læs mere

Info og krav til grupper med motorkøjetøjer

Info og krav til grupper med motorkøjetøjer Info og krav til grupper med motorkøjetøjer (English version, see page 4) GENERELT - FOR ALLE TYPER KØRETØJER ØJER GODT MILJØ FOR ALLE Vi ønsker at paraden er en god oplevelse for alle deltagere og tilskuere,

Læs mere

Statistical information form the Danish EPC database - use for the building stock model in Denmark

Statistical information form the Danish EPC database - use for the building stock model in Denmark Statistical information form the Danish EPC database - use for the building stock model in Denmark Kim B. Wittchen Danish Building Research Institute, SBi AALBORG UNIVERSITY Certification of buildings

Læs mere

PMDK PC-Side Basic Function Reference (Version 1.0)

PMDK PC-Side Basic Function Reference (Version 1.0) PMDK PC-Side Basic Function Reference (Version 1.0) http://www.icpdas.com PMDK PC-Side Basic Function Reference V 1.0 1 Warranty All products manufactured by ICPDAS Inc. are warranted against defective

Læs mere

DK - Quick Text Translation. HEYYER Net Promoter System Magento extension

DK - Quick Text Translation. HEYYER Net Promoter System Magento extension DK - Quick Text Translation HEYYER Net Promoter System Magento extension Version 1.0 15-11-2013 HEYYER / Email Templates Invitation Email Template Invitation Email English Dansk Title Invitation Email

Læs mere

Bookingmuligheder for professionelle brugere i Dansehallerne 2015-16

Bookingmuligheder for professionelle brugere i Dansehallerne 2015-16 Bookingmuligheder for professionelle brugere i Dansehallerne 2015-16 Modtager man økonomisk støtte til et danseprojekt, har en premieredato og er professionel bruger af Dansehallerne har man mulighed for

Læs mere

Generelt om faget: - Hvordan vurderer du dit samlede udbytte af dette fag?

Generelt om faget: - Hvordan vurderer du dit samlede udbytte af dette fag? Fag: Monetary Policy % 46 Samlet status % 5% 5% 75% % Ny % Distribueret 63% 9 Nogen svar % Gennemført 37% 7 Frafaldet % % 5% 5% 75% % Generelt om faget: - Hvordan vurderer du dit samlede udbytte af dette

Læs mere

Handling Sporadic Tasks in Off- Line Scheduled Distributed Real Time Systems

Handling Sporadic Tasks in Off- Line Scheduled Distributed Real Time Systems Handling Sporadic Tasks in Off- Line Scheduled Distributed Real Time Systems Damir Isović & Gerhard Fohler Department of Computer Engineering Mälardalen University, Sweden Presented by : Aseem Lalani Outline

Læs mere

NOTIFICATION. - An expression of care

NOTIFICATION. - An expression of care NOTIFICATION - An expression of care Professionals who work with children and young people have a special responsibility to ensure that children who show signs of failure to thrive get the wright help.

Læs mere

LESSON NOTES Extensive Reading in Danish for Intermediate Learners #8 How to Interview

LESSON NOTES Extensive Reading in Danish for Intermediate Learners #8 How to Interview LESSON NOTES Extensive Reading in Danish for Intermediate Learners #8 How to Interview CONTENTS 2 Danish 5 English # 8 COPYRIGHT 2019 INNOVATIVE LANGUAGE LEARNING. ALL RIGHTS RESERVED. DANISH 1. SÅDAN

Læs mere

Nyhedsmail, december 2013 (scroll down for English version)

Nyhedsmail, december 2013 (scroll down for English version) Nyhedsmail, december 2013 (scroll down for English version) Kære Omdeler Julen venter rundt om hjørnet. Og netop julen er årsagen til, at NORDJYSKE Distributions mange omdelere har ekstra travlt med at

Læs mere

Introduction Ronny Bismark

Introduction Ronny Bismark Introduction 1 Outline Motivation / Problem Statement Tool holder Sensor calibration Motion primitive Concatenation of clouds Segmentation Next possible pose Problems and Challenges Future Work 2 Motivation

Læs mere

Small Autonomous Devices in civil Engineering. Uses and requirements. By Peter H. Møller Rambøll

Small Autonomous Devices in civil Engineering. Uses and requirements. By Peter H. Møller Rambøll Small Autonomous Devices in civil Engineering Uses and requirements By Peter H. Møller Rambøll BACKGROUND My Background 20+ years within evaluation of condition and renovation of concrete structures Last

Læs mere

applies equally to HRT and tibolone this should be made clear by replacing HRT with HRT or tibolone in the tibolone SmPC.

applies equally to HRT and tibolone this should be made clear by replacing HRT with HRT or tibolone in the tibolone SmPC. Annex I English wording to be implemented SmPC The texts of the 3 rd revision of the Core SPC for HRT products, as published on the CMD(h) website, should be included in the SmPC. Where a statement in

Læs mere

To the reader: Information regarding this document

To the reader: Information regarding this document To the reader: Information regarding this document All text to be shown to respondents in this study is going to be in Danish. The Danish version of the text (the one, respondents are going to see) appears

Læs mere

DENCON ARBEJDSBORDE DENCON DESKS

DENCON ARBEJDSBORDE DENCON DESKS DENCON ARBEJDSBORDE Mennesket i centrum betyder, at vi tager hensyn til kroppen og kroppens funktioner. Fordi vi ved, at det er vigtigt og sundt jævnligt at skifte stilling, når man arbejder. Bevægelse

Læs mere

Boligsøgning / Search for accommodation!

Boligsøgning / Search for accommodation! Boligsøgning / Search for accommodation! For at guide dig frem til den rigtige vejledning, skal du lige svare på et par spørgsmål: To make sure you are using the correct guide for applying you must answer

Læs mere

Fejlbeskeder i SMDB. Business Rules Fejlbesked Kommentar. Validate Business Rules. Request- ValidateRequestRegist ration (Rules :1)

Fejlbeskeder i SMDB. Business Rules Fejlbesked Kommentar. Validate Business Rules. Request- ValidateRequestRegist ration (Rules :1) Fejlbeskeder i SMDB Validate Business Rules Request- ValidateRequestRegist ration (Rules :1) Business Rules Fejlbesked Kommentar the municipality must have no more than one Kontaktforløb at a time Fejl

Læs mere

Appendix 1: Interview guide Maria og Kristian Lundgaard-Karlshøj, Ausumgaard

Appendix 1: Interview guide Maria og Kristian Lundgaard-Karlshøj, Ausumgaard Appendix 1: Interview guide Maria og Kristian Lundgaard-Karlshøj, Ausumgaard Fortæl om Ausumgaard s historie Der er hele tiden snak om værdier, men hvad er det for nogle værdier? uddyb forklar definer

Læs mere

The River Underground, Additional Work

The River Underground, Additional Work 39 (104) The River Underground, Additional Work The River Underground Crosswords Across 1 Another word for "hard to cope with", "unendurable", "insufferable" (10) 5 Another word for "think", "believe",

Læs mere

Trolling Master Bornholm 2015

Trolling Master Bornholm 2015 Trolling Master Bornholm 2015 (English version further down) Panorama billede fra starten den første dag i 2014 Michael Koldtoft fra Trolling Centrum har brugt lidt tid på at arbejde med billederne fra

Læs mere

Engineering of Chemical Register Machines

Engineering of Chemical Register Machines Prague International Workshop on Membrane Computing 2008 R. Fassler, T. Hinze, T. Lenser and P. Dittrich {raf,hinze,thlenser,dittrich}@minet.uni-jena.de 2. June 2008 Outline 1 Motivation Goal Realization

Læs mere

Dagens program. Incitamenter 4/19/2018 INCITAMENTSPROBLEMER I FORBINDELSE MED DRIFTSFORBEDRINGER. Incitamentsproblem 1 Understøttes procesforbedringer

Dagens program. Incitamenter 4/19/2018 INCITAMENTSPROBLEMER I FORBINDELSE MED DRIFTSFORBEDRINGER. Incitamentsproblem 1 Understøttes procesforbedringer INCITAMENTSPROBLEMER I FORBINDELSE MED DRIFTSFORBEDRINGER Ivar Friis, Institut for produktion og erhvervsøkonomi, CBS 19. april Alumni oplæg Dagens program 2 Incitamentsproblem 1 Understøttes procesforbedringer

Læs mere

CS 4390/5387 SOFTWARE V&V LECTURE 5 BLACK-BOX TESTING - 2

CS 4390/5387 SOFTWARE V&V LECTURE 5 BLACK-BOX TESTING - 2 1 CS 4390/5387 SOFTWARE V&V LECTURE 5 BLACK-BOX TESTING - 2 Outline 2 HW Solution Exercise (Equivalence Class Testing) Exercise (Decision Table Testing) Pairwise Testing Exercise (Pairwise Testing) 1 Homework

Læs mere

Web-seminar. 30 March Noter

Web-seminar. 30 March Noter Web-seminar 30 March 2017 Noter Følg mig på www.tomhougaard.dk Hvad er Day Trading og Spekulation? Attachment is the great fabricator of illusions; reality can be attained only by someone who is detached.

Læs mere

University of Copenhagen Faculty of Science Written Exam - 8. April 2008. Algebra 3

University of Copenhagen Faculty of Science Written Exam - 8. April 2008. Algebra 3 University of Copenhagen Faculty of Science Written Exam - 8. April 2008 Algebra 3 This exam contains 5 exercises which are to be solved in 3 hours. The exercises are posed in an English and in a Danish

Læs mere

Central Statistical Agency.

Central Statistical Agency. Central Statistical Agency www.csa.gov.et 1 Outline Introduction Characteristics of Construction Aim of the Survey Methodology Result Conclusion 2 Introduction Meaning of Construction Construction may

Læs mere

Gusset Plate Connections in Tension

Gusset Plate Connections in Tension Gusset Plate Connections in Tension Jakob Schmidt Olsen BSc Thesis Department of Civil Engineering 2014 DTU Civil Engineering June 2014 i Preface This project is a BSc project credited 20 ECTS points written

Læs mere

Melbourne Mercer Global Pension Index

Melbourne Mercer Global Pension Index 15 October 2009 Melbourne Global Pension Index Dr David Knox www.mercer.com.au The Genesis Victorian Government wants to highlight the significant role that Melbourne plays in the pension and funds management

Læs mere