Enclosure Methods for Systems of Polynomial Equations and Inequalities

Total Page:16

File Type:pdf, Size:1020Kb

Enclosure Methods for Systems of Polynomial Equations and Inequalities Enclosure Methods for Systems of Polynomial Equations and Inequalities Dissertation zur Erlangung des akademischen Grades des Doktors der Naturwissenschaften (Dr. rer. nat.) an der Mathematisch-Naturwissenschaftliche Sektion Fachbereich Mathematik und Statistik vorgelegt von Andrew Paul Smith Tag der mündlichen Prüfung: 5. Oktober 2012 1. Referent: Prof. Dr. Jürgen Garloff, Universität Konstanz und HTWG Konstanz 2. Referent: Prof. Dr. Jon Rokne, University of Calgary Abstract Many problems in applied mathematics can be formulated as a system of nonlinear equa- tions or inequalities, and a broad subset are those problems consisting either partially or completely of multivariate polynomials. Broadly speaking, an ‘enclosure’ method attempts n to solve such a problem over a specified region of interest, commonly a box subset of R , where n is the number of unknowns. Subdivision (or branch-and-bound) is a commonly- applied scheme, wherein a starting box is successively subdivided into sub-boxes; sub-boxes for which a proof of non-existence of a solution can be completed are discarded. As a component of such, a boundary method attempts to exploit the properties of component functions over the boundary of a sub-box, without considering their behaviour within it. Two main types of non-existence proof are considered for polynomial systems over boxes or sub-boxes. Firstly, the topological degree of a system of equations (considered as a n n mapping from R to R ) can be computed over a sub-box, which possesses a root-counting property. Together with an enclosure for the determinant of the Jacobian, the existence (or otherwise) of roots in the sub-box can be ascertained. Secondly, and alternatively, a range-enclosing method can be used to compute a guaranteed outer enclosure for the range of a multivariate polynomial over a sub-box; if it does not contain zero, a root is excluded. The Bernstein expansion is used, due to the tightness of the enclosure yielded and its rate of convergence to the true enclosure. In both cases, interval arithmetic is employed to obtain guaranteed enclosures and ensure the rigour of these existence tests. Advances have been made in four main areas. Firstly, an existing recursive algorithm for the computation of topological degree is investigated in detail, including a complexity analysis, and algorithmic improvements are proposed. Secondly, a simple branch-and-bound method for systems of polynomial equations, utilising Bernstein expansion and an existence test by Miranda, is developed, and alternative subdivision strategies are considered. Thirdly, a major improvement of the Bernstein expansion itself is achieved with the development of the implicit Bernstein form, which exhibits greatly improved performance for many cate- gories of polynomials. Finally, several new methods are developed and compared for the computation of affine lower bounding functions for polynomials, which may be employed in branch-and-bound schemes for problems involving inequalities, such as global optimisation problems. Numerical results and an overview of the developed software are given. i Zusammenfassung Viele Probleme der angewandten Mathematik können als Systeme nichtlinearer Gleichungen oder Ungleichungen formuliert werden. Eine große Teilmenge davon besteht teilweise oder vollständig aus multivariablen Polynomen. Die Idee einer Einschließungsmethode löst ein solches Problem innerhalb einer relevanten Region. Gewöhnlich ist diese Region eine Box- n Teilmenge von R , wobei n die Anzahl der Unbekannten ist. Subdivision (oder Branch-and- Bound) ist ein oft verwendetes Schema, bei dem eine Anfangsbox sukzessiv in Subboxen unterteilt wird. Subboxen, für die die Nichtexistenz einer Lösung bewiesen werden kann, werden ausgeschlossen. Als Bestandteil dieses Schemas ist die Randmethode, die versucht die Randeigenschaften der Komponentenfunktionen bezüglich der Subbox auszunutzen ohne dabei das Verhalten innerhalb der Subbox zu betrachten. Die Nichtexistenzbeweise für Systeme polynomer Gleichungen über Boxen oder Subboxen werden durch zwei Haupttypen beschrieben. Der erste Typ kann durch den topologis- n n chen Grad eines Gleichungssystems (als eine Abbildung von R auf R ) über eine Sub- box beschrieben werden. Diese besitzt die Eigenschaft, die Anzahl der Wurzeln zählen zu können. Dabei kann die Existenz (oder Nichtexistenz) von Wurzeln in dieser Sub- box durch die Bestimmung einer Einschließung der Determinanten der Jacobi-Matrix er- mittelt werden. Als zweiter Grundtyp bildet die Bereichseinschließungmethode, die eine äußere Einschränkung des Bildbereichs eines multivariablen Polynoms durch eine Sub- box garantiert. Enthält dieses Intervall nicht Null, so kann auch das Vorkommen einer Wurzel ausgeschlossen werden. Fokus der Bernstein-Erweiterung ist die Bestimmung präzis- erer Grenzen für die Einschließung und eine schnellere Konvergenz gegen die exakte Ein- schließung. Um eine garantierte Einschließung und die Korrektheit dieses Existenz-Tests sicherzustellen, wird in beiden Fällen die Intervallarithmetik angewandt. Es wurden Fortschritte in vier Bereichen erzielt. Erstens wurde ein existierender rekur- siver Algorithmus für die Berechnung des topologischen Grads detailiert untersucht. Dabei liegt die Betonung auf die Komplexitätsanalyse und algorithmische Verbesserung und Er- weiterungen. Der zweite Bereich beschäftigt sich zunächst mit einer einfachen Branch-and- Bound-Methode für polynome Gleichungssysteme. Dafür wurden die Bernstein-Erweiterung und der Existenz-Test von Miranda verwendet. Weiterhin wurden alternative Strategien zur Subdivision in Betracht gezogen. Drittens wurde eine wesentliche Verbesserung der Bernstein-Erweiterung durch die Entwicklung der impliziten Bernstein-Form erzielt. Es zeigt sich eine starke Verbesserung der Leistung für viele Arten von Polynomen. Ab- schließend wurden mehrere neue Verfahren für die Berechnung von unteren affinen Gren- zfunktionen für Polynome entwickelt und miteinander verglichen. Diese neue Verfahren können für Branch-and-Bound-Verfahren bei Problemen mit Ungleichungen, wie z.B. glob- ale Optimierungsprobleme, eingesetzt werden. Numerische Ergebnisse und eine Übersicht der entwickelten Software liegen vor. ii Acknowledgements First and foremost, I would like to warmly thank the two supervisors of this work, Dan Richardson (during my time in Bath, U.K.) and Jürgen Garloff (during my time in Konstanz, Germany), for their expert, friendly, and productive supervision and co-operation, as well as their patience and generosity. I would like to thank a number of people with whom I have been fortunate enough to co-write research papers, for their productive co-operation, principally Jürgen Garloff, but also (in chronological order) Christian Jansson, Ismail Idriss, Laurent Granvilliers, Evgenija Popova, Horst Werkle, and Riad Al-Kasasbeh. I would like to thank Hermann Schichl and Evgenija Popova for making their software available to me and for their technical assistance. Thanks also to the authors and main- tainers of the filib++ software package, which I have used extensively. I would like to thank my family for their love and support; in particular my mother, who never gave up gently pestering me to complete this thesis during the excessively long hiatus — I can’t believe it’s finished it, either! I’d like to pay tribute to a number of people who have helped to keep me (somewhat) sane during this odyssey in various ways: From the gaming group, I’d like to mention Christoph, Volker, Jan, Ole, Martin, Stefan, Sünje, Regina, Kris, Tamara, Patrick, and Christine. From the Institute for Optical Systems (IOS) at the HTWG Konstanz, Dang Le, Alex, David, Marcus, Thomas, Jan, Andy, Manuel, Klaus, Matthias Franz, as well as several others. I’d like to thank Dang for his support and motivation during our mutual struggles to write up our theses! I’d also like to thank several friends in the U.K., Mark, Richard, Phil, Caroline and Stuart, and Russ for staying in contact (in spite of my frequent silences!) during my long sojourn in Germany. I would like to thank a number of people who have helped to arrange financial sup- port and employment in various ways: at the University of Bath, Dan Richardson; at the HTWG Konstanz, Jürgen Garloff, Horst Werkle, Florin Ionescu, and Riad Al-Kasasbeh (Al- Balqa Applied University, Jordan); at the University of Konstanz, Jürgen Garloff, Markus Schweighofer, Stefan Volkwein, and Rainer Janßen. In particular I would like to thank Riad for his motivational support and his helpful urging during the final stages of this work, as well as his friendship and his help with potential future employment. I would like to gratefully acknowledge several funding agencies that have supported this work, either directly or indirectly. The University of Bath and the Engineering and Physical Sciences Research Council (EPSRC), in the U.K., and the University of Konstanz, in Ger- many, have partially funded my doctoral research with stipendia. The German Research Foundation (DFG), the German Ministry of Education, Science, Research, and Technol- ogy, the State of Baden-Württemberg, and the University of Applied Sciences (HTWG) Konstanz, in Germany, have funded several research projects on which have I have worked together with Jürgen Garloff; some of that research appears in this thesis. I would like to thank the two referees, Jürgen Garloff and Jon Rokne, as well as the oral examiners, for taking the time to review my work. For proofreading, thanks to Volker Bürkel, Martin Spitzbarth, and Dang Le. iii
Recommended publications
  • Acm's Fy14 Annual Report
    acm’s annual report for FY14 DOI:10.1145/2691599 ACM Council PRESIDENT ACM’s FY14 Vinton G. Cerf VICE PRESIDENT Annual Report Alexander L. Wolf SECRETAry/TREASURER As I write this letter, ACM has just issued Vicki L. Hanson a landmark announcement revealing the PAST PRESIDENT monetary level for the ACM A.M. Turing Alain Chesnais Award will be raised this year to $1 million, SIG GOVERNING BOARD CHAIR Erik Altman with all funding provided by Google puter science and mathematics. I was PUBLICATIONS BOARD Inc. The news made the global rounds honored to be a participant in this CO-CHAIRS in record time, bringing worldwide inaugural event; I found it an inspi- Jack Davidson visibility to the award and the Associa- rational gathering of innovators and Joseph A. Konstan tion. Long recognized as the equiva- understudies who will be the next MEMBERS-AT-LARGE lent to the Nobel Prize for computer award recipients. Eric Allman science, ACM’s Turing Award now This year also marked the publica- Ricardo Baeza-Yates carries the financial clout to stand on tion of highly anticipated ACM-IEEE- Cherri Pancake the same playing field with the most CS collaboration Computer Science Radia Perlman esteemed scientific and cultural prizes Curricula 2013 and the acclaimed Re- Mary Lou Soffa honoring game changers whose con- booting the Pathway to Success: Prepar- Eugene Spafford tributions have transformed the world. ing Students for Computer Workforce Salil Vadhan This really is an extraordinary time Needs in the United States, an exhaus- SGB COUNCIL to be part of the world’s largest educa- tive report from ACM’s Education REPRESENTATIVES tional and scientific society in comput- Policy Committee that focused on IT Brent Hailpern ing.
    [Show full text]
  • Software Technical Report
    A Technical History of the SEI Larry Druffel January 2017 SPECIAL REPORT CMU/SEI-2016-SR-027 SEI Director’s Office Distribution Statement A: Approved for Public Release; Distribution is Unlimited http://www.sei.cmu.edu Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineer- ing Institute, a federally funded research and development center. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense. References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Carnegie Mellon University or its Software Engineering Institute. This report was prepared for the SEI Administrative Agent AFLCMC/PZM 20 Schilling Circle, Bldg 1305, 3rd floor Hanscom AFB, MA 01731-2125 NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [Distribution Statement A] This material has been approved for public release and unlimited distribu- tion.
    [Show full text]
  • The Social Economic and Environmental Impacts of Trade
    Journal of Modern Education Review, ISSN 2155-7993, USA August 2020, Volume 10, No. 8, pp. 597–603 Doi: 10.15341/jmer(2155-7993)/08.10.2020/007 © Academic Star Publishing Company, 2020 http://www.academicstar.us Musical Vectors and Spaces Candace Carroll, J. X. Carteret (1. Department of Mathematics, Computer Science, and Engineering, Gordon State College, USA; 2. Department of Fine and Performing Arts, Gordon State College, USA) Abstract: A vector is a quantity which has both magnitude and direction. In music, since an interval has both magnitude and direction, an interval is a vector. In his seminal work Generalized Musical Intervals and Transformations, David Lewin depicts an interval i as an arrow or vector from a point s to a point t in musical space. Using Lewin’s text as a point of departure, this article discusses the notion of musical vectors in musical spaces. Key words: Pitch space, pitch class space, chord space, vector space, affine space 1. Introduction A vector is a quantity which has both magnitude and direction. In music, since an interval has both magnitude and direction, an interval is a vector. In his seminal work Generalized Musical Intervals and Transformations, David Lewin (2012) depicts an interval i as an arrow or vector from a point s to a point t in musical space (p. xxix). Using Lewin’s text as a point of departure, this article further discusses the notion of musical vectors in musical spaces. t i s Figure 1 David Lewin’s Depiction of an Interval i as a Vector Throughout the discussion, enharmonic equivalence will be assumed.
    [Show full text]
  • The Computational Attitude in Music Theory
    The Computational Attitude in Music Theory Eamonn Bell Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2019 © 2019 Eamonn Bell All rights reserved ABSTRACT The Computational Attitude in Music Theory Eamonn Bell Music studies’s turn to computation during the twentieth century has engendered particular habits of thought about music, habits that remain in operation long after the music scholar has stepped away from the computer. The computational attitude is a way of thinking about music that is learned at the computer but can be applied away from it. It may be manifest in actual computer use, or in invocations of computationalism, a theory of mind whose influence on twentieth-century music theory is palpable. It may also be manifest in more informal discussions about music, which make liberal use of computational metaphors. In Chapter 1, I describe this attitude, the stakes for considering the computer as one of its instruments, and the kinds of historical sources and methodologies we might draw on to chart its ascendance. The remainder of this dissertation considers distinct and varied cases from the mid-twentieth century in which computers or computationalist musical ideas were used to pursue new musical objects, to quantify and classify musical scores as data, and to instantiate a generally music-structuralist mode of analysis. I present an account of the decades-long effort to prepare an exhaustive and accurate catalog of the all-interval twelve-tone series (Chapter 2). This problem was first posed in the 1920s but was not solved until 1959, when the composer Hanns Jelinek collaborated with the computer engineer Heinz Zemanek to jointly develop and run a computer program.
    [Show full text]
  • Computer Viruses and Malware Advances in Information Security
    Computer Viruses and Malware Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email: [email protected] The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treatment. Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with ideas for books under this series. Additional tities in the series: HOP INTEGRITY IN THE INTERNET by Chin-Tser Huang and Mohamed G. Gouda; ISBN-10: 0-387-22426-3 PRIVACY PRESERVING DATA MINING by Jaideep Vaidya, Chris Clifton and Michael Zhu; ISBN-10: 0-387- 25886-8 BIOMETRIC USER AUTHENTICATION FOR IT SECURITY: From Fundamentals to Handwriting by Claus Vielhauer; ISBN-10: 0-387-26194-X IMPACTS AND RISK ASSESSMENT OF TECHNOLOGY FOR INTERNET SECURITY.'Enabled Information Small-Medium Enterprises (TEISMES) by Charles A.
    [Show full text]
  • Set Theory: a Gentle Introduction Dr
    Mu2108 Set Theory: A Gentle Introduction Dr. Clark Ross Consider (and play) the opening to Schoenberg’s Three Piano Pieces, Op. 11, no. 1 (1909): If we wish to understand how it is organized, we could begin by looking at the melody, which seems to naturally break into two three-note cells: , and . We can see right away that the two cells are similar in contour, but not identical; the first descends m3rd - m2nd, but the second descends M3rd - m2nd. We can use the same method to compare the chords that accompany the melody. They too are similar (both span a M7th in the L. H.), but not exactly the same (the “alto” (lower voice in the R. H.) only moves up a diminished 3rd (=M2nd enh.) from B to Db, while the L. H. moves up a M3rd). Let’s use a different method of analysis to examine the same excerpt, called SET THEORY. WHAT? • SET THEORY is a method of musical analysis in which PITCH CLASSES are represented by numbers, and any grouping of these pitch classes is called a SET. • A PITCH CLASS (pc) is the class (or set) of pitches with the same letter (or solfège) name that are octave duplications of one another. “Middle C” is a pitch, but “C” is a pitch class that includes middle C, and all other octave duplications of C. WHY? Atonal music is often organized in pitch groups that form cells (both horizontal and vertical), many of which relate to one another. Set Theory provides a shorthand method to label these cells, just like Roman numerals and inversion figures do (i.e., ii 6 ) in tonal music.
    [Show full text]
  • An Interview With
    An Interview with LANCE HOFFMAN OH 451 Conducted by Rebecca Slayton on 1 July 2014 George Washington University Washington, D.C. Charles Babbage Institute Center for the History of Information Technology University of Minnesota, Minneapolis Copyright, Charles Babbage Institute Lance Hoffman Interview 1 July 2014 Oral History 451 Abstract This interview with security pioneer Lance Hoffman discusses his entrance into the field of computer security and privacy—including earning a B.S. in math at the Carnegie Institute of Technology, interning at SDC, and earning a PhD at Stanford University— before turning to his research on computer security risk management at as a Professor at the University of California–Berkeley and George Washington University. He also discusses the relationship between his PhD research on access control models and the political climate of the late 1960s, and entrepreneurial activities ranging from the creation of a computerized dating service to the starting of a company based upon the development of a decision support tool, RiskCalc. Hoffman also discusses his work with the Association for Computing Machinery and IEEE Computer Society, including his role in helping to institutionalize the ACM Conference on Computers, Freedom, and Privacy. The interview concludes with some reflections on the current state of the field of cybersecurity and the work of his graduate students. This interview is part of a project conducted by Rebecca Slayton and funded by an ACM History Committee fellowship on “Measuring Security: ACM and the History of Computer Security Metrics.” 2 Slayton: So to start, please tell us a little bit about where you were born, where you grew up.
    [Show full text]
  • Pitch-Class Sets and Microtonalism Hudson Lacerda (2010)
    Pitch-class sets and microtonalism Hudson Lacerda (2010) Introduction This text addresses some aspects of pitch-class sets, in an attempt to apply the concept to equal-tempered scales other than 12-EDO. Several questions arise, since there are limitations of application of certain pitch-class sets properties and relations in other scales. This is a draft which sketches some observations and reflections. Pitch classes The pitch class concept itself, assuming octave equivalence and alternative spellings to notate the same pitch, is not problematic provided that the interval between near pitches is enough large so that different pitches can be perceived (usually not a problem for a small number of equal divisions of the octave). That is also limited by the context and other possible factors. The use of another equivalence interval than the octave imposes revere restrictions to the perception and requires specially designed timbres, for example: strong partials 3 and 9 for the Bohlen-Pierce scale (13 equal divisions of 3:1), or stretched/shrinked harmonic spectra for tempered octaves. This text refers to the equivalence interval as "octave". Sometimes, the number of divisions will be referred as "module". Interval classes There are different reduction degrees: 1) fit the interval inside an octave (13rd = 6th); 2) group complementar (congruent) intervals (6th = 3rd); In large numbers of divisions of the octave, the listener may not perceive near intervals as "classes" but as "intonations" of a same interval category (major 3rd, perfect 4th, etc.). Intervals may be ambiguous relative to usual categorization: 19-EDO contains, for example, an interval between a M3 and a P4; 17-EDO contains "neutral" thirds and so on.
    [Show full text]
  • Reducing Pessimism in Interval Analysis Using Bsplines Properties: Application to Robotics∗
    Reducing Pessimism in Interval Analysis using BSplines Properties: Application to Robotics∗ S´ebastienLengagne, Universit´eClermont Auvergne, CNRS, SIGMA Cler- mont, Institut Pascal, F-63000 Clermont-Ferrand, France. [email protected] Rawan Kalawouny Universit´eClermont Auvergne, CNRS, SIGMA Cler- mont, Institut Pascal, F-63000 Clermont-Ferrand, France. [email protected] Fran¸coisBouchon CNRS UMR 6620 and Clermont-Auvergne University, Math´ematiquesBlaise Pascal, Campus des C´ezeaux, 3 place Vasarely, TSA 60026, CS 60026, 63178 Aubi`ere Cedex France [email protected] Youcef Mezouar Universit´eClermont Auvergne, CNRS, SIGMA Cler- mont, Institut Pascal, F-63000 Clermont-Ferrand, France. [email protected] Abstract Interval Analysis is interesting to solve optimization and constraint satisfaction problems. It makes possible to ensure the lack of the solu- tion or the global optimal solution taking into account some uncertain- ties. However, it suffers from an over-estimation of the function called pessimism. In this paper, we propose to take part of the BSplines prop- erties and of the Kronecker product to have a less pessimistic evaluation of mathematical functions. We prove that this method reduces the pes- simism, hence the number of iterations when solving optimization or con- straint satisfaction problems. We assess the effectiveness of our method ∗Submitted: December 12, 2018; Revised: March 12, 2020; Accepted: July 23, 2020. yR. Kalawoun was supported by the French Government through the FUI Program (20th call with the project AEROSTRIP). 63 64 Lengagne et al, Reducing Pessimism in Interval Analysis on planar robots with 2-to-9 degrees of freedom and to 3D-robots with 4 and 6 degrees of freedom.
    [Show full text]
  • BBST Course 3 -- Test Design
    BLACK BOX SOFTWARE TESTING: INTRODUCTION TO TEST DESIGN: A SURVEY OF TEST TECHNIQUES CEM KANER, J.D., PH.D. PROFESSOR OF SOFTWARE ENGINEERING: FLORIDA TECH REBECCA L. FIEDLER, M.B.A., PH.D. PRESIDENT: KANER, FIEDLER & ASSOCIATES This work is licensed under the Creative Commons Attribution License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. These notes are partially based on research that was supported by NSF Grants EIA- 0113539 ITR/SY+PE: “Improving the Education of Software Testers” and CCLI-0717613 “Adaptation & Implementation of an Activity-Based Online or Hybrid Course in Software Testing.” Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. BBST Test Design Copyright (c) Kaner & Fiedler (2011) 1 NOTICE … … AND THANKS The practices recommended and The BBST lectures evolved out of practitioner-focused courses co- discussed in this course are useful for an authored by Kaner & Hung Quoc Nguyen and by Kaner & Doug Hoffman introduction to testing, but more (now President of the Association for Software Testing), which then experienced testers will adopt additional merged with James Bach’s and Michael Bolton’s Rapid Software Testing practices. (RST) courses. The online adaptation of BBST was designed primarily by Rebecca L. Fiedler. I am writing this course with the mass- market software development industry in Starting in 2000, the course evolved from a practitioner-focused course mind.
    [Show full text]
  • Euromac 9 Extended Abstract Template
    9th EUROPEAN MUSIC ANALYSIS CONFERENC E — E U R O M A C 9 Scott Brickman University of Maine at Fort Kent, USA [email protected] Collection Vectors and the Octatonic Scale (013467), 6z23 (023568), 6-27 (013469), 6-30 (013679), ABSTRACT 6z49 (013479) and 6z50 (014679). Background 6z13 transforms to 6z50 under the M7 operation. 6z23 and 6z49 Allen Forte, writing in The Structure of Atonal Music (1973), map unto themselves under the M7 operation, as do 6-27 and tabulated the prime forms and vectors of pitch-class sets 6-30 whose compliments are themselves. (PCsets). Additionally, he presented the idea of a set-complex, a set of sets associated by virtue of the inclusion relation. So, a way to perceive these hexachords is that they provide five Post-Tonal Theorists such as John Rahn, Robert Morris and areas. Joseph Straus, allude to Forte’s set-complex, but do not treat the concept at length. The interval vector, developed by Donald Martino, tabulates the intervals (dyads) in a collection. In order to comprehend the The interval vector, developed by Donald Martino (“The Source constitution of the octatonic hexachords, I decided to create a Set and Its Aggregate Formations,” Journal of Music Theory 5, "collection vector" which would tabulated the trichordal, no. 2, 1961) is a means by which the intervals, and more tetrachordal and pentachordal subsets of each octatonic specifically the dyads contained in a collection, can be identified hexachord. and tabulated. I began exploring the properties of the OH by tabulating their There exists no such tool for the identification and tabulation of trichordal subsets.
    [Show full text]
  • Software Studies: a Lexicon, Edited by Matthew Fuller, 2008
    fuller_jkt.qxd 4/11/08 7:13 AM Page 1 ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• S •••••••••••••••••••••••••••••••••••••new media/cultural studies ••••software studies •••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• O ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• F software studies\ a lexicon ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• T edited by matthew fuller Matthew Fuller is David Gee Reader in ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• This collection of short expository, critical, Digital Media at the Centre for Cultural ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• W and speculative texts offers a field guide Studies, Goldsmiths College, University of to the cultural, political, social, and aes- London. He is the author of Media ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• thetic impact of software. Computing and Ecologies: Materialist Energies in Art and A digital media are essential to the way we Technoculture (MIT Press, 2005) and ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• work and live, and much has been said Behind the Blip: Essays on the Culture of •••••••••••••••••••••••••••••••••••••
    [Show full text]