Data Structures and Algorithm Design
|
|
- Elke Bach
- vor 6 Jahren
- Abrufe
Transkript
1 - University of Applied Sciences - Data Structures and Algorithm Design - CSCI Friedhelm Seutter Institut für Angewandte Informatik Contents 1. Analyzing Algorithms and Problems 2. Data Abstraction 3. Recursion and Induction 4. Sorting 6. Dynamic Sets and Searching 7. Graphs and Graph Traversals 8. Optimization and Greedy Algorithms 10. Dynamic Programming 13. NP-Complete Problems Institut für Angewandte Informatik 2 1
2 6. Dynamic Sets and Searching Dynamic Sets Array Doubling and Amortized Time Analysis Red-Black Trees and Binary Search Hashing Disjoint Sets Institut für Angewandte Informatik 3 Dynamic Sets A dynamic set is a set whose membership varies during computation. The sets initially have a certain number of members, including 0, and then elements are inserted or deleted as the computation progresses. The maximum size to which the set might grow is not known in advance. Institut für Angewandte Informatik 4 2
3 Dynamic and Static Data Structures Static: Size is set at compile time and not changeable at run time, e. g. array. Dynamic: Size is changeable at run time, e. g. linked list, tree. Institut für Angewandte Informatik 5 Dynamic and Static Data Structures To avoid the overhead for managing dynamic data structures an array with space largest as possible is allocated, usually not very satisfactory, although very common. More flexible is to allocate a small array initially and doubling its size whenever it becomes apparent that it is too small (and halving whenever becoming too big). Institut für Angewandte Informatik 6 3
4 Array Doubling The initial array size has to be specified. A counter for the number of entries currently being in the array has to be provided and maintained. The size of the array has to be doubled whenever the counter reaches the actual array size. The previous elements have to be transferred into the new array after doubling. Institut für Angewandte Informatik 7 Complexity of Array Doubling All operations on the array but the transfer operation need constant time, i.e. Θ(1). The transfer operation for inserting the n elements of the previous array into the new array needs linear time, i.e. Θ(n). The worst-case insertion complexity is Θ(n). Institut für Angewandte Informatik 8 4
5 Amortized Time Analysis The complexity for an individual operation of the same type may vary widely, e.g. Θ(1) to Θ(n). But the total time for a sequence of operations may be much less than the worst-case time for one operation multiplied by the length of the sequence. The large costs of one operation is spread out over many less expensive operations, thus in average the cost of an operation is kept small. Institut für Angewandte Informatik 9 Amortized Time Analysis The costs of each individual operation is computed by: amortized cost = actual cost + accounting cost Goals The sum of accounting costs over any legal sequence of operations is nonnegative. Although the actual cost may vary widely from one operation to the next, the amortized cost is fairly regular. Institut für Angewandte Informatik 10 5
6 Amortized Time Analysis The total amortized cost of a sequence of operations starting from the creation of the object is an upper bound on the total actual cost and therefore amenable to complexity analysis. Institut für Angewandte Informatik 11 Analogy Savings Account When times are good, an extra deposit is made for bad times. When the bad time arrives, with an unusually expensive operation, a withdrawal is made. To remain solvent, the account balance cannot go negative. Institut für Angewandte Informatik 12 6
7 Accounting Scheme Main Ideas Normal individual operations should have positive accounting costs. The unusually expensive individual operations should have negative accounting costs. The sum of positive accounting costs should offset the unusual expense and prevent the amortized cost from going negative. Institut für Angewandte Informatik 13 Example A stack with its operations push and pop is implemented with an array and array doubling, whenever the stack overflows. Actual cost of push and pop without resizing: 1 Actual cost of push with resizing from n to 2n: 1+nt, for some constant t Institut für Angewandte Informatik 14 7
8 Accounting Scheme Example Accounting cost of push without resizing: 2t Accounting cost of push with resizing from n to 2n: - nt + 2t Accounting cost of pop: 0 (Factor 2 guarantees the accounting costs not to become negative.) Institut für Angewandte Informatik 15 Accounting Scheme Example push operation Stack size Sum of accounting costs 1 N 2t N N 2Nt N+1 2N Nt+2t 2N 2N 3Nt 2N+1 4N Nt+2t 4N 4N 5Nt 4N+1 8N Nt+2t Institut für Angewandte Informatik 16 8
9 Amortized Cost Example actual accounting amortized push operation cost cost cost 1 1 2t 1+2t N N 2Nt N(1+2t) N+1 Nt+1+N Nt+2t (N+1)(1+2t) 2N Nt+2N 3Nt 2N(1+2t) 2N+1 3Nt+2N+1 Nt+2t (2N+1)(1+2t) 4N 3Nt+4N 5Nt 4N(1+2t) 4N+1 7Nt+4N+1 Nt+2t (4N+1)(1+2t) Institut für Angewandte Informatik 17 Amortized Cost Example The amortized cost of each push operation is 1+2t, independent of array doubling or not. The amortized cost of each pop operation is 1. Thus in the worst case both operations have an amortized cost (complexity) of Θ(1). Institut für Angewandte Informatik 18 9
10 Red-Black Trees Red-black trees are binary trees which satisfy the structural requirement that its height is within a factor of two of the height of the most balanced binary tree with n nodes, i. e. its height cannot exceed 2 lg(n+1). Red-black trees are thus almost balanced. Institut für Angewandte Informatik 19 Binary Search Tree Institut für Angewandte Informatik 20 10
11 Binary Search Tree Institut für Angewandte Informatik 21 Binary Search Tree Institut für Angewandte Informatik 22 11
12 Worst-case Complexity Depending on the height h: W(h) = Θ(h) Depending on the number of nodes n: In any tree: W(n) = Θ(n) In a balanced tree: W(n) = Θ( lg n) Institut für Angewandte Informatik 23 Red-Black Trees and External Nodes In red-black trees empty subtrees are treated as a special kind of node, called external node. An external node doesn t have any children and doesn t contain any data, including a key. All other nodes are called internal nodes. They contain data, including the key, and must have two children. Institut für Angewandte Informatik 24 12
13 Red-Black Trees Institut für Angewandte Informatik 25 Red-Black Tree Institut für Angewandte Informatik 26 13
14 Size and Depth of Red-Black Trees Institut für Angewandte Informatik 27 Height of Red-Black Trees Institut für Angewandte Informatik 28 14
15 Insertion into Red-Black Trees Insertion of the node at a position of an external node considering the binary search tree property. In case of a color constraint violation two nodes must flip colors, and, if necessary, a subtree must be rebalanced. Institut für Angewandte Informatik 29 Insertion Institut für Angewandte Informatik 30 15
16 Insertion Institut für Angewandte Informatik 31 Insertion Institut für Angewandte Informatik 32 16
17 Deletion from Red-Black Trees Locate the node to be logically deleted, call it u. If the right child of u is an external node, identify u as the node to be structurally deleted. If the right child of u is an internal node, find the tree successor of u, copy the key and information from that node to u. Identify the tree successor as the node to be structurally deleted. Carry out the structurally deletion and repair any imbalance of black height. Institut für Angewandte Informatik 33 Deletion Institut für Angewandte Informatik 34 17
18 Deletion Institut für Angewandte Informatik 35 Complexity Given a red-black search tree with n nodes. Worst-case insertion time is in Θ(log n). Worst-case deletion time is in Θ(log n). Institut für Angewandte Informatik 36 18
19 Hashing Hashing is a technique used to map keys of data from a large key space into a smaller index space of an array for storing the keys and the data or a reference to the data in the array. Hashing is used to implement a Dictionary ADT, for example. Institut für Angewandte Informatik 37 Direct Addressing Institut für Angewandte Informatik 38 19
20 Direct Addressing Key k and its data is stored in the array T at position T[k]. Key space must be equal to index space (in number and in values). Complexity of dictionary operations: Θ(1) Institut für Angewandte Informatik 39 Hashing The key space is extremely large but only a few are actually used. The size of the index space has to be adjusted to the actual number of keys. The keys are not restricted to numerical values. Institut für Angewandte Informatik 40 20
21 Hashing Keys and data or its references are stored in an array, called hash table H[0.. h-1]. A hash function maps a key k to an index c(k) of the hash table. The index also is called hash code of the key, 0 c(k) h-1. Several keys may be mapped to the same hash code. That event is called a collision. Institut für Angewandte Informatik 41 Closed Address Hashing Closed address hashing or chained hashing is a technique where collisions are resolved by storing all elements having the same hash code in linked lists. Initially these linked lists are empty. The load factor of the hash table is the average number of elements over all linked lists, α = n/h. (h number of entries in H, n number of currently stored elements.) Institut für Angewandte Informatik 42 21
22 Chained Hashing Institut für Angewandte Informatik 43 Complexity of Search Sum of costs for computing the hash code, accessing the hash table and searching in the linked list. Best and worst case: B(n) = Θ(1) W(n) = Θ(n) Institut für Angewandte Informatik 44 22
23 Complexity of Search Average case: Assume the hash code for each key is equally likely. A(n) = Θ(1+α) If n Θ(h), which can be accomplished by array doubling, then: A(n) = Θ(1) Institut für Angewandte Informatik 45 Open Address Hashing Open address hashing is a technique where collisions are resolved within the hash table by looking for an empty location, called rehashing. Rehashing by linear probing: rehash(j) = (j+1) mod h The load factor always is less than or equal to 1. Institut für Angewandte Informatik 46 23
24 Hash Functions A good hash function spreads the hash codes fairly evenly over the entire range of the hash table entries. Number of collisions should be minimized. Computing the hash code should be in Θ(1). Institut für Angewandte Informatik 47 Hash Functions Example: hash(k) = (a k) mod h (for some constant a) If k is not an integer, e.g. of string type, a function is needed to convert k to an integer. Institut für Angewandte Informatik 48 24
25 Disjoint Sets A disjoint set is a structure for a set (a collection) of sets, S = {S 1, S 2,..., S n }. The elements S i and S j are pairwise disjoint, 1 i < j n. Institut für Angewandte Informatik 49 Operations of Disjoint Sets makeset(x): Creates a set containing the element x. findset(x): union(x,y): Finds the representative of the set which x is a member of. Finds the representatives of the sets which x and y are members of, unites the sets, and destructs the original sets of x and y. Institut für Angewandte Informatik 50 25
26 Implementation (for example) A set of a collection of sets can be implemented as a linked list. The first element is the representative of the set. New elements are inserted at the end of the list (there may be a pointer to the end of the list). Each element has a pointer to the set s representative (first element of the list). Institut für Angewandte Informatik 51 Union-Find Program Create a collection of n disjoint sets, each containing a single element. Any sequence of union or find operations following then is called a Union-Find program. The length of such a program is the number of union and find operations. The makeset operations of the creation process are not counted. Institut für Angewandte Informatik 52 26
27 Union-Find Program (example) Let {{1}, {2}, {3},, {n}} be a collection of n disjoint sets. 1. union(1, 2) 2. union(2, 3)... n-1. union(n-1, n) n. findset(1)... m. findset(1) Institut für Angewandte Informatik 53 Worst-case Complexity (list implementation) The complexity of find is Θ(1). The complexity of union is Θ(k), if k is cardinality of the smaller set of the union. (These elements have to be relinked to the new representative.) A Union-Find program of n sets and length m then has a worst-case complexity of Θ(mn). The amortized worst-case complexity per operation then is Θ(n). Institut für Angewandte Informatik 54 27
28 Implementation (another example) A set of a collection of sets can be implemented as a tree. The root is the representative of the set. Each element has a pointer to its parent, for finding its representative. For a union the tree of smaller cardinality becomes a subtree of the other root. Paths from an element to the root are kept as short as possible. Institut für Angewandte Informatik 55 Worst-case Complexity (tree implementation) A Union-Find program on a set of n elements and length m has a worst-case complexity of Θ((n+m) lg*(n)). Institut für Angewandte Informatik 56 28
Priority search queues: Loser trees
Priority search queues: Loser trees Advanced Algorithms & Data Structures Lecture Theme 06 Tobias Lauer Summer Semester 2006 Recap Begriffe: Pennant, Top node Linien gestrichelt vs. durchgezogen Intro
MehrGeometrie und Bedeutung: Kap 5
: Kap 5 21. November 2011 Übersicht Der Begriff des Vektors Ähnlichkeits Distanzfunktionen für Vektoren Skalarprodukt Eukidische Distanz im R n What are vectors I Domininic: Maryl: Dollar Po Euro Yen 6
MehrIngenics Project Portal
Version: 00; Status: E Seite: 1/6 This document is drawn to show the functions of the project portal developed by Ingenics AG. To use the portal enter the following URL in your Browser: https://projectportal.ingenics.de
Mehreurex rundschreiben 094/10
eurex rundschreiben 094/10 Datum: Frankfurt, 21. Mai 2010 Empfänger: Alle Handelsteilnehmer der Eurex Deutschland und Eurex Zürich sowie Vendoren Autorisiert von: Jürg Spillmann Weitere Informationen zur
MehrExercise (Part II) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1
Exercise (Part II) Notes: The exercise is based on Microsoft Dynamics CRM Online. For all screenshots: Copyright Microsoft Corporation. The sign ## is you personal number to be used in all exercises. All
MehrMitglied der Leibniz-Gemeinschaft
Methods of research into dictionary use: online questionnaires Annette Klosa (Institut für Deutsche Sprache, Mannheim) 5. Arbeitstreffen Netzwerk Internetlexikografie, Leiden, 25./26. März 2013 Content
MehrNEWSLETTER. FileDirector Version 2.5 Novelties. Filing system designer. Filing system in WinClient
Filing system designer FileDirector Version 2.5 Novelties FileDirector offers an easy way to design the filing system in WinClient. The filing system provides an Explorer-like structure in WinClient. The
MehrGetting started with MillPlus IT V530 Winshape
Getting started with MillPlus IT V530 Winshape Table of contents: Deutsche Bedienungshinweise zur MillPlus IT V530 Programmierplatz... 3 English user directions to the MillPlus IT V530 Programming Station...
MehrContext-adaptation based on Ontologies and Spreading Activation
-1- Context-adaptation based on Ontologies and Spreading Activation ABIS 2007, Halle, 24.09.07 {hussein,westheide,ziegler}@interactivesystems.info -2- Context Adaptation in Spreadr Pubs near my location
MehrAlgorithms & Datastructures Midterm Test 1
Algorithms & Datastructures Midterm Test 1 Wolfgang Pausch Heiko Studt René Thiemann Tomas Vitvar
MehrCorporate Digital Learning, How to Get It Right. Learning Café
0 Corporate Digital Learning, How to Get It Right Learning Café Online Educa Berlin, 3 December 2015 Key Questions 1 1. 1. What is the unique proposition of digital learning? 2. 2. What is the right digital
MehrExercise (Part XI) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1
Exercise (Part XI) Notes: The exercise is based on Microsoft Dynamics CRM Online. For all screenshots: Copyright Microsoft Corporation. The sign ## is you personal number to be used in all exercises. All
Mehrp^db=`oj===pìééçêíáåñçêã~íáçå=
p^db=`oj===pìééçêíáåñçêã~íáçå= How to Disable User Account Control (UAC) in Windows Vista You are attempting to install or uninstall ACT! when Windows does not allow you access to needed files or folders.
MehrRisiko Datensicherheit End-to-End-Verschlüsselung von Anwendungsdaten. Peter Kirchner Microsoft Deutschland GmbH
Risiko Datensicherheit End-to-End-Verschlüsselung von Anwendungsdaten Peter Kirchner Microsoft Deutschland GmbH RISIKO Datensicherheit NSBNKPDA kennt alle ihre Geheimnisse! Unterschleißheim Jüngste Studien
MehrAlgorithms for graph visualization
Algorithms for graph visualization Project - Orthogonal Grid Layout with Small Area W INTER SEMESTER 2013/2014 Martin No llenburg KIT Universita t des Landes Baden-Wu rttemberg und nationales Forschungszentrum
MehrAsynchronous Generators
Asynchronous Generators Source: ABB 1/21 2. Asynchronous Generators 1. Induction generator with squirrel cage rotor 2. Induction generator with woed rotor Source: electricaleasy.com 2/21 2.1. Induction
Mehrp^db=`oj===pìééçêíáåñçêã~íáçå=
p^db=`oj===pìééçêíáåñçêã~íáçå= Error: "Could not connect to the SQL Server Instance" or "Failed to open a connection to the database." When you attempt to launch ACT! by Sage or ACT by Sage Premium for
MehrKlausur Verteilte Systeme
Klausur Verteilte Systeme SS 2005 by Prof. Walter Kriha Klausur Verteilte Systeme: SS 2005 by Prof. Walter Kriha Note Bitte ausfüllen (Fill in please): Vorname: Nachname: Matrikelnummer: Studiengang: Table
MehrLehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str. 3 07743 Jena
Lehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str. 3 07743 Jena http://www.im.uni-jena.de Contents I. Learning Objectives II. III. IV. Recap
Mehr1. General information... 2 2. Login... 2 3. Home... 3 4. Current applications... 3
User Manual for Marketing Authorisation and Lifecycle Management of Medicines Inhalt: User Manual for Marketing Authorisation and Lifecycle Management of Medicines... 1 1. General information... 2 2. Login...
MehrExercise (Part VIII) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1
Exercise (Part VIII) Notes: The exercise is based on Microsoft Dynamics CRM Online. For all screenshots: Copyright Microsoft Corporation. The sign ## is you personal number to be used in all exercises.
MehrELBA2 ILIAS TOOLS AS SINGLE APPLICATIONS
ELBA2 ILIAS TOOLS AS SINGLE APPLICATIONS An AAA/Switch cooperative project run by LET, ETH Zurich, and ilub, University of Bern Martin Studer, ilub, University of Bern Julia Kehl, LET, ETH Zurich 1 Contents
MehrWP2. Communication and Dissemination. Wirtschafts- und Wissenschaftsförderung im Freistaat Thüringen
WP2 Communication and Dissemination Europa Programm Center Im Freistaat Thüringen In Trägerschaft des TIAW e. V. 1 GOALS for WP2: Knowledge information about CHAMPIONS and its content Direct communication
MehrMATLAB driver for Spectrum boards
MATLAB driver for Spectrum boards User Manual deutsch/english SPECTRUM SYSTEMENTWICKLUNG MICROELECTRONIC GMBH AHRENSFELDER WEG 13-17 22927 GROSSHANSDORF GERMANY TEL.: +49 (0)4102-6956-0 FAX: +49 (0)4102-6956-66
MehrAS Path-Prepending in the Internet And Its Impact on Routing Decisions
(SEP) Its Impact on Routing Decisions Zhi Qi ytqz@mytum.de Advisor: Wolfgang Mühlbauer Lehrstuhl für Netzwerkarchitekturen Background Motivation BGP -> core routing protocol BGP relies on policy routing
MehrInequality Utilitarian and Capabilities Perspectives (and what they may imply for public health)
Inequality Utilitarian and Capabilities Perspectives (and what they may imply for public health) 1 Utilitarian Perspectives on Inequality 2 Inequalities matter most in terms of their impact onthelivesthatpeopleseektoliveandthethings,
MehrWählen Sie das MySQL Symbol und erstellen Sie eine Datenbank und einen dazugehörigen User.
1 English Description on Page 5! German: Viele Dank für den Kauf dieses Produktes. Im nachfolgenden wird ausführlich die Einrichtung des Produktes beschrieben. Für weitere Fragen bitte IM an Hotmausi Congrejo.
MehrAfter sales product list After Sales Geräteliste
GMC-I Service GmbH Thomas-Mann-Str. 20 90471 Nürnberg e-mail:service@gossenmetrawatt.com After sales product list After Sales Geräteliste Ladies and Gentlemen, (deutsche Übersetzung am Ende des Schreibens)
MehrRelease Notes BRICKware 7.5.4. Copyright 23. March 2010 Funkwerk Enterprise Communications GmbH Version 1.0
Release Notes BRICKware 7.5.4 Copyright 23. March 2010 Funkwerk Enterprise Communications GmbH Version 1.0 Purpose This document describes new features, changes, and solved problems of BRICKware 7.5.4.
MehrGerman Geography Cookie Unit Haley Crittenden Gordon German Teacher Lee High School & Key Middle School (adapted from Angelika Becker)
German Geography Cookie Unit Haley Crittenden Gordon German Teacher Lee High School & Key Middle School (adapted from Angelika Becker) Goal Students will learn about the physical geography of Germany,
MehrEinkommensaufbau mit FFI:
For English Explanation, go to page 4. Einkommensaufbau mit FFI: 1) Binäre Cycle: Eine Position ist wie ein Business-Center. Ihr Business-Center hat zwei Teams. Jedes mal, wenn eines der Teams 300 Punkte
MehrUSBASIC SAFETY IN NUMBERS
USBASIC SAFETY IN NUMBERS #1.Current Normalisation Ropes Courses and Ropes Course Elements can conform to one or more of the following European Norms: -EN 362 Carabiner Norm -EN 795B Connector Norm -EN
MehrDie Datenmanipulationssprache SQL
Die Datenmanipulationssprache SQL Daten eingeben Daten ändern Datenbank-Inhalte aus Dateien laden Seite 1 Data Manipulation Language A DML statement is executed when you Add new rows to a table Modify
MehrGroup and Session Management for Collaborative Applications
Diss. ETH No. 12075 Group and Session Management for Collaborative Applications A dissertation submitted to the SWISS FEDERAL INSTITUTE OF TECHNOLOGY ZÜRICH for the degree of Doctor of Technical Seiences
MehrTitelbild1 ANSYS. Customer Portal LogIn
Titelbild1 ANSYS Customer Portal LogIn 1 Neuanmeldung Neuanmeldung: Bitte Not yet a member anklicken Adressen-Check Adressdaten eintragen Customer No. ist hier bereits erforderlich HERE - Button Hier nochmal
MehrThere are 10 weeks this summer vacation the weeks beginning: June 23, June 30, July 7, July 14, July 21, Jul 28, Aug 4, Aug 11, Aug 18, Aug 25
Name: AP Deutsch Sommerpaket 2014 The AP German exam is designed to test your language proficiency your ability to use the German language to speak, listen, read and write. All the grammar concepts and
MehrSELF-STUDY DIARY (or Lerntagebuch) GER102
SELF-STUDY DIARY (or Lerntagebuch) GER102 This diary has several aims: To show evidence of your independent work by using an electronic Portfolio (i.e. the Mahara e-portfolio) To motivate you to work regularly
MehrInstruktionen Mozilla Thunderbird Seite 1
Instruktionen Mozilla Thunderbird Seite 1 Instruktionen Mozilla Thunderbird Dieses Handbuch wird für Benutzer geschrieben, die bereits ein E-Mail-Konto zusammenbauen lassen im Mozilla Thunderbird und wird
MehrLehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str. 3 07743 Jena
Lehrstuhl für Allgemeine BWL Strategisches und Internationales Management Prof. Dr. Mike Geppert Carl-Zeiß-Str. 3 07743 Jena http://www.im.uni-jena.de Contents I. Learning Objectives II. III. IV. Recap
MehrLogin data for HAW Mailer, Emil und Helios
Login data for HAW Mailer, Emil und Helios Es gibt an der HAW Hamburg seit einiger Zeit sehr gute Online Systeme für die Studenten. Jeder Student erhält zu Beginn des Studiums einen Account für alle Online
MehrFranke & Bornberg award AachenMünchener private annuity insurance schemes top grades
Franke & Bornberg award private annuity insurance schemes top grades Press Release, December 22, 2009 WUNSCHPOLICE STRATEGIE No. 1 gets best possible grade FFF ( Excellent ) WUNSCHPOLICE conventional annuity
MehrTIn 1: Feedback Laboratories. Lecture 4 Data transfer. Question: What is the IP? Institut für Embedded Systems. Institut für Embedded Systems
Mitglied der Zürcher Fachhochschule TIn 1: Lecture 4 Data transfer Feedback Laboratories Question: What is the IP? Why do we NEED an IP? Lecture 3: Lernziele Moving data, the why s and wherefores Moving
MehrPatentrelevante Aspekte der GPLv2/LGPLv2
Patentrelevante Aspekte der GPLv2/LGPLv2 von RA Dr. Till Jaeger OSADL Seminar on Software Patents and Open Source Licensing, Berlin, 6./7. November 2008 Agenda 1. Regelungen der GPLv2 zu Patenten 2. Implizite
MehrHIR Method & Tools for Fit Gap analysis
HIR Method & Tools for Fit Gap analysis Based on a Powermax APML example 1 Base for all: The Processes HIR-Method for Template Checks, Fit Gap-Analysis, Change-, Quality- & Risk- Management etc. Main processes
MehrFrequently asked Questions for Kaercher Citrix (apps.kaercher.com)
Frequently asked Questions for Kaercher Citrix (apps.kaercher.com) Inhalt Content Citrix-Anmeldung Login to Citrix Was bedeutet PIN und Token (bei Anmeldungen aus dem Internet)? What does PIN and Token
MehrRS232-Verbindung, RXU10 Herstellen einer RS232-Verbindung zwischen PC und Messgerät oder Modem und Messgerät
Betriebsanleitung RS232-Verbindung, RXU10 Herstellen einer RS232-Verbindung zwischen PC und Messgerät oder Modem und Messgerät ä 2 Operating Instructions RS232 Connection, RXU10 Setting up an RS232 connection
Mehr(Prüfungs-)Aufgaben zum Thema Scheduling
(Prüfungs-)Aufgaben zum Thema Scheduling 1) Geben Sie die beiden wichtigsten Kriterien bei der Wahl der Größe des Quantums beim Round-Robin-Scheduling an. 2) In welchen Situationen und von welchen (Betriebssystem-)Routinen
MehrGRIPS - GIS basiertes Risikoanalyse-, Informations- und Planungssystem
GRIPS - GIS basiertes Risikoanalyse-, Informations- und Planungssystem GIS based risk assessment and incident preparation system Gregor Lämmel TU Berlin GRIPS joined research project TraffGo HT GmbH Rupprecht
MehrCABLE TESTER. Manual DN-14003
CABLE TESTER Manual DN-14003 Note: Please read and learn safety instructions before use or maintain the equipment This cable tester can t test any electrified product. 9V reduplicated battery is used in
MehrSoftware Echtzeitverhalten in den Griff Bekommen
Software Echtzeitverhalten in den Griff Bekommen B.Sc.Markus Barenhoff [www.embedded-tools.de] Dr. Nicholas Merriam [www.rapitasystems.com] Übersicht Reaktionszeit Nettolaufzeit Optimierung Worst-Case
MehrRollen im Participant Portal
Rollen im Participant Portal Stand Februar 2011 Inhaltsverzeichnis 1 Welche Aufteilung existiert grundsätzlich im PP?...3 1.1 Organisation Roles:...3 1.2 Project Roles:...4 1.2.1 1st level: Coordinator
Mehr39 Object Request Brokers. 40 Components of an ORB. 40.1 Stubs and Skeletons. 40.1.1 Stub
39 Object Request Brokers 40.1 Stubs and s invoke methods at remote objects (objects that run in another JVM) Stub: Proxy for remote object example ORBs: RMI, JavaIDL : Invokes methods at remote object
MehrH Mcast Future Internet made in Hamburg?
H Mcast Future Internet made in Hamburg? Thomas Schmidt (HAW Hamburg) schmidt@informatik.haw-hamburg.de Forschungsschwerpunkt: IMS Interagierende Multimediale Systeme 1 Prof. Dr. Thomas Schmidt http://www.haw-hamburg.de/inet
MehrSAP PPM Enhanced Field and Tab Control
SAP PPM Enhanced Field and Tab Control A PPM Consulting Solution Public Enhanced Field and Tab Control Enhanced Field and Tab Control gives you the opportunity to control your fields of items and decision
MehrInformeller Brief Schreiben
preliminary note Every letter is something special and unique. It's difficult to give strict rules how to write a letter. Nevertheless, there are guidelines how to start and finish a letter. Like in English
MehrDynamische Programmiersprachen. David Schneider david.schneider@hhu.de STUPS - 25.12.02.50
Dynamische Programmiersprachen David Schneider david.schneider@hhu.de STUPS - 25.12.02.50 Organisatorisches Aufbau: Vorlesung 2 SWS Übung Kurzreferat Projekt Prüfung Übung wöchentliches Aufgabenblatt in
MehrKURZANLEITUNG. Firmware-Upgrade: Wie geht das eigentlich?
KURZANLEITUNG Firmware-Upgrade: Wie geht das eigentlich? Die Firmware ist eine Software, die auf der IP-Kamera installiert ist und alle Funktionen des Gerätes steuert. Nach dem Firmware-Update stehen Ihnen
Mehrherzberg social housing complex green living
Vienna 2011 social housing complex green living Seite 1/9 Vienna 2011 social housing complex green living since summer 2011, the new residents of the Herzberg public housing project developed by AllesWirdGut
MehrREPARATURSERVICE von starren und flexiblen Endoskopen
REPARATURSERVICE von starren und flexiblen Endoskopen Reparaturservice: Kundenbetreuung: Abholung / Lieferung: Unser Paketservice holt defekte Geräte deutschlandweit am gleichen Tag der Schadensmeldung
MehrThe Single Point Entry Computer for the Dry End
The Single Point Entry Computer for the Dry End The master computer system was developed to optimize the production process of a corrugator. All entries are made at the master computer thus error sources
MehrONLINE LICENCE GENERATOR
Index Introduction... 2 Change language of the User Interface... 3 Menubar... 4 Sold Software... 5 Explanations of the choices:... 5 Call of a licence:... 7 Last query step... 9 Call multiple licenses:...
MehrEinführung in die Linguistik, Teil 4
Einführung in die Linguistik, Teil 4 Menschliche Sprachverarbeitung im Rahmen der Kognitionswissenschaft Markus Bader, Frans Plank, Henning Reetz, Björn Wiemer Einführung in die Linguistik, Teil 4 p. 1/19
MehrH. Enke, Sprecher des AK Forschungsdaten der WGL
https://escience.aip.de/ak-forschungsdaten H. Enke, Sprecher des AK Forschungsdaten der WGL 20.01.2015 / Forschungsdaten - DataCite Workshop 1 AK Forschungsdaten der WGL 2009 gegründet - Arbeit für die
MehrProgrammentwicklung ohne BlueJ
Objektorientierte Programmierung in - Eine praxisnahe Einführung mit Bluej Programmentwicklung BlueJ 1.0 Ein BlueJ-Projekt Ein BlueJ-Projekt ist der Inhalt eines Verzeichnisses. das Projektname heißt wie
MehrAufnahmeuntersuchung für Koi
Aufnahmeuntersuchung für Koi Datum des Untersuchs: Date of examination: 1. Angaben zur Praxis / Tierarzt Vet details Name des Tierarztes Name of Vet Name der Praxis Name of practice Adresse Address Beruf
MehrHow-To-Do. Hardware Configuration of the CC03 via SIMATIC Manager from Siemens
How-To-Do Hardware Configuration of the CC03 via SIMATIC Manager from Siemens Content Hardware Configuration of the CC03 via SIMATIC Manager from Siemens... 1 1 General... 2 1.1 Information... 2 1.2 Reference...
MehrThe new IFRS proposal for leases - The initial and subsequent measurement -
Putting leasing on the line: The new IFRS proposal for leases - The initial and subsequent measurement - Martin Vogel 22. May 2009, May Fair Hotel, London 2004 KPMG Deutsche Treuhand-Gesellschaft Aktiengesellschaft
MehrChallenges for the future between extern and intern evaluation
Evaluation of schools in switzerland Challenges for the future between extern and intern evaluation Michael Frais Schulentwicklung in the Kanton Zürich between internal evaluation and external evaluation
MehrRULES FOR THE FIS YOUTH CUP SKI JUMPING REGLEMENT FÜR DEN FIS JUGEND CUP SKISPRINGEN
RULES FOR THE FIS YOUTH CUP SKI JUMPING REGLEMENT FÜR DEN FIS JUGEND CUP SKISPRINGEN EDITION 2015/2016 RULES FIS YOUTH SKI JUMPING 2015-2016 Legend: YOS = FIS Youth Ski Jumping 1. Calendar Planning as
MehrCHAMPIONS Communication and Dissemination
CHAMPIONS Communication and Dissemination Europa Programm Center Im Freistaat Thüringen In Trägerschaft des TIAW e. V. 1 CENTRAL EUROPE PROGRAMME CENTRAL EUROPE PROGRAMME -ist als größtes Aufbauprogramm
MehrVorlesung Algorithmische Geometrie. Streckenschnitte. Martin Nöllenburg 19.04.2011
Vorlesung Algorithmische Geometrie LEHRSTUHL FÜR ALGORITHMIK I INSTITUT FÜR THEORETISCHE INFORMATIK FAKULTÄT FÜR INFORMATIK Martin Nöllenburg 19.04.2011 Überlagern von Kartenebenen Beispiel: Gegeben zwei
MehrSupplier Status Report (SSR)
Supplier Status Report (SSR) Introduction for BOS suppliers BOS GmbH & Co. KG International Headquarters Stuttgart Ernst-Heinkel-Str. 2 D-73760 Ostfildern Management Letter 2 Supplier Status Report sheet
MehrExtended Ordered Paired Comparison Models An Application to the Data from Bundesliga Season 2013/14
Etended Ordered Paired Comparison Models An Application to the Data from Bundesliga Season 2013/14 Gerhard Tutz & Gunther Schauberger Ludwig-Maimilians-Universität München Akademiestraße 1, 80799 München
MehrDatabase Management. Prof. Dr. Oliver Günther und Steffan Baron Sommersemester 2002 (I)
HUMBOLDT UNIVERSITÄT ZU BERLIN Wirtschaftswissenschaftliche Fakultät Telefon: (030) 2093-5742 Institut für Wirtschaftsinformatik Telefax: (030) 2093-5741 Spandauer Str. 1 10178 Berlin E-mail: iwi@wiwi.hu-berlin.de
MehrAber genau deshalb möchte ich Ihre Aufmehrsamkeit darauf lenken und Sie dazu animieren, der Eventualität durch geeignete Gegenmaßnahmen zu begegnen.
NetWorker - Allgemein Tip 618, Seite 1/5 Das Desaster Recovery (mmrecov) ist evtl. nicht mehr möglich, wenn der Boostrap Save Set auf einem AFTD Volume auf einem (Data Domain) CIFS Share gespeichert ist!
MehrRailMaster New Version 7.00.p26.01 / 01.08.2014
RailMaster New Version 7.00.p26.01 / 01.08.2014 English Version Bahnbuchungen so einfach und effizient wie noch nie! Copyright Copyright 2014 Travelport und/oder Tochtergesellschaften. Alle Rechte vorbehalten.
MehrC R 2025 C LOSE PUSH OPEN
3V C R 2025 C LOSE PUSH OPEN ) ) ) 25 222 3V C R 2025 C LOSE PUSH OPEN 25 222 3V C R 2025 C LOSE PUSH OPEN 25 222 Den här symbolen på produkten eller i instruktionerna betyder att den elektriska
MehrDOWNLOAD. Englisch in Bewegung. Spiele für den Englischunterricht. Britta Buschmann. Downloadauszug aus dem Originaltitel:
DOWNLOAD Britta Buschmann Englisch in Bewegung Spiele für den Englischunterricht auszug aus dem Originaltitel: Freeze Hör-/ und Sehverstehen Folgende Bewegungen werden eingeführt: run: auf der Stelle rennen
MehrExercise (Part I) Anastasia Mochalova, Lehrstuhl für ABWL und Wirtschaftsinformatik, Kath. Universität Eichstätt-Ingolstadt 1
Exercise (Part I) Notes: The exercise is based on Microsoft Dynamics CRM Online. For all screenshots: Copyright Microsoft Corporation. The sign ## is you personal number to be used in all exercises. All
MehrNotice: All mentioned inventors have to sign the Report of Invention (see page 3)!!!
REPORT OF INVENTION Please send a copy to An die Abteilung Technologietransfer der Universität/Hochschule An die Technologie-Lizenz-Büro (TLB) der Baden-Württembergischen Hochschulen GmbH Ettlinger Straße
MehrB I N G O DIE SCHULE. Bingo card: Classroom Items. 2007 abcteach.com
Bingo call sheet: Classroom Items Das Klassenzimmer die Tafel die Kreide die Uhr die Landkarte das Buch das Heft der Kugelschreiber die Füllfeder der Stuhl der Bleistift das Papier der Schreibtisch der
MehrDisclaimer & Legal Notice. Haftungsausschluss & Impressum
Disclaimer & Legal Notice Haftungsausschluss & Impressum 1. Disclaimer Limitation of liability for internal content The content of our website has been compiled with meticulous care and to the best of
MehrHow to access licensed products from providers who are already operating productively in. General Information... 2. Shibboleth login...
Shibboleth Tutorial How to access licensed products from providers who are already operating productively in the SWITCHaai federation. General Information... 2 Shibboleth login... 2 Separate registration
MehrNVR Mobile Viewer for iphone/ipad/ipod Touch
NVR Mobile Viewer for iphone/ipad/ipod Touch Quick Installation Guide DN-16111 DN-16112 DN16113 2 DN-16111, DN-16112, DN-16113 for Mobile ios Quick Guide Table of Contents Download and Install the App...
MehrPrediction Market, 28th July 2012 Information and Instructions. Prognosemärkte Lehrstuhl für Betriebswirtschaftslehre insbes.
Prediction Market, 28th July 2012 Information and Instructions S. 1 Welcome, and thanks for your participation Sensational prices are waiting for you 1000 Euro in amazon vouchers: The winner has the chance
MehrInvitation - Benutzerhandbuch. User Manual. User Manual. I. Deutsch 2. 1. Produktübersicht 2. 1.1. Beschreibung... 2
Invitation - Inhaltsverzeichnis I. Deutsch 2 1. Produktübersicht 2 1.1. Beschreibung......................................... 2 2. Installation und Konfiguration 2 2.1. Installation...........................................
MehrLevel of service estimation at traffic signals based on innovative traffic data services and collection techniques
Level of service estimation at traffic signals based on innovative traffic data services and collection techniques Authors: Steffen Axer, Jannis Rohde, Bernhard Friedrich Network-wide LOS estimation at
MehrIn vier Schritten zum Titel. erfolgreichen Messeauftritt. Four steps to a successful trade fair. Hier beginnt Zukunft! The future starts here!
In vier Schritten zum Titel erfolgreichen Messeauftritt. Four steps to a successful trade fair. Hier beginnt Zukunft! The future starts here! Einleitung Intro Um Sie dabei zu unterstützen, Ihren Messeauftritt
MehrRestschmutzanalyse Residual Dirt Analysis
Q-App: Restschmutzanalyse Residual Dirt Analysis Differenzwägeapplikation, mit individueller Proben ID Differential weighing application with individual Sample ID Beschreibung Gravimetrische Bestimmung
MehrJunction of a Blended Wing Body Aircraft
Topology Optimization of the Wing-Cabin Junction of a Blended Wing Body Aircraft Bin Wei M.Sc. Ögmundur Petersson M.Sc. 26.11.2010 Challenge of wing root design Compare to conventional aircraft: Improved
MehrKurzanleitung um Transponder mit einem scemtec TT Reader und der Software UniDemo zu lesen
Kurzanleitung um Transponder mit einem scemtec TT Reader und der Software UniDemo zu lesen QuickStart Guide to read a transponder with a scemtec TT reader and software UniDemo Voraussetzung: - PC mit der
MehrOptimization in Business Applications: 2. Modeling principles
Optimization in Business Applications: 2. Modeling principles IGS Course Dynamic Intelligent Systems Part 2 Universität Paderborn, June July 2010 Leena Suhl www.dsor.de Prof. Dr. Leena Suhl, suhl@dsor.de
MehrFAQ - Häufig gestellte Fragen zur PC Software iks AQUASSOFT FAQ Frequently asked questions regarding the software iks AQUASSOFT
FAQ - Häufig gestellte Fragen zur PC Software iks AQUASSOFT FAQ Frequently asked questions regarding the software iks AQUASSOFT Mit welchen Versionen des iks Computers funktioniert AQUASSOFT? An Hand der
MehrField Librarianship in den USA
Field Librarianship in den USA Bestandsaufnahme und Zukunftsperspektiven Vorschau subject librarians field librarians in den USA embedded librarians das amerikanische Hochschulwesen Zukunftsperspektiven
MehrLoad balancing Router with / mit DMZ
ALL7000 Load balancing Router with / mit DMZ Deutsch Seite 3 English Page 10 ALL7000 Quick Installation Guide / Express Setup ALL7000 Quick Installation Guide / Express Setup - 2 - Hardware Beschreibung
MehrLesen Sie die Bedienungs-, Wartungs- und Sicherheitsanleitungen des mit REMUC zu steuernden Gerätes
KURZANLEITUNG VORAUSSETZUNGEN Lesen Sie die Bedienungs-, Wartungs- und Sicherheitsanleitungen des mit REMUC zu steuernden Gerätes Überprüfen Sie, dass eine funktionsfähige SIM-Karte mit Datenpaket im REMUC-
MehrAbteilung Internationales CampusCenter
Abteilung Internationales CampusCenter Instructions for the STiNE Online Enrollment Application for Exchange Students 1. Please go to www.uni-hamburg.de/online-bewerbung and click on Bewerberaccount anlegen
MehrTechnical Information
Firmware-Installation nach Einbau des DP3000-OEM-Kits Dieses Dokument beschreibt die Schritte die nach dem mechanischen Einbau des DP3000- OEM-Satzes nötig sind, um die Projektoren mit der aktuellen Firmware
Mehraqpa Vereinstreffen 15. Okt. 2014, Wien
aqpa Vereinstreffen 15. Okt. 2014, Wien EU-GMP-Richtlinie Part II Basic Requirements for Active Substances used as Starting Materials Dr. Markus Thiel Roche Austria GmbH History ICH Richtlinie Q7 Nov.
Mehr